Home
        Symantec Gateway Security 5310 Appliance 3DES
         Contents
1.                rere m Description  vAntivirus io   The AntiVirus feature provides     Firewall   vPN protection against virus infected  Full VPN Client Support data received over the network      High Availability Load Balancing  V Intrusion Detection System                          lt  Back Cancel         10    Figure 3 14 System Features page    Click Next     The System Features page appears  For more information on System Features  see the Product Overview on page 7     Un check any features you do not want to use     You can run the Setup Wizard again to enable any feature  or use the System  Features item under Base Components     Click Next   The Setup Wizard Network Interfaces page appears  see Figure 3 15      You configured one ethernet interface  the interface closest to the managing  SRMC system  with an IP address and netmask at the front panel during the  initial appliance setup procedure  That interface should appear in the Setup  Wizard Network Interfaces page     60    Initial Setup  Setup wizard    Setup Wizard i xj    Network Interfaces  Specify the inside and outside network interfaces        Network Interfaces      Name   IPAddress   Mask   Type   Description         10 1 1 11 255 0 0 0 Inside Inside Interface  1 0 10 0 255 0 0 0 Outside Outside Interfa  Outside Aurillary  1 Int     Outside Auxillary  2 Int     Interface  IP address  Mask  Type     Jethi   1 0 10  0   255  0 0 0 Outside    J Use DHCP  Apply         m       11    12    13  14    15    Figu
2.             ce cece cece eee 3 32  Front panel Controls    oenn a ear e GS a Sd E dane E E aera andre E ab 3 34  Network address information 1 1 0 0      cece cece cece eee eee eee eens 3 35  Network configuration worksheet         0 0 0  cece cece eee eee eee eee ee 3 36  Initial network configuration procedure      6 6    eee eee eee eens 3 38  Display system information          0  cc cece cece eee eee e eee eeees 3 42  Usesthe system mentite cate  Gh cca die ers ae RY week Ghee Bal ade a eal S 3 43  Get your license keys    ce ine biota bs P Gidea eed eee aude dea N 3 45  Restoring the Symantec Gateway Security appliance operating system               3 46  Install SRMC    tecsoacaaetordete rnes oem a a Chu de a eo ania aig 3 48  Connect to Symantec Gateway Security appliance             cece eee eee eee 3 54  Setup wizards seni ties sina eid ee hank wOwee ed tem dee on a eee ee a 3 56    4 Firewall    QUICKStart wizard  csscie avasdgeaseconienas Aetiatelonvn yd tunis oa are tod dii s iE wacko s 4 64   Quickstart firewall configuration results            00    e cece eee eee 4 68  SMTP  Wizard s   2 3 eieren ib otis sin aria e Ince  Coat td ek Sib ig e Boge waved wcerabeyaun le eee 4 70  Configure S2S tunnels using the wizard            0  ccc cece eee eee 5 79  Configure VPN Client tunnels using the wizard         0    ccc eee eee 5 95    6 Routes and DNS    Setting Up LOULES  oserei aad ninen dee erected deci n Mid ae ddye a i erent  b eed 6 100  Specifying the default 
3.          Finish Setup    Introduction    Local End 2 Here are your current selections     Remote End     Local Security Gateway West abc 2    VPH Policy   Local Network Entity manufacturing 10 1 11  Remote Security Gateway N A  Remote Network Entity JSmith   Cancel Setup VPN Policy ike_detault_crypto_strong    Finish Setup    Click on Finish to accept the changes or Save to save and reconfigure  If you  need to make any changes  click on the left pane links     Although this wizard creates the secure tunnel and all the necessary tunnel  components for you  once you ve completed the wizard  you can access the  property pages for all the items you ve selected and make changes     Name   JSmithWestVPN Finish   Save         Figure 5 21 Finish Setup screen  VPN Client Tunnel Wizard    Once you have made your remote VPN Client selection  click the VPN Policy  link to continue configuring your tunnel  The VPN Policy configuration  procedure is the same as in the S2S example  Refer to the steps after the figure  VPN Policy screen  S2S Tunnel Wizard on page 91 to continue     Chapter       Routes and DNS    Routing is the process of choosing a path over which to send packets of  information  For the security gateway to function properly  specific routes must  be defined in the Routing Tables  Network routes must be configured properly to  allow information to move from machine to machine     This chapter explains how to configure routes and set up the name service using  the DNS proxy
4.        0 6    cece cee ee eee een ee 9 196  Customizing virus messages 1 6    cee eee eee ee 9 197    10 Content Filtering    Usingsconterit profiles as  S rn r e aaa aden gated E E E E dass 10 202  Creating rating rule profiles       2 0    eee eee eee eee eee eee ee 10 202  Using a ratings profile in a rule                2c eee eee eee eee eee ee 10 204  Searching capabilities       0    ccc eee eens 10 205  Customizing WebNOT ratings lists          0 0    ccc ee eee eee eee 10 206  Using Content restrictions    sees Seeweng pars nodes Bi Gm adhe Sele a a aha eyers Adres tne 10 207    Allowingextensions oee a aK os Ge Kee eae eR arena eee 10 207    Contents    Allowing URIS  sissies esate gies Seb esi ia ee ieee eels 10 208  HTTP restrictions inarule           cece eee 10 209  FLET PURE  patterns  tics ck aoa Peis aoe cue kat E E oa 10 210  Denying MIME types  conair a ds gSG 0 ed Peo ES BEG les 10 211    11 High Availability and Load Balancing    About the cluster wizard  i035 o0thie didi iia ease wn keliciede ee halesiea eee eas 11 214  Preparing to create a cluster    6    ec eee e cece cece ee pigsa ai Daia iia 11 215  Creating a cluster for software high availability load balancing           11 215  Creating a cluster for appliance file propagation or hardware HA LB      11 222  Merifying a cluster tas cc me Ean Heeb son Oe a em media U te teksts 11 224  Modifying a clistet    erie eE a ete dele hg Peeves ee hOws 11 225  Deleting arcluster    0 e ie nics beaten NE EEA
5.       Domains   specify one or more domains that are known to be threats so that  messages from these domains are rejected       Maximum mail size   specify a maximum size for messages so that messages  that exceed the maximum mail size are rejected       Invalid E mails   detection of intentionally malformed e mail messages       Virus Message   indication of infections in e mail messages     Some mail filters can be used during a virus outbreak situation to further protect  your network  Once you have information on the characteristics of a new virus   you can use this information to block the infected attachment or e mail at the  appliance  For example  you can use the file name or file size option if you know  the exact name or size of an infected attachment  You can protect your network  immediately  before virus definitions for the new virus have been posted        Note  Correct functionality of these mail filtering options is dependent on the  Scan Options setting under the antivirus configuration for the SMTP proxy  If  you plan to use some or all of the mail filtering capabilities to block mail  messages  you must select Scan and Delete or Scan and Repair or Delete as the  scan option for SMTP  For more information  see Configuring antivirus  scanning for the SMTP proxy on page 178        Filtering mail by attachment file name    When you filter mail by file name  you specify one or more file names that are  known to be threats and specify how the antivirus scan serv
6.       For more information  see Editing the File Repair Message on page 198 or  Editing the File Remove Message on page 200     To restore the original text of the message  click Restore Default     The File Repair Message is added to the body of an e mail message when an  infected attachment is repaired or is deleted because it contained an unrepairable  virus or because it violated the established mail policy     Antivirus Scanning 199    Using the mail filter options    Several variables can be used as needed to customize the File Repair Message   These variables are described below  When editing the message  you can edit both  the text and the variables     Message as it appears with variables                ALERT  NThis e mail contained one or more infected  files   NT he following attachments were infected and have  been repaired   N  N  R N The following infected attachments  were deleted   N    N D NThe following infected attachments  were blocked because of Mail Policy  violations   N  N  P NYou may wish to contact the sender to  inform them about their infections   N  NThank you  N  N Your  ISP  N  N             Original message text follows xl       Message text as it appears to the user     ALERT      This email contained one or more infected files    The following attachments were infected and have been  repaired               lt list of infected files gt     The following infected attachments were deleted         lt list of deleted files gt     The following att
7.       Ifyou check Configure rules to allow internal users to access web and  FTP services and or Enable Antivirus Scanning  QuickStart  automatically configures these services without requiring any further  input  If these are the only options you select  continue at step 10     SMTP Configuration Wizard E x     Internal Mail Server    SMTP requests addressed to the external interfaces of the system will be directed to the internal  mail server     Please enter the server s IP or DNS address     fi 92 246 115 49        lt  Back Cancel         Figure 4 4 Internal Mail Server screen    5 On the Internal Mail Server screen  enter the IP address or DNS name of  your site   s internal mail server     In specifying an internal mail server  you are indicating where SMTP mail  addressed to the appliance   s external interface will be directed     6 Click Next to display the Allow Internal Hosts Out screen  see Figure 4 5      68   Firewall    QuickStart wizard    SMTP Configuration Wizard x     Allow Internal Hosts Out  If selected  the wizard will create rules that allow internal systems to send mail directly to external    mail servers  Otherwise rules that may have been previously created to support this option will be  removed        If this option is not selected  any rules that allow mail to be sent to all systems will be  deleted     r           lt  Back Cancel         Figure 4 5 Allow Internal Hosts Out    7 To allow all internal hosts to send mail directly to all external sy
8.       Message    343 Antivirus Warning  Error parsing extension list  restoring  default of Scan All Files       Explanation    There is a problem in the list of included or excluded extensions        User Action    Check the Antivirus Scanning settings for the FTPD  HTTPD  and  SMTPD proxies to make sure that they are correct     Make sure that the following rules have been followed     The extension list is a semicolon delimited list    The only wildcard used is a    which means any one character   could be empty       The extension begins with a period              Message    343 Antivirus Warning  Problem with the extension list  Switch to  Scan All Files        Explanation    The SRMC should have sent an extension list to the antivirus scan  server but did not        Table B 6    IDS and antivirus scanning log messages 257    Antivirus scanning messages       Antivirus scanning messages                                              User Action Check the Antivirus Scanning settings for the FTPD  HTTPD  and  SMTPD proxies to make sure that they are correct   Make sure that the following rules have been followed     The extension list is a semicolon delimited list    The only wildcard used is a    which means any one character    could be empty    The extension begins with a period      If the problem continues  contact customer support    Message 343 Antivirus Warning  Out of Memory  Cannot continue parsing  extension list  restoring default of Scan All Files   Explanation 
9.      8 Click Next     Firewall 73    SMTP Wizard       SMTP Configuration Wizard 3 fi x     Anti Spam  Define the anti spam settings for all smtp mail  You can later change these settings from  the  SMTPD and or individual rule properties           Check Sender s Address against RBL hosts     New RBL site    Add    1 blackholes  mail abuse  org Remove          Coes _        Figure 4 9 Anti Spam screen    9 On the Anti Spam page  define the anti spam settings for all SMTP mail     The Check Sender s Address against DNS check box is checked by default   This validates the originator   s envelope address by checking the format and  ensuring the domain name is fully qualified  It also checks whether an MX  record exists for the domain name in DNS  Domain Name System   E mail  from recipients who fail the DNS registration test is rejected     Check Sender s address against RBL hosts checks the sender s address  against the addresses in the a list of known spam originators known as the  Realtime Blackhole List  RBL   Any incoming connection attempts will be  denied if the address is found in the RBL     If you check the list provided  the RBL of the Mail Abuse Prevention System  project is used  You can also enter the domain name of another RBL provider  in New RBL Site field and add it to the list of RBL sites by clicking Add     10 Click Next     14  Firewall    SMTP Wizard    SMTP Configuration Wizard x     Anti Relay  Define the default anti relay settings for all smtp mail rul
10.      SYMANTEC CORPORATION RAPTOR MANAGEMENT CONSOLE SOFTWARE  LICENSE AGREEMENT    SYMANTEC CORPORATION AND OR ITS SUBSIDIARIES   LICENSOR   IS   WILLING TO LICENSE THE SOFTWARE TO YOU AS AN INDIVIDUAL OR   THE COMPANY OR LEGAL ENTITY THAT WILL BE UTILIZING PRODUCT   AND THAT YOU REPRESENT AS AN EMPLOYEE OR AUTHORIZED AGENT    EYOU OR YOUR   ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF   THE TERMS OF THIS LICENSE AGREEMENT  READ THE TERMS AND   CONDITIONS OF THIS LICENSE CAREFULLY BEFORE USING THE xl    Do you accept all the terms of the preceding License Agreement  If you choose No  the  setup will close  To install Symantec Raptor Management Console  you must accept this          agreement   InstallShield   lt  Back Yes No    Figure 3 5 SRMC License Agreement window    Read the license agreement  then click Yes to proceed  or No to exit the  SMRC installation      If you click Yes  the Choose Destination Location window is displayed  see    Figure 3 6      Initial Setup 51    Install SRMC    Symantec Raptor Management Console Setup    Choose Destination Location  Select folder where Setup will install files     InstallShield        Figure 3 6 SRMC Choose Destination Location window    7 Click Next to accept the default  or specify an alternate directory path   The Start Copying Files window is displayed  see Figure 3 7      52 Initial Setup    Install SRMC    Symantec Raptor Management Console Setup xi    Start Copying Files  Review settings before copying files        Setu
11.     Browse         V Set Recover password    Recover password           Verify        Cancel   Help         Figure 7 7 Backup property page    2 From the Local backup file name field  click Browse to display the open  Saved System Configuration dialog box  This opens to the default location  for backup files      Program Files Symantec Raptor Management Console backup    When you enter a filename and click Save  the file name is placed in the field     Management Console 123    Back up configuration files    You can also enter the path and a file name for the backup directory into the  field  The file name must have the extension  rfwcfg  Ifthe directory  does not exist  you are asked if you want to create it     Optionally  you can select the Set Recover password check box and enter a  password  This will allow you to decrypt your keys files if you copy these  backed up files to another Symantec Gateway Security appliance with a  different system name  see Restore configuration files on page 124         Note  If you do not enter a password  you cannot restore backed up  configuration files to another Symantec Gateway Security appliance  You can  only restore them on the same machine        Management Console    124    Restore configuration files    Restore configuration files    From the SRMC All Tasks menu  you have the option of restoring backed up  configuration files to your Symantec Gateway Security appliance or to another  Symantec Gateway Security appliance  If you or
12.     Figure 11 11 Three appliance cluster network diagram    Figure 11 11 is a three appliance HA LB network diagram that shows a typical  Symantec Gateway Security cluster implementation  Our clustered network    consists of the following components       External network  The external network is the 169 10 10 0 24 network  This    network connects to the Internet through our router  169 10 10 1      High Availability and Load Balancing   29      HA LB Implementation      Dedicated network  The dedicated network is the 192 168 30 0 24  It is used  as the heartbeat or control network  Each appliance in the cluster uses the  heartbeat network to exchange state information about the cluster     e Service network  Our service network is the 172 168 6 0 24 network  A  service network could have Web  SMTP and FTP servers  This network could  contain many machines and subnets       Internal network  Our internal network is the 192 168 1 0 24 network  This  network could contain many machines and subnets        Note  A heartbeat network does not have to be a dedicated network  dedicated to only heartbeat communications as shown in this example   Heartbeat communications can run on any internal network with other  traffic and subnets        To create this cluster  use the Create Cluster Wizard and follow the steps in  Creating a cluster for software high availability load balancing on page 215   When you get to the Cluster members screen you would add cluster members  using their IP A
13.     Power on the models 5200 and 5300    For UPS configuration details  see Connect an Uninterruptible Power Supply   UPS  on page 28     Power on the models 5200 and 5300    Turn on the power by pressing the On Off button on the front of the Symantec  Gateway Security appliance models 5200 and 5300     The hard disk spins up  the fans turn on  and the LCD screen lights up       A number of status messages are displayed on the LCD screen as the  appliance completes its boot process     Connect an Uninterruptible Power Supply  UPS     When the Symantec Gateway Security appliance is configured to use an  uninterruptible power supply  UPS   the appliance can power down in an orderly  manner in the event of a power failure  The appliance communicates directly to  the UPS unit through the serial port     The recommended supplier for UPS units is American Power Conversion   www apcc com      To configure Symantec Gateway Security for UPS support  you must first connect  the appliance to the UPS through a serial port as follows     1 Plug the UPS into the wall socket    2 Turn on the UPS    3 Plug the Symantec Gateway Security appliance into the UPS power socket   4    Connect the UPS serial cable to the UPS unit and the Symantec Gateway  Security appliance     Refer to Figure 2 5 for the location of the UPS port  5  on the model 5110  back panel     Refer to Figure 2 6 for the location of the UPS port  4  on the models 5200  and 5300 back panel        Note  To configure UPS support
