Home
        - Securepoint
         Contents
1.         Virusscan active    Virusscan active  Virusscan active       VNC Repeater  DynDNS Client    L2TP Server  PPTP Server  SPUVA Server  Web Server  DHCP Server  IPSec Server    0 connections on 1 tunnel  roadwarrior01 0 connections on 1 tunnel  roadwarrior01_2 0 connections on 1 tunnel    No DCHP Client connected        E Downloads   E 3  Security Manager Securepoint Manager  Securepoint Log Server  Authentication Agent   SSH Client   Securepoint Manual  Securepoint License    DI  DI          DI  Q  Q      DI  DI  v  Q  DI  D  I  o  DI  Qo  vd  DI  Q  DI  Ad  v  o    Routing Server       fig  7 cockpit overview    Securepoint  Security Solutions 18    5 Securepoint Cockpit Securepoint 10    5 1 Navigation Bar    The navigation bar guides you to the different configuration categories  These catego   ries are  configuration  network  firewall  applications  VPN  authentication  ex   tras  live log    Moving the mouse over the entry opens the respective dropdown menu     configuration network firewall applications VPN authentication extras live log A    fig  8 navigation bar of the cockpit    5 2 License    In this area you have an overlook of the firewall software  updates and license     mme asap O    License valid till Validation of the license  The date is given in US American format  MM DD YYYY    Last Virus Pattern update   Time of the last virus pattern update         License    Firewalltype  y2009nx    Build 6215    Securepoint    icense valid till  03 13        ast 
2.        Abort Back Next       fig  153 select L2TP    Select the authentication method     lf you want to use a preshared key  activate the radio button Preshared Key and en   ter the key into the field beneath     If you want to use a certificate  activate the radio button x 509 Certificate and select  a server certificate from the dropdown box     Click Next        IPSec Wizard         Create a IPSec Connection   Roadwarrior L2TP     Which kind of Authentification do you want to use         Preshared Key  eeeeeeee          509 Certificate  newCs              Abort Back       fig  154 select the authentication method    Securepoint  Security Solutions 140    10 Menu VPN Securepoint 10    Enter the address pool for the roadwarrior and the IP address of the DNS server     Enter the local IP address into the field Local L2TP IP address   Enter the IP address range into the fields L2TP address pool     Enter the IP addresses of the first and the second DNS servers into the fields Prima   ry and Secondary nameserver     Click Next          IPSec Wizard       Create a IPSec Connection   Roadwarrior L2TP   Please specify the address pool for L2TP Roadwarrior    Local L2TP IP address  192 168 1 8  L2TP address pool from   192 168 1 1    gt   128      FY    Primary nameserver  192 168 176 10    Secondary nameserver        Abort Back Next       fig  155 define address pool and DNS server    The last step offers the creation of L2TP users  If you don t want to use this option click    F
3.       Service Groups       VPN    B Groups          m Services     o  ah   W icmp   o  igmp   o  rsvp      archie nat traversal    cys  E domain_tcp  domain_udp    B openvpn_tcp  pptp  F3 gopher    S   finger openvpn_udp   ftp  SE http  EJ https  ica  Le    m Select Information    You have selected 0 Service s    You have selected 1 Service Group member                    Infobox Settings  Disable Infobox             Update Rule Close       _         fig  84 dialog service groups    Securepoint  Security Solutions 81    8 Menu Firewall Securepoint 10    8 5 2 Create New Service Group    You can also subsume Services in new service groups    Click on the plus symbol in the section Service Groups   The dialog Add service group appears     Enter a name for the new service group and click Add   Select the just created service group from the dropdown box     The message No member in service group appears in the right table  because no  service is added yet    Add services to the new group like described in the previous article     _    Add Service Group    Name  supportServicel       fig  85 enter name for the new service group    Securepoint  Security Solutions 82    8 Menu Firewall Securepoint 10    8 6 Network Objects    Network objects describe certain computers  network groups  users  interfaces  VPN   computers and    networks  With these network objects the rules in the portfilter can be de   fined exactly     Click the on the menu item Firewall in the navigation bar  Click
4.       fig  99 HTTP proxy settings   tab general    When you define exception for HTTP proxy the relevant computers will access the internet  directly  if an accordant rule exists     The exceptions must be defined by source and destination IP addresses          HTTP Proxy Exceptions       HTTP Proxy Exceptions     Source  Destination     192 168 10 0 255 255 255 0 0 0 0 0 0 0 0 0    Source   Mask  255 255 255 0 24 Le  Destination       Mask    Add Exception             Save Close    E       fig  100 define exceptions for the HTTP proxy    Securepoint  Security Solutions 92    9 Menu Applications Securepoint 10    9 1 2 Virus scanning    In this tab you can set which files and websites should be ignored by the virus scanner     You can deactivate the virus scanning by unchecking the checkbox Virus scanner   The left list shows file extentions  which are excluded by the virusscanning    You can edit the entry by clicking the wrench symbol  You can delete the entry by  clicking the trashcan symbol    Enter a file extenstion leading by a dot in the field under the left table and click Add  Extension to add an entry    The right list shows websites which are excluded by the virus scanner    You can edit the entry by clicking the wrench symbol  You can delete the entry by  clicking the trashcan symbol    Enter a website in the field under the right table and click Add Website to add an en     try   Host names like    www    are not declared     e  HTTP Proxy             Block Appli
5.     Password  eeccccce    Confirm Password  TE    Abort Back Finish       fig  47 add VDSL interface   set properties    Securepoint  Security Solutions 47    7 Menu Network Securepoint 10    7 2 1 6 Add Cluster Interface   The cluster interface is needed to set up a high availability environment    Two  or more  appliances are required to adjust this setup  One appliance acts in active state  as master and the other appliances are waiting in stand by mode as spare  If important ser   vices cannot be provided by the active machine or the whole machine breaks down  the oth   er appliance wakes op from stand by and assumes the service as master    The cluster interface binds a virtual and a    real    IP address to a physical interface  The espe   cialness of the high availability bond is that all appliances get the same virtual  P addresses   Because the redundant machines are running in standby mode and their cluster IPs are not  up  there will be no IP address conflict  The    real     P addreses  so called management IPs     are used to send advertisement packages in terms of their status between the appliances     ethO  10 0 0 1 24 10 0 0 3 24  10 0 0 2 24 10 0 0 2 24  switch A  external net    z eth2 eth2 Pe  master   Walt 192 168 13 1 24 BW 192 168 13 3 24 Dr SA    192 168 13 2 24 192 168 13 2 24 th    switch C  DMZ    switch B  internal net    eth eth  192 168 4 87 24 192 168 4 86 24  192 168 4 88 24 192 168 4 88 24  red IP address  gt  management IP  real IP      local
6.     administration       Filter Objects  amp  Services       Source Network Objects   DMZ Interface  O Destination Network Objects   DMZ Interface     Services  ftp                      fig  66 filter firewall rules    Securepoint  Security Solutions 66    8 Menu Firewall Securepoint 10    8 1 1 Create Rule    Yy    Click Appent Rule to append a new rule   The dialog Add Rule appears     The rule will be created on the tab General    Select in the field Source a source from the list    Select in the field Destination the destination from the list    Define in the field Service which service will be used    Choose in the field Action if the access should be accepted or denied   Select in the field Logging which logging mode should be used    In the field QoS  Quality of service  you can limit the bandwidth     VV VV WW V WV    At Rule Routing you can define which gateway should be used for packages of this  rule  For example  IPSec connections must always communicate over the same inter   face  This setting is important if you use several internet connections     Note  For source and destination a network object must exist which defines the item  exactly  If it doesn t exist you have to create it   If the used service is not listed you can define a new one        o Add Rule               General   Time Description       Destination    Source  internet    Service       Grp external_interfa  Grp internal_interfac  Grp internal_net       internet  Grp external_interfa    Grp inte
7.    emeng    KE    Services To define exact rules in the porttilter you use applicable services   In this section all services are listed with their used ports and protocols   You can edit them or add new ones     service Groups services which provide similar functions are subsumed to groups     Network Objects   Network objects specify groups  users or computers  You can only de     fine rules for created network objects     Network Groups   Network objects are subsumed to device groups        Securepoint  Security Solutions 63    8 Menu Firewall Securepoint 10    8 1 Portfilter    The port filter is the main item of the firewall  Rules are defined in this section  which control  the whole data traffic  The rules are editable in the properties networks  user  services  and  time  You can define if traffic which matched with a created rule will be logged     By default  traffic will be stopped if no rule is set which allows the traffic          Portfilter       m Portfilter    Source Destination Service Action Time Logging Active QoS Description Rule routing    1    internal net Q Internet any ACCEPT None      2    Filiale Berlin Zu Internal Network any ACCEPT None 7   3 Za Internal Network J Filiale Berlin any ACCEPT None  9  P   4 Q Internet   External Interface openypn_udp ACCEPT None      5    SSLYVPN Netz   Z Internal Network any ACCEPT None  amp     ae ije iae ei ei    e        l             Set Filter 4ppend Rule Append Group   Open Groups    Close Groups Update Rule Cl
8.   8 Menu Firewall Securepoint 10    8 6 5 Add Interface    You can also add network objects for interfaces   You distinguish between interfaces with static and dynamic IP addresses     Click Add Interface  The dialog Add Interface appears   Enter a name for the new object in the field Name     Under Type select StaticAddress or DynamicAddress   lf you have chosen StaticAddress  you have to enter the static IP address in the field  IP Address     Under Zone select the zone of the interface     Store your settings with Save        Add Interface        Add Interface    Name  external l Name  internal   Type    Dynamic Adress    Type   Static Adress   ei  IP Adress  192 168 175 1    Zone      firewall internal_       Save Close    7A       Save Close    A          fig  93 object of interface with dynamic address    fig  94 object of interface with static address    Securepoint  Security Solutions 87    8 Menu Firewall Securepoint 10    8 7 Network Groups    In this section you can subsume several network objects into groups  You can add new    groups  edit and delete existing groups     Select an existing group from the dropdown field in the section Network Groups     Click the trashcan symbol for deleting the group  All included network objects will be  deleted too    Click the plus symbol to create a new group    Enter a name for the new group and select an icon for the group    In the table Network Objects all available network objects are listed    In the table Network Group 
9.   9 Menu Applications Ssecurepoint 10    9 1 6 2 Whitelist    You can exclude users   P addresses and websites from the content filtering by the whitelist     9 1 6 2 1 User  Users who are listed in this table can call up websites without being limited by the content  filter      gt  Switch to the tab Whitelist  Select the tab Users      gt  Enter the login name of the user who should be excluded from the content filtering   Click the button Add User      gt  Todelete a user from the list click the trashcan symbol in the related row     o  HTTP Proxy    General Virusscan URL Filter Block Extensions Block Spplications Content Filter Bandwidth  Blacklist Categories Whitelist    User IP Addresses Websites    Whitelist User    Username    Add User          Save Close  Ms       fig  106 contenttfilter of the HTTP proxy   section whitelist   tab user    Securepoint  Security Solutions 99    9 Menu Applications Ssecurepoint 10    9 1 6 2 2 IP Addresses   P addresses can be excluded from the content filtering as well   This only makes sense if the IP addresses are assigned statically     Switch to the tab IP Addresses     Enter the IP address which should be excluded from the content filtering   Click the button Add IP     To edit an entry click on the wrench symbol beneath the related entry   To delete an entry click on the trashcan symbol beneath the related entry         HTTP Proxy      General Virusscan URL Filter Block Extensions Block Applications Content Filter Bandwidth  Blac
10.   Action  Firewall DROP  Incoming Interface  ethi  Outgoing Interface   Source  192 168 4   Destination  192 168 4    Protocol  UDP  Source Port  138  Destination Port  138       Flags        fig  203 details of a log message    Securepoint  Security Solutions 188    13 Menu Live Log Securepoint 10    13 5 Raw Data    Entries in the live log are conditioned Syslog messages  You can also display the Syslog    messages      gt  Click on the button Show raw data      gt  The raw data of the current logging are shown  The logging is still running in the  background        You can also download the raw data      gt  Click on the button Download raw data    gt  The data will be transferred in txt format     _      Show Raw Data       r Live Log Raw Data      lt 4 gt Apr 27 13 39 32 kernel  DROP default  IN eth1 OUT  MAC ff ff ff ff ff ff 00  15 c5 7c ed a9 08 00  ISRC 192 168     DST 192 168          LEN 96 TOS 0x00 PREC 0x00 TTL 128 ID 50642 PROTO UDP     lt 4 gt Apr 27 13 39 31 kernel  DROP default  IN eth1 OUT  MAC ff  ff  ff  ff  ff ff 00 15 c5 7c ed a9 08 00  SRC 192 168    gt  DST 192 168 4      LEN 96 TOS 0x00 PREC 0x00 TTL 128 ID 50603 PROTO UDP      lt 4 gt Apr 27 13 39 28 kernel  DROP default  IN eth1 OUT  MAC ff  ff  ff  ff  ff ff 00  15 c5 7c ed a9 08 00  SRC 0 0 0 0 DST 255 255 255 255 LEN 337 TOS 0x00 PREC 0x00 TTL 128 ID 50429 PROTO UDP     lt 4 gt Apr 27 13 38 41 kernel  DROP default  IN eth1 OUT  MAC ff  ff  ff  ff  ff ff 00 23 54 00 d2 ca 08 00  SRC 192 168  DST 1
11.   Enter your region into the field State    Enter the name of your city into the field City    Enter the name of your company into the field Organisation    Enter the department into the field Unit    Enter you e mail address into the field E mail    Select the CA to sign the certificate with    Select an Alias optionally  You will need it under the operating system MacOS      Activate the checkbox Server Authentication if you want to create a server certifi   cate     Click Save to create the certificate     VV VV VV VV V WV    v          F                                                                                                                               o Add Certificate   X          Add Certificate   Xx    Type    User   Server ze  Type   User   Server      Valid from   01 01 2009   valid from  01 01 2009 l  o0 woo  el op el    oo mlo woo m   valid untill  arapo      valid untill  31 12 2012    23 el Sg Lelleg el 23 Lal 0 Lel gg Le  Name  roadwarriorO1   Name  ee Server    Country  DE sel Country   DE sel  State  Nds   State  Hds  City  Lueneburg City  Lueneburg  Organisation     Securepoint Organisation    Securepoint  Unit     Support o    Unit     Support  Email  support sp de   Email  support sp de  CA   ew  i CA newCa  x   Alias  None     Alias    None sel  Server O casi bi  Authentication  Authentication   Save Close Save Close    E             fig  178 create client certificate fig  179 create server certificate    Securepoint  Security Solutions 165    11
12.   For applying the rules immediately click the button Update Rules         O  Advanced Settings      IPSec Portfilter Dialup Templates Variables Webserver       m  Portfilter     Accept all incomming IPSec  M        Allow Related connections  W             Update Applications Update Interface Update Rules Save Config Close  hs       fig  196 edit porttilter settings    Securepoint  Security Solutions 179    12 Menu Extras Securepoint 10    12 6 4 Dialup    LCP  Link Control Protocol  echo requests are used to control the existence of a connection   Several internet service providers don   t support this checking  For this you should disable the    checking      gt  To disable the checking deactivate the checkbox Support LCP Echo for PPPoE    gt  Store your setting with Save    gt  For applying the changes immediately click the button Update Interface      O  Advanced Settings    IPSec Portfilter Dialup Templates Variables Webserver       Dialup     Support LCP Echo for PPPoE  M        Save    Update Applications Update Interface Update Rules Save Config Close  A       fig  197 enable  disable the LCP echo request    Securepoint  Security Solutions 180    12 Menu Extras Securepoint 10    12 6 5 Templates    On this tab you can edit all templates on the firewall     Select the application you want to edit from the dropdown list Applications   The firewall displays the depending templates in the dropdown field Templates     Select the template you want to edit from the dropdown 
13.   General Attachment Filter Virusscan SMTP Settings SMTP Advanced PoP3 Settings          PoP3 Settings     Edit message in subject when spam    SPAM         Scan all Mailboxes for Virus J Scan all Mailboxes for attachment blocking    Scan specific Mailboxes    Scan specific Mailboxes      Edit Accounts  Edit Accounts           Account   Account  No Entries for this list    info    alice    bob                               Save Close       fig  132 settings for POP3 service    Securepoint  Security Solutions 124    9 Menu Applications Ssecurepoint 10    9 5 VNC Repeater    Virtual Networking Computing  VNC  software can display the screen content of a remote  computer on a local computer  The keyboard and mouse actions of the local computer are  send to the remote computer  So you can work on the remote computer as though you work  directly on it  The software is a client server application  The remote computer acts as the  server and the local computer as the client  You have to enter the IP address or the host   name of the remote computer and the port of the VNC repeater application to allow the traffic  through the firewall     9 5 1 General    Specify the ports which are used by the client  viewer  and the server     Enter the port of the local VNC repeater at the field VNC Viewer Port   Default setting is port 5900     Enter the port which is used by the remote VNC repeater at the field VNC Server  Port          YNC Repeater    General YNE Server ID       m General Sett
14.  48ms   recy from 216 239  59 104 seg 2  48ms   recy from 216 239 59 104 seq 3  47 ms   recy from 216 239 59 104 seq 4  47ms   recy from 216 239 59 104 seq 5  93ms   Transmitted   5   Received  5   Lost  0  0     Average round time  S6ms       Legend     A Lookup gi  7 Show Route       fig  62 result of a Ping    Securepoint  Security Solutions 61    7 Menu Network Securepoint 10    7 4 3 Routing Table    The command Routing Table shows the routing table of the appliance  You don t have to  enter data      gt  Click the button Routing Table   All entered routes will be listed        Network Tools    google de    192 168  724 dev ethO proto kernel scope link src 192 168    192 168     3 24 dev ethi proto kernel scope link erc 192 168   default via 192 168    dey eth         Legend      Lookup      Show Route          fig  63 output of the routing table    Securepoint  Security Solutions 62    8 Menu Firewall Securepoint 10    8 Menu Firewall    This menu item includes all functions for creating firewall rules  The entry Portfilter shows the  system of rules  This section manages rights of all computers  computer groups  networks     users  uSer groups and devices     firewall    Portfilter  Hide NAT    Port Forwarding    Services  Service Groups  Network Objects    Network Groups       fig  64 dropdown menu of the menu item firewall    Hide NAT Dynamic Network Address Translation   WEE  Port Forwarding Request from the internet to defined ports will be transmitted to defined  
15.  E       fig  88 create an object for a computer    fig  89 create an object for a network    Securepoint  Security Solutions 85    8 Menu Firewall Securepoint 10    8 6 3 Add VPN Host Net    The creation of VPN objects isn t very different from the creation of network and computer    objects  Just other zones are available      gt  Select the zone vpn ipsec  vpn ppp or vpn openvpn against the VPN method you  are using         Add YPN Host Net    Add YPN Host Net    Name  PPTP_Tunnel Name  Filiale   Type  Single Host      Type  Network        IP Address   192 168 180  32 IP Address  192 168 142 1  Zone Netmask  255 255 255 0 24    Nat IP  ee  Har IP        fig  90 create object for a VPN computer fig  91 create an object for a VPN network    8 6 4 Add User    You can also create network objects for users  This way you can set rules for several users   The only condition for this is that the users are SPUVA  Securepoint Security User Verifica   tion Agent  user and employ the agent to log onto the system  The user must be listed in the    user administration under the menu item Authentication in the entry Users     Click Add User  The dialog Add User appears   Under Name enter a name for the object   Under Login select a SPUVA user    Under Zone select the according zone    Select which NAT IP should be used    Store your settings with Save          Add User    Name  Max Muster    Zone   Nat IP        fig  92 create an object for an user    Securepoint  Security Solutions 86  
16.  Firewall  because of warranty reasons        fig  191 upload registration file    Securepoint  Security Solutions 175    12 Menu Extras Securepoint 10    12 5 Manage Cockpit    This menu item offers the possibility to customize the cockpit  You can hide lists which are    uninteresting for you  Furthermore you can position the lists to your needs     The dialog Manage Cockpit for user  x is divided into three sections     On the left the section Not displayed dialogs  Lists positioned here are not dis   played    In the middle the section Display in Cockpit Left  Shown lists will be displayed on  the left side of the cockpit     On the right the section Display in Cockpit Right  Shown lists will be displayed on  the right side of the cockpit     You can move the list per Drag and Drop   You can manage the lists not only horizontally but also vertically     Store your settings with Save        Save Close  E        fig  192 customize the cockpit    Securepoint  Security Solutions 176    12 Menu Extras Securepoint 10    12 6 Advanced Settings    This menu item opens a new browser window which offers settings for experienced users   You can for example edit the templates of all services and applications and read out the used    variables     Note  Make only changes in this section if you know what you re doing     An incorrect usage of these options can damag the correct functionality of the ap     liance or completely destroy the configuration        For these reasons following
17.  LAN 3 are destined for  the predefined networks  The ports in the machine are not labeled  Take the attribution from    the figure     LAN2 LAN 4   LAN6 LAN8       fig  5 front view of the RC 400  schematic     mm mmm mn       Securepoint  Security Solutions 16    4 Administration Interface Securepoint 10    4 Administration Interface    4 1 Connecting the Appliance    You access the appliance with your browser on the IP address of the internal interface on the  port 11115 using the https  SSL  protocol    The factory setting for the internal IP address is 192 168 175 1  The port 11115 cannot be  changed  It is reserved for the administration    User name and password are set to the following by default    Username  admin    Password  insecure     gt  Start your internet browser and insert the following value into the address field   https   192 168 175 1 11115   lf you have changed the IP address at the installation  replace the IP address  192 168 175 1 with the new one      gt  The dialog LOGIN appears         LOGIN    Username  admin    Password  wT TrTtttt    Login Reset  fig  6 Login dialog    At the field Username insert admin     At the field Password insert insecure or the new password  if you change it during  the installation process     After this click Login   You will be logged on to the system and the start screen appears     Change your password as quickly as possible  Use the navigation bar icon Au     thentication  item Users   Use upper  and lowercase char
18.  LAN ports are marked green     E  Appliance       fig  13 view of the appliance  for example a Piranja     5 6 Interfaces    In this area the interface in listed with the assigned IP addresses and zones  Depending on  the used appliance more interfaces  ethx  are shown     EEE eee  ett  Ethernet adapter for connection to the internet   a ee  eth Ethernet adapter for connection to the internal Network   O REIREI  eth2 Ethernet adapter to attach a demilitarized zone  DMZ    At the appliance indicated as LAN 3     DDDU A virtual interface to connect the firewall to the internet with  ee  Tun Virtual interface for the SSL VPN  The internal address is set to  Nita oe    E  Interfaces  ethO external  ethi internal  eth     up vpn openvpn       fig  14 status of interfaces    Securepoint  Security Solutions 23    5 Securepoint Cockpit Securepoint 10    5 7 IPSec    The created IPSec connections and their usage are listed in this section   Ahead stands the name of the connection followed by the current usage        O  IPSec    branch_Munich 0 connections on 1 tunnel    roadwarrior0ol 0 connections on 1 tunnel       roadwarrior01_2 0 connections on 1 tunnel    fig  15 list and status of IPSec connections    5 8 Downloads    In this table are listed  which files are available in the download section of the user interface   Furthermore the version and a short description are shown   The filename is a hyperlink which you can use to download the file directly        O Downloads  OpenVPNP
19.  Menu Authentication Securepoint 10    11 3 3 Import CA and Certificate    You can import CA and certificates  if they are available in PEM file format     Switch to the corresponding tab  CA or Certs    Click Import and in the appearing dialog click Browse     Select the file you want to import from your file system   After that click Import     Di  Import Certificate    Please select the certificate     C  server_cert pem    Import Close       fig  180 import dialog    11 3 4 Export CA and Certificate    You also can export CAs and certificates  You may select between PEM file format and the  encrypted format PKCS  12  You ought to consider that the appliance only imports the PEM    file format     Switch to the corresponding tab  CA or Certs    At the end of every row you find the following icons   H 6    The left icon exports the certificate or the CA as PEM file format   The right icon exports the certificate or the CA as PKCS  12    p12  format     Click on the favored icon and save the certificate or CA on your local file system        Securepoint  Security Solutions 166    11 Menu Authentication Securepoint 10    11 3 5 Download SSL VPN Client    You can also download the preconfigured SSL VPN client from the tab Certs  An Icon in the  row of every certificate offers the download of the zip archive  The archive includes the port   able OpenVPN client  a preconfigured configuration  the CA and the relating cert     Switch to the tab Certs   Select the desired certifica
20.  PPTP VPN user  you can assign an IP address to the user for the  VPN connection  The IP address must be contined in the address pool   If the new user utilizes SSL VPN  you have to set a SSL VPN IP address on the tab VPN      gt  Switch to the tab VPN      gt  Assign an IP address which is used by the user in the L2TP or PPTP VPN tunnel   This statement is optional      gt  Is the user SSL VPN user  a tunnel IP address must be set   This IP address must be an IP address of the subnet of the tun interface  default  192 168 250 xxx    The last part of the IP address must fulfill the following condition   a multiple of 4 minus 2   Formula  x   4 y  2  Possible values for the last part of the IP address    2  6  10  14       246  250  254     vi  Add User      General   VPN SSL VPN Client Spamfilter Extras    VPN PPTP IP address   VPN L2TP IP address   SSL YPN IP address  192 168 250 18    For L2TP and PPTP this is optional  4n ip address must be declared  for the SSL VPN user     Save Close       We    fig  168 assign a VPN IP address    Securepoint  Security Solutions 155    11 Menu Authentication Securepoint 10    11 1 3 Add User  Tab VPN Client    This tab will be activated if the user is member of the group SSL VPN  In this tab you make  settings to build a preconfigured SSL VPN client package for the user  The package includes  a configuration file  a certificate and the portable OpenVPN client  The user can download  the package in the user interface  Therefore the user n