14.     Upon discovery of any failure of the Hardware  or component thereof  to  conform to the applicable warranty during the applicable warranty period  You  are required to contact us within ten  10  days after such failure and seek a return  material authorization   RMA   number  Symantec will promptly issue the  requested RMA as long as we determine that you meet the conditions for  warranty service  The allegedly defective Appliance  or component thereof  shall  be returned to Symantec  securely and properly packaged  freight and insurance  prepaid  with the RMA number prominently displayed on the exterior of the  shipment packaging and with the Appliance  Symantec will have no obligation to  accept any Appliance which is returned without an RMA number     270  SYMANTEC APPLIANCE LICENSE AND WARRANTY AGREEMENT    Upon completion of repair or if Symantec decides  in accordance with the  warranty  to replace a defective Appliance  Symantec will return such repaired or  replacement Appliance to You  freight and insurance prepaid  In the event that  Symantec  in its sole discretion  determines that it is unable to replace or repair  the Hardware  Symantec will refund to You the F O B  price paid by You for the  defective Appliance  Defective Appliances returned to Symantec will become the  property of Symantec     Symantec does not warrant that the Appliance will meet your requirements or  that operation of the Appliance will be uninterrupted or that the Appliance will  be erro
15.     configuring     2 From the Action menu  select Properties     102 Routes and DNS    Setting up routes    The Symantec Gateway Security appliance Properties page displays  GSA  Connected  Properties RIES    General   Status   Paths   Passwords   Date Time System   License      The current system name  domain name and default gateway  address        System Name      sasa    Domain Name       yourdomain com    Default Gateway Address     fi 69 254 0 254       UPS Support    Stop Start                      Front Panel Keypad Locking  Disable                Figure 6 2 Route properties window    3 Select the System tab and enter the default gateway information  as shown in  Figure 6 2     4 Click OK to save your updated default gateway information     You must save and reconfigure the Symantec Gateway Security appliance for  your changes to take effect     1 Right click in the left pane   2 Choose All Tasks gt Save and Reconfigure     Creating static routes    Static routes are necessary if you have a routed network behind the Symantec  Gateway Security appliance  For the routed network to work properly  the router  or routers must be properly configured  Use the ping command to check the  ability of computers on routed networks to connect to the Symantec Gateway  Security appliance  It is recommended that you use contiguous networks to  reduce the number of static routes required  The network in Figure 6 1 requires a  route for the 192 168 3 0 and 192 168 5 0 networks     Rout
16.     ping 192 168 1 2    ping 192 168 3 12    If the ping command succeeds with the address  you have a name  resolution problem     If they are still unreachable  you have a networking problem  Make sure that  wkst2 and wkst12 are on and connected to the network  Check the  default gateway setting on wkst1  it should be set to the inside interface of  the Symantec Gateway Security appliance      Ifwkst2 is reachable but wkst12 is not  your static route from Symantec  Gateway Security appliance has not been established or your router is not  configured properly  Also  check your default gateway setting on wkst12     If you can not ping an address behind a router  ping both addresses of the  router  If one is reachable but the other is not  you have a routing  configuration problem     Test the news server with this command     ping news xyz com    From an internal machine like wkst1  ping a computer outside your  network     ping www symantec com    The request should return an IP address for the requested name  The ping  itself will be    timed out    or    unreachable    because ping is blocked by the  Symantec Gateway Security appliance  However  when the ping utility  requests an IP address  DNS should be able to find it     If ping does not get an IP address for the outside name  you have a problem  with outside name service     If you cannot receive an IP address for an outside name  attempt the same  ping command from an outside machine  www  xyz  comin our  example   I
17.    Network  192 168 30 0                   Server Server Server    VIP   In 172 168 6 250    Service Network  172 168 6 0    VIP  In 192 168 1 250    Internal Network  192 168 1 0             Router 192 168 10 2    Figure 11 13 HA LB cluster with VIPs    The next step is to modify the routing tables on each of the each of the machines  and servers on each of the networks  All machines and servers must now point to  the VIPs instead of the real IP addresses for HA LB to work properly  If the  machines and servers continued to point to the real IP addresses of the  appliances  and one of the appliances failed  all of the machines and servers    238    High Availability and Load Balancing  HA LB Implementation    pointing to that security gateway would be cut off from the network  The  following table shows the VIP settings for our cluster network     Table 11 1 VIP addresses  169 10 10 0 24 169 10 10 250 Outside   Internet       192 168 30 0 24 192 168 30 250 Dedicated   Heartbeat       172 168 6 0 24 172 168 6 250 Service       192 168 1 0 24 192 168 1 250 Internal             We set the default gateway of our dedicated  heartbeat  network machines to VIP  192 168 30 250  We set the default gateway of our internal network machines   everything on the 192 168 1 0 24 network  to VIP  192 168 1 250   We also  change the default gateway of the interface on the servers residing on our service  network to point to VIP  172 168 6 250   Each of these are different networks and  theref
18.    s Security Response engineers work 24 hours per  day  7 days per week  tracking new virus outbreaks and identifying new virus  threats     Antivirus Scanning 163    Virus detection    Virus detection    When Symantec engineers identify a new virus  information about the virus  a  virus signature  is stored in a virus definitions file  Virus definitions files are  updated periodically via Symantec   s automated LiveUpdate feature  When the  Symantec Gateway Security antivirus scan server scans for viruses  it is searching  for these virus signatures  To supplement detection of virus infections by virus  signature  the antivirus scan server includes Symantec   s patented Bloodhound  technology  which heuristically detects new or unknown viruses  based on the  general characteristics exhibited by known viruses     Bloodhound heuristic technology    Researchers at Symantec have developed two types of heuristics for Symantec  AntiVirus  The first  Bloodhound  is capable of detecting upwards of 80 percent  of new and unknown executable file viruses  The second  Bloodhound Macro   detects and repairs over 90 percent of new and unknown macro viruses  These  statistics are staggering considering the growth rate of computer viruses   Bloodhound requires minimal overhead since it examines only programs and  documents that meet stringent prerequisites  In most cases Bloodhound can  determine in microseconds whether a file or document is likely to be infected by a  virus  If it determi
19.   Make sure you have a solid working knowledge of DNS before  proceeding  as well as a list of the names and IP addresses of all computers at your  site  both in front of and behind the Symantec Gateway Security appliance     The configuration done in this chapter includes only the most basic name service  features  Refer to the Symantec Enterprise Firewall and Symantec Enterprise VPN  Configuration Guide for more advanced features     Routes and DNS    100    Setting up routes    Setting up routes    Your TCP IP Protocol must be configured properly for Symantec Gateway  Security appliance to work  This includes setting static routes  or default  gateways  on your Symantec Gateway Security appliance and your other  computers     Routes are necessary if you have a routed network behind the Symantec Gateway  Security appliance  The Symantec Gateway Security appliance must be able to  find the appropriate router through which to send packets        A routed network has more than one subnet behind the Symantec Gateway  Security appliance inside network interface  Other networks are behind  routers or gateways     A flat network has only one subnet behind the Symantec Gateway Security  appliance  There is no router or gateway system behind the appliance                              Internet  news xyz com  169 254 1 2 169 254 10 1 169 254 10 254  Internet Router  169 254 0 254  web xyz com Aux 2 Outside  169 254 1 3 169 254 1 1 169 254 0 1    Cort LP       E OQI  Aux 1 Inside  192 
20.   compiler  kernel  and so  on  of the operating system on which the executable runs  unless that  component itself accompanies the executable     If distribution of executable or object code is made by offering access to copy  from a designated place  then offering equivalent access to copy the source  code from the same place counts as distribution of the source code  even  though third parties are not compelled to copy the source along with the  object code     You may not copy  modify  sublicense or distribute the Program except as  expressly provided under this License  Any attempt otherwise to copy   modify  sublicense or distribute the Program is void  and will automatically  terminate your rights under this License  However  parties who have received  copies  or rights  from you under this License will not have their licenses  terminated  so long as such parties remain in full compliance     You are not required to accept this License  since you have not signed it   However  nothing else grants you permission to modify or distribute the  Program or its derivative works  These actions are prohibited by law if you do  not accept this License  Therefore  by modifying or distributing the Program   or any work based on the Program   you indicate your acceptance of this  License to do so  and all its terms and conditions for copying  distributing or  modifying the Program or works based on it     Each time you redistribute the Program  or any work based on the Program    th
21.   e  525 Tunnel Wizard d   J       Ss symantec  o      Introduction Remote End   Local End   To configure the remote end of your secure tunnel  you select a remote security  gateway and the protected network entity that acts as the originator of the   Remote End packets being sent or the final destination of the packets passing through the   i  YPH Policy mane  Finish Setup 1  Select an existing remote security gateway using an already configured  security gateway entity   Cancel Setup Or    Create a new remote security gateway for your tunnel     2  Select an existing network entity using an already configured network  entity   Or  Create a new remote protected entity to serve as the originator of tunnel  packets or the final destination for tunnel packets     Once your remote end selections are made  click the VPN Policy link        Figure 5 9 Remote End Screen  S2S Tunnel Wizard    2 Step 1 on the Remote End screen gives you two ways to select the remote  security gateway           By selecting an existing remote security gateway entity    By creating a new remote security gateway entity    For the network example in Figure 5 1  we will create a new remote security  gateway for the appliance called East by selecting the Create a new remote  security gateway link available in step 1  The New Security Gateway dialog  box appears  see Figure 5 10      VPN  Configure S2S tunnels using the wizard    New Security Gateway x   Name      East    Enter the IP address or a DNS resolv
22.   entry is logged to the logfile     In addition  you can filter the Signature List to view signatures by attack type   operating system  or severity     Viewing the Signature List    To view the Signature List    1 Inthe left pane  expand the IDS Components folder  and then expand the  Configuration branch     2 Click Signatures     All available signatures appear in the right pane     Intrusion Detection System  IDS   Configuring the IDS component          it rmc70    2 Symantec Raptor Management Console SGSA  Connected  IDS Components  Configuration signas      fp        Console window Help  D Ge     la x                   Action view Favorites T e   omenage    See bak 2    Enabled   Gated   attackName   AttackType  se    osna        Tree   Favorites                            Symantec Raptor Management Console vv  Vv  ASP_Download Unauthorized Access    Me    Wind  a a SGSA  Connected  Vv  M BAT_Execution_Via_HTTP Unauthorized Access    Me    Wind        Base Components lv  Vv  Bonk Denial of Service Sig    Me    Wind  E Access Controls M Vv  Cache_Cow Denial of Service Sig    Me    ALL    Virtual Private Networks Vv  Vv  Campas_CGI Unauthorized Access    Me    ALL      Monitoring Controls MM      Conflicting_tcP_Flags Suspicious Activity Si    Me    ALL  a  IDS Components Vv   v  Caokie_Monster Denial of Service Sig    Me    ALL  ofA Configuration Vv  Vv  Deep_Throat Unauthorized Access    Me    Wind  Sig lv  lv  Echo_Chargen_Loop Denial of Service Sig    Me    ALL  2i L
23.   extensions  allowing 207  propagation 222    Filter signatures   by attack severity 137   by attack type 135   by operating system 136  FireProof 214  Firewall software patches   applying from SRMC 126  Flat network 100  Front panel   features   models 5200 5300 32   using locked key pad 129  FTP   configuring for antivirus scanning 174    G    Gated signature 138  GNU general public license 262    H  HA LB  cluster properties 229  creating clusters 215  222  deleting clusters 228  implementation 232  overview 12  verifying clusters 224  VIPs 236  Heartbeat network  description 240  High Availability and Load Balancing  see HA LB  Host ID  see System ID 41  Host IP address  for SRMC 39  hosts pub file 107  defining alias 106  HTTP  configuring for antivirus scanning 174  ratings  allowing extensions and URLs 207  URL patterns 210    IDS  enabling and disabling 134  identifying signatures to detect 137  informational messages 247  LiveUpdate 139  marking signatures gated or not gated 138  monitoring 133  notifications 147  refreshing the view in the IDS Alerts Viewer  144  reports  Configuration Report 145  Executive Summary 145  running LiveUpdate on demand 141  142  scheduling LiveUpdate 140  signatures  configuring for detection 137  filtering by attack severity 137  filtering by attack type 135  filtering by operating system 136  marking gated or not gated 138  viewing additional information 139  viewing in the Signature Configuration  window 134  updating attack signatu
24.   list of sites with dialup and dynamically assigned IP addresses of mass e   mailers who spam using direct connections to their victims  mail servers  without using their ISP s mail server as a relay or gateway     76    Firewall  SMTP Wizard    SMTP Configuration Wizard xj  Completing the SMTP Configuration Wizard    The SMTP Configuration Wizard has successfully     J Modified or created rules to enable your internal mail  server to send and receive mail     In order for these changes to take effect  you must save and  reconfigure     Would you like to save and reconfigure now            No    will save and reconfigure later     To exit the wizard  click Finish            lt  Back Cancel         Figure 4 12 Completing the SMTP Configuration Wizard    14 Select the appropriate radio button to indicate whether you will save and  reconfigure the appliance now or later  then click Finish to complete the  wizard        Note  You can later change the anti spam and anti relay settings from the  SMTPD Proxy Properties page and or the individual rule properties  For  more information  see the Symantec Enterprise Firewall and Symantec VPN  Configuration Guide        Chapter       VPN    This chapter describes the use of the two tunnel wizards  S2S  site to site  and the  VPN Client  You can use these wizards to connect to remote hosts or clients  If  you would prefer not to use these wizards  refer to the procedures for configuring  secure tunnels in the Symantec Enterprise Firewall
25.  1  the  loopback interface     127 0 0 1  the  loopback interface        The antivirus scan server and  the proxy are on the same  appliance  and the scan server is  configured to accept both local  and remote connections    0 0 0 0  eth1  or eth0    The physical IP  address of the  appliance running  both the proxy and the  antivirus scan server       The proxy will request scanning  from an antivirus scan server on  a different appliance  thus  that  scan server is configured to  accept remote connections from  this appliance     0 0 0 0  eth1  or eth0    The physical IP  address of the  appliance running the  antivirus scan server       In the Antivirus scan server port number field  enter the port on which the    antivirus scan server listens     This port number must match the port number of the selected antivirus scan  server  specified in the Global_Antivirus_Configuration for that scan server     To block messages if the antivirus scan server is not available for scanning   check the Block traffic if server is unavailable check box     If you select Block traffic if server is unavailable and the proxy is unable to  contact the antivirus scan server for scanning  the proxy does not forward the  file to the intended destination  The requesting user receives an error    message     Use the Scan Options list to select how scanned files are handled       Scan and Log  When a virus is detected during scanning  a log entry is  generated  No repair is attempted  and the file
26.  2    In the left pane  expand the Antivirus Components node   Click LiveUpdate     The right pane displays LiveUpdate status information  including the date   and version number of the last successful update    Double click the status information to display the LiveUpdate Properties   page    Verify that the LiveUpdate Server field contains the domain name of the   correct LiveUpdate server  change the name if necessary    The default setting is liveupdate symantec com  In most cases  you will not   need to edit this setting    Check Enable Schedule    Do one of the following      Click Daily to run LiveUpdate every day  Select the Time to run  LiveUpdate       Click Weekly to run LiveUpdate at the same time on the same day of  every week  Select the Day of week  and select the Time to run  LiveUpdate     e Click Monthly to run LiveUpdate at the same time on the same day of  every month  Select the Day of month  and select the Time to run  LiveUpdate     Click OK     LiveUpdate runs automatically as scheduled     Configuring proxy services for antivirus scanning    The client component of the antivirus implementation is configured through the  HTTPD  FTPD  and SMTPD Proxy Services configuration  In the configuration   for each proxy service  you configure the way in which antivirus is implemented   for that proxy  When you create specific rules for a given proxy and enable    174    Antivirus Scanning    Configuring proxy services for antivirus scanning    antivirus scanning
27.  24  models 5200 5300 26   Backup files 122   Battery 243   Blacklist notification 150   Blacklistd daemon  configuring 152    Bloodhound 163    C  Change log command  executing from SRMC 127  Client program notification 152  Cluster  configuring VIPs 236  creating for hardware HA LB or file propa   gation 222  creating for software HA LB 215  preparation 215  verification 224  Wizard  deleting 214  modifying 225  using 214  Component list 15  Configuration  antivirus scanning 165  enabling antivirus scanning in a rule 183  establishing mail policies for antivirus scan   ning 186  files  backing up from SRMC 122  propagating 230  restoring from SRMC 124  gated option for IDS signatures 138  IDS signatures for detection 137  network worksheets 36  proxy services for antivirus scanning 173  Quickstart wizard 64  reports 8  Setup wizard 56  SMTP wizard 70  Connectivity    276   Index    to Gateway Security Appliance 54  verifying 108  Content  profiles  HTTP restrictions 209  restrictions 207  Content filtering 11  Content profiles 202  Custom services  configuring 8    Date and time  changing 118  Default  routes  configuring using Setup wizard 101  configuring using SRMC 101  Deleting  Executive Summary report 146  Denial of Service Attacks 8  Display  system information 42  DNS  configuring proxy 104  private file address statements 104  split level 104  Documentation  supplied 16  Domain Name 58    E   Electric shock 244   Enable disable  IDS 134    F  Factory reset 43  File
28.  3 1 Model 5110 front panel descriptions    1 The Status Indicators signal Ethernet and hard drive activity        Tx Rx  Transmit Receive  blinks when there is network traffic on  the inside interface       Link indicates an active network connection on the inside  interface     e Col blinks when a collision is detected on the inside interface       100 M indicates that 100 BaseT ethernet is being used on the inside  interface       Disk indicates hard disk activity on the hard disk drive        2 The Temp indicator blinks to indicate temperature status  blinking  slowly for temperature warnings and quickly for temperature failures  If  the Symantec Gateway Security appliance is in danger of overheating  a  log message is sent to SRMC                 Initial Setup 31  Front panel layout   model 5110    Table 3 1 Model 5110 front panel descriptions       3 The LCD screen displays the Symantec Gateway Security version  number and system health monitoring information     The LCD screen is the same on all models  Although relatively small in  size  it allows you to monitor appliance status  modify configuration  parameters  and re initialize the appliance  The displays available at the  LCD panel are as follows       System startup self tests    Performance monitoring    System menu  see Use the system menu on page 43     As the appliance boots up  the LCD displays status messages        4 The factory reset pinhole  when pressed  resets the Symantec Gateway  Security appliance i
29.  40    Initial Setup    Initial network configuration procedure    Record this password in the Network configuration worksheet on page 36  and press E to accept it     Later  you will enter this password into the SRMC login screen to begin a  remote management session between the SRMC and the appliance  After you  initially login  you can change this password through the SRMC        Note  You cannot change your passwords on the Symantec Gateway Security  appliance itself        The SRL password displays   SRL Password     xxdmmfsb  for example     Record this password in the Network configuration worksheet on page 36  and press E to accept it     Secure Remote Login enables a user on an authorized remote system to login  to the Symantec Gateway Security machine and edit Symantec Gateway  Security appliance files  reboot the machine  or perform other  troubleshooting or debugging tasks that are unrelated to normal Symantec  Gateway Security appliance operations  All remote traffic is encrypted     To make an SRL connection from an authorized client to the Symantec  Gateway Security appliance  see Connect to Symantec Gateway Security  appliance on page 54     The Root password displays   Root Password     h7vuvaxf  for example     Record this password in the Network configuration worksheet on page 36  and press E to accept it     This password is used to connect directly to the Linux OS through the serial  port     You should record this password  but Symantec recommends that y
30.  B  Console Window Help  D    H m     x                action view Favorites    e  gt  Alm BR  Se oHs Fs Sa          Tree   Favorites      Console Root    Symantec Enterprise Management is  E  Symantec Raptor Management Ce    localhost  yourdomain com    B m SGSA  Connected   B  Base Components    Loopback  rme  yourdomain com    System Features SG5A  yourdomain com      Routes    Remote Management    DNS Records    E9 Network Interfaces w    Private  Interface Private  Host Private  Host Private       Figure 6 4    3 To create a new host  right click and choose New  gt  Host     SRMC hosts list    The DNS Record Properties page appears  see Figure 6 5      SGSA  DNS Record     Properties  New     DNS Record         Specify the parameters associated with the chosen DNS    record type        Accessibility     Private      Public             Figure 6 5    Type   Name Server C Mail Server C Root Server  C Forwarder    Host C Interface  Authority C Recursion C Subnet Map  Name  Network Address    Aliases   Subnet Mask    Description     pe    Domain s  Served     DNS Record Properties page              4 Under Accessibility  select whether the Host is Private or Public        If you select Private  the data you typed is added to the hosts file  If you  select Public  the data is added to the hosts  pub file   See Provide    105    106    Routes and DNS  Configure the DNS proxy    hosts pub file information on page 107 for information on the hosts  pub  file      Under Type  selec
31.  Cluster configuration  not in sync screen  The invalid cluster is marked     b Choose another cluster member from which the cluster information will  be copied  and click Next     c Repeat until the Cluster configuration chosen screen is displayed  This  screen is read only     d Click Next to display the Completing the Wizard screen     e Click Finish to write the configuration of the selected cluster member to  all other members     Modifying a cluster    There are two reasons to modify a cluster     To make changes to the cluster configuration information and copy those  changes to all members of the cluster     To enable or disable a cluster member prior to using the Propagate option   Propagate copies the appliance configuration files from a selected appliance   s  sg directory to all enabled members of that appliance   s cluster     To access the Modify Cluster Wizard  you must be connected to at least one  cluster member     To modify a cluster    1  2  3    In the left pane  right click the cluster name   Choose All Tasks gt Modify Cluster to display the Modify Cluster Wizard   Click Next to display the Modifying a cluster screen     226    High Availability and Load Balancing  Preparing to create a cluster    You can change the cluster name and description  By default  the  Automatically connect to all disconnected cluster members check box is  checked  The modifications you make will only be copied to members that  are connected  Uncheck this check box if you do no
32.  FTP proxy for antivirus scanning    a Select ftp  from the Excluded Services list and use the  gt  gt  button to  move it to the Included Services list     b Select ftp  in the Included Services list and click Configure to display the  FTP Rule Properties page     Ftp Rule Properties 2 2  x     General Antivirus      Please specify if this rule will include antivirus scanning of FTP  traffic  Application Data Scanning has to be enabled for enabling  this option        Figure 9 5 FTP Rule Properties Page    c Click the Antivirus tab   d Check the Enable Antivirus Scanning check box   e Click OK     194 Antivirus Scanning    Enabling antivirus scanning in a rule    To configure the HTTP proxy for antivirus scanning    a Select http  from the Excluded Services list and use the  gt  gt  button to  move it to the Included Services list     b Select http  in the Included Services list and click Configure to display  the HTTP Rule Properties page     Click the Antivirus tab   d Check the Enable Antivirus Scanning check box     HTTP Rule Properties i 21x   Protocols   Restrictions   Web Proxy Antivirus    Please specify if this rule will include antivirus scanning of HTTP    traffic  Application Data Scanning has to be enabled for enabling  this option     Tl    Enable Antivirus Scanning       Figure 9 6 HTTP Rule Properties Antivirus page    e Click OK   To configure the SMTP proxy for antivirus scanning    a Select smtp  from the Excluded Services list and use the  gt  gt  button 
33.  I win beds 11 228  Viewing Cluster Properties 0 0 0    cece eee eee eee eee 11 229  Propagating appliance configuration files                  0  cee eee 11 230  HA LB Implementation          aA R EA eee eee eee eens 11 232  Three appliance cluster example           0    e cece eee eee eee 11 233  Setting Up  VIPS    aes iccd names E E E bea cease makes ne phos sweats 11 236  HALB ter Sensoren naea tue Sede ee a iitie peed a kee t8h   11 240    A Important safeguards    B IDS and antivirus scanning log messages    IDS Messages so sayceh scanned a a bret AE e the oe pile See eamnee 4 ae ee wiles TASS B 246  IDS Informational Messages          00    B 247  TDS Arts  coc kE a dais RAEE E RE EREA Cah emg  Maas Shed Saeed B 252  Antivirus scanning Messages    oss ete ee ee Fields woes side aide ee wie ate wes ee B 255    C Licenses    GNU GENERAL PUBLIC LICENSE           0 0 e eee cece eee e eee ri C 262  NO WARRANTY  geerntet a sate nett OEE vin ate eked ny Deeg ke eats C 266  SYMANTEC APPLIANCE LICENSE AND WARRANTY AGREEMENT            C 267  l     Software License  urma sce ese RRA Ae Olas Beek CNG WAAR ia C 267  2   Content Updates os rrr cena e nto ead Wl sien thet arlene AETS C 268    3  Limited  Warranty  x er r ee Gk acd oye SOTE AAEE REES C 268    6 Contents    4  Disclaimer of Damages  ererig isr cece cece eee eee eee C 270  5  U S  Government Restricted Rights          0 0    e eee eee ees C 271  6 Export Regulation  orres satiraren Ga wed eee esos Meee es C 271  PsGen
34.  Networks     Monitoring Controls     IDS Components    Antivirus Components                                  Configuring your Symantec System       QuickStart         Symantec  Gateway  Security Setup        2S Tunnel YPN Client  Wizard Tunnel Wizard       Figure 4 1       Configuring your Symantec System taskpad    2 Click the QuickStart icon in the taskpad  The Welcome to the QuickStart    Wizard screen appears  see Figure 4 2      66 Firewall    QuickStart wizard       QuickStart Wizard    Welcome to the QuickStart Wizard    This wizard will            Configure basic mail services    e     Configure rules to allow internal users to access web  and FTP services    To continue with QuickStart  click Next        Figure 4 2 QuickStart Wizard introduction    3 Click Next to begin using the QuickStart wizard        QuickStart Wizard      Configuration Options A    You have the option of configuring mail services  web and FTP services  or both  SY       Figure 4 3 QuickStart Wizard Configuration Options    Firewall 67    QuickStart wizard    4 The Configuration Options screen provides three check boxes  one to  configure mail services  one to configure web and FTP services  and one to  enable antivirus scanning in the rules for mail services and or web and FTP  services       Ifyou check Configure mail services  when you click Next  with or  without checking Enable Antivirus Scanning   the following screen  prompts you for the IP address of your mail server  Continue at step 5 
35.  Raptor Management Console icon and menu  items are added to the desktop and programs groups  Use the Symantec  Raptor Management Console icon or menu items to start SRMC     54   Initial Setup    Connect to Symantec Gateway Security appliance       Connect to Symantec Gateway Security appliance    After rebooting  you are ready to configure the Symantec Gateway Security  appliance     To connect to the Symantec Gateway Security appliance    1 Open SRMC by double clicking the shortcut icon placed on your desktop  during installation  The Console Root window opens     Expand the Symantec Enterprise Management folder     3 Click on the Symantec Raptor Management Console icon in the left pane to  access the Getting Connected taskpad  see Figure 3 10            it rmc70    Console Root  Symantec Enterprise Management Symantec Raptor Management Console  t o   oj xj  E Console Window Help  j Deh    E  j xi  l Action Yiew  Eavorites lle  gt m Ele  6    ME a 2      Tree   Favorites                  Getting Connected    C Console Root  B 7 Symantec Enterprise Management  E  Syl tec Raptor Management Console                 Done        Figure 3 10 SRMC Getting Connected taskpad window    4 Click on the New Connection icon in the Getting Connected taskpad to  display the SRMC logon screen  see Figure 3 11      Initial Setup 5  Connect to Symantec Gateway Security appliance        Symantec Raptor Management Console E 2  x    b   symantec  Welcome to the Symantec Raptor    Management Cons
36.  System taskpad appears in the right pane   If the taskpad is not visible  pull down the View menu and click Taskpad   In the right pane  start the wizard by clicking the SMTP Wizard icon     SMTP Configuration Wizard   x     Welcome to the SMTP Configuration Wizard          This wizard will        Modify or create rules that enable your internal mail      f  i  server to send or receive mail         To continue SMTP configuration  click Next        Figure 4 6 SMTP Configuration Wizard Welcome screen    Click Next     Firewall    71  SMTP Wizard      SMTP Configuration Wizard    E  Internal Mail Server L h  SMTP requests addressed to the external interfaces of the system will be directed to the i  mail server       192 246 115 48       Ej       Figure 4 7 Internal Mail Server    Enter the IP address or DNS name of your internal mail server     If you want antivirus scanning to be performed on SMTP traffic  check the  Enable Antivirus Scanning check box     Click Next     Firewall    SMTP Wizard       SMTP Configuration Wizard    Allow Internal Hosts Out if  If selected  the wizard will create rules that allow internal systems to send mail directly mal  mail servers  Otherwise rules that may have been previously created to support this option will be     removed           Figure 4 8 Allow Internal Hosts Out screen    7 Ifyou want to create a rules that will allow the internal systems to send mail  directly to external mail servers  check the Allow Internal Hosts Out check  box
37.  VIP was originally assigned to is back up   the VIP returns to it        Note  With symmetric routing turned on  sticky VIPs do not effect the node  that actually owns the connections  simply where the traffic is first seen  You  can implement your own symmetric routing by having sticky VIPs bound to  particular machines and then distribute them in a load balanced way  Then  turn asymmetric routing on and the incident node is the owner node for the  traffic        18 Click OK to process the Add a Virtual IP Address dialog box  then click OK  again to close the VIP Addresses dialog box     The VIPs you have assigned are shown in the Cluster member information  list     19 Repeat steps 15 through 18 for each subnet  then click Next to display the  final screen of the Cluster Wizard     222   High Availability and Load Balancing    Preparing to create a cluster    xl  Completing the Wizard    The New Cluster Wizard will now attempt to write the  cluster information to all members     In order for these changes to take effect  you must  reboot all the nodes to which changes were made     Would you like to reboot now           No    will reboot later     To exit the wizard  click Finish            lt  Back Cancel         Figure 11 8 Completing the Wizard page    20 Decide whether to reboot the cluster members now or later   If you choose Yes  reboot now  all appliances in the cluster will be rebooted   21 Click Finish to complete the wizard     You are returned to the SRMC  The n
38.  When all the cluster members have been added  click Next to display the  Define primary subnet and virtual IP address screen     High Availability and Load Balancing 219  Preparing to create a cluster    Create Cluster Wizard    Define primary subnet and virtual IP addresses   Choose the subnet to be used as the heartbeat or control network   Click the Edit button to specify the virtual IP addresses  VIPs  for the members of the cluster        Subnet  192 168 30 0 ns    Cluster member information         Subnet Vitus IP adcress    BB 192 168 30 0   BA 172 168 6 0   BB 192 168 1 0  m    169 10 10 0    Edit Clear All VIPs         E       Figure 11 5 Define primary subnet and virtual IP addresses page    14 Use the Subnet list to choose a subnet to be used as the controlling network   The inside network is selected by default     15 Select a Subnet from the Cluster member information list and click Edit to  display the VIP Addresses dialog box     220   High Availability and Load Balancing    Preparing to create a cluster    F Virtual IP addresses assigned to a subnet       Subnet    169 10 10 0    Virtual IP addresses        Figure 11 6 VIP Addresses dialog box    16 Click Add to display the Add a Virtual IP Address dialog box     Add a Virtual IP Address     x     Add virtual IP address for subnet 169 10 10 0    Virtual IP Address    o a    I This VIP is sticky    Preferred machine    z    ces         Figure 11 7 Add a Virtual IP Address dialog box    This dialog box allows y
39.  and Symantec Enterprise VPN  Configuration Guide  provided in PDF format        Note  In order to use VPN Client tunnels  you will need the full VPN function  crossgrade license        78    VPN    SRMC provides two tunnel wizards      2S Tunnel Wizard  Use this wizard to configure site to site  LAN to LAN   secure tunnels       VPN Client Tunnel Wizard  Use this wizard to configure tunnels to VPN  clients        Note  Before you use the tunnel wizards  you may want to configure the network  entity and security gateway building blocks that you will select for your tunnel   although the wizards do let you create these  See the Symantec Enterprise Firewall  and Symantec Enterprise VPN Configuration Guide for Network Entity  Security  Gateway  and Certificate configuration procedures        To access either of the tunnel wizards in SRMC    1 Select the system icon for the Symantec Gateway Security appliance you are  managing  The Configuring your Symantec System taskpad appears  see  Figure 4 1     2 Click on the  2S Tunnel Wizard icon or the VPN Client Tunnel Wizard icon  to begin configuring your tunnel        Note  The Symantec Gateway Security appliance can create VPN tunnels to other  Symantec Gateway Security appliances  VelociRaptor appliances  systems  running Symantec Enterprise Firewall with VPN  or to any IPsec compliant  device  It can also create tunnels to remote clients running Symantec Enterprise  VPN clients with the full VPN function crossgrade license        