21.  Provider       fig  54 list of DSL provider    7 2 3 1 Edit or Delete DSL Provider  In the list of all saved DSL providers on the tab DSL Provider a wrench symbol and a trash   can symbol are positioned beneath the entries  With these buttons the entries can be edited    or deleted      gt  For editing click the wrench symbol   The dialog Edit DSL Provider appears     Change the settings and save the new properties with Save     For deleting click the trashcan symbol     Click Yes at the conformation promt   The entry will be deleted        Securepoint  Security Solutions 53    7 Menu Network Securepoint 10    7 2 3 2 DSL Provider create    Click the button Add DSL Provider   The dialog Add DSL Provider appears     Enter a name for the provider into the field Name    Type your login data into the field Login    Enter your password into the field Password and retype it in the field Confirm pass   word    If you activate the checkbox Default Route a standard route will be set automatically     Select a time in the field Separation  At this time the appliances disconnect the inter   net connection  If you choose 0 the appliance does not force a disconnection        e  Add DSL Provider             Name     anonymous DSL    Login  nobody          Password  eecseces             Confirm password  eeeeseeee    Default route   Separation   3 je    Bnznsnannnssd              Save Close       fig  55 create DSL Provider    Securepoint  Security Solutions 54    7 Menu Network Securepoin
22.  Securepoint  Security Solutions 152    11 Menu Authentication Securepoint 10    11 1 Users    The dropdown menu item Users displays a list with all existing users and their permissions in  binary format    The users are listed in order of their creation    Existing users can be edited by clicking the wrench symbol or deleted by using the trash     can symbol         Users    Name Fullname Permissions    admin System Administrator oo0000001  root Superuser oo0o000001  fred Fred Feuerstein 000001000  barney Barney Geroellheimer 010010000  donald Donald Duck 000100000    daisy Daisy Duck 000000010    dagobert Dagobert Duck 001100100    max Max M  ller 000000100    Add       Infobox settings   E Disable Infobox          fig  165 list of existing users    When the mouse cursor moves over an user  an infobox appears  which shows the user  permissions and assigned VPN IP addresses of the related user   You can activate this function by unchecking the checkbox Disable Infobox     001100100 dagobert    Fullname  Dagobert Duck  PPTP IP  Not set   P2TP IP  192 168 180 15  OpenVPN IP  Not set  Permissions    ADMIN  Not set   YPN PPTP USER  Not set   YPN L2TP USER  active  SPAMADMIN  Not set  SPUVA USER  Not set   HTTP PROXY USER  active  USERINTERFACE  active   YPN SSL USER  Not set   SMTP RELAY USER  Not set       fig  166 user properties    Securepoint  Security Solutions 153    11 Menu Authentication Securepoint 10    11 1 1 Add User  Tab General    For adding a new user  open the wi
23.  address you  want to allow the access via SNMP   Select the wanted subnetmask and click Add network   The IP address is appended to the table      gt  To allow the access  you have to reate an according rule in the porttilter      O  Server Properties    Server Settings Administration Syslog SNMP Cluster Settings           SNMP       Enable SNMP Version 1   V  Enable SNMP Version 2c    Edit community string   public          Enable access from networks  IP Address Net    192 168 176 0          255 255 255 0 24     Add network                   fig  37 tab SNMP    Securepoint  Security Solutions 37    7 Menu Network Securepoint 10    7 1 5 Monitor Agent  AmdoSoft v4 Agent     The Securepoint firewall can be monitored and maintained by the controller software of the  company AmdoSoft Systems  The firewall connects to the registered AmdoSoft controller in  the internal or external network  The controller software for the automatic monitoring has to  be purchased from the company AmdoSoft Systems    It is no rule necessary for this data traffic     Go to the point Network on the navigationbar and click on the entry Server Proper   ties in the dropdownmenu     In the dialog Server Properties switch to the tab Monitoring Agent     Enter the IP address of the computer where the AmdoSoft Controller software is in   Stalled into the the field b4 Conroller IP     Afterward click Save          Server Properties    Server Settings Administration Syslog SNMP Monitoring Agent Cluster Sett
24.  another one  For example 2080     Vi    Click Port Forwarding in the dropdown menu of the Firewall icon   The window Port Forwarding appears  which displays all forwarding rules     Yy    Click Add to create a new port translation rule   The dialog Add Port Forwarding appears     Select Port Translation as type    Under Source select  from which network the query is coming    Under Interface define  which interface is used by the query    For Destination select a network object to which the query should be forwarded   Under External Port select the service and hence the port  which should be used   Under Original Port select the port you want to redirect to    Store your settings with Save      gt    gt    gt    gt    gt    gt    gt    gt    gt     Note  A rule in the portfilter must be set  to allow the port forwarding          Add Port Forwarding    Type  Port Translation     Source  Internet   Interface    eth0 Lal  Destination    webserver      External Port   http_webserver         Original Port   80 Las    fig  77 create port translation rule    Securepoint  Security Solutions       76    8 Menu Firewall Securepoint 10    8 4 Services    Services are used to specify the rules in the portfilter  Every service uses a certain protocol  and port or a port range  This is listed in the section Services   The list contains a lot of services  You can add new services  edit and delete services     8 4 1 Delete and Edit Services    Click the trashcan symbol beneath the service t
25.  audio l16       audio l20          audio l24   _   audio Ipc   O   audio midi         audio mpa       audio mpa robust     Se mp4a latm          GE eg  audio pcma  audio pcmu  audio prs sid               audio qcelp  audio red          fig  128 predefined MIME types    Securepoint  Security Solutions 120    9 Menu Applications Securepoint 10    9 4 3 Virusscan    You can check incoming and outgoing e mails for viruses  If a virus was found it will be de     leted  The deleting of a virus from an e mail will be indicated by a message in the e mail      gt  Activate Don   t scan specific Attachments to exclude attachments from the virus  scan by a Whitelist      gt  Use the Whitelist to define attachments which should not be scanned   You can specify them by file extension or by MIME type   You can write MIME types manually or select those from the predefined list  see  previous article       O  Spamfilter Properties    General Attachment Filter Virusscan SMTP Settings SMTP Advanced PoP3 Settings          Virus settings for SMTP and PoP3     W  Don t scan specific Attachments       m Whitelist   Extensions MIME Types  Type     pdf          m Edit Message                          fig  129 exclude attachments from the virusscanning    Securepoint  Security Solutions 121    9 Menu Applications Ssecurepoint 10    9 4 4 SMTP Settings    In this section you can define  how to deal with e mails that are identified as soam  include a    virus or an undesired attachment      gt  If you
26.  by entering an address into the field under the tables and click  the button Add Blacklist or Add Whitelist     You can block or approve whole domains with all subpages     For blocking or approving defined websites enter the relatie URL   Furthermore you can block domains and approve subpages of this domain   For example    blacklist  time com   whitelist  time com business    Just use top  and second level domains    For example    www example com becomes example com  www example com auctions becomes example com auctions       Securepoint  Security Solutions 94    9 Menu Applications Ssecurepoint 10       l     HTTP Proxy                I  General Virusscan URL Filter Block Extensions    Block 4pplications Content Filter Bandwidth    URL Filter    Block all    Use lists with authentication   Blacklist Websites     Whitelist Websites     Domain      Domain          ebay de google de    studi vz de securepoint de    heise de      Add Website   Add Website                   Save Close    E    fig  102 HTTP proxy dialog   tab URL filter    Securepoint  Security Solutions 95    9 Menu Applications Ssecurepoint 10    9 1 4 Block Extensions    On this tab you can define file extensions which will be blocked  Not only suffixes with three  characters are supported  You can also block suffixes like jpeg or mpeg     Suffixes must be given with alleading dot      gt  Enter the file extension in the field at the bottom of the window   Don t forget the leading dot  For example   mp3    
27.  by the SIP client to connect the proxy with the  dropdown box Inbound Interface     Select the interface which is used by the proxy to transfer the data to the internet from  the dropdown box Outbound Interface     Select the port on which the proxy expects data in field SIP Port  default 5060      Adjust the RTP Port Range to the port range used by the client     Enter the Timeout of the SIP server of the provider           YoIP Proxy    General Provider    Inbound Interface   Outbound Interface   SIP Port    RTP Port Range        eth       etho     5060   a v  7070   a       7089   al       Timeout for Registration  600  seconds    Save    fig  136 tab General of the VoIP Proxy dialog    Securepoint  Security Solutions    Close       127    9 Menu Applications Ssecurepoint 10    9 6 2 Provider  Enter the data of the provider in this section    gt  Enter the name of the provider in the field Domain      gt  Enter the SIP proxy of the provider in the field Proxy    gt  Select the SIP proxy port of the provider in the field Proxy Port  default 5060            VoIP Proxy    General Provider    Domain  telefonie de    Proxy  voip foo    Proxy Port  s060   a le    Save Close       fig  137 tab Provider of VoIP Proxy dialog    Securepoint  Security Solutions 128    9 Menu Applications Ssecurepoint 10    9 7 IDS    The Intrusion Detection System  IDS  is a system to detect attacks in the network  The IDS  analyzes all packets which pass the appliance  Suspicious activities will be
28.  cockpit and rebuilds the cockpit     The button    in the navigation bar has the same function     Securepoint  Security Solutions 184    13 Menu Live Log Securepoint 10    13 Menu Live Log    The Live Log shows the current log entries  For a clear view the entries are highlighted in  different colors  Furthermore the logs can be filtered     i Gis sch  Day Shows the day of occurrence  In the Live Logging the current date   wf Shows the protocol or the action additionally     Shows which service is affected  Detailed log message      O  LiveLog    LiveLog Settings          m Filter     Filter pattern    None Stop logging     _  Scroll automatically to the bottom          m Messages     Apr  27 13 25 53 Firewall DROP DROP default  IN ethi OUT  MAC ff ff ff ff ff ff 00 24 8c 4d 0e H    traffic  ethi  rx bytes  90801 tx bytes 68178 collisions    DROP  default  IN ethi OUT           Clear log window     amp  admin WA 192 168 4 102    Download Raw Data Show Raw Data Close       fig  201 entries in the live log    Securepoint  Security Solutions 185    13 Menu Live Log Securepoint 10    13 1 Start Live Log    When you enter the Live Log window the logging is out of action  You can also not enter any  search pattern   To start the logging complete the following approach     Click on the icon Live Log in the navigation bar   A new browser window appears     Click the button Start logging at the right side above the table     The live logging starts   The text of the button turns to 
29.  connection  The period can vary between 1  and 8 hours  Afterwards a new link connection is necessary for  security reasons  This starts automatically    Keyingtries How many trials to initiate the connection  time lag 20 seconds    unlimited  gt  unlimited trials  three times  gt  Three trials to initiate the connection     Securepoint  Security Solutions 145    10 Menu VPN Securepoint 10    10 3 1 2 Phase 2    ame mmm    PFS Perfect Forward Secrecy  The new key material must be created irrespective of the previous  keys  So no one can gather the new key from the previous key   Key life Duration of an IKE connection  The period can vary between 1  and 8 hours  Afterwards a new link connection is necessary for  security reasons  This starts automatically   tab Native IPSec    Local Net   Mask Local net which is connected with the remote net via VPN     Remote Net   Mask Remote net which is connected with the local net via VPN     tab L2TP    L2TP Subnet local subnet for L2TP connections  Only useable with L2TP connections with MS Windows Vista or  MacOSX  if the client is positioned behind a router     tab Address Pool  Local Net   Mask Local net which is connected with the remote net via VPN     Address Pool   Mask From this address pool an IP address will be assigned to the  roadwarrior when connecting to the local net        Securepoint  Security Solutions 146    10 Menu VPN Securepoint 10    10 4 L2TP    In this section you can set the general setting for L2TP VPN connec
30.  don t want to block spam but mark it  activate the checkbox Don   t block spam  just mark   You can edit the flag that is attached to the subject in the field Message in Subject      gt  Decide if incoming or outgoing e mails with a virus will be blocked or relayed with  deleted virus  Select the according radio buttons      gt  Decide if incoming or outgoing e mails with undesired attachment will be blocked  or relayed with deleted attachment  Select the according radio buttons          Spamfilter Properties    General Attachment Filter Virusscan SMTP Settings SMTP Advanced PoP3 Settings              SMTP Settings     W  Don t block spam just mark  Message in Subject  SPAM                 Reject complete E mail     Reject complete E mail    m Inbound Mail with Virus m Outbound Mail with Virus         Delete Virus and forward    Delete Virus and forward        Inbound blocked Attachment Outbound blocked Attachment     Reject complete E mail    Reject complete E mail     Delete Attachment and forward    Delete Attachment and forward                               Save Close       fig  130 settings for identified e mails    Securepoint  Security Solutions 122    9 Menu Applications Ssecurepoint 10    9 4 5 SMTP Advanced    In the advanced SMTP setting you can define a global Whitelist and a global Blacklist    The entries in the list could be an IP address  a domain or a host IP address   host name   E mails from Whitelist entries will be relayed without checking  E mails from 
31.  gt  Click on Add Extension   The extension is added to the list      gt  To delete an extension from the list click on the trashcan symbol at the end of he re   lated row     e  HTTP Proxy    General Virusscan URL Filter Block Extensions Block Applications Content Filter Bandwidth    Blocked Extensions   Suffix    Add Extension       Save Close       fig  103 HTTP proxy   tab block extensions    Securepoint  Security Solutions 96    9 Menu Applications Ssecurepoint 10    9 1 5 Block Applications    On this tab you can define remote support programs and messaging programs which will be  blocked    Note  These settings only work for the HTTP proxy  The programs could be executed via the  rule set without using the HTTP proxy  Possibly you have to modify the rule set to prevent  the communication of these programs     The applications are predefined  The section remote support includes the programs Tem   viewer and Netviewer  In the section messaging the most popular chat programs are prede   fined  You can also block messaging programs which are not listed with the option Block  other IM      gt  Select a program from the list  Activate the related checkbox to block the program    gt  Click Save         HTTP Proxy    General Virusscan URL Filter Block Extensions Block Applications Content Filter Bandwidth        Block remote support        Block Teamviewer   Block Netviewer  v       Block messenger   Block AOL    Block GIZMO   Block ICQ    Block MSN    Block SKYPE   Block TRIL
32.  in the dropdown menu on the entry Network Objects   The window Network Objects appears     In this window all available network objects are listed  The table can be ordered by  the values of the separate columns     Behind the objects are buttons for editing and deleting the related object   You can add objects with the buttons at the bottom of the window         Network Objects    Type   Name IP   Mask   Zone   NatIP    P Internet 0 0 0 0 0 external    Internal Network 192 168 4 0 24 internal etho  External Interface 192 168 4 103 32 firewall external null  Internal Interface 192 168 4 89 32 firewall internal   null  DMZ Interface 192 168 176 1 32 firewall dmz1 null  Private CLASS A IPSec Network 10 0 0 0 8 ypn ipsec   Private CLASS B IPSec Network 172 16 0 0 ypn ipsec   Private CLASS C IPSec Network 192 168 0 0 ypn ipsec   Filiale Berlin 19  168 210 0 ypn ipsec   AuBendienst Muller 192 168 250 662 ypn openypn    Spuva User daisy   pn ipsec       m  pa  pa  pi  P  P  P  P  P  P  P    SSL YPN Netz 192 168 250 0 vpn openypn       Infobox Settings  CI Disable Infobox    Maal       Add Host Net Add VPN Host Net Add User Add Interface       fig  86 list of created network objects    Securepoint  Security Solutions 83    8 Menu Firewall Securepoint 10    8 6 1 Network Object Information    The function Infobox shows information of a network object if the mouse cursor rolls over it   You can enable this function by unchecking the checkbox Disable Infobox   The infobox shows not on
33.  interface  So you can conduct all virtual LANs  at one interface  Every VLAN has an ID  which is append at the packets as a tag  On the  basis of thee tags  a VLAN supporting switch can direct to packets to the right VLAN     Appliance       fig  43 VLAN formation    Securepoint  Security Solutions 43    7 Menu Network Securepoint 10    Click Add Interface   The Interface Wizard appears     Select the desired interface type  in this case VLAN      Click Next   The configuration window of VLAN Interface appears     Select in the field Interface to which physical Interface the VLAN interface should be  bound to     Enter an ID for the interface in the field VLAN ID   Enter an IP and Mask the IP address and the subnet mask of the VLAN network     Select if an IP address will be assigned to the interface by the DHCP server  If so  ac   tivate the checkbox DHCP Client     Define the maximum size of a data packet and enter the value in the field MTU  Max   imum Transmission Unit   In normal case you can leave the default value  1500      lf the interface should answer pings  activate the checkbox Allow Ping   select the speed of the interface from the dropdown field Speed     Select the zone of the interface and the related zones by activating the relevant  checkboxes at the right side     Complete the configuration with Finish   After the interface is added you have to press the button Update Interface             Interface Wizard       VLan       General  Zones            LJ ext
34.  is turned on  for example after reboot     The heart symbol labels the current running configuration    The signs behind the configuration names are buttons for functions which can be used for  every configuration     The buttons Save as     and Import     are located below the list     buon   function nem  mn Lena   Exports the configuration and saves it in DAT format     rint Opens a browser window in which the configuration is shown  p in table format  This description can be printed or saved     nr   Laangen   Set the configuration to start configuration   e foa Loads the configuration   Deletes the configuration     Opens a browser window in which a description of the configu   ration can be typed        Securepoint  Security Solutions 30    6 Menu Configuration Securepoint 10    6 1 1 Save Configuration    The settings made will be stored automatically in the current running configuration  You can    also save the new settings in an existing configuration or in a new one     Click on the button Save as      The dialog Save as     appears     Select an existing configuration from the dropdown box or enter a new name for the  configuration     Click on Save        Save as       Please enter a name to save the  current configuration to     Select old name  TERRA  or enter new name       Save Abort       fig  31 save the configuration    Securepoint  Security Solutions 31    6 Menu Configuration Securepoint 10    6 1 2 Import configuration    You can import an existing con
35.  just one roadwarrior and enter the IP address into the field beneath     lf you want to give access to a couple of roadwarriors  activate the radio button Ad   dress Pool and enter the IP address of the address pool and the related subnet  mask  An IP address out of this pool will be assigned to the roadwarrior if it connects  to the network     lf you want to set up the firewall rules automatically  activate the checkbox Automati   cally create firewall rules     Click Finish for exiting the wizard             IPSec Wizard       m Create a IPSec Connection  Roadwarrior   Native   IKEy2     Please specify the networks you want to connect with IPSec        Local Network   192  168 175 0    Local Mask   255 255 255 0 24 Lei     Single Roadwarrior IP address        Address Pool   192 168 180 0    Address Pool Mask   255 255 255 0 24 Lal                      M  Automatically create firewall rules       Abort Back Finish       fig  152 settings IKEv2    Securepoint  Security Solutions 139    10 Menu VPN Securepoint 10    10 1 2 2 L2TP  L2TP combines the PPT protocol and the L2F protocol  Because L2TP has no authentica   tion  integrity and encryption mechanism it is combined with IPSec      gt  Activate the radio button IPSec Connection with L2TP    gt  Click Next          IPSec Wizard           Create a IPSec Connection   Do you want create a IPSec connection with or without L2TP      Native IPSec  TheGreenbow  NCP  Safenet or Windows 7     si    IPSec Connection with L2TP      
36.  logged by the  IDS    The system checks the signature of every packet against known attack signatures which are  stored in so called rules     Notice  Just activate rules which are applicable for your system     Otherwise the IDS stresses the system unnecessary      gt  Select rules in the dialog IDS  Activate the relative checkbox      gt  Store your settings with Save   The IDS service will be restarted           IDS   IDS rules  backdoor  bot   CJ chat  ddos   CJ dns   dos   CJ exploit  LJ finger   len   CL  game       l lirmn infn                fig  138 select the signature classes    Securepoint  Security Solutions 129    9 Menu Applications Securepoint 10    9 8 Nameserver    You have the possibility to forward requests to the local nameserver to external nameserv   ers  The replies of the external nameservers will be transmitted to the requesting application    or the requesting service     Select the menu item applications from the navigationbar and click on nameserver  in the dropdown menu   The dialog Nameserver appears     Enter the IP address of the external nameserver into the field at the bottom of the di   alog    Click Add IP Address to apply the nameserver to the list    You can delete listed nameserver by using the thrashcan button     Click Save to store the settings and leave the dialog     sf  Nameserver     Forwarder for local Nameserver   IP Address     128 176 191 10    Add IP Address             fig  139 add external nameserver    Securepoint  Secur
37.  message is shown by opening the new browser window          Warning    Changes on this Settings may crash the system   Do you want to continue        fig  193 warning by clicking menu item advanced settings    12 6 1 Buttons    If you made changes in this section the changes will not take effect till you update the appli     cation  the interface or the rule     description    ame eme    Closes the browser window Advanced Settings        fig  194 buttons in the window advanced settings    Securepoint  Security Solutions 177    12 Menu Extras Securepoint 10    12 6 2 IPSec    You can disable the support of IKEv1 and IKEv2 for IPSec connections     lf you disable both servers  IPSec connections cannot be established      gt  To disable a server click the related button Off    gt  To enable a server click the related button On      O  Advanced Settings    IPSec Portfilter Dialup Templates Variables Webserver       m IKE Server     IPSec IKE vil Server  IPSec IKE v2 Server             Update Applications Update Interface Update Rules Save Config       fig  195 switch states of IKEv1 and IKEv2 servers    Securepoint  Security Solutions 178    12 Menu Extras Securepoint 10    12 6 3 Portfilter    Make a setting for the allowance of IPSec connections     Activate the first checkbox to Accept all incoming IPSec     Activate the checkbox Allow related connections to allow iptables to accept all  packets of existing connections per connection tracking     Store the settings with Save 
38.  net 3 blue IP address  gt  cluster IP  virtual IP     fig  48 high availibility environment       Securepoint  Security Solutions 48    7 Menu Network Securepoint 10    Click Add Interface   The Interface Wizard appears     Select the desired interface type  in this case Cluster      Click Next   The configuration window of Cluster Interface appears     Select in the field Interface to which physical Interface the cluster interface should be  bound to  The physical interface persists to support the management IP address     In the field Cluster Interface a name is predetermined   Insert the virtual IP address of the appliance in the field Cluster IP   Enter the subnet mask into the field Mask     In the section Spare IPs enter the management IP address es  of the spare ma   chine s      Type the IP address and the related subnet macks into the fields IP and Mask and  click Add   The IP address will be shown in the list     With the trashcan beneath the IP address you can delete the relative entry     select the related zones in the section Zones   Normally the zones of the physical interface will be adopted     Click Finish to complete the configuration   After the interface is added  you have to press the button Update Interface        o Interface Wizard       Cluster         m General   Interface   etk        Cluster Interface  Cluster    Cluster IP      Mask                             Zones   Spare IPs   l M  external  IP      CI internal  10 0 0 3 T bag  CI dmz2  CI dmz
39.  portable OpenVPN client  a  preconfigured configuration file and the needed certificates     Opening OpenVPNPortable zip  You have chosen to open    2  OpenVPNPortable zip    which is a  Compressed  zipped  Folder  from  https   192 168 99    What should Firefox do with this file          Open with   Windows Explorer  default  v    Do this automatically for files like this from now on        fig  207 save dialog of the Mozilla Firefox     gt  Decompress the ZIP archive and save the directory on your computer or on an USB  flash drive     gt  Open the directory  Doubleclick the file OpenVPNPortable exe  The OpenVPN client  starts   The OpenVPN client icon appears in the taskbar beneath the clock   Click it with the right mouse button  The context menu appears  Start the SSL VPN  connections by clicking Connect     Connect    view Log  Edit Config  Change Password    Proxy Settings    About  Exit          fig  208 context menu of the VPN client in the taskbar    Securepoint  Security Solutions 195    14 Spamfilter Securepoint 10    14 4 Spamfilter    If the user is a member of the groups User Interface and Spam Filter User he can access  the Spam filter interface   The user can check which e mails were classified as soam or ham by the system  If he finds  e mails which are misclassified as soam  he can mark them as ham    It is important to move not identified spam mails from the ham section into the spam section    to train the adaptive filter  Bayes filter      The spam filt
40.  primary and secondary Nameserver   Enter the IP address of the primary and secondary WINS server  if you use one      Store your settings with Save         YPN L2TP  General DNS  WINS    Primary Nameserver  192 168 176 10  Secondary Nameserver    192 168 176 20  Primary WINS Server  192 168 70 10  Secondary WINS Server  192 168 70 20    Save Close       fig  160 define IP adresses of DNS and WINS servers    Securepoint  Security Solutions 148    10 Menu VPN Securepoint 10    10 5 PPTP    The basic settings of VPN via PPTP are nearly identical to the settings of L2TP   The basic settings of the PPTP interface and address pool are set on the tab General  On    the other tab enter the IP addresses of the name server and the WINS servers     Click in the VPN dropdown menu PPTP    The dialog VPN PPTP appears    In the tab General you have to adjust basic settings    Enter the IP which should be used by the PPTP interface in the field Local PPTP IP   An explicit PPTP interface doesn t exist  The entered IP address will be bound as a  virtual address to the external interface    Under PPTP Address Pool adjust a PPTP address pool    This must be set in the same subnet as the PPTP IP address    The left field contains the start address and the right field the end address of the ad   dress pool    For the Maximum Transmission Unit  MTU  the default value 1300 should be re   tained    You can select  if you want to use an authentication against a Radius server   Enable or disable the R
41.  safety measures in respect of network   web  and e mail security  The  appliance offers firewall   IDS  and VPN functionality  proxies  automatic virus scanning   web content  and spam filtering  clustering  high availability und multipath routing func   tionality  It provides several authentication methods and encrypted access to the net   work    The combination of these functions in one system minimizes the administrative and inte   grative complexity in contrast to individual solutions    The appliance is administrated with a clearly structured web interface    The Securepoint UTM solution is available as a pure software version or as sundry ap   pliances which are especially adapted to the requests  The solutions vary from home  office and small office networks to great company networks with several hundred com     puters     Securepoint  Security Solutions 11    Securepoint 10    Part 1    The Administration Interface    Securepoint  Security Solutions 12    2 The Appliances Securepoint 10    2 The Appliances    The firewall software is installed on hardware  which is especially designed for the purpose of  network protection  The portfolio of Securepoint contains 7 appliances  The appliances are  adapted to different network quantities and consequently the processing speed  the memory  capacity  the disk space  the throughput rate and the numbers of interfaces of the machines    vary     VPN throughput  Piranja o Gian up to 5 100 Mbit s 70 Mbit s    RC 100 o i RC100 1
42.  the settings for the password   You decide if the user may change the password himself  if the password must contain num   bers  special characters  lower  and uppercase letters and the minimal password length     The password can only be changed in the user interface     Switch to the tab Extras    lf the user is allowed to change the password  check the checkbox User can change  password    Select the Minimum password length    Decide which characters the password must contain    numbers    special characters  lower  and uppercase letters    Store your settings with Save     vi  Add User    General VPN SSL VPN Client Spamfilter Extras    User can change password  M    Minimum password length  S  Password must includes letters and  numbers  v  special characters  v  lower uppercase  v    These settings will only have an effect in the user interface     Save Close    A       fig  171 password properties    Securepoint  Security Solutions 158    11 Menu Authentication Securepoint 10    11 1 6 Add User  Tab WoL    The abbreviation WoL stands for Wake on LAN  You can start start turned off computers  over LAN  The mainboard and the network adapter must support ACPI to use this function   The option must set in the BIOS and in the network adapter settings    If this option is set for a user  the user can start listed computer over the user interface  The    membership UserlInterface is required     Switch to the tab WoL   Activate the checkbox Enable WoL   Enter the name of the 
43.  the website http  Awww java com      Enter your user name into the field User and your password into the field Password     Click Connect to login in to the system     If the login was successful  the button text changes to Disconnect  Click this button  for Logout  You also logout from the system by closing the applet window     If the login wasn t successful the text    Wrong username password    appears     Server  192 168 4 87  User     Password     Connect       fig  219 SPUVA login per Java applet    Securepoint  Security Solutions 206    14 Wake on LAN Securepoint 10    14 6 Wake on LAN    This section is only visible for users which are authorized to use the Wake on LAN function   The user can start registered computers remotely  The user can access the remote computer  if according rules are defined    This function must be supported by the comuter  The settings for this function are made in    the BIOS or at the network adapter settings     Click on the button Wake on LAN in the User Interface     The dialog Wake on Lan appears   Here are all computers listed which you allowed to start     Click on the button with the start symbol Y The related computer will be  started          Wake On Lan   Hostname Interface MAC Address   PC FredF ethi 00 3F 65 B4 DC 1A     Laptop Fred ethi 56 70 6C 4B8 23 48B          fig  220 start remote computer    Securepoint  Security Solutions 207    14 Download Section Securepoint 10    14 7 Download Section    Every user who is member o
44.  use of a rule is  logged and in which grade of accuracy  The logging data in Syslog format can be stored ona    server  So you can analyse logging data at a later time     To add a server for protocol data click on Add Syslog Server   The dialog Add Syslog Server appears     Enter the IP address or the host name into the input field and click Add   You can delete a server in the list by clicking the trash can icon beneath the entry          Server Properties    Server Settings Administration Syslog SNMP Cluster Settings           Syslog Server    Host  IP Address    192 168 176 5       Add Syslog Server                fig  36 tab syslog of the Server Settings dialog    Securepoint  Security Solutions 36    7 Menu Network Securepoint 10    7 1 4 SNMP    The Simple Network Management Protocol  SNMP  is a network protocol to control network  devices centraly  With this protocol you can read the values of interface traffic  processor   and memory utilization    The versions 1 and 2c are supported    The remote computer must be set as an authorized host to read the data  Furthermore a  SNMP client and the SNMP service must be installed on the remote computer  The host    must also know the Community String      gt  Activate the SNMP Version  you want to support  You can support both versions at  the same time      gt  Seta keyword into the field Community String  Advice the remote user of this key   word      gt  Atthe bottom of the section Enable access from networks enter an IP
45. 0 to 25 100 Mbit s 100 Mbit s    RC 200 3 I RC200 25 to 50 400 Mbit s 260 Mbit s    RC 300   a  50to 100 1000 Mbit s 700 Mbit s  RC 310 ke 50 to 100 1000 Mbit s 1000 Mbit s    RC 400 100 to 500   1000 Mbit s 1000 Mbit s    RC 410 eme   100 to 500   1000 Mbit s 1000 Mbit s      machine CPU USB   USB ports      Piranja VIA C3   Eden 533   1 GB Compact Flash   3 x 10 100  al al  RC 100 VIA C7 1 GHz 1 GB 80 GB 3 x 10 100  Ethernet ports NW  RC 200 Intel M 1 0 GHz 1 GB 80 GB 4 x 10 100 1000   5  TTT TTT een 1  RC 300 Intel Core2 Duo 1 GB 80 GB 6 x 10 1000  E4500 2 x 2 2 GHz Ethernet ports    RC 310 Pentium D 1 GB 2 x 80 GB 6 x 10 1000  2 xX 3 4 GHz Ethernet pPorts    RC 400 Xeon 5335 2 GB 2x73 GB 10 x 10 1000 4  co eae ee  RC 410 Xeon 1 8 GHz 2 GB 2x73 GB 10 x 10 1000 4  TT Iesel    Securepoint  Security Solutions 13       3 Positioning the Appliance Securepoint 10    3 Positioning the Appliance    In the network assembling the appliance is positioned behind the modem  If a network is  actuated behind the appliance  a switch or hub must be set between the UTM and the    network  If you only use one computer  you can conduct it directly to the appliance        Securepoint  Appliance        fig  1 position of the appliance in the network    3 1 Piranja and RC 100    The Piranja and the RC 100 appliances have 3 Ethernet ports  LAN 1 to LAN 3   one serial  interface  D Sub  and two USB ports    The three network ports are destined for different nets  The interface ethO is reached thro
46. 3  CI dmz4  COI dmz5  CI dmz6  IP  10003   vpn ipsec  Mask   255 255 255 0 24 el  Add  vpn ppp                                     Abort Back Finish  E       fig  49 add cluster interface   set properties    Securepoint  Security Solutions 49    7 Menu Network Securepoint 10    7 2 1 7 Edit or Delete an Interface  In the lists of all interfaces on the tab Interfaces a wrench symbol and a trashcan symbol are  positioned beneath the entries  With these buttons the entries can be edited or deleted     For editing click the wrench symbol   The dialog Change Interface appears     Change the settings and save the new properties with Save     For deleting click the trashcan symbol     Click Yes at the conformation prompt   The entry will be deleted        7 2 2 Routing    Routing entries define via which gateway a destination has to be reached   The default route defines that all destinations are reachable via the internal gateway  internal  interface      o Network Configuration  Interfaces Routing DSL Provider DynDNS DHCP    Source IP Mask Route Destination Mask Weighting  192 168 100 1 0 0 0 0 0 1  192 168 176 0 24 192 168 175 1 0 0 0 0 0 1    Add default route Add route       fig  50 list of routing entries    Securepoint  Security Solutions 50    7 Menu Network Securepoint 10    7 2 2 1 Edit or Delete Routes  In the lists of all routing entries on the tab Routing a wrench symbol and a trashcan symbol  are positioned beneath the entries  With these buttons the entries can be edi
47. 8 Menu Firewall Securepoint 10    8 3 1 Port Forwarding    Via Port Forwarding you can conduct inquiries  which are directed to a specified port  to a  defined computer  For Example  You can conduct HTTP queries at port 80 directly to the    web server  For this forwarding a network object must exist for the web server     Click Port Forwarding in the dropdown menu of the Firewall icon   The window Port Forwarding appears  which displays all forwarding rules     Click Add  to create a new forwarding   The dialog Add Port Forwarding appears     Select Port Forwarding as type    Under Source select from which network the query is coming    Under Interface define which interface is used by the query    For Destination select a network object to which the query should be forwarded   Under External Port select the service and hence the port  which should be used   Store your settings with Save     Note  A rule in the portfilter must be set  to allow the port forwarding        Add Port Forwarding    Type    Port Forwarding ze   Source    Internet   Interface    eth0 EN  Destination    webserver iv   External Port    http    Save Close       fig  76 create port forwarding rule    Securepoint  Security Solutions 15    8 Menu Firewall Securepoint 10    8 3 2 Port Translation    With port translation you can change default ports to self defined ports     Example  You want to run two web servers in the DMZ  But the default HTTP port 80 cannot    be set twice  So you redirect the port to
48. 92 168 4        LEN 78 TOS 0x00 PREC 0x00 TIL 64 ID 0 DF PROTO UDP         lt 4 gt Apr 27 13 38 41 kernel  DROP default  IN eth1 OUT  MAC ff  ff  ff  ff  ff  ff 00 23 54 15 d1 c0 08 00  DST 192 168   _ LEN 78 TOS 0x00 PREC 0x00 TTL 64 ID 0 DF PROTO UDP     lt 4 gt Apr 27 13 37 56 kernel  DROP default  IN eth1 OUT  MAC ff  ff  ff  ff  ff  ff 00  1f e2 6d 65 39 08 00  SRC 192 168 4 DST 192 168      LEN 240 TOS 0x00 PREC 0x00 TTL 64 ID 0 DF PROTO UDP     lt 4 gt Apr 27 13 37 46 kernel  DROP default  IN eth1 OUT  MAC ff  ff  ff  ff  ff ff 00 d0 b7 b2 27 0e 08 00  SRC 192 168      DST 192 168    LEN 235 TOS 0x00 PREC 0x00 TTL 128 ID 92 PROTO UDP     lt 15 gt Apr 27 13 37 27 server     lt 15 gt Apr 27 13 37 27 server  traffic    lt 15 gt Apr 27 13 37 27 server  traffic    lt 15 gt Apr 27 13 37 27 server  traffic    lt 15 gt Apr 27 13 37 27 server  traffic    lt 15 gt Apr 27 13 37 27 server  traffic    lt 15 gt Apr 27 13 37 27 server  traffic    lt 15 gt Apr 27 13 37 27 server  traffic    lt 15 gt Apr 27 13 37 27 server  traffic    lt 15 gt Apr 27 13 37 27 server  traffic        RA Anr 27 13 37 14 sshdf42951  nam_unix sshd sessinn   session clased far user admin                   fig  204 raw data of the log entries    Securepoint  Security Solutions 189    13 Menu Live Log Securepoint 10    13 6 Colored Labeling of the Service in the Live Log    tag description    Communication between Securepoint client and server    Communication between dhcp client and  server    oa  Gi  4    Co
49. Blacklist entries  will be blocked without checking      gt  Enter complete e mail addresses on the tab E Mail  Whitelist and Blacklist       gt  Enter domains on the tab Domain  Whitelist and Blacklist     gt  Enter host IP addresses or host names on the tab Host  Whitelist and Blacklist      Di  Spam filter Properties    General Attachment Filter Virusscan SMTP Settings SMTP Advanced POP3 Settings          SMTP Whitelist  don t filter for spam   SMTP Blacklist  always reject    E mail Domain Host E mail Domain Host    E mail Domain    support securepoint cc example com                   Save Close  E       fig  131 global Whitelist and Blacklist    Securepoint  Security Solutions 123    9 Menu Applications Ssecurepoint 10    9 4 6 POP3 Settings    Here you can define settings for the POPS e mail retrieve service  You can check all mail     boxes for viruses and undesired attachments or just specified mailboxes      gt  The subject of soam e mails will be tagged  Edit the tag in the field Edit message in  subject when spam      gt  Decide on the left side if all mailboxes should be scanned for viruses or just specified  ones   If you select the option specific mailboxes  enter the user names whose mailboxes  should be scanned     Decide on the right side if all mailboxes should be scanned for undesired attach   ments or just specified ones    If you select the option specific mailboxes  enter the user names whose mailboxes  should be scanned        O  Spamfilter Properties  
50. C d EE 169  12 ITS wf NW re 170  Te Ll EE 171  Meet er DN EEN 171  12 1 2 CLI Send Commande 172  122 AE 173  12 2  Update the  Eelere eege bebe 173  12 2 2 Update Virus Pattern Database               cccccccccccceecceeeeceeeeseeeeeeeeseeeeseeesaeeses 174  2S Ee ee Le e EE 174  Securepoint    Security Solutions 8    Securepoint 10    ES REO raO EE 175  12 5    Manage GOCK Olt annie Geir cre Aha Eeer 176  12 6  Advanced EE 177  PAO PUTON 177  Ve2 0se NWP ranne 178  tO  POOE EN 179  gle aio DR TE EE 180  BC E We EE 181  1260  Ee 182  T2200    WWEDSCIV EN ege dE 183  T27     TREMSSIAllliccataoudaccsuntanngtdonsanptantadontieme R 184  128 RereSh COCK OI EE 184  13 Men   LIVE E ee D 185  i SLAM EINE LO carcnnea 186  18 2 Search hue e e E 186  Toco  WA CIMINO EE 187  13 4 Details of a Log Message cc eecccecccsececeeeeseeeeeeeeseeeeseeeseueeseeeeeeeeseeeeseeesaneesanes 188  TsO  Eege 189  13 6 Colored Labeling of the Service in the Live Log    190  Part2    ol  EE EE 191  14 HOGIN  SCM ee 192  14 1 The User Interface Gechons 193  E Change PassWord EE 194  143   Download SSL VPN CLONE EE 195  TAAL  Eege Ee ee 196  14 4 1 Overview over the spam filter interface               ccecseceeeeeeeeeeeeeeeeeeeeeeeeaeeeeens 196  144 2  COMUMNS OF the VAS soa O 198  144 3 D     tails ofan EMail prisimena 199  E EE Aciononihe Tab Ra RE 200  1445  Acionron the Tab SHAM iaioa a a aioe cele csaseieae  201  14 46 Actonson hun EE SE EEN 202  Aa Tao Aa iG tavncalcaaunetiaedntiasdieh aimednacaadetnnehies
51. For this you have to use special  CLI commands  For further information on these commands check the CLI reference which is    available on the Securepoint website      gt  Type the desired CLI command into the field CLI    gt  Confirm the sending of the command with Send Command    gt  The command and the answer of the firewall appear in the text window                  Command Line Interface               CLI Log   CLI Send Command         CLI   show service       A          fig  186 send CLI command    Securepoint  Security Solutions 172    12 Menu Extras Securepoint 10    12 2 Updates    You can update the firewall software and the virus pattern database at this menu item  The  firewall will connect to the Securepoint Server and looks for new versions     Updates are only available with a valid license        Updates       Firewall     Version  Build 6870 Check for Updates Update           Virusscan   Pattern version  Main Database  Update  O5 Jan 2006 23 48  0200    Daily Database   OG Jan 2006 19 23  0100                fig  187 dialog for updating firewall software and virus pattern database    12 2 1 Update the Firewall    The version of the firewall software is given as a build number  First check if a newer version  is available  An immediate update will not check the build number but rather updates the  firewall with the same version number    The update stops all services and restarts the firewall  Therefore you should update the soft     ware only if a newer versi
52. LIAN   Block YAHOO   Block other IM                    fig  104 block remote support and messaging programs    Securepoint  Security Solutions 97    9 Menu Applications Ssecurepoint 10    9 1 6 Content Filter    9 1 6 1 Blacklist Categories   The Content Filter blocks websites with defined content  You can select from several prede   fined content categories  The categories contain tags and keywords which are characteristic  for respective content  The keywords are weighted by their directness  If the sum of key   words exceeds a defined limit  Naughtylesslimit  the website will be blocked  The higher the    Naughtylesslimit  the more improbable is the blocking of a website     Select the categories you want to block  Activate the related checkbox     Define the threshold  Naughtylesslimit    Consider that a low threshold could block many sites which don t meet conditions for  the selected categories     Store your settings which Save     0  HTTP Proxy    Virusscan URL Filter Block Extensions Block Applications Content Filter Bandwidth    Blacklist Categories Whitelist    wv auctions   wv chat  computercrime maleware  culture books  discrimination  file extensions  film video cinema  flirt dating  forums  fun jokes  games  music  news  pharma potenz  pornography  proxy  shopping  sport betting  travel  yiolence weapons  webmail    Naughtylesslimit     80   middle       fig  105 content filter of the HTTP proxy   tab blacklist categories    Securepoint  Security Solutions 98  
53. LS deed 54  Tee    DYDD NG E 55  7 2 4 1 Create or Edita DynDNS Ent    56  7 2 4 2 Delete a DynDNS Entry              ccc cceccceececeeeceeeeceeeeseeeceuseceueeseeessueesseesseeens 56  Vee EE 57  eege 58  Fe en 59  E Ee Gall Ee le 60  7 4 1 LO IUD dE 60  CAE    G EE 61  Ee BRON EE 62  Eet Mr Ut VW EE 63  8 1 FONG EE 64  8 1 1 AS eebe 67  Sekt  MODX FUN CHOM act  xe cecetbiamostes gusset EEN 68  E TI UMM EE 69  8 11 93  Tap DSSCIIOTION EE 69  Ge eenegen enee ee 70  8 1 3 Organize Rules and Groupe  sierran anaE 71  oe ROE NA EE 72  Sid Pon Forwardihg E 14  8 3 1 POR FOWardiNO seroren 75  8 3 2 POF MRAM SALON EE 76  E le 77  8 4 1 Delete ANC CIS Le 77  642  er E IMMA O WEE 78  843 AUG SEIN ICC EE 79  B Di  SEME EE  80  8 5 1 Edit Existing  SERVICE Ee EE 81  8 5 2 Create NEW Service Group    82  BO  INGTON CO CCS eer 83   Securepoint    Security Solutions 5    Securepoint 10    8 6 1 Network Object Information               ccccseccceeecceeeceeeceeecsuseceeecueeseuseceeessueeneess 84  EE ele Be Te 85  S 6 3 ele WA EC HOSIN EE 86  S64 Add A EE 86  865  Add lat ir Le 87  Bl NeWok IOUS  EE 88  8 7 1 Network le  Gelle eg Ee oie ect raed ati ete asennad ate etnies  89  8 7 2 Network Group lnformation           eannnannanneannannnnnnennnnnnennnnnnnnrsnenerrsnenerennererennes 89  MENU eelere 90  GC DAN ACEP FOX EE 91  9 1 1 Generalerna EE ETE 91  Oli  EE eee acer mele 93  ee Sa     2 EE 94  OVA  iBIOCK EXTCNSIONS EE 96  OA  BIOCKADPICAUON EE 97  Ce E ie WEE 98  9 1 6 1    Blacklist Cate
54. Member all network objects are listed which are ele   ments of the selected network object group    You can add network objects to the selected group by highlighting objects in the left  table and click on the rightwards arrow button    The selected network objects will be moved to the right table    You can delete network objects from the group by highlighting objects in the right ta   ble and click on the leftwards arrow button    The selected network objects will be removed from the right table       Click on the button Update Rule to apply the network group changes to the rules of  the porttilter     o  Network Groups       External Interface        Groups             Network Objects Network Group Member  W   Internal Interface W   External Interface  KR DMZ Interface   5 Internet      Private CLASS A IPSec Network  f   Private CLASS B IPSec Network  Jf Private CLASS C IPSec Network    jnternal net     s  ui   gt                            Select Information    You have been selected 0 Network Objects   You have been selected 0 Network Group member           Infobox Settings  C Disable Infobox             Update Rule Close       fig  95 network groups dialog    Securepoint  Security Solutions 88    8 Menu Firewall Securepoint 10    8 7 1 Network Object Information    The function Infobox shows information of the network object if the mouse cursor rolls over  it    You can enable this function by unchecking the checkbox Disable Infobox    The infobox shows the name  IP add
55. Password  Confirm the  password in the field Confirm Password             Mail Relay    General   Relaying Mail Routing Greylisting Domain Mapping Advanced    General Settings     Virusscanner     on sl  Spamfilter  on zs   Postmaster E mail Address  master securepoint   Maximal E mail size in KByte  20480      Smarthost Settings    Enable Smarthost  wi   Smarthost  www mastermail net    Enable Smarthost Authentication  M    Login  securepoint       Password  EE    Confirm Password  Pe i ee          fig  112 general settings for the mail relay and the Smarthost    Securepoint  Security Solutions 105    9 Menu Applications securepoint 10    9 3 2 Relaying    On the tab relaying you deside how to deal with e mails of recorded hosts and domains   E mails which are directed to your domain should be relayed to your internal mail server  If  the internal mail server also uses the firewall for sending e mails you have to enter it   s IP  address    You have the possibility to use relay blocking lists  In these lists computers are registered  which are known for sending spam e mails  With these lists  mailservers could be blocked    which are listed misleadingly or their misuse was a long time ago     You can also enable SMTP authentication for local users  The selected certificates are used    for encryption of the data traffic        Mail Relay    General Relaying Mail Routing Greylisting Domain Mapping Advanced       m Relaying Settings   Option Domain or Host  To securepoint de  
56. Restart Off  Kerberos   i Restart Off       fig  140 overview of the services  their states and their classification to critical services    Securepoint  Security Solutions 131    10 Menu VPN Securepoint 10    10 Menu VPN    The Virtual Private Network  VPN  connects several computers or networks with the local  network  This is realized by a tunneling connection through the internet  For the user the  tunneling connection seems to be a normal network connection to the destination host  The  VPN provides the user a virtual IP connection  The transmitted data packets are encrypted    by the client and will be decrypted by the firewall and vice versa     For transmitting the data  several protocols are used  The methods are varying in degree of    safety and complexity     VPN    IPSec Wizard  IPSec Globals    IPSec  L2TP  PPTP  SSL VPN       fig  141 dropdown menu VPN    ame om    L2TP Combination and enhancements of PPTP and L2F  Is supported by MS Windows     PPTP Point to Point Tunneling Protocol doesn   t use a comprehensive encryp     tion     Is supported by MS Windows     SSL VPN Uses the TLS SSL encryption protocol        Securepoint  Security Solutions 132    10 Menu VPN Securepoint 10    10 1 IPSec Wizard    The assistant for creating IPSec VPN connections guides you step by step through the sev   eral configuration points    You can choose between site to site or roadwarrior connection    A site to site connection interlinks two networks  For example  The local netw
57. Securepoint 10    Securepoint           SECUREPOINT    Product Overview Securepoint 10    Product Overview    This manual applies to the following products   VPN Product    Terra VPN Gateway    The Terra VPN Gateway has less functions than the Securepoint UTM products    These limitations affect the functions of the applications proxies  virus scanner  spam filter  and content filter    If you purchase the Terra VPN Gateway  you can easily upgrade to the Securepoint UTM  product with a registration key  At this yearly update costs are incurred  For further informa   tion contact our sales department  vertrieb securepoint de    UTM Products        Terra UTM Gateway       Piranja       RC100       RC200       RC300       RC310       RC400       RC410       Securepoint 10 for Modular Server        Securepoint 10 for VMware    All Securepoint UTM products have the full UTM function volume     Securepoint  Security Solutions 2    Content    Product Overview    VPN Product    UTM Products    1 Introduction    Part 1 The Administration Interface    2  he Appliances wrssictvnccseesvaosseelaacsseesiacssveluaeniennae  A Positioning the Applance  3 1 Piranja and RC 100   S RO OO  39 Ce  3A  e  4 Administration Interface             sseeseeeseenneeneeennnn  4 1 Connecting the Applance   4 2 System Requirements for Client Computer  D Securepoint CGockont     5 1   Navigation Bar     32 Beie E  E  DYSICMIN EE  5 4 Service Status eege dee dee   eehen  39  ee ue E  Sicht  JEE  EE  5 3  DOwNo
58. Stop logging   Click the button again to stop the logging        13 2 Search function    When you started the live logging  all events which are logged will be shown   If you look for something special  use the filter function  You find the filter function centered    above the event table  The function works only  when the logging is active     m Filter     Filter pattern   None   Start logging  V  Scroll auto  he bottom        Time  Service  Content           gt  Stop a running logging     gt  Select a pattern from the dropdown box Filter pattern   o Time  Filters the entries by time   o Service  Filters the entries by service   o Content  Filters the entries by message text      gt  Enter a search pattern into the right field   The search pattern is depended on the selected filter     o Time can be given in hours  minutes and seconds  Use colons as separators   For example  13 16 09   8 36 00  You can filter by hours and skip the minutes and the seconds  The entry must end  with a colon     For example  16    9    You can filter by minutes and skip the hours and seconds  The entry must begin  and end with a colon    For example   27     09 Service       Securepoint  Security Solutions 186    13 Menu Live Log Securepoint 10    o Service  lf you filter by service you don   t have to know the service concretely  You  can also use parts of words   For example  webserver   server    Content  The content of protocol messages is very different  If you dont know a  concrete error 
59. To securepoint cc    securepoint de    Add Domain Add Host           Options   Use Relay Blocking Lists     Activate SMTP Authentication  for local Users     Choose CA     Choose Server Certificate                          fig  113 relaying settings    Securepoint  Security Solutions 106    9 Menu Applications Ssecurepoint 10    To add a domain  click Add Domain   The dialog Add Realy Domain appears     Enter a domain in the field Domain    select None  To  From  Connect in the dropdown field Option    In the field Action choose between Relay  forward   Reject  block  and OK  ac   cept     Click Add     To add a host  click Add Host   The dialog Add Host or IP Address appears     Enter a host name or an IP address into the field Host or IP Address   In the field Action choose between Relay  Reject and OK   Click Add     l o Add Relay Domain        Add Relay Host or IP Address       Domain  Host or IP Address   securepoint de   19700 Fl    Action    RELAY  a                 fig  115 add IP address    fig  114 add domain    Securepoint  Security Solutions 107    9 Menu Applications Ssecurepoint 10    9 3 3 Mail Routing    The mail routing defines which mail server is responsilble for e mail adresses in which do   main    You can activate an e mail validation against different databases or against a local file  E   mail to addresses which don t exist will be directly rejected by the mail relay      gt  To enable the e mail validation  activate one checkbox Validate E mail addres
60. Virus Pattern update  22 Apr 2009 09 07  0400    fig  9 licence area    Securepoint  Security Solutions 19    5 Securepoint Cockpit Securepoint 10    5 3 System    In this area the current system utilization and the number of active TCP   UDP connections    are shown     Lane sO  Utilization of the processor  RAM    Utilization of the memory  ee graphical and in percentage  SWAP Utilization of the swap file  ps graphical and in percentage    Current TCP Connections   Number of current TCP connections  Current UDP Connections   Number of current UDP connections    Start Configuration Name of the start configuration    Running Configuration Name of the running configuration    E  System Status   CPU  19  utilization   Type  VIA Esther processor LO00MHz  1000 Mhz  RAM  41  of 1014 MB used  SWAP  0  of 4194 MB used  Uptime  08S Days 03 Hours 17 Minutes   Current TCP connections  28   Current UDP connections  2  Start Configuration     Running Configuration        fig  10 system status    Securepoint  Security Solutions 20    5 Securepoint Cockpit Securepoint 10    5 4 Service Status    The table shows a list of all available services and their status  Next to the HTTP proxy   POPS proxy and Mail Relay services is shown the state of the virus scanning   An active service is illustrated by a green circle  A grey circle shows that the service is    inactive     service description    SSH Server Secure Shell  Allows an encrypted connection to the appliance     Mail Relay service for 