40.  appliance sends  and the level of  severity that will trigger the notification        Note  IDS alerts constitute message numbers 525  550  and 575  If system  notifications are configured to notify on Warning level events  500 series events    IDS alerts will not trigger the system notification  You must create IDS  notifications to trigger notifications by severity level for IDS alerts        To configure any kind of IDS notification  1 Expand the Monitoring Controls folder and select the Notifications icon     2 Right click and choose New gt IDS Notification to create a notification that  will apply only to messages sent by the Intrusion Detection System  IDS      148 Intrusion Detection System  IDS     IDS notifications    The General tab of the Notifications Properties page is displayed  with IDS  only shown in the Type field        SGSA Notification Notification  1 Properties  New     ajx     General   Severity   Mail      Jz Please select the action and time range in which this  notification will be executed        Action    MAIL ha      Time Range  RAAN    Type  fibs only             Figure 8 4 Notifications Properties Page     General Tab    You can use the Type list to change the type of notification to a System  notification     Changing the type changes the choices available from the Action drop down  list and the options available on the Severity tab     For instructions on creating system notifications  see the Symantec Enterprise  Firewall and Symantec Enterpr
41.  battery on the system board provides power for the real time    clock and CMOS RAM  The battery has an estimated useful life expectancy  of 5 to 10 years     Power Cord    cae Important safeguards       Caution  The power supply cord is used as the main disconnect device   Ensure that the socket outlet is located or installed near the equipment and is  easily accessible           Caution  Francais  Le cordon d   alimentation sert d   interrupteur g  n  ral  La  prise de courant doit   tre situ  e or install  e    proximit   du mat  rial et offrir  un acc  s facile           Caution  Deutsch  Zur sicheren Trennung des Ger  tes vom Netz ist der  Netzstecker zu ziehen  Vergewissern Sie sich  da   die Steckdose leicht  zug  nglich ist        5 Electrical Shock    To reduce the risk of electrical shock  do not disassemble this product   Return it to Symantec when service or repair work is required  Opening or  removing covers may expose you to dangerous voltage or other risks   Incorrect reassembly can cause electric shock when this product is  subsequently used        Note  Opening the cover will void your warranty        6 Operating the unit in an equipment rack    If you plan to install the Symantec Gateway Security appliance in an  equipment rack  use these precautions       Ensure the ambient temperature around the appliance  which may be  higher than the room temperature  is within the limits specified in  Appliance models and specifications on page 13       Ensure there is
42.  connection    Ifa failure occurs on the incident node  another node in the cluster becomes the  incident node  claims ownership of the VIP  and assumes responsibility for all  new connection requests entering the cluster     Heartbeat network    An internal network that acts as the heartbeat or control network  The heartbeat  network is used by each appliance in the cluster to exchange state information  about the cluster  The heartbeat network does not have to be dedicated to  heartbeat communications only  however this a preferred configuration     Sticky node    A node in the cluster can be designated as a sticky node  If a node is marked as  sticky  and requests are currently being sent to it  requests will continue to be sent  to this node until this node is no longer available  due to a failure   If one node  gives up the sticky bit  it will jump to the next node picked to be the incident  node  and remain there until that node is no longer available  even if the first  node comes back up     Preferred node    A node in the cluster can also be designated as a preferred node  A preferred node  can be thought of as a persistent sticky node  By specifying that a node is  preferred  communication requests will always be sent to this machine when it is  available  If this machine is unavailable  another machine on the cluster will  become the incident node  but will not be marked as the preferred node  If the    High Availability and Load Balancing   241    HA LB Implementa
43.  firewall  You can protect your network immediately   even before virus definitions for the new virus have been posted        To filter mail based on attachment file size  1 In the left pane  expand the Antivirus Components node   2 Click Mail Options     3 Inthe right pane  double click MailFilter_Configuration to display the  MailFilter_Configuration Properties page     190 Antivirus Scanning    Using the mail filter options    4 Click the File Sizes tab        SGSA Mail Options    MailFilter_Configuration Properties _2  x   Maximum Mail Size   Virus Message   Invalid E mail    File Names File Sizes   Subjects   Domains      Use this page to define the sizes of attachments to be  filtered        Messages with attachments of the following size can be rejected or  the attachment can be removed from the message if the Antivirus  Scan Option for the SMTP proxy is  Scan and Delete  or  Scan and  Repa            Remove the Attachment    File size    Bytes Add       Delete    Reset         Figure 9 9 Mail Filter File Sizes page    5 Select how the antivirus scan server will handle messages than contain an  attachment of a size you have specified     Your choices are           Reject the message   the antivirus scan server rejects messages that  contain an attachment of a specified size       Remove the attachment   the antivirus scan server removes any  attachments of a specified size and delivers the rest of the message   including attachments that have not been specified for rem
44.  for those rules  the antivirus settings you configure via the  Proxy Services configuration apply to the antivirus scanning for that proxy     The proxy configuration for each proxy lets you specify the following       the address and port number of the scan server that will provide scanning  services      the handling of files when the antivirus scan server is unavailable      the handling of infected files  and the types of files  by extension  that will be  submitted to the antivirus scan server for scanning    The proxies do not have to be running on the same physical appliance as the  antivirus scan server  The functionality is identical regardless of whether the  antivirus scan server is local or remote to the proxies  The proxy establishes a  TCP IP connection to the antivirus scan server and passes the file to be scanned  to the scan server  The scan server scans the file and handles it based on the  configuration settings established for that proxy     Configuring antivirus scanning for the FTP and HTTP proxies    The Proxy Services configuration you set up for FTPD or HTTPD  respectively   determines how virus scanning is implemented for all rules for which FTP or  HTTP is enabled as a service and for which antivirus scanning is enabled     To configure the antivirus settings for FTP or HTTP  1 In the left pane  expand the Access Controls node   2 Click Proxy Services     3 Inthe right pane  double click FTPD to display the FTPD Proxy Properties  page or HTTPD to d
45.  has a Symantec Gateway Security appliance that does all  the name resolution for this site  There is a protected news server on a service  network  The main networks are the private protected machines     An alternative to using the DNS proxy by itself to provide all name resolution is  to use an inside name server for inside name requests  The DNS proxy still deals  with outside requests  This is called a dual level DNS        Caution  You should understand DNS before attempting to configure the DNS  proxy  See the Symantec Enterprise Firewall and Symantec Enterprise VPN  Configuration Guide for information on DNS        Provide private DNS file address statements    The DNS private entries are stored in the Linux DNS entries hosts file  and the  public entries are stored in the hosts  pub file  Use SRMC to specify the DNS  entries as Public or Private  Private machines are intended for use by inside users  only  Their names and IP addresses are kept secret from the outside interface to  help prevent attack     You can create the DNS entries using the SRMC DNSD Properties window  For  more information  see the Symantec Enterprise Firewall and Symantec Enterprise  VPN Configuration Guide     To create the DNS entries using SRMC  1 Expand the Base Components folder in the SRMC   2 Select the DNS Records icon   The existing DNS entries appear in the right pane  see Figure 6 4      Routes and    DNS    Configure the DNS proxy       0 onsole Roo p g pto g 0 onnected    f     f  
46.  hours    7 Enter the IP address of the system that will be sending the notification    8 Enter the password of the system that will be sending the notification    9 Re enter the password to verify it    10 Click OK     Client Program notification    A Client Program notification causes the appliance to start up a designated client  program in response to an IDS alert     To configure a Client Program notification    1  2    Expand the Monitoring Controls folder and select the Notifications icon     Right click and choose New gt IDS Notifications to display the General tab of  the Notification Properties page     Choose CLIENT PROGRAM from the Action drop down list   Click the Severity tab     Check one or more of the check boxes to choose the severity level or levels for  which the notification will be triggered     Intrusion Detection System  IDS  153    IDS notifications    Click the Client Program tab        SGSA  Notification  Notification  5 Properties  New     General   Severity Client Program      j     Please select a local client program to execute for this  notification        Client Program  l       Figure 8 7 Notifications     Client Program Tab    6 Inthe Client Program field  enter the full path of the client program you  want to invoke plus any arguments     The appliance will call the program as it appears in the Name field   appending the date and contents of the message text to the end        Note  Any client program you call MUST exit upon completion  Mult
47.  in the main Logfile Viewer if  the events are not filtered out of the view     For more information about the main Logfile Viewer  see the Symantec Enterprise  Firewall and Symantec Enterprise VPN Configuration Guide     Intrusion Detection System  IDS  143    Viewing IDS Alerts in the IDS Alerts Viewer       fa tmc70    Console Root Symantec Raptor Management Symantec Raptor Management Console velociraptor  Connected   Re    Bifa  E3     T   Console window Help D S E  T   tel x     Action view    e same  E wo uns    E f 155 64 98 100 Attack Name Attack Type Time Stamp  D 2 velociraptor  Connected   Read UDP_Bomb Denial of Service Sign    08 09 2001 11 52 00  w  Base Components ji UDP_Bomb Denial of Service Sign    08 09 2001 11 52 01    G2 Access Controls UDP_Bomb Denial of Service Sign    08 09 2001 11 52 02  H  Virtual Private Networks  1 Monitoring Controls     IDS Components  8 fA Configuration  2 Signatures  sy LiveUpdate  8   Reports    Configuration Repot      Executive Summary   amp  F 3  Monitoring      August  2001     Alerts   hiers 20010808     Alerts  20010806      Alerts 2001080     Alerts  20010806    Alerts  20010808    Alerts 2001080      Alerts  2001080   o Alerts 2001080   Alerts  2001080   H H July  2001   E  FS January  2001  a  Antivirus Components                            AStart   f me70    Console Roo     2  untied  Paint   QJ Exploring   Raptor Manage       11 18AM  Figure 8 3 IDS Alerts Viewer page    When an IDS attack is detected  an entry is m
48.  of California  United States of America   Otherwise  this Agreement will be governed by the laws of England  This  Agreement and any related License Module is the entire agreement between You  and Symantec relating to the Appliance and   i  supersedes all prior or  contemporaneous oral or written communications  proposals and  representations with respect to its subject matter  and  ii  prevails over any  conflicting or additional terms of any quote  order  acknowledgment or similar  communications between the parties  This Agreement may only be modified by a  License Module or by a written document which has been signed by both You  and Symantec  This Agreement shall terminate upon Your breach of any term  contained herein and You shall cease use of and destroy all copies of the Software  and shall return the Appliance to Symantec  The disclaimers of warranties and  damages and limitations on liability shall survive termination  Should you have  any questions concerning this Agreement  or if you desire to contact Symantec  for any reason  please write   i  Symantec Customer Service  175 W  Broadway     272  SYMANTEC APPLIANCE LICENSE AND WARRANTY AGREEMENT    Eugene  OR 97401  USA  or  ii  Symantec Customer Service Center  PO BOX  5689  Dublin 15  Ireland     8  Excluded Software     The Excluded Software consists of the open source code software known as Linux  included with the Appliance  All Excluded Software is licensed under the GNU  General Public License  Version 2  
49.  on the Symantec Gateway Security appliance   access the System Menu  as described in Use the system menu on page 43  You  can also turn UPS support on from the SRMC Symantec Gateway Security Setup  wizard  which is detailed in Setup wizard on page 56        Chapter       Initial Setup    This chapter describes the procedures for configuring the Symantec Gateway  Security appliance network parameters for use with the Symantec Raptor  Management Console  SRMC   installing the SRMC  connecting the SRMC to  the appliance  and running the Setup Wizard  This chapter also describes the  various Symantec Gateway Security appliance hardware features     Symantec Gateway Security appliance has an integral LCD display located on the  front of the unit  Using the appropriate buttons  you can enter basic  configuration information into the Symantec Gateway Security appliance  as well  as monitor certain system operating parameters     30   initial Setup    Front panel layout   model 5110       Front panel layout   model 5110    The Symantec Gateway Security appliance model 5110 front panel  as shown in  Figure 3 1  contains six data entry and navigation keys and a two line x 16  character liquid crystal display area  The initial configuration of the Symantec  Gateway Security appliance takes place at the unit   s front panel  where you enter  and modify parameters such as system and network IP addresses        Figure 3 1 Symantec Gateway Security appliance model 5110 front panel    Table
50.  operations  When in monitoring mode  the Symantec Gateway Security appliance  alternately displays system information related to the health and status of the  appliance     It displays date  time  and status in this manner     Nov 14 14 00 00  System  OK    The LCD next displays system version and resource utilization information     V 1 0  running   CPU  40  Log  20     Finally  the LCD displays the network interface load information  in packets per          second    In  0 S  Out  0 S  Auxl  0 S  Aux2  0 S   Key   In   Inside Interface    eth0   Out   Outside Interface    ethl     Auxl   Auxiliary 1 Interface    eth2   Aux2   Auxiliary 2 Interface    eth3     Initial Setup   42    Use the system menu    Use the system menu    When the Symantec Gateway Security appliance is up and running  you can  access the system menu on the appliance by pressing the E button  The system  menu contains seven options  For descriptions of the buttons on the Symantec  Gateway Security appliance front panel and the functions they perform see Front  panel controls on page 34     The available System Menu options are     1    Network Setup    Use this menu option to re enter or change network settings configured  during the initial setup process  To continue to the next system menu entry   press either the down  v  arrow key or the right   gt   arrow key     Reboot    When you press E on this menu item  you are prompted to select Yes or No   No is selected by default  To reboot  use an arrow b
51.  or disable members of  a cluster when you are preparing to propagate configuration changes from  one member of a cluster to the rest of the cluster     Delete Cluster   Allows you to delete the cluster configuration information  from all the members of the cluster  This does not delete any appliances  It  removes the configuration information that associates them with a cluster     High Availability and Load Balancing   24      Preparing to create a cluster    Preparing to create a cluster    Every Symantec Gateway Security appliance to be added to a cluster must meet  the following prerequisites       All members must have the same number of configured interfaces     All members must run the same operating system version       The network configuration of all cluster members must match  every cluster  member must have IP addresses on the same subnets as the other cluster  members       Each appliance must have a different system name        HA LB must be enabled on all appliances    In addition  the IP address specified to connect to the Symantec Gateway Security  appliance must lie on the same subnet as the IP addresses specified to connect to  the other members     Before you create a cluster    Define the IP addresses of all the appliances you want to add to the cluster       Define the remote management passwords of all the appliances you want to  add to the cluster  using the SRMC     Creating a cluster for software high availability load balancing    The following pro