61. acters  numerals and special characters  Your    password should be eight characters long        Securepoint  Security Solutions 17    5 Securepoint Cockpit Securepoint 10    4 2 System Requirements for Client Computer        Operating system  MS Windows XP and higher or Linux        Processor  Pentium 4 with 1 8 GHz and higher or according      Memory  512 MB or more      Browser  preferably MS Internet Explorer 7 and Mozilla Firefox 3    5 Securepoint Cockpit    The first screen shown after login to the trusted area displays an overview of the hardware  and services status  Besides it contains the navigation bar  information of the license  active  connections and available downloads    This view is always open  All further configuration options and settings will be conducted in  popup windows  After editing the settings  the popup windows will be closed and the cockpit  in the background will be activated again    The lists in the cockpit can be closed to managie the display for your needs     Firewalltype  Securepoint 10  Version  Build 8421  Licensed to  UNREGISTERED             wg   BB etho miami vpn ipsec  vpn      31  utilization eth1 internal  firewall internal  VIA Samuel 2  532 Mhz eth2 dmz1i  firewall dmz1    51  of 249 MB used Fun vpn openvpn   gt  i   0  of 4200 MB used  Uptime  00 Days 17 Hours 51 Minutes  Current TCP connections  11  Current UDP connections  0  Cluster status  No cluster active  Start Configuration  support  Running Configuration  support     
62. adS sisie  E Ee E EE  510  SSR E ama ee  5 11 Web Interface ler     512 DACP EE E  Delo Menace  KC e    Securepoint  Security Solutions    Securepoint 10    Securepoint 10    Select Trane o eNOS eae 26  5 13 2 Traffic Details und Traffic Zoom    27  BAA ONON le  p cenn T 28  DIS AMISTO ee 28  OAO E 28  6 Ment NS ee le Le ee 29  6 1 Configuration Management    30  6 1 1 Save en le Et te EE EN  6 12  leie Beer te Ee EE ER  Seele EE EE 32  639   HAN SWS1GIM epep pe E E E ERE 32  Ot eelere E TTT ER  SE Ee Lee EE ER  E MenUNEWOK beet Abee Ee 33  Pal  SCIEN IP EE eebe 34  7 1 1 DOI VEN SCN G EE 34  Gan EE elo Delt tel E 35  Ke VE HY SLOG rc kee ac tesa eet ee ei AT 36  EE ONM EE 37  7 1 5 Monitor Agent  AmdoSoft v4 Agent     38  TACO  EE SE MING Ee 39  dee    INGIWORK GOMMGUIAN ON erse teeta icigieealaasneicegeeeeds 40  7 2 1 Il Ee 40  LANA  ele Cui WN ACS EE 42  Leika 0 e RA La     a TE 43  Peso Adad PPTP EE EE 45  Le Ae  Add PPPOE IMCN ACC sri ote eccarNs T eciestar NS edie oiace NS ata 46  7 2 1 5 VDSL Interface hinzuf  gen            aannannnnnnenennnnennsnnonrnrrronrnnrrnnrrnrrsnrrerenrennee 47  7 2 1 6 Add Cluster Interface es e c2sccsccucecccneeedecedetsnendaenetecddakedeusaeuadentiehseenseeaedeoddsten  48  7 2 1 7 Edit or Delete an Interface AA 50  fee E dl Te RE 50  Peek Editor Delete e 51  Terz NACA ST A 51  Securepoint    Security Solutions 4    Securepoint 10    T2728  EE ROUGE  EE 52  7 2 3 DOELP OWI EE 53  Lede Editor Delete LE e Le EE 53   Vee Ove  MOL PIOVIOEL ClO A
63. adius Server Authentication by selecting On or Off     Store your settings with Save     0  YPN PPTP      General DNS  WINS    Local PPTP IP  192 168 1 8     PPTP Adress Pool  192 168 1 9 Iris Lais  MI 1300     Radius Server Authentication    Off EI    Save Close       fig  161 adjust IP address  address pool and authentication    Securepoint  Security Solutions 149    10 Menu VPN Securepoint 10    In the tab NS WINS enter the IP addresses of the name server and of the WINS server   Windows Internet Name Service   if you use one  This will be forwarded to the PPTP net     work     Switch to the tab NS WINS   Enter the IP address of the primary and secondary Nameserver   Enter the IP address of the primary and secondary WINS server  if you use one      Store your settings with Save         YPN PPTP  General DNS  WINS    Primary Nameserver  192 168 176 10  Secondary Nameserver   192 168 176 20    Primary WINS Server  192 168 70 10   Secondary WINS Server    192 168 70 20      Save Close       fig  162 define IP addresses of DNS and WINS servers    Securepoint  Security Solutions 150    10 Menu VPN Securepoint 10    10 6 SSL VPN    In this section you can set the general setting for SSL encrypted VPN connections     Enter the desired IP which should be used by the virtual interface in the field SSL  VPN IP    This VPN connection will be established over a separate virtual interface  The ad   dress pool depends on the IP address of the tun interface  If you change the IP ad   dre
64. alled name resolu   tion  The inversion search to detect the hostname of an IP address is not supported      gt  Enter a hostname into the field Host name      gt  Click on the icon Lookup   If the host is known all related IP addresses will be shown        Network Tools    google de    A 72 14 221 104  A 72 14 221 104  A 72 14 221 104  A 216 239 59 104  4 216 239  59 104  A 216 239  59 104  A 74 125 77 104  A 74 125 77 104  A 74 125 77 104        Legend        Lookup   i ing S Show Route          fig  61 looking for IP addresses    Securepoint  Security Solutions 60    7 Menu Network Securepoint 10    7 4 2 Ping    A Ping checks if a defined computer is reachable in the IP network  The appliance is sending  an ICMP echo request to the computer  so called Ping  The appliance expects an ICMP  echo reply as an answer  often called Pong   If the remote computer sends this answer  the  computer is reachable    lf the computer is not reachable the function shows the message undefined  The query also  fails  if the computer is configured to not answer Pings      gt  Enter a hostname or an IP address into the field Please enter a host      gt  Click on the icon Ping   lf the computer answers  the times the resond packages needed are shown and the  average time of all packages Furthermore the list shows how many packages are  send  received and lost   If the host does not answer  the message undefined will be shown        Network Tools    google de    recy from 216 239  59 104 seq 1 
65. an reach the user interface with their webbbroser over the IP address of the in   ternal interface by using the HTTPS protocol   forexample  https   192 168 175 1    lf the users want to enter the user interface from outside the internal net  for example from  the internet or the DMZ   the administrator has to create a firewall rule for reaching the inter     nal interface from outside with the HTTPS protocol     Securepoint  Security Solutions 192       14 The User Interface Sections Securepoint 10          14 1 The User Interface Sections    The user interface has more sections  The user can access the sections depending on his    group membership     Change password Spamfilter Download SSL VPN Client SPUVA Login Wake on Lan       fig  205 login screen    Change Dialog to change the password  User Interface with possibility  password Password length and characters to use accord    to change password  User  ing to the settings in the user management  management  gt  tab Extras     Spam filter Shows all received e mails and their classifica  User Interface with Spam  tion into ham  desired e mails  and spam  unde    Filter Admin  sired e mails   Possibility for resorting of mis   classified e mails     Download ZIP archive which includes the portable User Interface with SSL VPN    SSL VPN OpenVPN client  preconfigured configuration    client file  CA and user certificate     SPUVA Login   Central user authentication to login in to the sys    User Interface with SPUVA   Wake o
66. and Password   Enter the address of the DynDNS server into the field Server    In the field MX enter the domain for the e mail reception  for example securepoint de      Select the interface which should be used for this connection from the field Interface   mostly a ppp interface          Change DynDNS    Hostname  securepoint dyndns c       Login  Sp  admin         Password  eeeeeeee          Server  _members dyndns ord  Ma       Interface    pppd           Save Close       fig  57 create a DynDNS entry    7 2 4 2 Delete a DynDNS Entry     gt  Todelete a DynDNS Entry  click on the trashcan symbol beneath the relative entry    gt  Confirm the security query with Yes      gt  The DynDNS entry will be deleted        Securepoint  Security Solutions 56    7 Menu Network Securepoint 10    7 2 5 DHCP    The Dynamic Host Configuration Protocol can assign IP addresses and other network set   tings to the clients  If you start a client of the internal network  the operating system of the  client sends a query to the DHCP services of the server  The server transmits an available  IP address  the IP addresses of the DNS server and of the default gateway to the client    If you don t want to use this service  make no entries in this section and disable the client    DHCP Server in the menu applications  gt  Service Status      gt  Enter the internal subnet into the field Local Subnet and the relating subnet mask in   to the field Netmask      gt  Define the IP address range  The DHCP se
67. anning of e mails     Mail Relay Settings of the mail server     P a  Forwarding of remote control programs   Activate and deactivate services        Securepoint  Security Solutions 90    9 Menu Applications Ssecurepoint 10    9 1 HTTP Proxy    The HTTP proxy is set between the internal net and the internet  It analyzes content of inter   net sites  blocks suspicious websites and checks data for viruses    The client sends his query to the proxy  The proxy gets the data from the internet  analyses it  and sends it to the client  The proxy acts as an exchange agent  For the client the proxy acts  as a server  For the server in the internet the proxy acts as a Client     9 1 1 General    On the tab General you can make basic settings for the Proxy     Setting up the port of the proxy  The default port is 8080   If you want to define the Outgoing Address enter the desired IP address     If you use another proxy  activate the checkbox Cascade   In this case enter the IP address of the other proxy in the field Parent Proxy and the  port in the field Parent Proxy Port     Decide in which networks the proxy should be activated as a transparent proxy   Transparent means that the proxy isn t visible for the user  You needn t insert the  proxy settings in the browser  The firewall conducts the packets to the proxy automat   ically  But if you don t insert the proxy setting in the browser the user authentication  fails and protocols like HTTPS and FTP must be activated by rules     Unde
68. ation Domain  securepoint cc securepoint de    securepoint ru securepoint de    4dd Domain Mapping             Save Close  E       fig  123 domain mapping settings    To add a domain mapping rule  click the button Add Domain Mapping   The dialog Add Domain Mapping appears     Enter the domain of the incoming e mail in Source Domain   Enter the new domain in Destination Domain   Click Add         Add Domain Mapping    Source Domain   securepoint ru  Destination Domain     securepoint cc       fig  124 add a domain mapping rule    Securepoint  Security Solutions 114    9 Menu Applications Ssecurepoint 10    9 3 6 Advanced    This section offers settings that protect the mail relay with a basic mechanism          o  Mail Relay       Domain Mapping Advanced      General Relaying Mail Routing Greylisting    Advanced Settings     wv Enable Greeting Pause  Greeting Pause  2000   milliseconds    Define exceptions  Edit    v Prevent recipient flooding    Delay after  2  bad recipients     wv Limit max number of recipients    Max number of recipients for each message  E      wv Limit connections  prevent DDoS   Overall number of concurrent connections per seconds  3    Define exceptions  Edit    wv Enable rate control  Define window size  60   seconds  Limit the connections of a single host  5    Define exceptions  Edit    Save Close       A    fig  125 protecting mechanism on the tab advanced    Securepoint  Security Solutions 115    9 Menu Applications Securepoint 10    9 3 6 1 Greet
69. ation via certificate and IKEv2    Securepoint  Security Solutions 137    10 Menu VPN Securepoint 10    10 1 2 1 1IKEv1  If you selected IKEv1 you have to specify the local network and an IP address for the road     warrior     Enter the network the roadwarrior connects to into the field Local Network   Select the related subnet mask from the dropdown box Local Mask     Enter an IP address from the subnet into the field Roadwarrior IP address  This IP  will be assigned to the roadwarrior when it connects to the local network     lf you want to set up the firewall rules automatically  activate the checkbox Automati   cally create firewall rules     Click Finish for exiting the wizard              IPSec Wizard       Create a IPSec Connection   Roadwearrior IKEv1     Please specify the networks you want to connect with IPSec        Local Network   192 168 176 0          Local Mask   255 255 255 0 24 ei    Roadwarrior IP address   192 168 176 55     Ml Automatically create firewall rules       ll             Abort Back Finish       fig  151 settings IKEv1    Securepoint  Security Solutions 138    10 Menu VPN Securepoint 10    10 1 2 1 2IKEv2  If you selected IKEv2 you have to enter an individual IP address for the roadwarrior or a ad     dress pool     Enter the network the roadwarrior connects to into the field Local Network   Select the related subnet mask from the dropdown box Local Mask     Activate the radio button Single Roadwarrior IP address if you want to give access  to
70. box Templates   The template will be displayed in the section Template Content     Adjust the template for your needs     Store the changes with Save Template   For applying the changes immediately click the button Update Applications             Advanced Settings       IPSec Portfilter Dialup   Templates Variables Webserver    4 o cl      A Ze       7 emm      Applications    openvpn       Templates    etc openvpn conf Te   m Template Content           SIE   CLIENT_MODE  0  port   PORT     ELSE   iclient    fragment   FRAGMENT   ENDIF             Save Template       Update Applications Update Interface Update Rules Save Config Close  hi       fig  198 edit template    Securepoint  Security Solutions 181    12 Menu Extras Securepoint 10    12 6 6 Variables    On this tab you can show the template variables and their values  You can also add new va     riables  The added values just stay until a reboot of the appliance     Select the application from which you want to see the variables in the dropdown box  Applications     The variables are shown in the window Entries     To show the value of a variable click on the loupe symbol in the related row   The value is shown in the window Entry Value    Click trashcan symbol to delete the value     Beneath the dropdown box Applications is an entry field   To add a variable enter the name of the new variable in this field and click Add Entry     The changes are saved immediately and exist until the next reboot of the appliance   For a
71. can define e mails which should be excluded from the greylisting  They  will be forwarded at the first delivery attempt    In the section IP Address   Net you can exclude e mails from the greylisting which come from  defined IP addresses and networks      gt  Enter an IP address into the field at the bottom of the window    gt  Select the related subnet mask from the dropdown field      gt  Click Add IP Address   Net   The IP address will be saved in the whitelist     m Whitelist        IP Address Net Domain Email Recipients Email Sender    IP Address Net Mask  10 0 0 0    172 16 0 0    E e ei    192 168 0 0    tes    127 0 0 0    255 255 255 0 24 el Add IP Address  Net          fig  119 Whitelist   IP Addreses   Net    Securepoint  Security Solutions 111    9 Menu Applications Ssecurepoint 10    9 3 4 2 Whiteliste Domains  You also can exclude e mails from the greylisting which comes from defined domains   The specifcatons are only made in second  and top level domains      gt  Enter a domain in the field at the bottom of the window      gt  Click the button Add Domain   The domain will be saved in the whitelist        r Whitelist   IP Address Net Domain Email Recipients Email Sender  Domain    securepoint cc    partner de    4dd Domain                fig  120 Whitelist   Domain    Note  The domain isn   t the domain of the e mail address  but the domain of the mail server    which delivers the e mail        Securepoint  Security Solutions 112    9 Menu Applications Ssecurep
72. cations Content Filter Bandwidth      General   Virusscan   URL Filter Block Extensions       Virusscanning  v   Whitelist Extensions                       _________ F Whitelist Websites    Suffix         Domain  securepoint de  securepoint cc  securepoint org  windowsupdate microsoft com  windowsupdate com  update  microsoft com    swquery apple com    Dw  PR Pe  Pe  Pe  Pe  pe TD  S e ei e ei ei ei ei    swedn apple com     gt  ek 186 See 106 Che wee cee wee ome  ei e ei e e e e e ei e    Add Extension     Add Website       Save Close    fig  101 HTTP proxy dialog   tab virus scanning    Securepoint  Security Solutions 93    9 Menu Applications Ssecurepoint 10    9 1 3 URL Filter    With the URL filter you can block the access to websites by defining the URL  The filter is  adjustable by two lists  The blacklist contains URLs of blocked websites  The whitelist con   tains addresses of allowed websites    If you select an authentication mode on the tab General  websites on the blacklist are visible  for authenticated users  If you want to use the blacklist for all users  activate the option Use    lists with authentication     Switch to the tab URL Filter   Enable the filter by activating the checkbox URL Filter     Activate the option Use lists with authentication to block sites from the blacklist un   iversally     You can edit the entries by clicking the related wrench symbol  You can delete the  entries by clicking the related trashcan symbol     Add entries to the lists
73. ce basic settings   Administrator  P addresses  time zone and log server IP address    Network Configuration   Network settings  Setting of  P addresses and subnets of interfaces  DSL connec     tion  DynDNS service  routing and DHCP server    Zone Configuration Assign interfaces to zones and create new zones   Network Tools Tools  Lookup  Ping and lists the routing table       Securepoint  Security Solutions 33    7 Menu Network Securepoint 10    7 1 Server Properties    In this section basic settings for the appliance will be set  The dialog contains the tabs Serv   er Settings  Administration  Syslog and Cluster Settings     7 1 1 Server Settings    On this tab you can set the appliance name  the Domain Name Service server and the Net     work Time Protocol server     Enter the domain name of the firewall into the field Servername     Enter the IP address of the Domain Name Service server into the field Primary Na   meserver    If you use a Second name server enter its IP address into the field Secondary Na   meserver     Enter the IP adress or the host name of a time server into the filed NTP Server and  select your time zone in the dropdown box Timezone     You can limit the numbers of TCP IP connections  The number must range between  16 000 and 2 000 000  Enter the number into the field Maximum number of active  connections     Select from the dropdown box Last Rule Logging the protocol accuracy for dropped  packets     _     Server Properties      Server Settings Admi
74. computer in to the first field below the list     Select the interface from the dropdownbox the computer is connected to     Enter the MAC address of the network adapter of the remote computer into the third  field   The address must be given in double characters separated by a colon      gt  Click Add      O  Add User    General VPN Spamfilter Extras  Enable WoL  V   Hostname Interface MAC Address    PC Fred ethi 00 3F 65 B4 DC 1A    laptop Fred    ethi       56 70 6C 4B 23 4B    Add         fig  172 computer which can be started by the user    Securepoint  Security Solutions 159    11 Menu Authentication Securepoint 10    11 2 External Authentication    For user authentication you can not only use the local database but also external authentica   tion databases  The appliance offers checking against a Radius  or LDAP server   For the HTTP proxy you can also select authentication with the Kerberos service     11 2 1 Radius    Enter the access data for the Radius server on the tab Radius     Open the dialog External Authentication    On the tab Radius insert the data of the Radius server    Insert the hostname or the IP address of the server in the field IP address or host  name     Under Mutual secret key insert the password and retype it in the field Confirm mu   tual secret key     Store your settings with Save         External Authtentication    Radius LDAP Kerberos          Radius Settings  IP adress or host name  192 168 175 100  Mutal secret key  eoccccee    confirm mu
75. e     Activate the detailed view with a doubleclick in the row of the desired e mails   Attachment of the mail will be displayed as a hyperlink in the row at the bottom of the  window    Click on the hyperlink to download the attachment                    Mail Details x  From  news2Onews   3   To    Date  2009 09 20 16 33   Status    Subject  Neue_Brille_gesucht _Brillen_inklusive_Glser_sch on_fr_29 Euro  Frau_         This is a multipart message in MIME format    Attachments  attachment 1       SchlieBen  hi       fig  211 view of details    Securepoint  Security Solutions 199    14 Spamfilter    14 4 4 Action on the Tab Ham    Securepoint 10    You can execute the following actions on the e mails         Mark selected e mails as soam        Delete selected e mails      Resend selected e mails      Select all e mails       Delete all e mails        Resend all e mails    Marks the selected e mails as soam and  moves them to the tab Spam    Moves the marked e mails to the tab Trash   sends the marked e mails again    Marks all e mails on this tab    Moves all e mails on this tab to the tab Trash     sends all e mails on the tab again     Mark selected e mails as spamiw   Execute     Mark selected e mails as spam  Delete selected e mails    Resend selected e mails  Select all e mails  Delete all e mails       Resend all e mails    fig  212 actions on the tab Ham    Securepoint    Security Solutions 200    14 Spamfilter Securepoint 10    14 4 5 Action on the Tab Spam    You can 
76. e  AuBendienst_Meyer l                fig  148 name of the connection    Securepoint  Security Solutions 136    10 Menu VPN Securepoint 10    You can set up the IPSec  Internet Protocol Security  connection with or without L2TP   Layer2 Tunneling Protocol    You need a separate client for native IPSec  without L2TP   The operating system Microsoft    Windows 7 already includes a native IPSec client     10 1 2 1 native IPSec     gt  Activate the radio button Native IPSec    gt  Click Next        IPSec Wizard           Create a IPSec Connection   Do you want create a IPSec connection with or without L2TP      Native IPSec  TheGreenbow  NCP  Safenet or Windows 7        IPSec Connection with L2TP             Abort Back       Ai    fig  149 select native IPSec    Choose between the authentication methods preshared key and certificate  Furthermore se     lect the IKE version you want to use     If you choose preshared key activate the radio button Preshared Key and enter the  key into the field beneath     lf you choose certificate activate the radio button x 509 Certificate and select a serv   er certificate from the dropdown box     Choose between IKEv1 and  KEv2 and activate the relative radio button   Click Next          IPSec Wizard       Create a IPSec Connection  Roadwarrior   Native    Which kind of Authentification and IKE you want to use     Preshared Key       509 Certificate  spServer    IKE version 1    IKE version 2             Abort Back Next       fig  150 authentic
77. e Certificate Revocation Lists are listed  These lists have the same name   as the relating CA  If a certificate is revoked  it is stored in the CRL of the CA it is signed with   The lists can be exported  So other sites which are also use certificates of the appliance cab   be informed of revoked certificates    Furthermore CRLs from other sites can be imported  This files must have the CRL format     Switch to the tab CALs   All CRLs of self created CAs and imported CRLs are show on this tab     For export a CRL click the button with the disk symbol    The browser will open a dialog in which you can select the saving path    For import a CRL click the button with the label Import    Enter the whole path of the file into the appearing dialog or click Browse the search  the file in the local system     Afterward click import     Importet CRLs can also be deleted   Click the button with the trashcan symbol to delete the relating CRL     Confirm the security question      O  Certificates    CA Certs Revoked CRLs  Name Status  original_CA  SupportCA    bla_CA Imported    Import       fig  183 tab CRLs    Securepoint  Security Solutions 169    12 Menu Extras Securepoint 10    12 Menu Extras    In this section you will find options to customize the administration interface and functions for    advanced users     extras    CTA    Update Firewall    Registration  Manage Cockpit  Advanced Settings  Refresh All  Refresh Cockpit       fig  184 dropdown menu extras    a  CLI Command Lin
78. e Interface   Logging of the command line in  and output   a Sending commands to the appliance     Changelog Shows changes from one version to the previous version of the fire   wall software     Refresh Cockpit Reloads the values of the cockpit     The button D in the navigation bar offers the same function        Securepoint  Security Solutions 170    12 Menu Extras Securepoint 10    12 1 CLI    The command line interface  CLI  sends commands to the firewall software  Most functions  of the administration interface are based on such commands  This section offers to log the  in  and output of the CLI  Furthermore you can send commands directly to the firewall     12 1 1 CLI Log    On this tab you can activate the logging of the CLI in  and output  The logging is disabled by  default   Send commands to the firewall are colored blue     Answers of the firewall are colored green      gt  Toenable the logging  activate the checkbox Enable CLI Log      gt  The logging can always show the current entries  To enable this function activate the  checkbox Enable autoscroll      O  Command Line Interface            CLI Log CLI Send Command    D mm       Legend                              eT  e CLI Request     CLI Response W CLI Error      CLI Log settings   Enable CLI Log   Enable Autoscroll              fig  185 CLI logging    Securepoint  Security Solutions 171    12 Menu Extras Securepoint 10    12 1 2 CLI Send Command    In this tab you can send commands directly to the firewall  
79. e e mails on this tab irrevocably         Resend all e mails sends all e mails on the tab again     Mark selected e mails as spam  Delete selected e mails permanent    Resend selected e mails  Mark all e mails as ham  Mark all e mails as spam  Delete all e mails permanent  Resend all e mails       fig  214 Actions on the tab trash    Securepoint  Security Solutions 202    14 Spamfilter Securepoint 10    14 4 7 Tab Statistic    On this tab the ratio of spam and deleted e mails to ham e mails is shown graphically  Fur     ther diagrams show the numbers of mails depending on their origin     14 4 7 1 Filter  With the filter function above the diagram all statistics can be displayed for different time in     tervals      gt  Select the interval from the dropdown box   Possible intervals are     Today  Yesterday  Last week  Last month   gt  Click Refresh to reload the diagram     Refresh    Yesterday  Last week  Last month       fig  215 select intervall    Securepoint  Security Solutions 203    14 Spamfilter Securepoint 10    14 4 7 2 Tab General   On this tab a diagram shows the total number of ham e mails  soam e mails and deleted e   mails  The blue lines clarify the total amount of every bar on the y axis    The legend on the right side shows the numbers of every section and the percentage      O  Spamfilter    Ham Spam Trash Statistic    General Virus Top Level Domain       Today E Refresh       m Information    Type Count Percent  E mails  138  Ham  122 88 40      WS  g Spa
80. e of the previous keys  So no one can  gather the new key from the previous key     10 3 1 1 Phase 1    In these settings the basic connection parameters are stored     Le  tab General    Local gateway ID ID of the appliance   lf you use the interface ppp0 ethO the firewall ID is the IP address  of the interface  You can insert the hostname as well  also the  DynDNS name     remote VPN gateway or host  Name or IP address    Remote host gateway   remote VPN gateway or host  Name or IP address    ID Enter the certificate of the remote host  if the connection uses  certificates for authentication     Authentication Shows which authentication method is used   ema  Local key  Local Certif    Depending on the authentication method  enter the local key   PSK  or the name of the certificate     Start automatically Activate only for site to site connections     Dead peer detection This functions recognizes  if the connection aborted unexpectedly     If an abort is recognized  the tunnel will be shut down completely    to guarantee a new link connection     DynDNS name Mark this checkbox  if the remote host uses a DynDNS service     Securepoint  Security Solutions 144       10 Menu VPN Securepoint 10  Encryption Encryption method  Authentication Authentication method    Strict If this box is activated  the remote station must use the same set   tings for key and hash mode  regards phase 1 and phase 2      DH Group Key length of the Diffie Hellmann key        IKE life Duration of an IKE
81. e portfilter and is dropped by the last rule  it could be  more sensible to position the blocking rule at the top of the porttilter  Especially if this kind of  packets come in often    You can not only move single rules but also rule groups and rules inside of a group  It is also  possible to move rules from one group into another    For organizing the rule use    Drag  amp  Drop    and the context menu which opens with a right    mouse click      t Toggle Active    Ej Toggle Group    4 Add new Rule  Insert Rule before        Insert Rule after  Add new Group  Insert Group before  Insert Group after   Si Edit    gy Delete       fig  72 context menu of the portfilter dialog    The context menu offers the possibility to create rules and groups at defined positions  So  you don t have to move them after creation    Switch the status of a highlighted rule by using the option Toggle Active  The option Toggle  Group changes the status of all rules in a group    The context menu also includes the options Edit and Delete    In the second column of every row you will find the wrench  and the trashcan symbol for  editing and deletion    Instrumental in managing the rule set are the options Open Groups and Close Groups   They open or close all groups in the list  The symbols in front of the groups open or close a  single group     The green symbol with the two arrows presents a closed group  o  Click on it to open the group   7    The red symbol presents an open group  Click on it to cl
82. ecccseeceececseeccseeceueeceeeceueecseeeeseeseaeeseeseeas 136  SE REH UE 137    n e WCE WEE 138  Ee EE WAGE EE 139  WO ER GEN 140  tO MP SOC GOO als EE 142  1021 General DCHING Sisciccthecercantec cect iatoedaeieiceed iad edanhol eee iuciededies heb iecedatied gene  142  bg Ge EN EE 143  BE SEENEN 144  ue Oo HN elt GOMME GIO NEEN 144  Securepoint    Security Solutions 7    Securepoint 10    e EE Dia D nt Le BEE 144  10 3 1 2 Phase E 146  OA T TEE 147  MO Se NR a a E niu eiicananetcesntusiehcasauehortatauncayautulcasancatcassatneaseneds 149  T00 S EN E aT arene tet aeaaian canines vareiicaaieataremicudanenceere 151  11 Menu Authbentcaton  152  bs WD NEE 153  11 1 1 Add User Tab General               ccc cece cece cccccccccececececcacccecececuacaceueneauavaceneneaeas 154  ETS viet Heen MN  155  11 1 3 Add User Tab VPN OChenmt 156  died  Add User Tab Spam Fiter eege Ee 157  Itro ele 8 oy  all E le te EE 158  11 1 6 Add User Tab W e EEN 159  11 2 External Authbenticaton  ccc cccececccceccccccccccccecceucececueatenesueaeeceanecueneeneaneaees 160  Pee le    0 EE E EE 160  dh E NWI AP SOI EE 161  Le  iE 2E AEE EE EE 162  Wiles  era re EE 163  i is  Ss Simms gos ck EE 164  11 3 2 CreateCGertificales cc cccccccccccccececcceccecececcccacecececcacaueceteceavsueceneneas 165  11 3 3 Import CA and CGerttcaie cc ccccccceccccsseeeeseeeeesseeeeeseeeeesseeeeesseeeesseneeeeas 166  11 34 Export GA and ee le EE 166  11 3 5 Download SSL VPN Cent  167  11 3 6 Delete CA and Certificate    168  tos E
83. eeds the membership in the group  User Interface    If the user isn   t member of this group you can preconfigure the SSL VPN package anyway   You just have to hand the package to the SSL VPN user  see chapter 14 3      To enable the preconfiguration  activate the checkbox Enable VPN Client     Select a user certificate from the dropdown box Certificate  If no certificate is shown   you have to create one first    Select an IP address or a hostname in the field SSL VPN Gateway which is used by  the SSL VPN service    Either select a dynamic DNS entry trom the dropdown box or enter an IP address  or host name into the field Alternative     The option Redirect default gateway to remote site reroutes the whole internet traf   fic of the VPN user over the appliance     Click the button Download Client to download the client package as a zip archive     vi  Add User    General VPN SSL VPN Client Spamfilter Extras       Enable VPN Client  SSL YPN Certificate   Certificate  ssl Client zi  SSL YPN Gateway   Please select the gateway for the connection   e secpoint dyndns org v     Alternative    Redirect default gateway to remote site     Download Client       If the user has the User Interface permission  it is possible to  download a preconfigured client from the User Interface     Save Close       E    fig  169 setting for preconfigured SSL VPN client    Securepoint  Security Solutions 156    11 Menu Authentication Securepoint 10    11 1 4 Add User  Tab Spam Filter    Is the user 
84. ent to the server but also the server to the client     Switch to the tab Kerberos     Enter the LDAP group name of the group you want to give access into the field  Workgroup     Enter the domain name of the realm used into the field Domain     Under AD Server enter the IP address of the computer which hosts the Kerberos  service     Enter the IP address of the used DNS server into the field Primary Nameserver   Enter the administrator of the Kerberos server into the field User    Enter the password of the Kerberos administrator into the field Password and retype  it in the field Confirm Password           External Authtentication      Radius LDAP Kerberos    NTLM Settings   These settings will have only an effect on the HTTP Proxy     Workgroup  securepoint   Domain  securepointlocal    AD Server  192 168 176 100  Primary Nameserver  192 168 176 10    Administrator account  Administrator  rer  Ss Tt          Password        Confirm Password  eeeeeng          Save Close       fig  175 access data for the Kerberos server    Securepoint  Security Solutions 162    11 Menu Authentication Securepoint 10    11 3 Certificates    The appliance uses certificates to authenticate users which connect via VPN  The certificate  proves the users identity and contains a digital signature and statements about the owner   Certificates are signed by a Certification Authority  CA  to guarantee the genuineness of the  certificate  Normally the CA is a third independent and trustable instance  Yo
85. ented  time period is the last 24 hours  The measurement is taken every 5 minutes          Interface Traffic       settings    fig  21 graphical display of the data traffic    5 13 1 Traffic Settings    With the button Settings your can configure  which interfaces are displayed in this area   The dialog Interface Traffic Settings shows two lists  The left one shows the available inter   faces and the right one the interfaces which are displayed in the cockpit  Highlight an inter   face and use the arrow buttons to move it to the desired list     o Interface Traffic Settings x    m Interfaces m Show Interfaces  gt     ethi  etho                         fig  22 available and displayed interfaces    Securepoint  Security Solutions 26    5 Securepoint Cockpit Securepoint 10    5 13 2 Traffic Details und Traffic Zoom    A click onto a diagram opens a new window  which shows the graph in higher resolution  It  also shows details of the traffic          Interface Traffic eth1    E incomming   KByte s    E Outgoing   KByte s    12 00 16 00 20 00 0 00 4 00 8 00    Reset zoom       Overview   Measuring points  288  4 8 9 44  5  8 9 44   Incomming total  1 Mbyte   Outgoing total  50 Mbyte   Incomming average  0 01 Kbyte s   Outgoing average  0 59 Kbyte s   Collisions total  0 CO Show in plot  Errors total  D O Show in plot  Collision and error plot is not zoomable                 fig  23 details of the data traffic of the interface eth1    You can enlarge a section of the graph by raisi
86. er Type you can choose between Include and Exclude     Under Source define which objects should be nated   In this example the internal network    Under Interface set the interface which should be used    lf you have a static IP address  select ethd  lf you use a dynamic IP address  deploy  the DSL interface pppd     If the rule should be used for all destinations  select the entry any in the field Destina   tion     Position defines the position in the Hide NAT rule table  The rules are executed se     quential excepting the Exclude rules which are executed at first regardless of their  position        o Add HideNat       Type        Source           Interface        TN    Position    append              Save Close       fig  74 create HideNAT rule    Securepoint  Security Solutions 73    8 Menu Firewall Securepoint 10    8 3 Port Forwarding    The menu item Port Forwarding includes the functions Port Forwarding and Port Translation   Both functions define the destination of packages which reach the firewall at a defined port   Port Forwarding direct packages arriving at the defined port to a determined computer     Port Translation replaces the port of an ariving package with a self defined port     o Port Forwarding    Source Over IP  Interface Destination External Port Original Port  Internet eth0 webserver administration    Internet eth   webserver http_webserver 80       fig  75 list of port forwarding and port translation rules    Securepoint  Security Solutions 74    
87. er interface only shows e mails  if the spam filter is activated     14 4 1 Overview over the spam filter interface    The mails are ordered by time  the newest at top      Di  Spamfilter    Ham Spam Trash Statistic 1    Sender   Le Filtern    Reset 2      Date    From  To  Subject     C  15 18 18 09 09 siegeiox7  reply b    telnet ah pptp de    By increasing the number of your inch       15 18 18 09 09 fractured22 qales    bikini aspi treib    Tired of your old ugly watch  Get a n     C  15 18 18 09 09 amplitudesm6 dete    _hilfe ohrensausen    Dont wait until you become rich get      15 18 18 09 09 cellularcq282 met    biotechnologie te    Great harmony of quality and low prices   C  15 18 18 09 09 embryologists2 ro    base64 domaenenna    Your cheap designer watch will be inc     C  15 18 18 09 09 topicsd3 ritual com baseball tuerkei     With our watches your style will be i     C  15 18 18 09 09 dringenddawpy fre    _firewall for nt f    Ihre berweisung      15 17 18 09 09 goodnesszz21 reta    be pptp de With these watches being trendy is ch          15 17 18 09 09 gewinnegya web de  diabetes forum je    Dringend    OO00000000F    1 20 o0f 28 next gt  last page    3    Mark selected mails as ham      Execute 4 5  Refresh       fig  209 sections and functions of the spam filter    Securepoint  Security Solutions 196    14 Spamfilter    Securepoint 10    bag e    2 Filter    3 Navigation    4 Action    The display is divided in different sections    Ham shows identified des
88. ernal  Interface   etb    x     VLan ID   34 CO dmz1    IP     Mask    255 255 255 0 24 E C dmz3  DHCP Client     MTU    Allow Ping  O vpn ipsec  Speed    O vpn ppp    internal       192 168 180 1   C dmz2                CO dmz4  O dmz5  C dmz6                O vpn openvpn  O firewall external  M  firewall internal  O firewall dmz1       Abort Back Finish       Ye    fig  44 add VLAN interface   set properties    Securepoint  Security Solutions 44    7 Menu Network Securepoint 10    7 2 1 3 Add PPTP interface    A PPTP interface is used for connecting the internet by Point to Point Tunneling Protocol     This protocol is primarily used in Austria     Click Add Interface    The Interface Wizard appears    Select the desired interface type  in this case PPTP    Click Next    The configuration window of PPTP Interface appears     Select in the field Interface to which physical Interface the PPTP interface should be  bound to  This should be the external interface  It will be replaced by the PPTP inter   face after completion     Enter an Local Ethernet IP Address and Mask the IP address and the subnet mask  of the interface    The field Modem IP Address expects the IP address  which is assigned to you by  the internet service provider    Select a provider from the dropdown field DSL Provider  which is used to connect  the internet    If you did not create a DSL provider yet  select the entry new and add a provider  En   ter the required data into the fields Provider Name  Userna
89. execute the following actions on the e mails         Mark selected e mails as ham Marks the selected e mails as ham and  moves them to the tab Ham         Delete selected e mails Moves the marked e mails to the tab Trash       Resend selected e mails Sends the marked e mails again       Mark all e mails as ham Marks all e mails on this tab as ham and    moves them to the tab Ham       Delete all e mails Moves all e mails on this tab to the tab Trash         Resend all e mails sends all e mails on the tab again     Mark selected e mails as bam Execute  Mark selected e mails as ham  Delete selected e mails    Resend selected e mails  Mark all e mails as ham  Delete all e mails  Resend all e mails       fig  213 actions on the tab spam    Securepoint  Security Solutions 201    14 Spamfilter Securepoint 10    14 4 6 Actions on the Tab Trash    You can execute the following actions on the e mails         Mark selected e mails as ham Marks the selected e mails as ham and  moves them to the tab Ham        Mark selected e mails as spam Marks the selected e mails as spam and  moves them to the tab Spam        Delete selected e mails permanent Deletes the marked e mails irrevocably        Resend selected e mails Sends the marked e mails again        Mark all e mails as ham Marks all e mails on this tab as ham and  moves them to the tab Ham        Mark all e mails as soam Marks all e mails on this tab as spam and  moves them to the tab Spam        Delete all e mails permanent Deletes th
90. f the CA expires  all certificates which are signed with this CA  will become invalid too     Enter a name for the CA into the field Name    Select your country identifier from the field Country    Enter your region into the field State    Enter the name of your city into the field City    Enter the name of your company into the field Organisation   Enter the department into the field Unit    Enter you e mail address into the field E mail    Click Save to create the CA      gt    gt    gt    gt    gt    gt    gt    gt          o  Add Certificate RI       Type   Root CA ise    valid from   01 01 2009        oo iloon Lal  oo w   Valid untill   31 12 2012   23 m59 ell oa el  Name  InewCA 8    Country  DE  m   State  Nds                     City  Lueneburg       Organisation  Securepoint          Unit  Su pport          Email  support sp de       Save Close       fig  177 create CA    Securepoint  Security Solutions 164    11 Menu Authentication Securepoint 10    11 3 2 Create Certificates    Click in the tab Cert onto Add    The dialog Add Certificate appears    The fields Valid from and Valid until define the duration of validity of the certificate   You can enter the date directly into the first field  Or click into the field and a calendar  appears where you can select the date  The following three fields are reserved for the  time  hour  minutes  and seconds      Enter a name for the certificate into the field Name     Select your country identifier from the field Country   
91. f the group User Interface can access the download section   The download section offers files and documents which are stored on the appliance  The  hyperlink is positioned in the first column of the list  The second column contains the version    of the file and the third column contains a short description of the file     Login in to the user interface   Click the button Download   Click on the hyperlink in the first column to start the download     Click on Save  or according  in the browser query   The download will begin      O  Downloads  Security Manager Securepoint Manager  Log Server Securepoint Log Server  SPUVA Client Authentication Agent  Putty     SSH Client  Manual   Securepoint Manual  License Securepoint License       fig  221 available donwloads    Securepoint  Security Solutions 208    15 Download Section Securepoint 10    15 Zone Concept of the Securepoint Firewall    To every interface of the appliance one zone or several zones are assigned  For example  To  the internal interface the zone internal is assigned and to the external interface the zone  external is assigned    For the rule set of the firewall  the administrator has to create network objects  IP addresses  or networks  and assign one zone to every network object  This action defines behind which  interface a network object is positioned    A well known attack scenario on a router is to fake a sender IP address  IP Address Spoof   ing   If the attacker uses a Sender address from the internal net
92. figuration  The function requires that the external file must be  saved in DAT format     Click on the button Import       The dialog Import configuration     appears     Click on browse and select the designated file     After that click Import   The configuration will be stored on the application           Import configuration        Configuration to import     CAinstall dat    Import Abort       E    fig  32 import external configuration    6 2 Reboot System    The second point of the dropdown menu restarts the appliance  After reboot the start confi   guration will be loaded  If no configuration is set as a start configuration  you have to set one    before the reboot     6 3 Halt System    This point stops the system  The system will neither be rebooted nor new shuted down    6 4 Factory Defaults    Reset the system to factory settings   Note  The reset will delete all configurations     6 5 Logout    Click on this button to log out of the system  The appearance of the administration interface  will be stored for each user on every logout     Securepoint  Security Solutions 32    7 Menu Network Securepoint 10    7 Menu Network    Network settings like  P addresses of the interfaces  DSL access data etc  are set here  Fur   ther on you can download updates and apply the license file in this section     network    Server Properties    Network Configuration  Zone Configuration    Network Tools       fig  33 dropdown menu of the menu item network    Server Properties Applian
93. gories sorei deg EEN 98  OTOZ WANES EE 99  E WE E EEN 99  ON6 272  MP ele 100  Se  WNCDSICS si csecs Acer soe ated EE 101  GEN e EN Le e VE 102  O22 IRORSFIOXV 103  GE RE 104  9 3 1 General EE 105  GREEN le e WE 106  939 9    Mal te le  EEN 108  Cs EECH 110  9 3 4 1 Whitelist IP address  Nei    111  9 3 4 2 Whiteliste DOMAINS eg 112  9 3 4 3 Whitelist E mail Hecpients A 113  9 3 4 4 Whitelist E mail Gender    113  93 5    DOMAIN Tei e e LR EEN 114  SOs AVIO cea cut Gs eal cutee Gc eed toca Gta ead ocean E 115  9 3 6 1  Greeting TE 116  Securepoint    Security Solutions 6    Securepoint 10    9362 RECIPIENT TIOOGING EE 116  9 3 6 3 Limit max number Of recipients              cccceccceeeeceeeceeeeceeeeseeeseueeseeesaeeesaess 116  9364  LIMIMCONNECHONS EEN 116  9360    Bale Com vik cect tec cea Aiea cic ee lca Ae eat Bee ee 116  9 4 Spam Filter Propertie                ccccccccccssceccseeecesceceueeccseeecsueeseeseecaueessueeeseneessueeess 117  9 4 1 ET eg EEN 117  9 4 2 AtachmMont lt EEN 119  9 4 3 e Ee EE EE 121  944 SMTP SOUING E 122  9 4 5 SIM PiAGVANCCC WEE 123  oS SA POPS EE Ee 124  95     VNC Ee 125  9 5 1 ET a EE 125  9 5 2 VING Server He 126  9 5 3 VNC Server EEN 126  20  NOIR PIO E 127  9 6 1 General  127  9 6 2 FO VICI OM asic rae pen se ne a earn ene arn aac eae aia A asad 128  o7 Ip EE EE 129  9 8 SATUS CUNY Cle ee EE 130  9 9     Service Status EEN 131  TO MERU VPN DEE 132  101 IPSec Wizard BEE 133  tO Seto EE 133  10 1 2 Site to End  Roadwarrior               ccce
94. ies for the POP3 proxy    Securepoint  Security Solutions 103    9 Menu Applications Securepoint 10    9 3 Mail Relay    In this section you set properties for the e mail service        Mail Relay x    General Relaying Mail Routing Greylisting Domain Mapping Advanced    fig  111 tabs of the mail relay    General General settings for spam filter  virus scanner  e mail administrator and  maximum e mail size     Relaying Allowed relaying hosts and domains        Securepoint  Security Solutions 104    9 Menu Applications Ssecurepoint 10    9 3 1 General    Set general setting of the mail relay and a Smarthost     A Smarthost must only be set  if e mails should not be send directly by the appliance     Set the dropdown field Virusscanner to ON to scan e mails for viruses   Set the dropdown field Spamfilter to ON to check the e mails for spam     Enter the e mail address of the e mail administrator in the field Postmaster E Mail  Address    Limit the maximum size of an e mail  Enter a value in kilobyte in the field Maximal E   Mail Size in KByte  maximum is 10 000 000 KByte     If you don t want to limit the e mail size set the value to 0     If you want to use a Smarthost activate the checkbox Enable Smarthost     Enter the IP address or the host name of the external mail server in the field Smar   thost     If the external mail server requires an authentication  activate the checkbox Enable  Smarthost Authentication     Enter your user name and password into the fields Login and 
95. ing Pause   Mail servers send a Greeting Message to the sending mail server  An uncorrupted mail serv   er will deliver more SMTP commands after it gets this message    Spam mail servers don   t wait for this message and deliver the mail immediately  The mail  relay drops e mails if the Greeting Message rule has been ignored     You can define mail servers that don   t have to wait for the Greeting Message  Use the Edit  button beneath Define Exceptions and enter the IP address or the host name of the mail    server     9 3 6 2 Recipient flooding   Refers to the sending of mails to a lot of recipients  at which the recipient addresses are  composed randomly  After a defined number of failed delivery attempts a pause of 1 second  will be made    This slows down the query of e mail addresses and it will be inefficient for the address collec   tor     9 3 6 3 Limit max number of recipients    Define a maximum number of recipients inside an e mail     9 3 6 4 Limit connections  Limits the simultaneous connections to your firewall per second   You can define mail servers by IP address or host name which should be excluded from this    limit     9 3 6 5 Rate Control   Limits the simultaneous connections from one server in a interval of one minute  default    Exceptions can be defined    You can define mail servers by IP address or host name which should be excluded from this    limit     Securepoint  Security Solutions 116    9 Menu Applications Securepoint 10    9 4 Spam Filter Pr
96. ings           Monitoring Agent  Your firewall can be managed over AmdoSoft b4 Managed Services technology     The software needed  b4 agent  to provide that service is already installed on your firewall     Here you can configure the IP address of the b4 Controller needed to configure your management rules     b4 Controller IP  192 168 175 101             Save Close       E    fig  38 tab Monitor Agent    Securepoint  Security Solutions 38    7 Menu Network Securepoint 10    7 1 6 Cluster Settings    The Securepoint appliance offers the option to set up a high availability environment  For the  environment you need at least two appliances  One firewall will be used as active machine   mMaster  and the other one  or more  as backup machine  slave  in standby  If a requisite    service or the complete master crashes  the slave machine assumes the control     Define the range  in seconds  between the status messages of the master to the  slave in the field Delay between advertisment packets    Decide how many messages may be missing  before the master is detected as  crashed  Type the number in the second field    Enter a number into the field Cluster ID  to identify the cluster formation    Enter a keyword for the encryption of the status messages into the field Cluster Se   cret    The option Switch to master if possible sets the appliance as master if it goes back  on stream    The Host Status can be offline  master or slave     If the status has the value master  the applia
97. ings     VC Viewer Port  5900 A     VNC Server Port  5500 A                   fig  133 set ports    Securepoint  Security Solutions 125    9 Menu Applications Ssecurepoint 10    9 5 2 VNC Server ID    If the server connects the VNC proxy  an ID is assigned to the server  The client connects    the server via the repeater and uses the ID to identify the Server     OG YNC Repeater    To add a Server ID type it into the General YNC Server ID YNC Server IP  field ID at the bottom of the dialog           YNE Server     Click Add  Repeater ID    Click the trashcan symbol be   neath an ID to delete it                 fig  134 tab VNC Server ID    9 5 3 VNC Server IP    lf the client initiates the connection  the VNC proxy forwards the query to the IP address of    the server     Oo YNC Repeater   x       To add a Server IP type it into the General VNC Server ID   VNC Server IP  field IP at the bottom of the dialog  BEE  Click Add  IP Address    192 168 71 23    Click the trashcan symbol be   neath an IP to delete it  192 168 145 163    Gi                Save Close    fig  135 tab VNC Server IP    Securepoint  Security Solutions 126    9 Menu Applications    9 6 VoIP Proxy    Securepoint 10    The VoIP  Voice over IP  proxy offers packet based telephony over the internet     It supports SIP  Session Initiation Protocol  for initiation of a communication session and    RTP  Real Time Transport Protocol  for broadcasting the speech data     General    Select the interface which is used
98. inish and leave the wizard     Enter the user name of the new user into the field Login name   Enter the first name and the surname into the field Fullname     Assign a password to the user in the field Password and confirm it in the field Con   firm Password     Click Finish to save the IPSec connection and the user        IPSec Wizard         Create a IPSec Connection  Roadwarrior   L2TP   Address Pool   User    Do you want create a L2TP User  Additional user you can add in the user management     Login name  max    Fullname  Max Meyer  Password  eeecceee    Confirm password  eoccccce             Abort Back Finish       fig  156 create L2TP user    Securepoint  Security Solutions 141    10 Menu VPN Securepoint 10    10 2 IPSec Globals    Adjust general settings for all IPSec VPN connections     10 2 1 General Settings    On this tab you can activate the option NAT Traversal  This function prevents the manipula   tion of IPSec packets by address translation  This could occur if the mobile user uses NAT    devices himself     o IPSeC Global Settings    General IKE V2       Enable Nat Traversal     b Traversal           fig  157 option NAT Traversal    Securepoint  Security Solutions 142    10 Menu VPN Securepoint 10    10 2 2 IKE V2    The Internet Key Exchange  IKE  protocol is used for managing and exchange of IPSec  keys  It arranges the connection establishment and the authentication of the communication  partner  Furthermore it is responsible for the negotiation of the e
99. innsaudadnbeaiaatnnsadanaonialeetneuaaieenees 203  Securepoint    Security Solutions 9    Securepoint 10    EE a ol e 203   E 72 Tab General renns a E 204  TAAT  TaD TE 204  14 4 7 4 Tab Top Level Domam  205   E OPN Pi LOIren EE RTTE R 206  140 Wake on LAN eneren enc asiaaanhrwatanc asa gantre At ancevaganieananoeaRaneuatReas 207  14 7 D  wnload SCCUOM E 208  15 Zone Concept of the Securepoint Firewall               ccccceccccsececeseeeeeeeeseeeeeseeeesaeeesees 209   Securepoint    Security Solutions 10    1 Introduction Securepoint 10    1 Introduction    The internet is an ubiquitous information and communication medium in our time  Often  the computer or the network is permanent connected to the internet  because a lot of  businesses are executed online    lt is mostly disregarded that the internet must be seen as a security risk  This is especial   ly critical  if confidential data are stored on the systems  The security of these data can   not be guaranteed  The information could be spied out or may be irrevocable lost by a    computer virus     Software firewalls  which are installed on the computer  don   t meet requirements  be   cause the dangerous programs are already in the net    A system is demanded  which is positioned between the internet and the local network   to guard the network against destructive programs and to control the communication with    the internet     The Securepoint Unified Threat Management  UTM  offers a complete solution with  comprehensive