52.  or message is forwarded    to the intended destination     10    11    Antivirus Scanning LAL    Configuring proxy services for antivirus scanning      Scan and Delete  When a virus is detected  the infected file is deleted  no  repair is attempted   and a log entry is generated       Scan and Repair or Delete  When a virus is detected  the antivirus scan  server attempts to repair the infected file  Infected files that cannot be  repaired are deleted  and a log entry is generated for each deleted file     Use the Which file extensions to scan drop down list to select the file types  that will be sent to the antivirus scan server for scanning  The scan server  uses these lists to determine what to scan when there are container files     Your choices are       All files  All files regardless of extension are sent to the antivirus scan  server for scanning           Only those in include list  Only files with the extensions listed in the  include list are sent to the antivirus scan server  If you select this option   you can edit the Include list to add or delete file extensions  The default  Include list contains those file types considered at risk of infection       All except those in exclude list  All files except those with the extensions  listed in the Exclude list are sent to the antivirus scan server  If you select  this option  you can edit the Exclude list to add or delete file extensions   The default list includes those file types not likely to be infected        N
53.  or the final destination of the packets passing through the  tunnel   VPH Policy  Finish Setup 1  Select East  using an already configured security gateway entity   Or  Cancel Setup Create a new remote security gateway for your tunnel     2  Select finance using an already configured network entity   Or  Create a new remote protected entity to serve as the originator of tunnel  packets or the final destination for tunnel packets        Once your remote end selections are made  click the VPH Policy link        Figure 5 13 Completed Remote End screen  S2S Tunnel Wizard    The remote end of your secure tunnel is now configured     To configure the VPN Policy of a S2S Tunnel  1 Click on the VPN Policy link on the left side of the screen to display the VPN  Policy configuration page     A check mark appears beside the Remote End link to indicate completion   see Figure 5 14      ven   22    Configure S2S tunnels using the wizard                  525 Tunnel Wizard     9 symantec  o             Introduction VPN Policy   Local End   The VPN policy you select determines the privacy and integrity algorithms used for  encrypting and decrypting packets passing through your secure tunnel  There are   Remote End   several pre configured policies for you to choose from depending on the level of  security you require    VPH Policy   Finish Setup 1  Select a pre configured YPN policy for your new tunnel    Cancel Setup    Once your VPN policy selection is made  if checkmarks appear beside th
54.  regardless of extension are sent to the antivirus scan server  for scanning     Only those in include list  Only files with the extensions listed in the include  list are sent to the antivirus scan server  If you select this option  you can edit  the Include list to add or delete file extensions  The default Include list  contains those file types considered at risk of infection     All except those in exclude list  All files except those with the extensions  listed in the Exclude list are sent to the antivirus scan server  If you select this  option  you can edit the Exclude list to add or delete file extensions  The  default list includes those file types not likely to be infected        Note  The default Include and Exclude lists contain the recommended file  types to protect your network against viruses and other types of malicious  code  To minimize potential exposure to infection  use care in editing  extension lists  For maximum security  you can choose to scan all file types  regardless of extension  but be aware that performance can be impacted  during periods of peak usage        If you have selected Only those in include list from the Which file extensions  to scan list  optionally edit the Include list to add or remove file extensions   Add any additional file extensions you want to scan  Delete any extensions  that you do not want to scan       Use a semicolon     to separate file extensions     182 Antivirus Scanning    Configuring proxy services for antivirus 
55.  s outside interface  and the protected    Remote End network entity that acts as the originator of the packets being sent or the final   VPH Policy destination of the packets passing through the tunnel    Finish Setup 1  Select an existing local security gateway using an already configured  security gateway entity    Cancel Setup Or    Select a local interface to create a new local security gateway     2  Select an existing network entity using an already configured network  entity   Or  Create a new local protected entity to serve as the originator of tunnel  packets or the final destination for tunnel packets     Once your local end selections are made  click the Remote End link        Figure 5 3 Local End  S2S Tunnel Wizard    Step 1 on the Local End screen gives you two ways to select the local security  gateway           By selecting an existing security gateway        By using a local interface to create a new security gateway    For the network example in Figure 5 1  we will create the local security  gateway using the local interface     Click the local interface link available in step 1 on the configuration page to  display the pull down menu  see Figure 5 4      82   vpn    Configure S2S tunnels using the wizard    s  525 Tunnel Wizard   xi  Ss symantec  MOS UR   Introduction Local End   Local End To configure the local end of your secure tunnel  you select a local security    gateway  generally your Raptor system s outside interface  and the protected  network ent
56.  select your next  character using the same process     Passwords are limited to 8 lowercase alpha  a z  characters only        Note  If you type an incorrect character  you can either press the Cancel  button     S   or you can go back using the left arrow   lt   button  Your  selections will be erased to the point at which you want to make your  correction        Once you have correctly typed your Password  press the E button  You now  have access to the locked keypad     Once Locking is enabled  the appliance automatically locks after five  5   minutes of keypad inactivity     Chapter       Intrusion Detection  system  IDS     The IDS technology available with the Symantec Gateway Security appliance  provides dynamic network intrusion detection that transparently examines  network traffic to instantly identify  log  and terminate unauthorized use  misuse   and abuse of computer systems by internal saboteurs and external hackers  The  IDS compares individual packets from the firewall to a file of attack signatures     An attack signature is a set of rules that identifies an attacker   s attempt to exploit  a known operating system or application vulnerability  Both the header and the  payload information for each packet are examined to distinguish attacks from  legitimate traffic  In addition  with IDS  the appliance detects atomic signatures     When the IDS detects an attack  it creates a log entry in the log file on the  Symantec Remote Management Console  SRMC   With ID
57.  selecting  this item will disable the front panel controls  To unlock the LCD lock  press  any button on the front panel and enter the Root password for the appliance        Note  The front panel buttons can be locked from the SRMC  This disables  the use of the buttons until the proper password is entered using the buttons   See Use a locked keypad on page 130        Initial Setup   4      Get your license key    Get your license key    You can use the Symantec Gateway Security appliance without a license key for a  30 day grace period  At any point during those 30 days  you can contact Symantec  for a license key     To get your license key and register for support  use the online license key  generator from the Symantec licensing and registration site at  www symantec com certificate     The Symantec Gateway Security appliance comes with the Symantec Gateway  Security License Key Request and Support Registration form  This form provides  a number where you can fax your license key request in the event that you cannot  use the online method     As part of the registration process  you will also be registered for one year of Gold  support which includes technical support  content updates  and appliance  replacements     You must provide the Symantec Gateway Security appliance System ID and the  Symantec Gateway Security product software serial number whenever requesting  a license key or technical support       Obtain the System ID during the initial appliance setup procedu
58.  specify Antivirus LiveUpdate properties  m                      LiveUpdate Server   RENINERtneinerten  Run LiveUpdate Now      Status       Last Update  002   Last Updated 31 October  2001  r Schedule    J Enable schedule      Daily   Cw Day of week      Sunday      Monthly Day of month      Time  24 hour     0 00    hh mm                 Figure 9 2    AV LiveUpdate Properties Page    Verify that the LiveUpdate Server field contains the domain name of the  correct LiveUpdate server  change the name if necessary     The default setting is liveupdate symantec com  In most cases  you will not  need to edit this setting        Note  If you change the server address  you must save this information  before you proceed with step 5  After changing the server address  click OK  to close the AV LiveUpdate Properties page  then click Save and Reconfigure  on the toolbar  Open the property page again  and then proceed with step 5        Click Run LiveUpdate Now     A message notifies you that LiveUpdate has been run successfully  A logfile is  also created to show the update     6    Antivirus Scanning 173    Configuring proxy services for antivirus scanning    Click OK to close the AV LiveUpdate Properties page     Scheduling LiveUpdate to run automatically    You can schedule LiveUpdate to run on an appliance at the same time every day   the same time on a specific day every week  or at the same time on the same day of  every month     To schedule LiveUpdate to run automatically    1 
59.  specifying an Internal mail server  you are indicating where SMTP mail  addressed to the Symantec Gateway Security appliance   s external interface is  directed     When QuickStart configures access to web and FTP services  it also configures a  rule from the inside interface to the Universe  allowing all internal systems to  access HTTP and FTP services destined for anywhere  Antivirus scanning of  HTTP and FTP traffic is performed if the Enable Antivirus Scanning check box is  selected     Note  For setting up firewall configurations beyond those detailed in the  QuickStart wizard  refer to the Symantec Enterprise Firewall and Symantec  Enterprise VPN Configuration Guide  provided on the Symantec Gateway Security  CD ROM as a PDF file        Firewall    70    SMTP Wizard    SMTP Wizard    The SMTP Wizard provides a quick way to configure rules to provide anti   spamming and anti relay protection and prevent your internal mail server from  being used as a spam relay     Because SRMC automatically creates the necessary rules for SMTP service when  you use the wizard to configure your mail server  you can set up anti spamming    parameters on one particular rule created by the wizard  The rule that allows    all    systems to send mail to the internal mail server    should contain your anti spam  restrictions     To run the SMTP Wizard    1    In the left pane  click on the icon of the appliance on which you want to  perform the configuration     The Configuring your Symantec
60.  sufficient air flow around the unit       Ensure electrical circuits are not overloaded  consider the nameplate  ratings of all the connected equipment and ensure you have overcurrent  protection       Ensure the equipment is properly grounded  particularly any equipment  connected to a power strip       Do not place any objects on top of the appliance     Appendix       IDS and antivirus scanning  log messages    This appendix describes      Messages that are sent to the system log file as a result of IDS alerts     Messages sent from the Antivirus scan server as a result of antivirus scanning  Antivirus scanning is associated with two types of messages       Customizable messages that are sent to users when viruses are detected      System logfile messages    246      IDS and antivirus scanning log messages    IDS Messages    IDS Messages    IDS notifications are generated for IDS messages only and System notifications  are generated for system  non IDS  messages  All log messages events that say  they are an  IDS Alert  are used for generating IDS notifications and not used  when generating System notifications  All log messages events that do not say  they are an  IDS Alert  are used for generating system notifications and are not  used when generating IDS notifications    IDS messages may be of two types      Informational messages  message number 100      IDS alerts  message numbers 525  550  575     Both types of messages are recorded in the logfile that the system co
61.  system settings    You can change the Symantec Gateway Security appliance   s system settings from  SRMC     To change the system settings    1 Connect to the Symantec Gateway Security appliance  see Connect to  Symantec Gateway Security appliance on page 54      Select the icon of the connected appliance in the left pane   Right click and choose Properties   The appliance   s properties page opens    4 Select the System tab  see Figure 7 3      Here you can change the Symantec Gateway Security appliance system name   the domain name  and the default gateway address  You can also select to use  UPS  Uninterruptible Power Supply  support  and to enable or disable front  keypad locking  See Front panel keypad locking on page 129 for more  information     118 Management Console    Change system settings    SGSA  Connected  Properties E 2 x     General   Status   Paths   Passwords   Date Time System   License      The current system name  domain name and default gateway  AA address        System Name     foasa    Domain Name       yourdomain com    Default Gateway Address     fi 69 254 0 254       UPS Support    Stop C Start                Front Panel Keypad Locking  Disable                Figure 7 3 System settings    Make any necessary changes   Click OK     You must save and reconfigure the Symantec Gateway Security appliance for  your changes to take effect     7 Right click in SRMC   Select All Tasks  gt  Save and Reconfigure     Change the date and time    You can change t
62.  that are connected to a  Radware FireProof    device  Radware   s FireProof    is an intelligent traffic  management device for multiple firewalls and Virtual Private Network   VPN  devices  See www radware com for more information     Other third party hardware HA LB devices can be used  but are not  supported by Symantec  An option is provided to configure third party  hardware HA LB devices     Other replication   To enable the propagation of configuration files from one  appliance to other appliances  Symantec Gateway Security appliance  configuration information is stored in the var lib sg directory  When you  select an appliance in your cluster and click on Propagate  all files from that  appliance s sg directory are copied to the sg directories of enabled members  of the cluster  This allows all members of the cluster to appear as one  appliance  with the same users  network entities  rules  and all other  properties     After you have created a cluster  you can manage it by right clicking the cluster  name and choosing one of the following options from the All Tasks menu     Verify Cluster   Identifies cluster members that may not have the same  configuration and allows you to update the configuration based on a selected  cluster member     Modify Cluster   Allows you to add members to a cluster after it is created  to  delete members  to change the cluster s control network  and to change  virtual IP addresses     You can also use the Modify Cluster wizard to enable
63.  the  IP address of the router interface through which the SRMC can be reached so  that you can configure it from outside the internal network  If you do not  have a default route  but you have an SRMC on your subnet  you can add this  route later     Gateway Address     000 000 000 000  For the network in Figure 3 3  you would enter 169 254 0 254        Note  If the SRMC is behind the Symantec Gateway Security appliance and  on the same subnet  you do not have to enter a Gateway Address here  You  can move past this address without changing it by pressing E  static or default  routes can be configured at a later time        Now that Symantec Gateway Security appliance has the network  configuration information it needs to locate the managing SRMC  you must  enter the IP address of the SRMC host and make note of the passwords  Symantec Gateway Security appliance creates for remote management     Enter the SRMC host address for the SRMC host system   SRMC IP Address     000 000 000 000  For the network in Figure 3 3  you would enter 169 254 10 1       Caution  Once you enter the SRMC system IP address  the Symantec  Gateway Security appliance calculates and displays your remote management  passwords  You MUST make note of these passwords  You can change them  later  but you will need them to start the first remote management sessions  between the SRMC and the Symantec Gateway Security appliance        The SRMC password displays   SRMC Password     ltbcfetglzha  for example    
64.  the appliance   s properties page     SGSA  Connected  Properties E aixi    General   Status   Paths   Passwords   Date Time   Syster    fa Current license information   wed             License Limit  Used User Licenses  Used Server Licenses    Unlimited Users fo fo  System Id  O74BDADE    License Key   eval pvc46f3r6b63       Figure 7 5 Type a license key    3 Select the License tab  see Figure 7 5      Enter a new Symantec Gateway Security appliance license key or  if you have  a 30 day non licensed copy  enter a license key for the first time   Click OK     To save your new key  right click in SRMC  and select All Tasks  gt  Save and  Reconfigure     7 To make the license change take effect  reboot the Symantec Gateway  Security appliance     Management Console ten    Perform a system shutdown from SRMC    Perform a system shutdown from SRMC    From the SRMC All Tasks menu  you can remotely perform Symantec Gateway  Security appliance system shutdowns     To shutdown from SRMC    1 Right mouse click from within SRMC and select System Shutdown from the  All Tasks menu  see Figure 7 6      New  gt                    Disconnect  View  gt    Editor  New window from here Reconfigure  Sl   als   System Shutdown  System Reboot  Restore  Backup  Patch  SRL Client  Save All  Change Log  Import Users     Import VPN          Help    Figure 7 6 SRMC All Tasks menu    2 You are asked to confirm this shutdown     A System Shutdown brings down the Symantec Gateway Security appliance  so