100. ired e mails    Spam shows identified undesired e mails    Trash shows deleted e Mails  deleted by the Spam Filter User    Statistics shows a diagram of ham and spam e mails in depen   dence on the country of origin   Click on the tabs to change the view    With the filter you can sort the list by  Sender  Recipient  Subject   Country  SMTP  POP3  Virus  Blocked   For some criteria a pattern is needed  Insert the pattern in the input  field    Execute the filter by clicking on Filter    You can reset the selection by clicking on Reset    The display shows 10 entries per side    With the buttons back and next you can scroll through the pages   With the buttons first page and last page you can jump to the first  or to the last side    You can choose an action  mark as ham spam  delete  irrevocable  delete  for all checked e mails  activated checkbox in the first col   umn     With the action Select all e mails you can check or uncheck all e   mails shown on this page    The action will be executed when you click on Execute        5 Refresh With the button Refresh the page will be reloaded     Securepoint  Security Solutions 197    14 Spamfilter Securepoint 10    14 4 2 Columns of the Table    eee    first column Activate the checkbox to mark the e mail   Already marked e mails will be unchecked if you click the checkbox    again     Date Date and time of the e mail     erate E mail type  SMTP kl or POPS Eh    Shows a symbol if the e mail contains a virus  ES    In the tab Spam 
101. is shown which filter has detected the e mails as spam    mail   Bayes filter K3    Commtouch filter Esd    Sender of the e mail   To Recipient of the e mail   Subject Subject of the e mail     Ham Spam Trash Statistic    Sender      Filter    Reset          Date      From  To  Subject   C  15 52 18 09 09 ft horpach gmx net test realsecure de test  E  15 51 18 09 09 fa horpach gmx net test realsecure de test gmx 2  C  15 49 18 09 09 na horpach gmx net test realsecure de test gmx  E  15 48 18 09 09 fa horpach googlemai    test realsecure de test neu     15 39 18 09 09 horpach googlemai    test realsecure de test        15 32 18 09 09 Frat horpach googlemai    test realsecure de Mail mit Attachment   C  15 10 18 09 09   root www2 securep    dhi realsecure de Please check your Mailbox     15 08 18 09 09 mi news2 news aidame    luzk pptp de Mit_swoodoo com_bis_zu_80_Prozent_bei       C  14 59 18 09 09    nd horpach googlemai    test realsecure de Testmail    Mark selected mails as spam       Execute       fig  210 columns in the tab Ham    Securepoint  Security Solutions 198    14 Spamfilter Securepoint 10    14 4 3 Details of an E mail    The Spam Filter User can take a look at the content of an e mail  The content and the at   tachments are only displayed if these options are activated in the spam filter settings  Other     wise only the e mail header is shown     Note  Showing the content of an e mail may violate the data privacy     Notice the data protection act of your stat
102. ission  Unit   Usually you can leave the default value  1500      lf the interface should answer to pings  activate the checkbox Allow Ping   select the speed of the interface from the dropdown field Speed     In the right section select the zone of the interface and the related zone s  and acti   vate the relevant checkboxes     Complete the configuration with Finish   After the interface is added you have the press the button Update Interface             Interface Wizard       Eth          General              ___   gt  gt  gt  J Zones     Interface Name  eth    dmz2    IP     Mask   255 255 255 0 24 f C dmz4  DHCP Client  O    MTU    Allow Ping  CO vpn ppp    LJ am2t             192  1eg 1901   C dmz3             O dmz5  CI dmz6     2500   O vpn ipsec       CO vpn openypn  CO firewall external  O firewall internal  O firewall dmz1  M  firewall dmz2  O firewall dmz3                   Abort Back Finish       fig  42 add eth interface   define settings    Securepoint  Security Solutions 42    7 Menu Network Securepoint 10    7 2 1 2 Add VLAN Interface   VLAN means Virtual Local Area Network and is used to divide a physical network into ser   veral logical nets  Several networks kann be used to structure the whole intranet  You can  split the network by organization into units  groups or by spatial properties like floor or build   Ings    Actually you need one interface for every network  VLAN interfaces of the appliance are vir   tual interfaces that are bound to one physical
103. ity Solutions 130    9 Menu Applications Ssecurepoint 10    9 9 Service Status    In this section all services of the firewall are listed  The current state of every service is  shown  You can start  stop or restart the system    If you use a high availability environment you can define which services are critical  This  means  if the service crashes  the system will change to the spare machine  This setting is  called Cluster Protection      gt  An active service shows a green On bution   An inactive service shows a red Off button      gt  Start a service by clicking the button On in the related row   Stop a service by clicking the button Off in the related row   Restart a service by clicking the button Restart in the releted row     If you use a high availability environment set the Cluster Protection to On for servic   es which should be available always     o Service Status   Name   Status   Cluster Protection  SSH Server On Restart On   Off   Mail Relay Restart On   Off   DNS Server ff Restart Off  POP3 Proxy Restart Off   HTTP Proxy Restart Off   VOIP Proxy Restart Off   VNC Repeater E  Restart Off    DynDNS Client Restart Off  NTP Server Restart Off    IDS Server Restart Off    L2TP Server   Restart Off  PPTP Server Off Restart Off  SPUVA Server   ON Restart Off  Web Server Restart Off    DHCP Server Restart Off  IPSec Server     Restart Off    SSL VPN Server Restart Off  IGMP Proxy   Restart Off  Virusscanner   Restart Off  CTASD Server Restart Off    BAYESD Server   
104. klist Categories Whitelist    User IP Addresses Websites  Whitelist IP Addresses    _                o_4o4  Nw gt S  IP Address  123 123 123 123  192 168 180 153    192 168 180 64    Save Close  hs       fig  107 content filter of the HTTP proxy   section whitelist   tab IP addresses    Securepoint  Security Solutions 100    9 Menu Applications Ssecurepoint 10    9 1 6 2 3 Websites  In this section you can enter websites which will not be checked by the content filter     Just insert absolutely trustable websites  Some entries are factory provided     Switch to the tab Websites     Enter addresses of websites which should be excluded by the content filtering   Click the button Add Website     To edit an entry click the wrench symbol beneath the related entry     To delete an entry click the trashcan symbol beneath the related entry         HTTP Proxy    General Virusscan URL Filter Block Extensions Block Applications Content Filter Bandwidth  Blacklist Categories Whitelist    User IP Addresses Websites  m Whitelist Websites   Domain   securepoint de   securepoint cc   securepoint org   windowsupdate microsoft com    windowsupdate Com    E  amp  e e e e    update microsoft com      Add Website       Save Close  4       fig  108 content filter of the HTTP proxy   section whitelist  tab websites    Securepoint  Security Solutions 101    9 Menu Applications Ssecurepoint 10    9 1 7 Bandwidth    You can limit the bandwidth globally or per host     Enable the bandwidth limitation b
105. l zen               fig  117 add route for the mail relay    Securepoint  Security Solutions 109    9 Menu Applications Ssecurepoint 10    9 3 4 Greylisting    The greylisting controverts spam by rejecting e mails with unknown combinations of sending  mail server  address of the sender and address of the recipient  A soam mail server will not  retry to deliver the mail  A normal mail server will do  When the mail comes the second time     the relay will accept it      gt  Enable the greylisting by activating the checkbox Enable Greylisting      gt  The mail relay stores the combination of server  sender and recipient automatically if  the mail arrived a second time   Enter in the field Auto Whitelisting the number of days the combination should be    stored     Define the time interval between the delivery attempts  Enter the number of minutes    into the field Delaying      O  Mail Relay    General Relaying Mail Routing Greylisting    Domain Mapping Advanced         Greylist Settings   W  Enable Greylisting    Auto Whitelisting   7 days  Delaying  2 minutes       m  Whitelist     IP Address Net  10 0 0 0  172 16 0 0  192 168 0 0    127 0 0 0    255 255 255 0 24       IP Address Net Domain E mail Recipients E mail Sender    Mask  8   12  16    8    e Add IP Address  Net                   fig  118 greylisting settings    Save    Securepoint  Security Solutions    Close       110    9 Menu Applications Securepoint 10    9 3 4 1 Whitelist IP address   Net   In the whitelist you 
106. lity for ham and 99 shows a high probability for spam   o Bias to define spam  Multiplier for words in the ham database   lf there is much more spam than ham the values should be set to 1   Click Reset values to set the values back to default values   If the checkbox E mail body invisible for the spam administrator is activated the  spam administrator will only see the e mail header in the spam filter interface  The  content isn t visible for him   Consider the respective privacy regulations if you uncheck this option   Define how long the e mails should be saved on the appliance  Enter the number of  days in the field Keep e mails not longer than x days           O  Spamfilter Properties                     General Attachment Filter Virusscan SMTP Settings SMTP Advanced POP3 Settings       Global Spamfilter Settings     Automatically Spamfiltering   V Bayes Filter  Threshold value for spam mail   90          Bias to define spam  50       Reset values  E mail body invisible for spam administrator  Keep emails not longer than  14   days                   fig  126 settings for filter mechanism    Securepoint  Security Solutions 118    9 Menu Applications securepoint 10    9 4 2 Attachment Filter    You can block attachments from incoming and outgoing e mails  The filter can check all at   tachments or you limit the checking of a special attachment  You can define attachments by  extension or MIME  Multipurpose Internet Mail Extensions  type which is given in the e mail    heade
107. ly the name and the object group affiliation but also if the object is    used in a firewall rule  In this case the numbers and a summary of the rules are shown        Filiale Berlin Network Object Information    Name  Filiale Berlin   Group  Filiale Berlin     Source Destination Service  Filiale Berlin Internal Network any  Internal Network Filiale Berlin any       fig  87 information of network objects    Securepoint  Security Solutions 84    8 Menu Firewall Securepoint 10    8 6 2 Add Host Net    To create a network object for a network or a computer use the following approach     Click Add Host Net    The dialog Add Host Net appears    Enter a name for the new object in the field Name    Under Type select whether you want to create an object for a network or for a com   puter    Host  Under IP Address enter the according IP address of the computer    Under the dropdown field Zone select the zone which the computer is associated  with    Network  Under IP Address enter the IP address of the network    Select from the dropdown field Netmask the compatible netmask    Im the field Zone enter the zone of the network     Select which NAT IP should be used     Store your settings with Save     oi  Add Host Net i e  Add Host Net       Name  Webserver Name  Internet_Server       Type    Single Host    Type     Network      IP Address   192 168 176 10  IP Address  192 168 176 0 _    damz1  M  Netmask   255 255 255 0 24  m   Zone  j  Nat IP   et ae       Save Close       Save Close 
108. m  15 10 86            Trash  1 0 72            fig  216 tab general    14 4 7 3 Tab Virus   On this tab a diagram shows the total number of virus infected e mails  The blue lines clarify  the total amount of every bar on the y axis    The legend on the right side shows the numbers of every section and the percentage          Spamfilter    Count Percent  18  10    0       fig  217 tab virus    Securepoint  Security Solutions 204    14 Spamfilter Securepoint 10    14 4 7 4 Tab Top Level Domain  On this tab a diagram shows from which state the e mails are received  The statistic is split    into ham e mails  soam e mails and deleted e mails      O  Spamfilter    Trash Statistic    Top Level Domain       Refresh          fig  218 tab top level domain    Securepoint  Security Solutions 205    14 SPUVA Login Securepoint 10    14 5 SPUVA Login    The Securepoint User Verification Agent  SPUVA  gives users individual rights on computers  in the DHCP environment  The user authenticates against SPUVA and gets an individual  security policy for any workstation in the network  If the user changes his workplace  he will    get the same security policy at the new workplace automatically     Login in to the user interface    Click on the button SPUVA Login    A new browser window appears in which a Java applet is starting    Confirm the security query for starting the applet    The java applet can only be executed if the Java Runtime Environment is installed  If  it isn   t installed visit
109. me and Password    Click Finish to complete the configuration     After the interface is added  you have to press the button Update Interface             Interface Wizard    PPTP            m General    Interface    etho       Local Ethernet IP Address   192 168 130    Mask  255 255 255 0 24       Modem IP Address   10 0 0 138      DSL Provider  internet communicator                 Abort Back Finish  A       fig  45 add PPTP interface   set properties    Securepoint  Security Solutions 45    7 Menu Network Securepoint 10    7 2 1 4 Add PPPoE Interface  A PPPoE interface is used for connecting the internet by Point to Point Protocol over Ether     net  This protocol is commony used in Germany     Click Add Interface    The Interface Wizard appears    Select the desired interface type  in this case PPPoE    Click Next    The configuration window of PPPoE Interface appears     Select in the field Interface to which physical Interface the PPPoE interface should be  bound  This should be the external interface  It will be replaced by the ppp interface  after completion     Select a provider from the dropdown field DSL Provider  which is used to connect  the internet   If you did not create a DSL provider yet  select the entry new to add a provider  Enter  the required data into the fields Provider Name  Username and Password     gt  Click Finish to complete the configuration      gt  After the interface is added you have to press the button Update Interface       o Interface Wiza
110. me are    numbered serially from 1 to n     ethO  eth1  eth2  eth3  eth4     ethn    virtual network eth0 0  ethO 1     ethO n  ethn 0  ethn 1    ethn n   virtual address is bonded to real interface     ADSL and VDSL pppO  ppp1    pppn    high availability clusterO  cluster1  cluster2    clustern    environment  virtual address is bonded to real interface     OpenVPN tunO  tun1  tun2    tunn  virtual interface     The minimum of three interfaces are ethernet interfaces with the name ethO  eth1 and eth2        Furthermore one virtual interface un is predefined with the address 192 168 250 1         Interface Wizard    Which kind of interface you want to create     fe  Eth      VLAN      PPTP      PPPoE     VDSL       Cluster    Back Next       E    fig  41 select the interface typ    Securepoint  Security Solutions 41    7 Menu Network Securepoint 10    7 2 1 1 Add eth Interface    Click Add Interface   The Interface Wizard appears     Select the desired interface type  in this case eth      Click Next   The configuration window of eth Interface appears     In the section General you have to set the properties of the interface   The name of the interface is set automatically and cannot be changed     Enter the IP address of the interface into the field IP   Select the subnet mask in the field Mask     If the DHCP server should assign an IP address to this interface  activate the check   box DHCP Client     You can define the maximum packet size in the field MTU  Maximum Transm
111. member of the group Spam Filter User  you can restrict the permissions to sev   eral e mails addresses or domains  You can add three entries  If you don   t enter any restric     tion  the user can access all e mails    Restriction to several e mail addresses must be set for the whole e mail address   For example  john smith example org  Restriction to domains must be set with a leading    at    symbol     For example   example org     gt  Switch to the tab Spam Filter      gt  Restrict the display of the spam filter interface to several e mail addresses or do   mains  These settings are only relevant for users  which are members of the group  Spam Filter User      gt  Activate the checkbox Show blocked attachments in Spam Filter to disable the  possibility to display blocked attachments     vi  Add User  General VPN Ss t Spamfilter Extras    E mail or Domain 1   securepoint de  E mail or Domain 2  fred feuerstein com  E mail or Domain 3     Show blocked attachments in Spamfilter  V     Please enter the e mail addresses or domains  which the spam  filter user has to administrate  e g   info securepoint de or   securepoint de   You can assign three e mail addresses to each  user  If you don t assign any e mail address  the user will see any  e mail in the user interface     Save Close       fig  170 restrict the display of the spam filter    Securepoint  Security Solutions 157    11 Menu Authentication Securepoint 10    11 1 5 Add User  Tab Extras    On this tab you can adjust
112. message  you can search for an IP addresses      gt  Start the log with Start logging      gt  You can invert the filter  The filter will show all entries which don t match the search  pattern   To enable this option activate the checkbox Inverse filter on the tab Settings      gt  By default the option Scroll automatically to the bottom is activated  New entries  are appended to the list  So this option always shows the newest entries        13 3 Tab Settings    Here you can invert the filter  The filter will show all entries which dont match the given  search pattern    Furthermore you can define the number of entries  If the logging has more entries defined   here the oldest entries will be deleted    Changes on this tab can only be made if no logging is running      O  LiveLog    LiveLog Settings           Settings    Inverse filter  100      Maximum live log entries             Changes on this Settings are only allowed if logging is switched off     A admin WE 192 168 4 102    Download Raw Data Show Raw Data       fig  202 tab settings    Securepoint  Security Solutions 187    13 Menu Live Log Securepoint 10    13 4 Details of a Log Message    If the automatic scrolling is disabled you can navigate through the log by the arrow keys on  the keyboard  If you press the    enter    key on a marked entry  a window with details of the log  message is shown    This is also shown if you make a double click on an entry with the mouse      O  Log Detail    Day  27   Time  13 37 46
113. mmunication dns  Domain Name Service  client  lt    gt  nameserver    Communication dyndns client  lt    gt  dyndns provider    Communication https client  lt    gt  server or via https proxy    Communication http client  lt    gt  server or via http proxy    Messages of the Intrusion Detection Systems    Messages of the IPSec service    Messages of the L2TP service    Communication ntp  Network Time Protocol  ntp client  lt    gt  server    Communication pop3  Post Office Protocol 3client  lt    gt  server or pop3 via POP3 proxy    Messages of the pppd service    Messages of the pptp service    Communication smtp Mail despatch    Communication ssh  Secure Shell Protocol    Messages by the virus scanner    Communication VNC client  lt    gt   server or via VNC proxy    Communication VoIP client  lt    gt   server or via VoIP proxy    Interface messages    Alerts warnings of the firewall and the IDS system    Drop  dropped data packages    Accept  accepted data packages    ir   En  RH  BHEBAH  HHHHBEHEIGE    Reject  rejected data packages with the message Destination Unreachable    Securepoint  Security Solutions 190    Securepoint 10    Part 2       User Interface    Securepoint  Security Solutions 191    14 Login User Interface Ssecurepoint 10    14 Login User Interface    The user interface is useable for all users with the group membership User Interface in  combination with Spam Filter Admin  SSL VPN  SPUVA User or the possibility to change    the password     The users c
114. n Lan   Remote turn on the registered computers  User Interface with WoL  Downloads Shows all downloadable applications and docu    User Interface   S emme ee    Securepoint  Security Solutions 193       14 Change Password Securepoint 10    14 2 Change Password    This section is only visible for users which are authorized to change their password     Login in to the user interface    Click the button Change Password    The dialog Change Password appears    Enter your current password in the field Old Password    Enter your new password into the field New Password and retype it in the field Con   firm Password    The password must meet the conditions which are shown in the section Password  Restriction     Click Change Password     si  Change password    Old Password  eeeseeee  New Password  eecsseseese    Confirm Password  eessseseses       Password restrictions              Change Password Close       he  fig  206 change password    Securepoint  Security Solutions 194    14 Download SSL VPN Client Securepoint 10    14 3 Download SSL VPN Client    lf the user is member of the groups User Interface and SSL VPN and if the administrator  has made settings for the VPN client for this user  he is able to download the SSL VPN client    In this section     Login in to the User Interface   Click on the button Download SSL VPN Client to start the download   Select in the browser dialog the option Save File  or accordingly      The downloaded file is a packed ZIP archive including the
115. nce can be made to spare with the button  Downgrade to spare  A machine with slave status becomes the master          Server Properties          Server Settings Administration Syslog SNMP   Cluster Settings      Cluster settings  Delay between advertisment packets   1 seconds    Number of missing advertisment 5  1   255   packets untill peer declared as dead     Cluster ID  D  1   255   Cluster Secret     secret    Switch to master if possible  ET  Host Status  OFFLINE    Downgrade to spare       Save Close       fig  39 tab Cluster Settings    Securepoint  Security Solutions 39    7 Menu Network Securepoint 10    7 2 Network Configuration    In this area the settings for the network have to be defined  This contains the IP addresses of  the several interfaces  entries in the routing table  access data of the internet service provid     er  maybe data of a dynamic address service and settings ot the DHCP server     7 2 1 Interfaces    The tab Interfaces shows a list of all available interfaces with the related IP address and  zone     o Network Configuration    Interfaces Routing DSL Provider DynDNS DHCP    Name IP Adress Mask Zone   etho 123 123 123 100 32 external  ethi 192 168 175 1 24 internal   eth2 192 168 176 1 24 dmzi   Dun  192 168 250 1 24   on openypn    Add Interface       fig  40 list of available interfaces    Securepoint  Security Solutions 40    7 Menu Network Securepoint 10    The name of the interface is depending on it   s usage  Interfaces with the same na
116. ncryption parameters and  the generation of the keys  The complexity of the protocol complicates the configuration of an  IPSec connection  especially if you use different end devices    The new version of the IKE protocol  IKEv2  defangs this complexity  It allows a faster con   nection establishment and a more stable connection  By now this version is supported by    several programs  It is implemented in Microsoft Windows 7 too     In this dialog the IP addresses of the Domain Name servers and the Windows Internet Name    Service servers are specified  This will be forwarded to the remote stations     o IPSeC Global Settings    General IKE V2       Domain Name System  DNS 1  192  168 176 10  DNS 2  192  168 176 20               WINS Server   WINS 1   192 168 70 10  WINS 2   192 168 70 20              fig  158 IKEv2 settings    Securepoint  Security Solutions 143    10 Menu VPN Securepoint 10    10 3 IPSec    This point displays an overview of all native IPSec and L2TP connections   Here you can adjust the settings of the connections  delete  load  initiate and stop the con     nections  Furthermore the status of the connection is shown     10 3 1 Edit Connection    An IPSec connection is divided into two phases    The first phase negotiates the encryption method and the authentication  The Internet Key  Exchange  IKE  protocol defines  in which way security parameters will be agreed and  shared keys will be exchanged    The second phase creates new key material irrespectiv
117. ndow Users and click on the button Add    The dialog Add User appears    In the tab General you have to adjust basic settings    Under Login enter the name which the user uses for logging in    Under Name enter the real name of the user    Insert a password in the field Password and retype it in the field Confirm password     Activate the designated group memberships by marking the according checkboxes   lt is allowed to check more than one box     fl  Add User    General VPN SSL VPN Client Spamfilter Extras    Login  donald  Name  Donald Duck  Password     Confirm password        Groups   Firewall Admin  Spamfilter User   VPN L2TP  VPN PPTP    SSL VPN  vi SPUVA User   HTTP Proxy  Userinterface  M  SMTP Relay User              fig  167 general setting for a new user    description    Firewall Admin 000000001   Administrator of the firewall    VPN PPTP 000000010   PPTP VPN connection user    VPN L2TP 000000100   L2TP VPN connection user  Spam Filter User 000001000   Administrator of the   Administrator of the spam filter filter    SPUVA User 000010000   User authenticates via ee User Verification  Agent    HTTP HTTP Proxy     000100000   00000   HTTP HTTP proxy user user    tee Interface Medel 000000 e a o of the firewall user interface  SSL VPN 010000000   SSL VPN connection user  SMTP Relay User   100000000   User of the SMTP mail relay    Securepoint  Security Solutions 154       11 Menu Authentication Securepoint 10    11 1 2 Add User  Tab VPN    If the new user is L2TP or
118. ng a selection rectangle in the lower diagram     You can reset the selection by clicking Reset Zoom     o  Interface Traffic eth1    NIV ZS    15 30 16 00 16 30 17 00    sil anc     Reset zoom       m Overview   Measuring points  288  4 8 9 44  5 8 9 44   Incomming total  1 Mbyte  Outgoing total  50 Mbyte  Incomming average  0 01 Kbyte s  Outgoing average  0 59 Kbyte s  Collisions total  0 O Show in plot  Errors total  0 O Show in plot  Collision and error plot is not zoomable                 fig  24 enlarged section    Securepoint  Security Solutions    2     5 Securepoint Cockpit Securepoint 10    5 14 Show Help    In the title bar of the dialogs you can find a questionark symbol right beneath the close but   ton  Press this symbol to open the help  The shown text comments the settings  which have  to be set in the dialog  This function is context sensitive and only describes the relative di     alog           PoP3 Proxy D x  fig  25 help symbol in the title bar  5 15 Administrator IP    At the bottom of the web browser window the user name and the IP address of the logged on  administrator are shown     A click on the double arrow in the lower left corner hides or shows the bar     AN admin W 192 168  dp    fig  26 name and IP address of the logged on user fig  27 hides or shows the data    5 16 Refresh    At the right side of the navigation bar you will find the button Refresh Cockpit     With this button you can reload the website              fig  28 reloads the cockpi
119. nistration Syslog SNMP Cluster Settings                Firewall  emeng fw support local i    DNS Server  Primary Nameserver   192 168 100 10  Secondary Nameserver   192 168 200 10    Time settings  NTP Server  ptbtime2 ptb de          Timezone  Europe Berlin    Further Settings    Maximum number of active   16000   2000000  connections     Last Rule Logging     Save Close       fig  34 tab Server Settings    Securepoint  Security Solutions 34    7 Menu Network Securepoint 10    7 1 2 Administration    The administration access to the appliance is only allowed from the internal net by default   In this tab you can define which IP addresses and subnets the appliance can be admini   strated from     To add an IP address or a net  click the button Add Host Net    The dialog Add Host IP appears    Enter a host name or an IP address    lf you want to allow the access for a subnet  you have to use the bitcount notation   For example  192 168 176 0 24    Click Add     You can delete entries in the list by clicking the trash can icon beneath the entry          Server Properties    Server Settings Administration Syslog SNMP Cluster Settings           External Administration    External Admin Host  IP Address    192 168145 15 32    Add Host Net          Save Close       fig  35 tab Administration for external administration    Securepoint  Security Solutions 30    7 Menu Network Securepoint 10    7 1 3 Syslog    In the portfilter of the appliance the administrator can define whether the