65.  the end of  the subject line and search string is not ignored  For example if you specify    block  me    in a subject line     block me     will not be blocked     Note  This filter can be used during in a virus outbreak situation to further  protect your network  In the case of a new e mail born virus  if you know the  subject line or part of the subject line of the infected message  you can use this  information to block infected e mail at the firewall  You can protect your  network immediately  even before virus definitions for the new virus have been  posted        To filter mail based on subject  1 In the left pane  expand the Antivirus Components node   2 Click Mail Options     3 Inthe right pane  double click MailFilter_Configuration to display the  MailFilter_Configuration Properties page     192 Antivirus Scanning    Using the mail filter options    4 Click the Subjects tab        SGSA Mail Options MailFilter_Configuration Properties 2  x   Maximum Mail Size   Virus Message   Invalid E mail    FileNames   File Sizes Subjects   Domains      Use this page to define the subjects of mail messages to be  filtered        Messages with subject lines you enter below will be rejected if the  Antivirus Scan Option for the SMTP proxy is    Scan and Delete  or     Scan and Repair or Delete      Subject    Add      Delete    Reset      J7 Block messages with empty subject lines        Figure 9 10 Mail Filter Subjects page    5 In the Subject field  type a text string   Search s
66.  the networks that each appliance talks to must also be  configured     The second step is the setup of virtual IP address  VIPs  on the network  See  Cluster members screen on page 235     Three appliance cluster example    In this example  each of the three Symantec Gateway Security appliances uses all  four of its network ports  located on the back panel of the appliance   as shown in  Figure 11 10  to connect to the networks shown in Figure 11 11     Outside Port  Aux 2 Port Outside Network  Internal Network  Internet     192 168 1 0 24 169 254 0 0 24       Aux 1 Port Inside Port  Service Network Dedicated    172 168 6 0 24  Heartbeat   Network  192 168 30 0 24    Figure 11 10 Symantec Gateway Security appliance back panel    Each of the three appliances is configured and connected to the network in the  same way  Even if two of the appliances fail  the third appliance will pick up the  load  The three internal networks will still be secure and online  although with  diminished throughput capacity because one appliance is bearing the full  network load     234    High Availability and Load Balancing  HA LB Implementation    Internet        Router  169 10 10 1    External Network           169 10 10 4       169 10 10 2                O    S9l Z6L    Dedicated    Heartbeat      Network  192 168 30 0 24              Server Server Server    Service Network  172 168 6 0 24         Internal Network  192 168 1 0 24           192 168 1 4    192 168 10 0 24    Router  192 168 10 1
67.  the protected network entity that acts as the originator of the  packets being sent or the final destination of the packets passing through the  tunnel     Remote End  VPH Policy    Finish Setup 1  Select East using an already configured security gateway entity   Or  Cancel Setup Create a new remote security gateway for your tunnel     2  Select an existing network entity using an already configured network  entity   Or    l Subnet      to serve as the originator of tunnel packets or the final    tunnel packets     Subnet    Once yo selections are made  click the WPH Policy link           Figure 5 11 Remote protected entity pull down menu    6 Select Subnet from the pull down menu to create the 206 7 7 2 finance  subnet displayed in Figure 5 1  The New Subnet dialog box appears  see  Figure 5 12      ven   89    Configure S2S tunnels using the wizard       New Subnet       192 168 20 0             Figure 5 12 New Subnet dialog box  Remote End    7 Inthe dialog box  type a Name for your subnet entity and the IP address of  the subnet  in this case finance and 192 168 20 0     8 Click OK  your new subnet entity will be used as the remote network entity     90   vpn    Configure S2S tunnels using the wizard    s  525 Tunnel Wizard Exi  9 symantec  oo  Introduction Remote End  Local End   To configure the remote end of your secure tunnel  you select a remote security  gateway and the protected network entity that acts as the originator of the  RemoteEnd   amp  packets being sent
68.  to run LiveUpdate        For each appliance connected to the SRMC  you can     Run LiveUpdate on demand    Schedule LiveUpdate to run at a specific time    If you are using a cluster or multiple Symantec Gateway Security appliances  each  appliance must be updated separately        Note  Virus definitions are not configurable  Virus definitions are only updated  when LiveUpdate is run           Caution  If you do a factory reset of your appliance  you will loose the most  recent virus definitions and all LiveUpdate schedule information  You will have  only the virus definitions that were running on the appliance when it was first  installed and you will need to re schedule LiveUpdate     Following a factory reset  run LiveUpdate immediately to update the virus  definitions  Symantec recommends that you schedule regular LiveUpdates to  ensure that you are protected against new virus threats        Running LiveUpdate on demand    You can run LiveUpdate at any time to update the virus definitions for the  antivirus scan server     To run LiveUpdate on demand    1 In the left pane  expand the Antivirus Components node     172    Antivirus Scanning  Updating virus definitions    Click LiveUpdate     The right pane displays LiveUpdate status information  including the date  and version number of the last successful update     Double click the status information to display the AV LiveUpdate Properties  page        SGSA  A   LiveUpdate  LiveUpdate Properties    General      D Please
69. 1    IDS Messages       IDS informational messages    Explanation    There is a problem downloading the files from the LiveUpdate server  when Run LiveUpdate Now is clicked in the LiveUpdate Properties  window  This may occur if one or more of the following occurs       The appliance cannot connect to the LiveUpdate server     The files cannot be located on the LiveUpdate server       The files downloaded from the LiveUpdate server cannot be  placed in the existing directory structure       The LiveUpdate file is corrupted        User Action    Perform the following       Ensure that the server specified in the LiveUpdate Properties  window is valid       Click Run LiveUpdate Now in the LiveUpdate Properties window           Message    100 IDS Info  IDS Signature Config  Update file does not exist       Explanation    The updated sigs conf file is not found on the Symantec Gateway  Security appliance        User Action    Re enter the signature configuration changes in the SRMC GUI  and  click Save and reconfigure           Message    100 IDS Info  IDS Signature Config  IDS Signature Config  version  check failed       Explanation    The version of sigs conf attempted to be written to the Symantec  Gateway Security appliance is different from the version currently on  the appliance  Signature configuration changes are not saved on the  appliance        User Action    Re enter the signature configuration changes in the SRMC GUI  and  click Save and reconfigure           Messag
70. 100 011 192 168 6 6 192 168 1 17    Router 192 168 1 62    192 168 5 1    Server    192 168 1 22 192 168 1 1 192 168 1 2 192 168 1 3 192 168 3 65            192 168 5 2 192 168 5 3 192 168 5 4 192 168 3 10 192 168 3 11 192 168 3 12    Figure 6 1 A Routed network example    Routes and DNS 101    Setting up routes    In the example network in Figure 6 1  default route settings for the internal  network are as shown in Table 6 1     Table 6 1    Default route settings    news    169 254 1 2  SGSA aux  interface        web    169 254 1 3  SGSA aux  interface        server    192 168 1 17  SGSA inside interface        wkstl   wkst3    192 168 1 17  SGSA inside interface        wkst10   wkst12    192 168 3 85  inside router        wkst13   wkst15       Www       192 168 5 1  inside router     169 254 0 1  Internet router           Specifying the default gateway    For most installations  the default route will be your Internet router  In the  example network shown in Figure 6 1  the Symantec Gateway Security appliance  host must have the default route set to 169 254 0 254     When you first configure the Symantec Gateway Security appliance using the  setup wizard  you enter the default gateway information on the first screen  If for  some reason  the default gateway was not specified then  you can specify it by  accessing the Symantec Gateway Security appliance Properties page     To specify the default gateway    1 Select the icon of the Symantec Gateway Security appliance you are
71. 100 MB network interface card installed      Either a crossover cable to connect the Symantec Gateway Security appliance  directly to the network interface on the PC or a connection to a switch or hub  to which the appliance is attached       Note  Laptop PCs may not run the restore program properly        During the restore process  the appliance may automatically reboot itself and  perform other installation tasks  This process must be allowed to complete  without interruption for a successful restore of the appliance software to its  original factory condition  This process may take 15 minutes     To restore the appliance operating system    1 Press any button on the front panel of the appliance until the System Menu  displays on the LCD screen     Press the down  v  arrow button until the Shutdown option appears   Select the Shutdown option by pressing the E button     When prompted  turn off the power using the power switch     ao B amp B WwW N    Insert the Symantec Gateway Security CD ROM into the CD ROM drive of  your PC     6 Reboot your PC  turn off and restart  with the Symantec Gateway Security  CD in the CD drive     Initial Setup   47    Restoring the Symantec Gateway Security appliance operating system    7 Turn on the power to Symantec Gateway Security appliance using the power  switch while pressing and holding down the Select  S  button on the LCD  console     8 Continue holding down the Select  S  button until    Select Option     appears  on the LCD displa
72. 32      High Availability and Load Balancing    HA LB Implementation    HA LB Implementation         The Symantec Gateway Security appliance is a critical component of network  security  A single appliance configuration  a network without HA LB  may not be  appropriate for all situations for the following reasons       Single point of failure         Possible bottleneck   As a single point of failure  if the appliance is down  your external users no longer  have access to internal resources  and your internal users are cut off from external    networks  Although the network is still secure  it is off line until the appliance is  restored to service     Internet          Server    Service Network          Router Internal Network    Figure 11 9 Non HA LB network    One solution is to add additional appliances to your company network  Multiple  appliances can be configured to act as if they were one gateway  This is referred to  as a cluster  If one member of a cluster has a failure the others will continue to  operate and pick up the load  network traffic  of the failed appliance without any  interruption of service to the users of the network     High Availability and Load Balancing   233    HA LB Implementation    The following example depicts a three appliance software HA LB cluster  The first  step in creating this cluster is to physically setup and configure the appliances on  the network  Internal and external interfaces on each appliance must be  configured properly  and
73. 4     Store this completed form in a secure location  This form can also serve as a  permanent record for each Symantec Gateway Security appliance installed at  your site  For details on the worksheet items listed below  see Initial network  configuration procedure on page 38     Make a copy of this worksheet to record the output data     Initial Setup   37    Network configuration worksheet    Network configuration worksheet  User input during initial setup     Interface IP address       Netmask          Gateway address    SRMC address       Symantec Gateway Security appliance output during initial  setup     SRMC password             SRL  Secure Remote Login  password        Root password     System ID          1 Passwords are output during the hardware configuration process    38   Initial Setup       Initial network configuration procedure    Initial network configuration procedure    The Symantec Gateway Security appliance first prompts you to enter the IP  address of the network port that will communicate with the SRMC system that  will manage the Symantec Gateway Security appliance     To perform the initial network configuration of an appliance    1  2    Start the appliance initial setup by pressing the E  Enter  button     Choose whether the SRMC system that will manage the Symantec Gateway  Security appliance is inside  In  the network protected by Symantec Gateway  Security appliance or outside  Out  the network     SRMC location    In  Out  By default   In  is se
74. Add SRMGS  220i iarasi a ee ehh EU eke cea dle Rois elena bier 7 127  Use secure remote login 2 0    cee eee eee ARENS 7 128  Front panel keypad locking serrent Ea ccc cece eens 7 129  Us  a locked Keypads  s0i5 scoe iom cco s tamani an s van naia a alee ele 7 130  8 Intrusion Detection System  IDS   IDS  Gomponents folder lt  ic mri iaa ede edad agg eaten gate Ua wanda 8 132  GONMAUTATIOD o isi cec te donee EE Leah endo EAE RE a eee ease eo EAA 8 132  REPOTS isk i2s eGo este yee aS Hinge Ee Seeds Bak Bele O Ee AN 8 132  Monitoring dso ss geisha Peed dale dt dieters    Oa bd om wrens wf AREE 8 133  Configuring the IDS component           00    cece eee eee eee eens 8 133  Configuring IDS Signatures          0    8 134  Using LiveUpdate to update attack signatures                   0000 00  8 139  Viewing IDS Alerts in the IDS Alerts Viewer           0  sce sees cece teen eens 8 142  Updating the View in the IDS Alerts Viewer                   0200000  8 144  IDS  Reports  csc sito eee od eee be ee aia eee E Se os  RL te tee ete 8 145  Configuration Report serae 0    cece eee eee enna 8 145  Executive  SUMMALy serine eein e REE elihs Val e 8 145  MS HOt CATIONS itara r EEEE EEEO A We ae SEA 8 147  Blacklist notifications erore riean E EEE ETEA E OAA 8 150    Client Program notification ekra EAR cece eee eee eee ees 8 152    4    Contents    Mail notifications soeroep eos e E cect ncn ERA ERARA 8 153  Page notifications mseteseteni reer E ARTA E ENAA E NEA 8 155  SNMP notificat
75. Antivirus Scanning    Using the mail filter options    4 Click the Virus Message tab        a  Use this page to define the messages displayed when a virus    is detected or when a mail filter violation has occurred        Vv       The mail body will be updated with the text below if the Antivirus  Scan Option for the SMTP proxy is  Scan and Delete  or  Scan  and Repair or Delete        File Repair Message C File Remove Message  Message repaired text       ALERT  NThis e mail contained one or more infected  files   N The following attachments were infected and have  been repaired   N  N    R   NThe following infected attachments  were deleted   N    N  D NThe following infected attachments  were blocked because of Mail Policy  violations   N     N    P NYou may wish to contact the sender to  inform them about their infections     N    NThank you  NN Your  ISP  N  N             Original message text follows xl    Restore Default            Figure 9 14 Mail Filter Virus Message page    5 Check the Update Mail body check box     6 To optionally customize a message  click either the File Repair Message or the    8    File Remove Message radio button   The text of the selected message displays in the text box     Edit the message as necessary     Click OK to save your configuration     Editing the File Repair Message    SGSA  Mail Options    MailFilter_Configuration Properties 2  x   File Names   File Sizes   Subjects   Domains    Maximum Mail Size Virus Message   Invalid E mail   
76. Engines   Sex Education   Sexual Acts      Sports    Violence Profanity                  Figure 10 2 Rating Profiles Properties   Rating Profile tab    Select the Rating Profile tab     9 Inthe Allowed Ratings field  click on the name of a topic you want to include  in your profile and use the right arrow to move it to the Disallowed Ratings  field  these are topics you are planning to ban      To select multiple topics  press and hold the Shift key while clicking   10 Click OK to save your profile   The WebNOT profiles created in this way appear in a dialog window when you  select ratings  in the SRMC Rule Properties page and click the Configure       button  Ratings profiles are applied to the HTTP protocol selected in the same  rule as the ratings service     Using a ratings profile in a rule    To use a ratings profile in a rule  1 Expand the Access Controls folder     2 Select the Rules icon  right click  and choose New gt Rule   The Rule Properties page is displayed     Content Filtering 205    Using content profiles    3 Create your rule following the guidelines in the section on Rules in the  Symantec Enterprise Firewall and Symantec Enterprise VPN Configuration  Guide    Select the Services Tab     5 Select ratings  from the Excluded Services list and move it to the Included  Services list by using the  gt  gt  button     6 Click the Configure    button     The Ratings Rule Properties dialog box opens as shown in Figure 10 3  This  dialog box allows you to select an 
77. IME Type  The Denied MIME Types Properties page appears     In the text field  enter the MIME type you want to deny  using the following  format     image gif    212 Content Filtering    Using content restrictions  4 Click OK to save your entry     Repeat this procedure for each MIME type you want to restrict   To remove a MIME type  select it and press the Delete key     Chapter       High Availability and Load  Balancing    The Symantec Gateway Security appliance provides high availability and load  balancing  HA LB  features  Load balancing allows the members of a cluster to  share the work  A special case  or feature  of load balancing is referred to as high  availability  meaning that if one appliance fails  the remaining member or  members of the cluster can take over and continue to share the load     HA LB is an optional feature  You must purchase an HA LB Crossgrade License  for each appliance in a cluster  Check with your system administrator for license  requirements     214      High Availability and Load Balancing  About the cluster wizard    About the cluster wizard    The Symantec Gateway Security appliance provides a Cluster wizard to group  appliances into a cluster for three purposes     Integrated Software HA LB   To configure software high availability and load  balancing on appliances with HA LB enabled using built in clustering  functionality     Hardware HA LB   To configure hardware high availability and load  balancing on appliances with HA LB enabled