120. o be used as DHCP relay  In this case a central DHCP server distri   butes the DHCP information in the network  The appliance receives the broadcast querys  and forwards them to the central DHCP server  The answers of the server will be returned to  the clients by the DHCP relay  In this way the clients receive IP addresses and network in   formation dynamically although the DHCP server stands in another subnet     In the section Interface define the interfaces from which net the DHCP queries  should be received and to which they should be forwarded   Select the interface from the dropdownbox and click on Add Interface     Define the IP address of the central DHCP server in the list  P Addresses   Type the IP address into the field and click Add IP Address     Afterward click Save and Update Interfaces        Note  For this traffic no rules must be defiened          Network Configuration    Interfaces Routing DSL Provider DynDNS DHCP DHCP Relay          vc Interfaces  IP Addresses   ethi 192 168 175 110  eth2    etho         Add Interface Add IP Address                   Update Interfaces       fig  59 settings for DHCP Relay    Securepoint  Security Solutions 58    7 Menu Network Securepoint 10    7 3 Zones    This dialog lists all arranged zones of the appliance and the allocated interfaces  The zones  conduce to confine or connect interfaces and associated nets    The important zones are already set in factory    Every zone is available only once and can be allocated to ju
121. o delete it   Confirm the security query with Yes     Click the wrench symbolbenaeth the service to edit it     Make modifications in the appearing dialog   Click Save     OH  Services    a    Icon   Designation   Protocol   Designation Port    ah ah    lo     icmp icmp    r  KL      igmp igmp    a     rsvp rsvp  archie tcp  cvs tcp  domain_tcp tcp  domain_udp udp  finger tcp  ftp tcp    gopher tcp    7  ee H   E Ten   I E o   WRRRRRRRE    http tcp    p ton       7 hine  Infobox Settings  C Disable Infobox    ae       dd new Service       fig  78 list of available services    Securepoint  Security Solutions if    8 Menu Firewall Securepoint 10    8 4 2 Services Information    The function Infobox shows information about services if the mouse cursor rolls over it    You can enable this function by unchecking the checkbox Disable Infobox    The infobox shows not only the name and the service group affiliation of the service but also  if the service is used in a firewall rule  In this case the rule number and a summary of the rule    are shown     openvpn_udp Services Information    Name  openypn_udp   Group  openvpn_udp     Source Destination Service   4 Internet External Interface openypn_udp       fig  79 infobox for services    Securepoint  Security Solutions 78    8 Menu Firewall Securepoint 10    8 4 3 Add service    Click Add new Service   The dialog New Service appears     In the field Designation enter a name for the new service     In the field Protocol select a protoc
122. ogged web interface sessions    admin 22 9 2009   12 16  admin 22 9 2009   12 16  admin 22 9 2009   12 16       fig  19 users  which are logged on the administration or user interface    5 12 DHCP Lease    The DHCP  Dynamic Host Configuration Protocol  server assigns dynamic IP addresses to  the user of the internal network  if this service is activated  This IP address is reserved for the  user for a defined time  In this section the reserved addresses are listed with the user name  and the MAC address of the computer  The last column shows the status  A grey dot means  that the user is offline  A green dot means that the user is currently logged on    The table always contains ten rows  If more DHCP addresses are stored  you can leaf    through the pages with the arrow button at the bottom      E  DHCP   192 168 1 18 PC_TestCenter 00 5c b3 36 8d 46  192 168 1 24 PC_Smith 00 40 48 b1 aa 62  192 168 1 33 Laptop_Training OO cc de 37 8d 41  192 168 1 51 PDC Black 00 48 54 1b 59 73  192 168 1 52 PC_Training 0e 30 d3 57 8d 92    192 168 1 56 PC_Management 00 50 bf 67 a2 fd  192 168 1 83 TestServer 00 c7 bb 78 8c 21    192 168 1 100 Laptop Guest 00 40 48 bl aa 62       fig  20 stored DHCP addresses    Securepoint  Security Solutions 25    5 Securepoint Cockpit Securepoint 10    5 13 Interface Traffic    The display Internet Traffic shows the data traffic of the interfaces graphically  The incom   ming traffic is shown as a green and the outgoing traffic as a blue graph  The repres
123. oint 10    9 3 4 3 Whitelist E mail Recipients    Exclude e mails to defined recipients from the greylisting      gt  Enter the e mail address of a recipient into the field at the bottom of the window      gt  Click Add E mail Recipient   E mails which are delivered to this recipient will be excluded from the greylisting        r Whitelist   IP 4ddress Net Domain Email Recipients Email Sender  Recipient    postmaster securepoint de    support securepoint de          Add Email Recipient          fig  121 exclude e mail recipients from the greylisting    9 3 4 4 Whitelist E mail Sender    Exclude e mails from defined sender from the greylisting      gt  Enter the e mail address from a sender into the field at the bottom of the window      gt  Click Add E mail Sender   E mails which are delivered from this sender will be excluded from the greylisting        r Whitelist   IP 4ddress Net Domain Email Recipients Email Sender  Sender    max muster mail de    partner message de               Add Email Sender    fig  122 exclude e mail sender from the greylisting       Securepoint  Security Solutions 113    9 Menu Applications Ssecurepoint 10    9 3 5 Domain Mapping    This function replaces the domains of e mail addresses  So the internal mail server must only  be configured for one domain    For example    bob myhost com becomes to bob myhost de        Mail Relay    General Relaying Mail Routing Greylisting Domain Mapping Advanced  Domain Mapping Settings  EH    Source Domain Destin
124. ol from the list which is used by the service   If you choose the icmp protocol  you have to select an ICMP Control Message too   lf the service uses a specified port  insert this port in the field Destination Port   If the service uses a port range  select Port Range at the field Type  Insert the start  an end port of the range into the fields Port Range Start and Port Range End     Store the new service with Save             Add Service        Add Service                   Designation  openVPN   Designation  RangeProtocol            Protocol  u d p   F m Protocol  tcp  Type  Single Port  vl Type    Port Range sel  Destinaton Port  1194  ali Port Range Start     Port Range End  3015                              Save Close Save Close       fig  80 add service   single port fig  81 add service   port range    Securepoint  Security Solutions 79    8 Menu Firewall Securepoint 10    8 5 Service Groups    In the section service groups you can subsume several services into a group  delete services  from existing groups or add services to existing groups  These groups can be used in the  portfilter for rule creation     If the mouse cursor rolls over a service  an infobox can be displayed which shows the prop   erties of the service  You can enable this feature by unchecking the checkbox Disable Info   box     be  cvs Service Information    Name  cvs  Protocol  tcp   Source Port  1024 65535  Destination Port  2401   ICMP        fig  82 infobox shows properties of a service    You al
125. on is available      gt  First click the button Check for Updates  The firewall checks the server for new ver   sions      gt  If the firewall answers that a new version is available  click Update            Firewall     Version  Bulld 6870 Check for Updates          fig  188 update firewall software    Securepoint  Security Solutions 173    12 Menu Extras Securepoint 10    12 2 2 Update Virus Pattern Database    The virus scanner can be adapted immediately  If no newer version is available  the update  will not be executed  If a new database is installed  the scanner will be restarted     The virus scanner checks every hour for updates automatically      gt  Click Update     Virusscan        Pattern version  Main Database  Update  O5 Jan 2006 23 48  0100    Daily Database   O8 Jan 2006 19 23  0100       fig  189 update virus pattern database    12 3 Changelog    The function Changelog offers the possibility to show the changes of one version of the fire   wall software to the previous version     The published versions are listed in the dropdownbox      gt  Goon the point Extras in the navigation bar and click the entry Changelog in the  dropdownmenu  The dialog Changelog appears which shows the changes from the  previous version to the actual version      gt  To show changes of former versions  select the desired version from the dropdown   box and click Show        Note  Only changes form one version to the next version are shown     zi  Changelog       m Changelog   Bugfi
126. operties    The integrated Securepoint anti soam solution filters unrequested e mails  spam   Therefore  it uses a combination of different methods to detect as much undesired e mails as possible   The Securepoint spam filter analyzes every e mail on the basis of different criteria and classi   fies it as soam depending of the weighting  Assessment criteria are for example  obviously  invalid sender address  known spam text passages  HTML content  future dated sender data    and so on     9 4 1 General    Decide which spam filter mechanism you want to use    The automatic filter uses a spam filter module of the company Commtouch  The company  services a consistently updated spam database  The incoming e mails are checked against  this database    The Bayes filter checks on the basis of classified evaluated words  if an e mail is soam or  ham  desired mail     In order that the filter works properly  it must be trained by the soam administrator  The ad   ministrator has to resort the misclassified mail into soam and ham  Thereby the filter learns  which words are typical for a spam e mail     Securepoint  Security Solutions te    9 Menu Applications Ssecurepoint 10    If you want to use the Commtouch module activate the checkbox Automatically  Spam filtering   Activate the checkbox Bayes Filter to use this filter mechanism   Set values for the following settings   o Threshold value for spam mail  The calculated value lies in the range between 1  and 99   1 shows a high probabi
127. ork of a central  office with the local network of a branch    A roadwarrior connection binds one or more computers with the local network  For example     An outdoor staff connects with the laptop to the network of the central office     10 1 1 Site to Site     gt  Click in the VPN dropdown menu on the entry IPSec Wizard   The dialog IPSec Wizard  gt  Create an IPSec connection appears     gt  Select the VPN type  Site to Site Connection   gt  Connects your local network with a remote net   work      gt  Click Next        IPSec Wizard           Create a IPSec Connection   Which type of a IPSec connection do you want to create      Site to Site Connection  connect two gateways        Roadwarrior  connect a computer with a gateway              Abort Back Next       fig  142 select kind of connection    Securepoint  Security Solutions 133    10 Menu VPN Securepoint 10    Enter a name for the VPN Connection in the field Connection name     Enter the IP address or hostname of the remote network in the field Gateway     If you want to use a DynDNS service  activate the checkbox Hostname resolved by  DynDNS     Click Next          IPSec Wizard       Create a IPSec Connection  Site to Site     Please specify the connection name and the IP or hostname from the gateway you want to  connect     Connection name  VPN_Filiale  Gateway  kecurepoint_stuttgar    Hostname resolved by DynDNS  Fi             Abort Back Next       fig  143 define name and gateway    You can decide between two au
128. ortable 1 5 2paf Mobile SSL VPN Client  OpenVPNConfig Zon Example configuration    SecEntry IPSec Client   Trial    SPUVA Client Authentication Agent    Putty SSH Client  Manual   Manual of the Firewall    License agreement       fig  16 available downloads in the user interface    5 9 Spuva User    This table lists the users and their IP address  which have signed in via SPUVA  Securepoint  User VerificationAgent     The SPUVA gives users individual rights on computers in the DHCP environment  The user  authenticates against SPUVA and gets an individual Security Policy for any workstation in  the network  If the user changes his workplace  he will get the same Security Policy at the    new workplace automatically        O   Spuva User    barney       fig  17 user barney is conneted via SPUVA    Securepoint  Security Solutions 24    5 Securepoint Cockpit Securepoint 10    5 10 SSH User    This section shows  which user has connected the appliance via SSH  Secure Shell for ex   ample by the program PuTTY    Login name and IP address of the user are shown  Also the time of the login is listed          User logged on via SSH  admin 192 168     root 192 168        fig  18 users  which are logged on via SSH    5 11 Web Interface User    Shows a list of user  which are logged on the web interface  The login name and the IP ad   dress of the user are shown  Also the time of the login is listed   The table lists users at the administration interface and the user interface           L
129. ose       fig  65 overview of all created rules    Note  You can also define IP Table rules in the category Advanced Settings  see chapter  12 6 5   On the tab Templates use the Application securepoint firewall and    the Template  etc post rules sh     Securepoint  Security Solutions 64    8 Menu Firewall Securepoint 10    A rule always has the following structure        Who  where from which source  uses which service to access a defined destination   Then you have to decide if the activity is allowed  Accept   denied  Drop  or refused  Re   ject   With the action Drop the data packet will be discarded  The action Reject will  transmit to the sender the error message    Destination unreachable           You can log the traffic when it is matched by a rule  You can decide between three set   tings    o None  gt  No logging   o Short  gt  The first three packets of a new connection will be logged  After a minute the  next three packets will be logged   o Long  gt  All packets will be logged       The rule can be limited temporarity  days and time          A short description can be set     With the wrench symbol beneath the rule you can call a dialog for editing the rule    With the trashcan symbol beneath the rule you can delete the rule    Rules can be dissarranged by    Drag and Drop     The order of the rules in the portfilter can be  important because the rules will be processed in sequence  Once dropped packets cannot    be accepted by a later rule       Notice  To acti
130. ose the  group     Securepoint  Security Solutions 71    8 Menu Firewall Securepoint 10    8 2 Hide NAT    Private  P addresses are not routed in the internet  Therefore outgoing packets must get the  external IP of the firewall  The function Hide Nat realites this     The Source is the network or the computer  which IP will be replaced by the Hide NAT   Behind IP   Interface describes which IP address the packets get instead of their own one   You can define an IP address or an interface  If you use a dynamic IP  insert the DSL inter   face    The Destination must be set to declare  in which case the Hide NAT is to be used   Network objects are used for source and destination  To create Hide NAT rules  you maybe  have to create network objects before    The option Include means that the Hide NAT will be used  The Exclude option means that  the Hide NAT will not be used and so packets will be send with their original IP address  for    example in tunnel connections     IPSec  site to site         HideNat    Source Behind IP  Interface Destination Hide Nat  Internal Network eth   Internet Include  Internal Network ethO Private CLASS A IPSec Network Exclude P  Internal Network erb   Private CLASS B IPSec Network Exclude    Internal Network eth   Private CLASS C IPSec Network Exclude P       fig  73 list of Hide NAT rules    Securepoint  Security Solutions 72    8 Menu Firewall Securepoint 10    Click on Add  to define a new Hide NAT rule   The dialog Add HideNat appears     Und
131. pdown  field belongs to the ending time        Add Rule    General Time Description    Monday Tuesday Wednesday Thursday Friday Saturday Sunday  7  sa   7  sa    7  sa   7 all   18 f  li f  le wl Jelli       fig  69 add new rule   tab time    8 1 1 3 Tab Description    On the tab Description you can enter an explanation for the rule      gt  Click on the tab Description    gt  Click into the text field and enter a description    gt  Click Save to store the rule        Add Rule    General Time Description       Description       fig  70 add new rule   tab description    Securepoint  Security Solutions 69    8 Menu Firewall Securepoint 10    8 1 2 Create Rule Group    You can subsume several rules to one group  If you unite several rules of one scope to one    group you can arrange the portfilter clearly     Click on the button Append Group in the dialog Portfilter   The dialog Append Group appears     Enter a name for the new group in the field Groupname     Click on Add   The new will be added to the Portfilter at the bottom position     You can move the rule into the group via Drag  amp  Drop              Append Group x    4ppend Group   Groupname  Opervh       fig  71 add rule group    Securepoint  Security Solutions 70    8 Menu Firewall Securepoint 10    8 1 3 Organize Rules and Groups    The order of rules in the porttfilter can have a big effect on the performance of the appliance  because the rules are executed sequentially    lf a packet passes through all rules of th
132. pplying the changes click the button Update Applications               Advanced Settings         IPSec Portfilter Dialup Templates   Variables Webserver          Applications    openvpn Lel     Add Entry  ae          LDAP_AUTH  LDAP_SERVER    LOGLEVEL       AOFANIMAL PAA io     ae Values          Values       1500                      Update Applications Update Interface Update Rules Save Config Close  E        fig  199 show variables and their values    Securepoint  Security Solutions 182    12 Menu Extras Securepoint 10    12 6 7 Webserver    On this tab you can change the port of the webserver for the user interface   By default the port of the webserver for SSL encrypted connections is 443     Enter the desired port into the field or use the arrow buttons to select the desired  port     Store your changes with Save   For applying the changes click the button Update Applications      O  Advanced Settings    IPSec Portfilter Dialup Templates Variables Webserver       E      User Webinterface port   443 A Le       Save    Update Applications Update Interface Update Rules Save Config Close  A       fig  200 change the port of the webserver    Securepoint  Security Solutions 183    12 Menu Extras Securepoint 10    12 7 Refresh All    This function reloads all data of the appliance and rebuilds the cockpit   So you can update data in the cockpit which are changed per CLI and not in the administra     tion interface     12 8 Refresh Cockpit  This function reloads all data of the
133. r      gt  Either Block all Attachments   You can exclude attachment by the Whitelist      gt  Or Block specific Attachments   You have to define the attachments to be checked in the blacklist     This filter doesn t block the e mails  It just removes the attachments   lf an attachment is removed  a message is inserted into the mail  You can edit this  message in the field Edit Message      O  Spamfilter Properties    General Attachment Filter Virusscan SMTP Settings SMTP Advanced PoP3 Settings       r Attachmentfilter for SMTP and PoP3        Block all Attachments ga Block specific Attachments          m Whitelist Blacklist  Extensions MIME Types Extensions MIME Types  Suffix Suffix       exe  mp3                      Edit Message      Attachments removed by Securepoint firewall                   fig  127 delete attachments from the e mails    Securepoint  Security Solutions 119    9 Menu Applications Securepoint 10    You can write MIME types on your own  for example  audio mp3  or you use prede   fined types     Switch to the tab MIME Types at the Whitelist or Blacklist section     Click the button Predefined   The dialog Add MIME Type appears     Select a type by activating a radio button     Choose a subtype from the relative dropdown list     Click Add   The MIME type will be added to the Whitelist or Blacklist           Q  Add Mime Type       Mime Types         application activemessage    E Laudio prs sid iy        audio gsm   _   audio gsm efr         audio Is       
134. r Destination Network enter the remote network   Enter the according net mask at Destination Mask     Activate the checkbox Automatically create firewall rules to create the firewall rules  for the connection automatically     Click Finish to exit the assistant     o IPSec Wizard    Create a IPSec Connection  Site to Site     Please specify the networks you want to connect with IPSec     Local Network   192 168 175 0   Local Mask   255 255 255 0 24_       Destination Network    192 168 210 0    Destination Mask    255 255 255 0 24 el          bel Automatically create firewall rules          Abort Back Finish       fig  146 enter interlinked subnets    Securepoint  Security Solutions 135    10 Menu VPN Securepoint 10    10 1 2 Site to End  Roadwarrior     Click in the VPN dropdown menu on the entry IPSec Wizard   The dialog IPSec Wizard  gt  Create an IPSec connection appears     Select the VPN type  Roadwarrior  gt  One or several computers can connect to the local network     Click Next          IPSec Wizard       Create a IPSec Connection   Which type of a IPSec connection do you want to create      Site to Site Connection  connect two gateways      S Roadwarrior  connect a computer with a gateway              Abort Back       fig  147 select kind of connection     gt  Enter a name for the VPN connection in the field Connection name    gt  Click Next        IPSec Wizard           Create a IPSec Connection  Roadwarrior    Please specify the connection name     Connection nam
135. r Exceptions enter subnets and IP addresses which should be except from the  proxy redirect  Source and destination addresses must be specified for these excep   tions     Select an authentication mode    None no authentication   Local authentication against the local user database   Radius authentication against a Radius server   Active Directory authentication at the AD of the network   NTLM authentication against the NT LAN manager  Click the button Settings to define if all users or just  a defined group are allowed to authenticate     lf you want to limit uploads and downloads activate the checkbox Enable Size Limit   If you don t want to limit the upload or the download  activate the relative radio but   ton unlimited     The Anonymize Logging logs without user name and IP address        Securepoint  Security Solutions 91    9 Menu Applications Securepoint 10     O  HTTP Proxy    General Virusscan URL Filter Block Extensions Block Applications Content Filter Bandwidth       r Proxy   Proxy Port  8080  Enable Outgoing Address  C  Outgoing Address    Cascade  E  Parent Proxy        Parent Proxy Port  0 v                   m Authentication  Transparent Mode   5 None E  etho    Local WV  ethi     Radius E  eth2     LDAP  F  tuno     NTLM       Settings Exceptions                      m  Size Limit   Enable Size Limit   d  Max upload      5000 KByte or    unlimited    Max download     0 KByte or      unlimited            Logging   Anonymize Logging  E             Save Close 
136. rd    PPPOE  General   Interface    eth0 E  PPP Interface  pppo             DSL Provider    internet communicator            Abort       el    fig  46 add PPPoE interface   set properties    Securepoint  Security Solutions 46    7 Menu Network Securepoint 10    7 2 1 5 VDSL Interface hinzufugen  VDSL stands for Very High Speed Digital Subscriber Line and is an internet connection with    great transfer rates     Click Add Interface    The Interface Wizard appears    Select the desired interface type  in this case VDSL    Click Next    The configuration window of VDSL Interface appears     Select in the field ETH Interface to which physical Interface the VDSL interface  should be bound  This should be the external interface     Select a VLAN ID for the Interface  At completion an eth interface will be created with  the selected ID  for example eth0O 7     In the field VDSL Interface a name is predetermined    Select a provider from the dropdown field DSL Provider  which is used to connect  the internet    If you did not create a DSL provider yet  select the entry new to add a provider  Enter  the required data into the fields Provider Name  Username and Password     Click Finish to complete the configuration   After the interface is added you have to press the button Update Interface               Interface Wizard  General   ETH Interface   etht       VLAN ID  7    VDGL Interface  pppo       DSL Provider  new  a   Provider Name  ynet_Service       Username  securepoint  gt    
137. ress  subnet mask  zone and NAT IP     J SSL VPN Netz    Network Object Information    Name  SSL YPN Netz  IP  192 168 250 0  Mask  24   zone  vpn openyvpn  Nat IP        fig  96 object information    8 7 2 Network Group Information    You can also retrieve information of network groups      gt  Select a network group from the dropdown box      gt  Click on the information symbol behind the dropdown box   The infobox appears        The infobox shows the name of the network group and if the group is used in a firewall rule     In this case the numbers and a summary of the firewall rules are shown     o Rules for Network Group    Name  External Interface         Rules for Group     Source Destination Service  2 Internet External Interface openvpn_udp                fig  97 infobox for a network group    Securepoint  Security Solutions 89    9 Menu Applications Securepoint 10    9 Menu Applications    In this menu item you will find the settings of the proxies for HTTP  POP3 and VoIP and also  the settings of the remote control service VNC Repeater  the Mail Relay and the Spam Filter     Furthermore you can switch the status of the services     applications    HTTP Proxy   PoPS Proxy   Mail Relay   Spamfilter Properties  YNC Repeater   VoIP Proxy   IDS    Service Status       fig  98 dropdown menu applications    J    HTTP Proxy General settings of the proxy  Furthermore virus scanning  filtering  of internet addresses and website content   POP3 Proxy Spam filtering and virus sc
138. rnal_interfac  Grp internal_net    lany    default internet  1      ACCEPT  a     Active          Infobox setting                       E Disable Infobox    dns  ntp  ipsec    Logging   NONE ei  QoS    None       administration  netbios   proxy   ping    Ae            Rule routing           EN    None                         Save Close       fig  67 create new rule   tab general    Securepoint    Security Solutions 67    8 Menu Firewall    8 1 1 1 Infobox Function    When the mouse cursor rolls over an entry in the list  an infobox appears which shows de   tails of the entry  It shows which objects or services are elements of the related group   You can enable this function by deactivating the checkbox Disable Infobox     SSL_VPN_Netz    Network Groups Information    Name  SSL_YPN_Netz   Member  Name IP  ssi_vpn_net 192 168 250 0  ssl_user barney  4uBendienst_Miuller 192  168 250 30  4uBendienst_Meyer 192 168 250 58    Zone   yon openypn    ypn openypn  ypn openyvpn    yYpn openyvypn       fig  68 group elements with IP address and zone affiliation    Securepoint  Security Solutions    Securepoint 10    68    8 Menu Firewall Securepoint 10    8 1 1 2 Tab Time  On the tab Time you can limit the validity period of a rule   If you do not set any limit  the rule is valid all the time     Click on the tab Time     Select a beginning time and an ending time for every day at which the rule should be  limited     The top dropdown field belongs to the beginning time and the bottom dro
139. route   The dialog Add Route appears     Select in the field Type if the route applies to all networks and computers or just for  several ones    For all select without Source    Otherwise select with Source and enter the IP address and the subnet mask of the  concerned network or host in the fields Source Network and Source Mask     Enter the Gateway  which should be used for reaching the destination network or  destination host     In the fields Destination Network and Destination Mask enter the IP address and  the subnet mask of the destination     You can assign a weighting for the route in the field Weighting        Add Route      Add Route    Type  without Source EI Type  with Source E  Gateway  192 168 175 1   Source Network   192 168 176 0    Destination 192 168 176 0    Source Mask  255 255 255 0 24       Retort   Gateway  192 168 175 1   Destination 255 255 255 0 24 e SH S       Mask    Destination  Network     FE 7 Destination  weighting    d Mack     Save Close Weighting     fig  52 general route Save Close       A    fig  53 route for defined sources    Securepoint  Security Solutions 52    7 Menu Network Securepoint 10    7 2 3 DSL Provider    When connecting the internet using a DSL dialup mode  you have to enter the provider and  your account data  so the appliance can connect to the internet by itself     o Network Configuration    Interfaces Routing DSL Provider DynDNS DHCP    Name Login Force separation Default Route    anonymous DSL nobody 2 Yes    4dd DSL