78. ING  REPAIR OR  CORRECTION     IN NO EVENT  UNLESS REQUIRED BY APPLICABLE LAW OR AGREED  TO IN WRITING  WILL ANY COPYRIGHT HOLDER  OR ANY OTHER  PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM  AS PERMITTED ABOVE  BE LIABLE TO YOU FOR DAMAGES   INCLUDING ANY GENERAL  SPECIAL  INCIDENTAL OR  CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR  INABILITY TO USE THE PROGRAM  INCLUDING BUT NOT LIMITED  TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR  LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF  THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS   EVEN  IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE  POSSIBILITY OF SUCH DAMAGES     267  SYMANTEC APPLIANCE LICENSE AND WARRANTY AGREEMENT      SYMANTEC APPLIANCE LICENSE AND WARRANTY  AGREEMENT    SYMANTEC CORPORATION AND OR ITS SUBSIDIARIES   SYMANTEC   IS  WILLING TO LICENSE THE SOFTWARE INCLUDED WITH THE  APPLIANCE YOU HAVE PURCHASED TO YOU AS AN INDIVIDUAL  THE  COMPANY  OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE  SOFTWARE  REFERENCED BELOW AS  YOU OR YOUR   AND TO  PROVIDE WARRANTIES ON THE APPLIANCE ONLY ON THE CONDITION  THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AND  WARRANTY AGREEMENT  READ THE TERMS AND CONDITIONS OF  THIS LICENSE AND WARRANTY AGREEMENT CAREFULLY BEFORE  USING THE APPLIANCE  THIS IS A LEGAL AND ENFORCEABLE  CONTRACT BETWEEN YOU AND SYMANTEC  BY OPENING THIS  PACKAGE  BREAKING THE SEAL  CLICKING ON THE  AGREE  OR  YES   BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY   REQ
79. June 1991  a copy of which is included with the  user documentation for the Appliance  The license entitles You to receive a copy  of the source code for Linux only upon request at a nominal charge  If you are  interested in obtaining a copy of such source code  please contact Symantec  Customer Service at one of the above addresses for further information     Appendix       serial Port Cable    Serial 9 Pin Cable Specifications    Use a cable the meets the following specifications to connect to the serial port of  your appliance     Table D 1 Serial 9 Pin Cable Connections                            1  lt  DCD  Data Carrier Detect   2  lt  RX  Receive Data    3  gt  TX  Transmit Data    4  gt  DTR  Data Terminal Ready   5   GND  Signal Ground    6  lt  DSR  Data Set Ready    7  gt  RTS  Request To Send    8  lt  CTS  Clear to Send    9  lt  RI  Ring Indicator              274   serial Port Cable    Serial 9 Pin Cable Specifications       A    Adding SRMCs 127  Address  configuring during first system boot 35  statements  private entries for DNS 104  transforms 8  Alerts  viewing for IDS 142  Alias 107  defining in host file 106  Antivirus scanning  configuring 165  proxy services 173  scan server 168  enabling in a rule 183  local 166  mail filter options 186  messages 255  on the Gateway Security Appliance 165  overview 10  remote 166  Asymmetric routing 241  Attack signature  update using LiveUpdate 139  using IDS attack signature 139    B   Back panel features  model 5110
80. Note  Transparent connections match against the reverse mapped DNS name of  the requested address  To allow transparent access  you must include the reverse   mapped address in the ht tpurl1s file  If reverse lookups are disabled  use the IP  address        HTTP restrictions in a rule    To specify HTTP restrictions in a rule  1 Expand the Access Controls folder and click on Rules     2 Right click and choose New gt Rule to create a new rule or double click on an  existing rule to display its Properties page     3 Click the Services tab     If http  is not listed as an included service  select it in the Excluded Services  list and use the  gt  gt  key to move it to the Included Services list     With http    selected  click Configure   5 Click the Restrictions tab  and check one or both of the following     210 Content Filtering    Using content restrictions    6      Restrict By URLs   Select this option if you subscribe to the WebNOT  service or to block designated URLs          Restrict By File Extensions   Select this option if you have entered only  specific file extensions to be allowed in the Allowed Extensions tab of the  HTTP Content Extensions Properties page     Click OK     HTTP URL patterns    HTTP URL patterning can be used to protect a web server from being accessed  illegally by the use of special characters in the incoming URL string     To prevent this from happening  the appliance includes a file named  httpurlpattern cf  This file contains a list of potent
81. O geere EE E erent eee anh E cams ataealy 1 13  Model 5200 rrisin ennn e a a ed a es 1 14  Model 5300 i saciaastace veiertaauigduled a ra cgeasie es aie bade dead wie  1 14  Components list  isc ccc cies ce ce nthaes secre ee See Lew ees eee EEEE 1 15  DOCUMENTATION isis ice sd ierra ere pho an eai EE Genre ea tom sa Re RR aa A 1 16  Checking the Hardware     sicciseiecrvitaveigin a rare EEEE RESA EET EER 1 17    2 Installation    Cautions and warnings 2 0 0 6    0  eee eee eee eee a 2 19  Stand alone hardware installation            0  cece cece e eee e eens 2 20  Rack mount instructions          0  c cece eee cent eee n eee e a E 2 22  Back panel of model  5110 cide sega rer sE ni nE E ere sete EEEE 2 24  Connect model 5110 to the network           0 0 c eee eet eee eens 2 25  Connect power cord to model 5110 0 0    kee eee eee eee 2 25  Power on the model 5110 2 0       cece cece CESE EEEE EE NEE EA 2 26  Back panel of models 5200 and 5300     1 6    cece eee eee eens 2 26  Connect models 5200 and 5300 to the network              0  cece eee ee eee eee ee 2 27  Connect the power cord to models 5200 and 5300            eee eee eee eee eee 2 27  Power on the models 5200 and 5300            cece eee e eee cece eee e eee eneee 2 28    Connect an Uninterruptible Power Supply  UPS                0  eee eee eee 2 28    2    Contents    5 VPN    3 Initial Setup    Front panel layout   model 5110 2 0    eee ccc ccc ccc eect eee eens 3 30  Front panel layout   models 5200 and 5300  
82. P proxy is  Scan  and Delete  or  Scan and Repair or Delete        Maximum size  Bytes       Figure 9 12 Mail Filter Maximum Mail Size page    5 Inthe Maximum size field  enter the maximum mail size  in bytes  that the  appliance will accept     Use a 0  this is the default value  to indicate no maximum   6 Click OK     196 Antivirus Scanning    Using the mail filter options    Rejecting invalid mail messages    Computer viruses and malicious programs sometimes create intentionally  malformed e mail messages  These distortions are recognized by the antivirus  scan server and can be used as criteria to reject potentially infected messages     To reject invalid mail messages  1 Inthe left pane  expand the Antivirus Components node   2 Click Mail Options     3 Inthe right pane  double click MailFilter_Configuration to display the  MailFilter_Configuration Properties page     4 Click the Invalid E mail tab        SGSA Mail Options MailFilter_Configuration Properties 1 2  xj  File Names   File Sizes   Subjects   Domains    Maximum Mail Size   Virus Message Invalid E mail    re Use this page to reject invalid mail messages        This option allows antivirus scanning to reject e mail that may have  been intentionally malformed by a computer virus or other malicious  program if the Antivirus Scan Option for the SMTP proxy is  Scan  and Delete  or  Scan and Repair or Delete         Figure 9 13 Mail Filter Invalid E mail page    5 Check the Reject invalid mail messages check box   6 C
83. Please enter the Blacklist information for this notification        Firewall     Port     Password     Confirm Password             Figure 8 6 Notifications     Blacklist Tab    In the Firewall field  enter the IP address of the firewall to which the Blacklist  notification will be sent     The default is the appliance where IDS is running  127 0 0 1      In the Port field  enter the firewall   s Blacklistd port number or accept the  default port 426     In the Password field  enter the password that Blacklist will use to  authenticate itself with the firewall     Record this password so that you can use it when you create the remote  management password for the blacklist daemon  as shown in the next  procedure     Re enter the password to confirm it   Click OK     152    Intrusion Detection System  IDS     IDS notifications    After you create the notification  you must configure the blacklist daemon on the  system that will receive the notification     To configure the blacklist daemon    1 Connect to the firewall that will receive the notification    2 Expand the Base Components node    3 Right click on Remote Management Passwords and choose New  gt  Remote  Management Password    4 Inthe Remote Management Password Properties page  click the Intrusion  Detection radio button   Leave the port number for intrusion detection at 426   Use the Blacklist Timeout field to specify the duration of the blacklist period   By default  this field is set to 1440 minutes  which equals 24
84. S  you can set  notification options to notify designated people in response to different levels of  alert messages detected  For more information  see IDS notifications on page  147     132       Intrusion Detection System  IDS   IDS Components folder    IDS Components folder    Configuration    Reports    The IDS Components folder consists of three branches     Configuration  Reports   and Monitoring     The Configuration option allows you to configure     Signatures    The attack signatures file shipped with the appliance contains signatures that  detect the most common network attacks  such as Denial of Service and  Buffer Overflow     The IDS component can be configured to detect attacks by signature name   then treat them as gated or non gated signatures     LiveUpdate    IDS LiveUpdate allows you to update the selected appliance with an updated  attack signatures file that contains the most current IDS attack signatures     For more information  see Configuring IDS Signatures on page 134 and Using  LiveUpdate to update attack signatures on page 139     The Reports option allows you to generate two types of reports     The Executive Summary reports provide a high level overview of the number  and severity level of attacks seen during a specified time period  daily  weekly   or monthly   Executive Summary reports are a good way to take periodic  snapshots of your overall network security     The Configuration report provides the current configuration of each attack  sign
85. Scan server  antivirus 162  Scanning  antivirus 161  Scheduling  LiveUpdate to update IDS  attack signatures 140  Secure  Remote Login  password 116    Index   279    Remote login 128  Tunnel wizards 79  95  Setup  procedure  initial 38  wizard 56  Shutdown 43  Signatures  configuration window 134  filtering  by attack severity 137  by attack type 135  by operating system 136  SMTP wizard 70  SNMP Notifications  about 157  SNMP V1 158  SNMP V2 159  Software patches  applying to the firewall 126  Split level DNS 104  SRL  client 128  password 40  SRMC  adding SRMCs 127  applying software patches to firewall 126  backing up configuration files 122  changing  date and time 118  license key 120  log command 127  system settings 117  configuring private DNS entries 104  filtering content 202  host IP Address 39  installing 48  49  LiveUpdate  running on demand 171  scheduling 171  overview  password 39  55  managing 116    280   Index    root 116  Quickstart wizard 64  restarting system 121  restoring configuration files 124  root password 40  Secure Remote Login  SRL  116  Setup wizard 56  SMTP wizard 70  system shutdown 121  Static routes  setting 100  Status indicators  100 M 30  32  active connection 32  Col 30  32  Disk 30  32  hard disk drive 32  Link 30  32  Temp 30  32  traffic 32  Transmit Receive 30  32  Web activity 32  Sticky node 240  Striker technology 164  Symantec Gateway Security Models  5110 13  5200 14  5300 14  Symantec Raptor Management Console  see SRMC  Syma
86. Symantec Gateway  Security Appliance    Installation and Configuration Guide  February 19  2002     gt   symantec     Models 5110  5200 and 5300    Part Number  16 30 00030    The software described in this book is furnished under a license agreement and  may be used only in accordance with the terms of the agreement     Copyright notice    Copyright    1998 2002 Symantec Corporation   All Rights Reserved     Any technical documentation that is made available by Symantec Corporation is  the copyrighted work of Symantec Corporation and is owned by Symantec  Corporation     Portions copyright  c  eHelp Corporation  All rights reserved     No warranty    The technical documentation is being delivered to you AS IS and Symantec  Corporation makes no warranty as to its accuracy or use  Any use of the technical  documentation or the information contained therein is at the risk of the user   Documentation may include technical or other inaccuracies or typographical  errors  Symantec reserves the right to make changes without prior notice     No part of this publication may be copied without the express written permission  of Symantec Corporation  20330 Stevens Creek Blvd   Cupertino  CA 95014     Trademarks    Microsoft  MS DOS  Windows  and Windows NT are registered trademarks of  Microsoft Corporation  IBM  OS 2  and OS 2 Warp are registered trademarks of  International Business Machines Corporation  Novell and NetWare are registered  trademarks of Novell Corporation  3Com and Ethe
87. T    B use the Restore Software solely to restore the Appliance to its original factory  functionality in the event the Software preloaded on the Appliance is  corrupted or becomes unusable     C make copies of the printed documentation which accompanies the Appliance  as necessary to support your authorized use of the Appliance  and    D after written notice to Symantec  in connection with a transfer of the  Appliance  transfer the Software on a permanent basis to another person or  entity  provided that you retain no copies of the Software  Symantec consents  to the transfer and the transferee agrees in writing to the terms of this  agreement     You may not     A sublicense  rent or lease any portion of the Software  reverse engineer   decompile  disassemble  modify  translate  make any attempt to discover the  source code of the Software  or create derivative works from the Software     B use the Restore Software for any purpose other than to restore the Appliance  to the original factory functionality     C use  if you received the Software distributed on an Appliance containing  multiple Symantec products  any Symantec software on the Appliance for  which you have not received a permission in a License Module  or    D use the Software in any manner not authorized by this license     2  Content Updates     Certain Symantec software products utilize content that is updated from time to  time  antivirus products utilize updated virus definitions  content filtering  product
88. There may be a memory leak    User Action Reboot the appliance and contact Customer Support    Message 343 Antivirus Warning  Parsing extension  Restoring default of  Scan All Files   Explanation There may be a memory leak    User Action Restart your machine and call tech support    Message 343 Antivirus Warning  Scanner required by rule but not  configured   Explanation The proxy is configured to scan files  but does not have an IP  address for the antivirus scan server    User Action Check the server setting in antivirus scan server IP address    Message 343 Antivirus Warning  Failed to open control socket    343 Antivirus Warning  Failed to connect to the antivirus scan  server due to  lt error   gt        258 IDS and antivirus scanning log messages    Antivirus scanning messages    Table B 6 Antivirus scanning messages  Explanation There was an error opening the connection or initializing the    connection to the antivirus scan server        User Action Check to make sure the antivirus scan server is running and  listening  Also make sure the configuration variables are correct   The proxy will block the connection if configured to do so           Message 343 Antivirus Warning  Buffer overflow on file name    343 Antivirus Warning  Buffer overflow on headers       Explanation The filename or header given to the antivirus scan server interface   for a particular transaction  is too long and will cause a buffer  overflow  This could be an attack  The proxy will block the  c
89. UESTING A LICENSE KEY OR USING THE SOFTWARE AND THE  APPLIANCE  YOU AGREE TO THE TERMS AND CONDITIONS OF THIS  AGREEMENT  IF YOU DO NOT AGREE TO THESE TERMS AND  CONDITIONS  CLICK ON THE  I DO NOT AGREE  OR  NO  BUTTON IF  APPLICABLE AND DO NOT USE THE SOFTWARE AND THE APPLIANCE     1  Software License     Except for the software  if any  described in the Excluded Software section at the  end of this agreement  the   Excluded Software    the software  the  Software    which accompanies the appliance you have purchased  the  Appliance   is the  property of Symantec or its licensors and is protected by copyright law  While  Symantec continues to own the Software  you will have certain rights to use the  Software after your acceptance of this license  This license governs any releases   revisions  or enhancements to the Software that the Licensor may furnish to you  as well as the copy of the Software provided to you on a CD ROM or other media  in connection with the Appliance  the  Restore Software    Except as may be  modified by a Symantec license certificate  license coupon  or license key  each a   License Module   which accompanies  precedes  or follows this license  your  rights and obligations with respect to the use of this Software are as follows     You may     A use the Software solely as part of the Appliance for no more than the number  of users as have been licensed to you by Symantec under a License Module     268  SYMANTEC APPLIANCE LICENSE AND WARRANTY AGREEMEN
90. User Action Perform the following       Ensure that the server specified in the LiveUpdate Properties  window is valid       Either click Run LiveUpdate Now in the LiveUpdate Properties  window  or allow LiveUpdate to run as scheduled to update the  files on the appliance           Message 100 IDS Info  IDS LiveUpdate  IDS LiveUpdate process completed   failed merge       Table B 3    IDS and antivirus scanning log messages 249    IDS Messages       IDS informational messages                                                    Explanation The downloaded sigs conf file cannot be merged with the existing  sigs conf file  This may occur if one or more of the following occurs     There is a mismatch in the signature order in the downloaded file     There is a mismatch in the field count for one or more signatures   in the downloaded file    User Action Run LiveUpdate again    Message 100 IDS Info  IDS LiveUpdate  IDS LiveUpdate process completed and  new module installed   Explanation All files were downloaded and installed successfully    User Action None    Message 100 IDS Info  IDS LiveUpdate  IDS LiveUpdate process completed   module load failed   Explanation The downloaded IDS kernel module  ids o  file cannot replace the  existing file  no module installed    User Action Contact Customer Support    Message 100 IDS Info  IDS LiveUpdate  IDS LiveUpdate process completed  files  out of sync   Explanation The version numbers of the downloaded IDS kernel module  ids o   and the s