140. rver will assign IP addresses to the clients  from this range   The range must be a part of the local subnet  Consider that the first address   XXX XXX XXX 1  iS mostly assigned to the default gateway  Hence it cannot be part of  the DHCP address pool  Furthermore reserve a couple of IP addresses for computer  and server which need static IP addresses to warrant the correct working of several  services   Enter the lower limit of the range into the field DHCP Pool start and the upper limit  into the field DHCP Pool end     Enter the standard gateway into the field Default Gateway  This is the IP address of  the internal interface     Type the IP addresses of the DNS server into the fields Nameserver  1 and Name   server  2     Type the IP addresses of the WINS server into the fields WINS Server  1 and WINS  Server  2  if you use them      gt  Store your settings with Save     o Network Configuration    Interfaces Routing DSL Provider DynDNS   DHCP      Subnet  Local Subnet  192 168 175 0   Netmask    255 255 255 0 24 iv        DHCP Pool  DHCP Pool start  192 168 175 3    DHCP Pool end  192 168 175 25             Gateway  i Default Gateway  192 168 175 1            Nameserver  Nameserver  1  192 168  100 10  Nameserver  2  192 168 200 10       WINS  WINS Server  1  192 168 100 10    WINS Server  2  192 168 200 10         Save       fig  58 settings for DHCP server    Securepoint  Security Solutions of    7 Menu Network Securepoint 10    7 2 6 DHCP Relay    The appliance can als
141. sending e mail     DNS Server Domain Name System Server  Hostname to IP address resolution  POP3 Proxy Post Office Protocol Version 3 Proxy   Establishes a connection to a POP3 server and tests the re   ceived e mails for viruses and spam     HTTP Proxy    Hypertext Transfer Protocol Proxy    The proxy interconnects the client of the internal network with  the server in the internet  It can block HTTP requests by means    of content and it can test websites for viruses   VoIP Proxy Voice over IP Proxy  VNC Repeater Virtual Network Computing    DynDNS Client Dynamic Domain Name Services Client       The client updates the current IP of the firewall by a DynDNS    service     NTP Server Network Time Protocol Server  Synchronizes all system clocks in the network     IDS Server Intrusion Detection System Server       Protects the network against know intrusions  L2TP Server Layer 2 Tunneling Protocol Server   Offers VPN connections to the firewall by using the network  protocol L2TP     PPTP Server Point To Point Tunneling Protocol Server    Offers VPN connections to the firewall by using the network  protocol PPTP        Securepoint  Security Solutions 21    5 Securepoint Cockpit Securepoint 10  SPUVA Server Wortmann Security User Verification Agent Server  ee Central user authentication  Web Server Dynamic Host Configuration Protocol Server  Allocates network configurations to the computer in the network   for example the IP address    DHCP Server Internet Protocol Security Ser
142. ses  against Mailserver with           gt  You can use the addresses of the LDAP directory or the SMTP server checks the ex   istence of the addresses   Furthermore you can upload a file with e mail addresses  The validation can be made  against this file with the option Validate E mail addresses against Mailserver with  local file  The file contains one e mail address per row  You can edit the file from  here with the button Edit e mail addresses   You also can download it with the button Download file         Mail Relay    General Relaying Mail Routing Greylisting Domain Mapping Advanced    SMTP Routing Settings     Domain Mailserver    realsecure de 192 168 4 10    pptp de 192 168 4 10    Add SMTP Routing    Validation    Validate E mail addresses against Mailserver with SMTP    Validate E mail addresses against Mailserver with LDAP    Validate E mail addresses against Mailserver with loacal file  Ml 0 Email addresses  Local File validation    i Upload File Download File Edit email addresses    Save Close       P    fig  116 routing settings for the mail relay    Securepoint  Security Solutions 108    9 Menu Applications Ssecurepoint 10    To assign e mails of a domain to a defined mail server  click the button Add SMTP  Routing     The dialog Add SMTP Routing appears   Enter a domain into the field Domain     Enter a host name or an IP address of the mail server into the field Mailserver   Click Add     o  Add SMTP Route    Domain        ssecurepoint cc  Mailserver     ma
143. so can retrieve information of service groups      gt  Select a service group from the dropdown box      gt  Click on the information symbol beneath the dropdown box   An infobox appears        The infobox shows the name of the service group and if the group is used in a firewall rule     In this case the number and a summary of the rule are shown     o Rules for Network Group    Name  External Interface       Rules for Group     Source Destination Service  2 Internet External Interface openypn_udp                fig  83 infobox for a service group    Securepoint  Security Solutions 80    8 Menu Firewall Securepoint 10    8 5 1 Edit Existing Service Groups    Select a group from the dropdown box in the section Service Groups   The services which are elements of the selected group are shown in the right table     You can add services by highlighting services in the left table  It could be helpful to  disable the infobox     Click on the rightwards arrow button between the tables   The service will be move from the left table into the right table     Highlight a service you want to delete in the right table    Click on the leftwards arrow button between the tables   The highlighted service will move from the right table to the left table     You can delete the whole group by a click on the trashcan symbol beneath the  dropdown box   Confirm the Security Query with Yes       Click on the button Update Rule to apply the service group changes to the rules of    the portfilter     
144. ss in this section  it will also change in the section network configuration    Enter the port of the SSL VPN in the field SSL VPN Port  The default port 1194 is al   ready set    The SSL VPN uses the protocol udp  You can change the protocol to tcp  This is not  recommended because a big overhead is produced    Select a server certificate from the dropdown box SSL VPN Certificate  This certifi   cate has to be created with the option Server Authentication  This authenticates the  appliance as a SSL VPN server     Store your settings with Save            SSL YPN          SSL VPN IP  192 168 250 1   255 255 255 0 24 el  SSL VPN Port  1194   a         SSL VPN Protocol   udp Le              Save Close       fig  163 adjust IP address  address pool and server certificate    Securepoint  Security Solutions 151    11 Menu Authentication Securepoint 10    11 Menu Authentication    The user  and certificate administration is located in the section Authentication  Further   more you can adjust the settings of external authentication methods here     authentication    Users  External Suthentication    Certificates       fig  164 dropdown menu authentication    Users User administration for creating new users and editing existing users     Furthermore assigning group membership  password  etc     External Authen    Settings for external authentication via Radius  or LDAP server   ea AE  Certificates Certificate administration for creating new certificates  Also export and  earen T      
145. st one interface  If you want to  use interfaces in the same zone  you have to add a new zone     Type a name for the new zone in the field Name in the section Add Zone     select an interface which should be allocated to the zone from the dropdown field In   terface     Click Add Zone to save the settings     If you want to change allocated interfaces  use the tab Interfaces in the menu Net   work  gt  Network Configuration        Zones    m zones  Name Interface       external pppo  internal eth1  dmzi eth2  dmz2  dmz3             Gd Zone       Name   Interface    None e    Add Zone                fig  60 dialog for adding and deleting zones     gt  Todelete a zone  click on the trashcan symbol in the column of the related zone      gt  Confirm the securety query with Yes   The zone will be deleted        Securepoint  Security Solutions 59    7 Menu Network Securepoint 10    7 4 Network Tools    The point Network Tools opens a dialog which offers three needful functions  These func   tions are often used in network engineering  Therefore they are implemented in the ap     pliance     meaning   description  gt Z  gt  o    button           ec Detects IP addresses of a host     d ox Detects if a computer is reachable in the network   routing table   Shows the routing entries of the appliance     7 4 1 Lookup       The name of this function is deduced from the command    nslookup     The function queries the  nameserver which IP address belongs to a defined host name  This is c
146. t    Securepoint  Security Solutions 28    6 Menu Configuration Securepoint 10    6 Menu Configuration    All settings of the appliance are stored in a configuration file   Commands which are related to the configuration and basic system commands are depo     sited in the menu item configuration     configuration    Configuration  management    Reboot System  Halt System  Factory Defaults  Logout       fig  29 dropdown menu of the menu item configuration    Configuration The configuration management shows a list of all saved configuration  management files  Here you can export  print or delete the configuration   Furthermore you can load and import configurations  set a start configu     ration or save current settings in a new file        Securepoint  Security Solutions 29    6 Menu Configuration Securepoint 10    6 1 Configuration Management    All settings of the firewall are stored in a configuration file  The menu item Configuration    management of the menu configuration shows a list of all saved configurations      gt  Choose the menu configuration in the navigation bar and select the point Configu   ration management from the dropdown menu   The dialog Configurations appears         Configurations   Status Name   Sg TERRA  TERRA BACKUP  fsdffsd    a D g    import  TERRA173    Import           fig  30 list of available configurations    The start configuration is labled with an asterisk ahead of the configuration name  This confi   guration is loaded when the appliance
147. t 10    7 2 4 DynDNS    If you don   t have a static IP address  but a dynamic one which is changing at every dial into  the internet  you can use a DynDNS service for always being reachable with the same host   name  This is only required if you offer a service which should be reachable from the internet   for example web server  VPN connection  or if you want to administrate the firewall from the  external net    If you use the DynDNS services the client transmits at every dial in its current IP address to  the DynDNS service provider  The current IP address Is stored by the provider  The provider  links your static hostname with your current IP address  In this way it is assured that your  host is always available by the host name  The appliance transfers the current IP address to  the DynDNS provider     You can create six interfaces  These will be listed in the tab DynDNS        Network Configuration    Interfaces Routing DSL Provider DynDNS DHCP      Hostname Login Server MX Interface    1 securepoint dyndns de sp _admin members dyndns org pppo       fig  56 list of the external DNS update service for dynamical IP addresses    Securepoint  Security Solutions 55    7 Menu Network Securepoint 10    7 2 4 1 Create or Edit a DynDNS Entry    To create a new entry or to edit an existing entry  click on the wrench symbol   The dialog Change DynDNS appears     Enter your domain name into the field Hostname   Type your access data of your services provider into the fields Login 
148. tal secret key  eeseesee                fig  173 access data for the Radius server    Securepoint  Security Solutions 160    11 Menu Authentication Securepoint 10    11 2 2 LDAP Server    For using a LDAP server follow the approach below     Open the dialog External Authentication   On the tab LDAP insert the data of the LDAP servers     Insert the host name or the IP address of the server in the field IP address or host  name     Enter the server domain into the field Server Domain   Under User name insert your user name of the server     Under User password insert your password and retype it in the field Confirm user  password     Store your settings with Save          External Authtentication    Radius LDAP Kerberos          LDAP Settings  IP adress or host name  Idap    168 175 100  Server domain  securepoint local  User name  admin    User password  eecccece       Confirm user password  eeeseeee             fig  174 acces data for the LDAP server    lf you use the LDAP authentication in combination with the services HTTP proxy or L2TP   you have to create new groups in the Active Directory  AD   and users  which may access  the local net have to be members in these new groups     HTTP Proxy  gt  group in AD SecurepointHitp  L2TP  gt  group in AD SecurepointL2tp    Securepoint  Security Solutions 161    11 Menu Authentication Securepoint 10    11 2 3 Kerberos    The Kerberos authentication service authorizes the access of the HTTP proxy  It not only  authenticates the cli
149. te and click on the following icon     The dialog OpenVPN Client appears  It asks for settings to configure the OpenVPN  configuration     Select a DynDNS Entry from the dropdown box   Or enter an IP address into the field Alternative     The option Redirect default gateway to remote site reroutes the whole internet traf   fic of the VPN user over the appliance     Click Save to start the download     vi  Open  PN Client    YPN Gateway   Please select the gateway for the connection   e secpoint dyndns org  gt      Alternative     U Redirect gateway    Save Close       vA    fig  181 settings for the OpenVPN client    Securepoint  Security Solutions 167    11 Menu Authentication Securepoint 10    11 3 6 Delete CA and Certificate    You cannot delete the CA or certificates directly  You can only revoke them so they aren t  valid anymore  Revoked certificates are store as invalid  so nobody can use them for authen     tication anymore     Switch to the corresponding tab  CA or Certs    Click on the Trash Can symbol at the end of the row     Answer the security query with Yes   The CA or the certificate will get the status Revoked   The invalid files will be listed on the tab Revoked          Certificates  CA Certs Revoked    Name Type Valid untill Status  ssl_Server User   Server 31 12 2012 23 59 59 REVOKED       fig  182 revoked certificate in the tab Revoked    Securepoint  Security Solutions 168    11 Menu Authentication Securepoint 10    11 3 7 Tab CRLs    On the tab CRLs th
150. ted or deleted      gt  For editing click the wrench symbol   The dialog Edit Route appears     Change the settings and save the new properties with Save     For deleting click the trashcan symbol     Click Yes at the confirmation prompt   The entry will be deleted        7 2 2 2 Add Default Route    Click Add default route   The dialog Add Default Route appears     Enter as Gateway the IP address of the internal interface   The fields Destination Network and Destination Mask are predefined   The value Weighting defines the priority of the route     This statement is relevant if you use  two or more  internet connections  Multipath  Routing     If the first route has the weighting 1 and the second one the weighting 2  the second  route will be used twice as much as the first one  The weighting 5 and 10 have the  same effect           Add Default Route    Gateway  192 168 175 1     Destination  Network     Destination Mask     Weighting        Save Close       fig  51 add default route    Securepoint  Security Solutions 51    7 Menu Network Securepoint 10    7 2 2 3 Add Route   Routes offer the possibility to find networks which are not directly connected to the appliance   To send a package to a network which is connected via a gateway  for example a router  to  the appliance  the system must be informed about this  Otherwise the packages will be  routed to the default gateway where they cannot be transmitted to the desired network     Switch to the tab Routing and click Add 
151. thentication methods  Either use the preshared key  PSK   method or you use the authentication via certificate  The PSK is a password which is known  by both connection partners     Preshared Key Method    Select the radio button Preshared Key  Enter the preshared key  PSK      Decide which IKE  Internet Key Exchange  version you want to use and select the  related radio button     Click Next          IPSec Wizard           Create a IPSec Connection  Site to Site     Which kind of Authentification and IKE you want to use     Preshared Key  TETTETETT    x 509 Certificate     IKE version 1  IKE version 2             Abort Back       fig  144 authentication via PSK and IKEv1    Securepoint  Security Solutions 134    10 Menu VPN Securepoint 10    Certificate Method    Mark the radio button x 509 Certificate and select a server certificate from the drop   down box     Decide which IKE  Internet Key Exchange  version you want to use and select the  related radio button     Click Next     o IPSec Wizard    Create a IPSec Connection  Site to Site   Authentification  Which kind of Authentification and IKE you want to use   O Preshared Key     CG x 509 Certificate     Filale_Stuttgart ze        IKE version 1  GZ IKE version 2          Abort Back Next  vA       fig  145 authentication via certificate and IKEv2    Now enter the networks which should be interlinked by the VPN connection     Under Local Network enter your local network   Select the according net mask at Local Mask     Unde
152. tions     Click in the VPN dropdown menu L2TP   The dialog VPN L2TP appears     In the tab General you have to adjust basic settings     Enter the IP which should be used by the L2TP interface in the field Local L2TP IP     An explicit L2TP interface doesn   t exist  The entered IP address will be bound as a  virtual address to the external interface    Under L2TP Address Pool adjust a L2TP address pool    This must be set in the same subnet as the L2TP IP address    The left field contains the start address and the right field the end address of the ad  dress pool     For the Maximum Transmission Unit  MTU  the default value 1300 should be re   tained    Under Authentication select the authentication mode    You can select from local authentication against the database of the appliance  au   thentication via a Radius server or via an Active Directory     Store your settings with Save             YPN L2TP         General   DNS  WINS             Local L2TP IP   192 168 180 1     L2TP Adress Pool   192 168 180 1     50  a     MTU  1300     Authentication    Local iy                    Save Close    fig  159 adjust IP address  address pool and authentication method    Securepoint  Security Solutions       147    10 Menu VPN Securepoint 10    In the tab NS WINS enter the IP addresses of the name server and of the WINS server   Windows Internet Name Service   if you use one  This will be forwarded to the L2TP net     work     Switch to the tab NS WINS   Enter the IP address of the
153. u can create a  CA yourself to sign the certificates you have generated  The signed certificates will be distri   buted to the users which connect to the local net via VPN  The signature assures that the  certificates are created by the firewall and not by anybody else    For a complete authentication  not only the remote station needs a certificate but also the  firewall itself  You have to create one certificate for the firewall and one certificate for each    external user     You can import external certificates given in PEM format  You may also export local certifi   cates in PEM format or as PKCS  12     The tab CA shows all existing Certification Authorities   The tab Certs shows all available certificates   The tab Revoked shows all invalid CAs and certificates        Certificates    CA Certs Revoked    Name Type Valid from Valid untill    est CA 17 02 2012 23 59 59 OK    Import       fig  176 list of available CAs    Securepoint  Security Solutions 163    11 Menu Authentication Securepoint 10    11 3 1 Create CA    At first you have to create a CA to sign created certificates     Click in the tab CA onto Add   The dialog Add Certificate appears     The fields Valid from and Valid until define the duration of validity of the CA  You  can enter the date directly into the first field  Or click into the field and a calendar ap   pears where you can select the date  The following three fields are reserved for the  time  hour  minutes  and seconds     When the validation o
154. ugh  LAN 1and is designated for the external network  internet   LAN 2 represents the second  interface eth1 and is designated for the internal network  The port LAN 3 uses the interface  eth2 and is destined for a demilitarized zone  DMZ   It can also be used for a second internal    network or a second external connection     DC Input       fig  2 rear view of the Piranja respectively of the RC 100    external  internet     internal       Securepoint  Security Solutions 14    3 Positioning the Appliance Securepoint 10    3 2 RC 200    The RC 200 has 4 LAN ports  The assignments of the first three ports are identical to the  previous it described ones  The port LAN 4 is bounded to the interface eth3 und is for free  disposal  You could connect another internal net  another DMZ or a second internet connec   tion to this port          DC Input Key Mouse    I l           fig  3 rear view of the Piranja respectively of the RC 100    3 3 RC 300       The RC 300 has 6 LAN ports  Contrary to smaller dimensioned appliances the ports are  numbered serially from right to left  The ports at the machine are not labeled  Take the attri   bution from the figure     LAN A LAN3 LAN2 LAN        fig  4 front view of the RC 300  schematic        Securepoint  Security Solutions 15    3 Positioning the Appliance Securepoint 10    3 4 RC 400    This Appliance has 8 LAN ports  The sockets are arragned in two blocks of 4 connectors   The ports are numbered top down and from left to right  LAN 1 and
155. vate new rules you have to click the button Update Rule in the Portfilter    Dialog     lf you changed the order of the rules you have to update the rules also        Securepoint  Security Solutions 65    8 Menu Firewall Securepoint 10    You can modify the view of the portfilter by using the filter function  This way you can find a  desired rule fast     Click on Set Filter in the portfilter overview to open the dialog Set Filter   Activate the filter by selecting the entry On from the dropdown field Enable Filter     You can filter the entries of the porttilter by several criteria   The criteria are     Groups     Source Network Groups Shows all entries which have the given group  as source     Destination Network Groups Shows all entries which have the given group  as destination     Service Groups Shows all entries which use the given group  as service     Objects and Services     Source Network Objects Shows all entries which have the given object  as source     Destination Network Objects Shows all entries which have the given object  as destination     Services Shows all entries which use the given service    Activate the desired filter criterion and select a filter word from the related dropdown  box    Click Close    The set filter will be used for the firewall rules        o Set Filter       Filter Options   Enable Filter  On      Filter Groups        Source Network Groups     Internet             Destination Network Groups    Internal Interface       Service Groups
156. ver  Offers VPN connections to the firewall by using the IPSec pro   tocol   IPSec Server Layer 2 Tunneling Protocol Server  Offers VPN connections to the firewall by using the network  SSL VPN Server secure Socket Layer Virtual Private Network Server  eee Offers SSL secured VPN connections to the firewall   IGMP Proxy Internet Group Management Protocol  eee Offers the spreading of packets to multiple recipients     CTASD Server Commtouch Anti Soam Daemon   mee Service for soam identification from the company Commtouch   Kerberos The Kerberos authentication service authorizes the access of  wf the HTTP proxy     Mailfilter Scans e mails for soam and undesired attachments     SNMP Server Simple Network Monitoring Protocol  Reads the values of interface traffic  processor  and memory    utilization     Routing Server Supports several routing protocols           Applications    SSH Server SPUVA Server    Mail Relay Virusscan active Web Server  DNS Server DHCP Server  POP3 Proxy Virusscan active IPSec Server    HTTP Proxy Virusscan active SSL VPN Server       SG E    VOIP Proxy IGMP Proxy    VNC Repeater Virusscanner       0       DynDNS Client CTASD Server    NTP Server Kerberos    c    IDS Server Mailfilter    L2TP Server SNMP Server       PPTP Server Routing Server    fig  11 service status  part 1  fig  12 service status  part 2     Securepoint  Security Solutions 22    5 Securepoint Cockpit Securepoint 10    5 5 Appliance    Displays the view of the appliance   The connected
157. work and the packet is send  from a wrong zone  for example  external  the packet will be dropped automatically on the    basis of the zone concept  The administrator doesn   t have to create anti spoofing rules        fig  222 zone concept of the Securepoint firewall    Securepoint  Security Solutions 209    15 Download Section Securepoint 10    The zone concept is designed in two parts  The firewall Zones and the group zones    The firewall zones contain the zones  firewall internal  firewall external and firewall dmz   These zones are provided for the interfaces of the appliance    A group zone is assigned to one firewall zone  For example  The group zone internal is as   signed to the firewall zone firewall internal with the internal interface    In the group zones computers and networks are positioned  which are connected with the  firewall by the related interface    The VPN zones are provided for VPN computers and networks  These are assigned to the  external interface too  but they are different from the devices of the zone external because    they connect the appliance by a secure tunnel     Zones can only be assigned once  If you want to use two interfaces for the internal net  you    have to create a new zone for the second internal net     Securepoint  Security Solutions 210    
158. x Mailfilter   Fixing Email Database update routine    Bugfix SSL VPN   Fixing OpenVPN tunO problem after CLI command update interface   Bugfix Kernel   IP forwarding fix    Bugfix Spamfilter   Restart CTASD when defaultroute updates   Feature Server   Decreasing CLI to Server response time    Feature Server   Add config convert CLI command  convert database to UTF 8         Feature Server   CLI command show systemstats replaced memFree with memAvail     u wm ban     em wm mmi VU  et 8 M o     wm Ai se ses DT PPA Ett L   EI KK   nf          m Changelogs   Show Build    8830     Show                fig  190 changes from one version to the next    Securepoint  Security Solutions 174    12 Menu Extras Securepoint 10    12 4 Registration    Here you can upload your license file  If you don t have a license yet  you can follow the  hyperlink in the dialog to access the Securepoint website and register your appliance   Upload the license file like this      gt  Click Browse and select the license file from your file system    gt  Click Upload to upload the file     Di  Registration    If you don t have any Registration File  you can register  your Securepoint Firewall through the following link     https   www securepoint de registration    Upload Registration   C  SecurepointREG bd   Browse       Upload    Only a registered Firewall updates the Virusscan Pattern  Files automatically and allows you to update the Firewall  itself to a newer Version  Please register your Securepoint 
159. y activating the checkbox Enable Bandwidth Con   trol     Select a global limitation or a limitation per host   Activate the related radio button     Enter a global limit in kilobit per second in the field Global Bandwidth     Enter a host limit in kilobit per second in the field Bandwidth per Host   The host just gets this bandwidth even if the global bandwith is not reached yet     ei HTTP Proxy      General Virusscan URL Filter Block Extensions Block Applications Content Filter   Bandwidth      wv Enable Bandwidth Control    Global Settings   k Limit global Bandwidth    Global Bandwidth  16000     KBit s  Host Settings     Limit Bandwidth per host    Global Bandwidth  16000 KBit s  Bandwidth per Host   512      KBit s       fig  109 limit the bandwidth in the HTTP proxy    Securepoint  Security Solutions 102    9 Menu Applications Ssecurepoint 10    9 2 POP3 Proxy    The POPS proxy acts as a POPS server to the mail client and retrieves the e mails from a  mailserver in the internet  The e mails are checked for viruses and spam and are send to the    mail client     Select at Virusscanning the value On to activate the virus scanning     select at Spamfilter the value On to activate the spam filter   Choose the net in which the Transparent Proxy should be activated   Store your settings with Save           PoP3 Proxy    Virusscanning     On      Spamfilter  On el  Transparent Proxy    Please choose the TT etho   interfaces  ethi   LI eth2   C  tuno       fig  110 set propert
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
PIPER MS - Clay Paky  PEG-N770C - Sony Europe  aceite italika  取 扱 説 明 書  Samsung 커브드 사운드바 9.1 채널  Lenovo 8994 Personal Computer User Manual  User Manual - ACESEE Security Limited  室内ユニットは - パナソニック  Casio EX-ZR400 Camcorder User Manual      Copyright © All rights reserved. 
   Failed to retrieve file