91. VIP addresses have been modified  click Next to display the final  wizard screen     If the cluster you are modifying is a software HA LB cluster  you will be  prompted to reboot so that the modifications you have made can be  registered     On the Completing the Wizard screen  click Finish to write the modified  cluster configuration to all files in the cluster     To access the Delete Cluster Wizard  you must be connected to at least one cluster  member     Note  The process of deleting a cluster does not delete any appliances  It simply  removes the configuration information that associates them into a cluster        To delete a cluster    1  2  3    In the left pane  right click the cluster name   Choose All Tasks gt Delete Cluster to display the Delete Cluster Wizard   Click Next to display the Deleting a cluster screen     By default  the Automatically connect to all disconnected cluster members  check box is checked  The cluster can only be deleted if all members are  connected so that the cluster information can be deleted from them     Click Next       Ifthe option to automatically connect was checked  the wizard connects  to all cluster members  and then displays the Completing the Wizard  screen     High Availability and Load Balancing   222    Preparing to create a cluster      Ifthe option to automatically connect was not checked on the previous  screen  the Connect to cluster members screen is displayed to allow you  to connect     Enter the password and  if nec
92. able name for your  new Security Gateway       206 7 7 2     Authentication method     Certificate    C Shared Key       Note that both gateways of a tunnel must be using the same  authentication method  and the same shared secret if using it               Cancel         Figure 5 10 New Security Gateway dialog box  Remote End    In the dialog box  type a Name and an IP address for your remote gateway  In  this case  East and 206 7 7 2  Also  decide which authentication method is to  be used  see Figure 5 10   In this example  we have selected Certificate for  authentication     For details on authentication  see the Symantec Enterprise Firewall and  Symantec Enterprise VPN Configuration Guide     Click OK  the name of your new security gateway will be used as the Remote  Security Gateway     Step 2 of the Remote End screen gives you two ways to specify the remote  originator or endpoint for tunnel packets       By selecting an existing network entity     By creating a new protected network entity    In this case  we will create a new entity to represent the remote finance subnet  displayed in Figure 5 1     From the second part of step 2  select the Create a new remote protected  entity link  A pull down menu appears  see Figure 5 11      87    88   vpn    Configure S2S tunnels using the wizard       525 Tunnel Wizard xi    i   symantec  o   __   Introduction Remote End  Local End 7 To configure the remote end of your secure tunnel  you select a remote security    gateway and
93. achments were blocked because of Mail  Policy violations      lt list of blocked files gt     You may wish to contact the sender to inform them about  their infections     Thank you     Your ISP    200    Antivirus Scanning    Using the mail filter options    The following variables can be used to customize File Repair Message text        Table 9 3 Variables used to customize the File Repair Message  oN Moves to the next line    R Displays a list of all infected attachments for a given message that have    been repaired        HD Displays a list of all infected attachments for a given message that have  been deleted because they could not be repaired       a Displays a list of all infected attachments for a given message that were  identified  whether deleted or repaired        P Displays a list of all attachments that were blocked because of a mail  policy violation       Editing the File Remove Message    The File Remove Message is placed in a text file called infection txt and attached  to an e mail message in place of an infected attachment that is deleted because it  cannot be repaired  The file remove message is used only to replace an  attachment that is removed because it contains a virus and not when the  attachment is removed because of a mail policy violation     To edit this message  simply change the text  Message text as it appears to the  user     A file was removed because it contained malicious code  that could not be removed        Chapter       Content Filt
94. address and clicking Delete     224    High Availability and Load Balancing  Preparing to create a cluster    11 Enter the IP address  password  and management port of another appliance  and click OK     The new member s IP address is added to the Cluster members screen and  your connection is verified     12 Repeat Steps 10 and 11 for each cluster member to be added     13 When all the cluster members have been added  click Next to display the final  screen of the Cluster Wizard     14 Click Finish to complete the wizard     You are returned to the SRMC  The newly created cluster appears as an icon  in the left pane  By expanding it  you can see the members of the cluster     If you created a Hardware HA LB cluster the cluster is ready to be connected a  Radware FireProof    device  Radware   s FireProof    is an intelligent traffic  management device for multiple firewalls and Virtual Private Network  VPN   devices  See www radware com for more information     Verifying a cluster    Verifying a cluster allows you to be sure that the cluster configuration  information is identical on all cluster members  For example  if a machine was  down when you last made changes  it may not have the latest cluster  configuration information     If your cluster members do not have identical cluster information  the Verify  Cluster wizard allows you to choose a cluster member so that its configuration  can be copied to all other members     To verify a cluster   1 Connect to a member of th
95. ade in the file named  logfile YYYYMMDD  where YYYYMMDD represents the year  month  and day the  log was created  These attacks appear in the IDS Alerts Viewer when you access  that file via the IDS Monitoring node     New log messages appear at the bottom of the window  scrolling up previous log  messages  The SRMC automatically updates the view of the current logfile every  15 seconds while the IDS Alerts Viewer is open     Logfiles are managed using a program called changelog  For more information   see Manage log files on page 127     You can view additional information about each entry in the IDS Alerts Viewer  by double clicking on an event     For more information  see Viewing additional information for a signature on  page 139     144    Intrusion Detection System  IDS   Viewing IDS Alerts in the IDS Alerts Viewer    To view IDS events in the Alerts Viewer    1    In the left pane  expand the IDS Components branch  and then expand the  Monitoring branch     Expand the folder that contains the alerts that you want to view   Click the alerts icon for the file that you want to view     The most current events in the selected log appear in the right pane  An entry  appears for each IDS logfile entry  The information includes     Severity  The assigned severity of the attack  levels are High  Medium  and  Low     Attack Name  The name of the attack signature    Attack Type  The type of attack    Timestamp  The time the attack was logged on the appliance    Source IP  The s
96. all the nodes in the cluster     To propagate appliance configuration files   1 Associate the appliances protecting your network into a cluster  See Creating  a cluster for appliance file propagation or hardware HA LB on page 222   Make your changes to a selected appliance system in the cluster     Decide whether to propagate appliance configuration files to all members of  the cluster  or to disable some cluster members so that their configuration  files remain unchanged  See also Modifying a cluster on page 225        Note  Symantec recommends that you propagate to all cluster members        4 In the left pane  click on the icon of the appliance where changes have been    made     High Availability and Load Balancing   231    Preparing to create a cluster    Right click and choose All Tasks gt Propagate  or display the Action menu and  choose All Tasks gt Propagate     A message box asks if you are sure you want to propagate  Click Yes   The Result of configuration propagation status box is displayed     For each appliance in the cluster  the appliance service is temporarily stopped  so that the configuration files can be copied to the appliances     The status box displays the following messages as the backup file from the  source appliance is restored     Processing Wait     Updating SRMC view Wait     Restarting Services Wait       Propagation Done    When the configuration has been propagated to all enabled members of the  cluster  click OK to close the status box     2
97. another machine        Click OK     Management Console    126    Apply patches to the Symantec Gateway Security software    Apply patches to the Symantec Gateway Security  software    Patches or hot fixes may be provided for your existing Symantec Gateway  Security software  The Patch option  available from the SRMC All Tasks menu   see Figure 7 6   lets you  push  a patch from the SRMC machine to the  Symantec Gateway Security appliance     To apply a patch    1 Once you have downloaded the patch   tgz file  from the Symantec Web site  to your SRMC machine  you can select All Tasks  gt  Patch from within SRMC     Open System Software Patch    E 2 x   Look in    SY Security JJe    ey E        a  vc 3des 1 0 326 install    Files of type   System Patch    tgz  M  Cancel    4       Figure 7 9 Open System Software Patch page    2 The SRMC prompts you to browse to the patch on your local system   3 When you locate the patch  select Open     The patch unpacks and installs to the Symantec Gateway Security appliance        Note  Once the patch or hot fix is applied  the Symantec Gateway Security  appliance automatically reboots and the SRMC disconnects from the appliance        Management Console 12    Manage log files    Manage log files    When a logfile exceeds a certain size  default 200MB   the system automatically  starts another logfile by running the Changelog command  This prevents a  single logfile from exhausting the available disk space  Through SRMC  you can  perform a m
98. anual Changelog command on the Symantec Gateway Security  system to rollover the current logfile to the  oldlogs directory  For more  detailed information on Changelog  see the Symantec Enterprise Firewall and  Symantec Enterprise VPN Guide  provided as a PDF file     To perform a manual ChangeLog command   1 Select All Tasks  gt  ChangeLog from within SRMC  see Figure 7 10                     New  gt    Disconnect  View  gt  Editor  Anangelcons    Save and Reconfigure  Line up Icons Stop  Help System Shutdown        System Reboot  Restore  Backup  Patch  SRL Client    Save All   Change Log  Import Users     Import YPN            Figure 7 10 ChangeLog menu    2 The current logfile is placed in the  oldlogs directory and named  according to the SRMC logfile dating convention     For example 2002315  Mar  15  2002   A new logfile is then started     Add SRMCs    The appliance can be managed by more than one SRMC  although not at the  same time  To configure remote management by another SRMC  follow the  instructions in Managing passwords on page 114  Be sure to type the IP address  of the new Remote Host in the appropriate field     You can then connect to this appliance with an SRMC with that specified address   Type the appropriate hostname and password into the login window     128      Management Console  Use secure remote login    Use secure remote login    Secure Remote Login lets a user on a machine with SRMC to login to the  Symantec Gateway Security appliance and revie
99. appliance  SNMP management stations  that receive alerts from the appliance must have this information incorporated  into their MIBs     To support this configuration task  the Symantec Gateway Security appliance  distribution CD includes MIB files for SNMPv1 and SNMPv2 alerts  Their  locations are     Table 8 1 SNMP Notification MIB Files  snmpvl mib Symantec Gateway Security CD ClientSoftware snmp        snmpv2 mib Symantec Gateway Security CD ClientSoftware snmp        158    Intrusion Detection System  IDS     IDS notifications    Configuring an SNMPV1 notification    Before you begin to create a notification  contact the system administrator of the  SNMP device to which you want to send the notification to get the host name and  port number of the SNMP device  and a value for the Community field     To configure an SNMP V1 notification    1  2    Expand the Monitoring Controls folder and select the Notifications icon     Right click and choose New gt IDS Notifications to display the General tab of  the Notification Properties page     Choose SNMP V1 from the Action drop down list   Click the Severity tab     Check one or more of the check boxes to choose the severity level or levels for  which the notification will be triggered     Click the SNMP V1 tab        SGSA Notification Notification  7 Properties  New  2  x     General  Severity SNMP v1    ag    Please enter the SNMP v1 information for this notification        Host     Port  162 4  Community        Figure 8 10 No
100. ate a new cluster screen     Create Cluster Wizard x    Create a new cluster  Specify a name and description for the cluster   Select the type of the cluster         Name  SGSA_Clusterl  Description   Software HALB Cluster     Specify the type of the cluster     Integrated Software HA LB      Hardware HA LB      Other replication               lt  Back Cancel       Figure 11 2 Create a new cluster wizard screen    High Availability and Load Balancing aie    Preparing to create a cluster    Enter a name and description for the cluster   Click the Integrated Software HA LB radio button     Click Next to display the Cluster members screen     Create Cluster Wizard a x     Cluster members  Use the buttons to Add or Delete cluster members   Use the checkboxes to enable or disable the propagation of configuration  files to cluster members        Cluster members        IP Address             Figure 11 3 Cluster members screen    7    To add the first member to the cluster  click Add to display the Connect to  cluster member dialog box     Symantec Raptor Management Console   2  x     Connect to cluster member    IP Address  az A  Password     Management Port  418 4     Z Obtain read write access upon connecting    cove         Figure 11 4 Connect to cluster member dialog box    218    High Availability and Load Balancing  Preparing to create a cluster    10    11    12  13    Enter the IP address of the appliance that will be the first cluster member   and the password and port numb
101. ature  along with configuration information for LiveUpdate for the  selected appliance     For more information  see IDS Reports on page 145     Intrusion Detection System  IDS  133    Configuring the IDS component    Monitoring    The Monitoring option provides information on all network attack attempts  detected by the IDS component  As the IDS component detects attacks  that  information is written to a log file  which is accessed through the SRMC     Click the Alerts icon in the SRMC Tree to see the list of files available  You can set  up a filter to sort through the data collected in a logfile  This feature can be very  handy if you want to locate information on attacks of specific severity levels in  large logfiles  For more information about viewing alerts  see Viewing IDS Alerts  in the IDS Alerts Viewer on page 142     The alerts list has the same structure as system logfiles  which can be viewed by  opening the Monitoring Controls folder in the left pane and choosing the Logfiles  option  For more information about system logfiles  see the Symantec Enterprise  Firewall and Symantec Enterprise VPN Configuration Guide     Configuring the IDS component    The IDS component is enabled or disabled during the initial appliance setup  The  initial default is for the IDS component to be enabled  For more information  see  Setup wizard on page 56     After the initial appliance setup  you can enable or disable the IDS component in  the SRMC  For more information  see the fo
102. ber to participate in the propagation of appliance  configuration files     When you have completed all changes to the cluster member screen  click  Next     10    High Availability and Load Balancing   227    Preparing to create a cluster      Ifthe cluster is not an HA LB cluster  the final screen of the wizard is  displayed  Go to Step 13       Ifthe cluster is an HA LB cluster  the Define primary subnet and virtual  IP addresses screen is displayed  Complete steps 7 through 12     To change the subnet that is selected to act as the heartbeat network  click  Clear All VIPs  then use the Subnet drop down list to select a different  subnet  You must then create virtual IP addresses  VIPs  for all subnets     To change or create a VIP  select a subnet in the Cluster member information  list and click Edit to display the VIP Addresses dialog box     The VIP Addresses dialog box provides the following options      Select an existing VIP and click Edit to edit it or Delete to delete it     To add anew VIP  click Add    Clicking Add or Edit displays the Add a Virtual IP Address dialog box   Complete the Add a Virtual IP Address dialog box as follows     Note  Symantec recommends that the VIP address is higher than the  physical IP address of the nodes in the cluster          Enter a Virtual IP Address for the cluster member without doing  anything else in this dialog box       This creates a normal VIP that is free to participate in load balancing  It  does not have any sort of s
103. cedure describes how to create a cluster for software or  hardware high availability and load balancing  HA LB      An HA LB cluster can also be used to propagate appliance configuration files  from one cluster member to all other enabled members of the cluster  See  Creating a cluster for appliance file propagation or hardware HA LB on page  222     Before you create the cluster  make sure that the IP addresses and passwords of all  the appliances you want to add to the cluster have been defined on all the  appliances that will be added to the cluster     To create a software HA LB cluster    1 Click the Symantec Raptor Management Console icon to display the Getting  Connected taskpad in the right pane     If the Taskpad is not displayed  pull down the View menu and choose  Taskpad     216 High Availability and Load Balancing    Preparing to create a cluster    2 Click the New Cluster icon to display the Create Cluster Wizard    create ruster wizara x    Welcome to the Cluster Create Wizard     This wizard will   e Define members of a cluster        e Define the heartbeat subnet and virtual IP addresses  assigned to the cluster            Enable or disable the members of the cluster  During  propagation of configuation files other than the cluster  configuration files  the disabled members will be  ignored     To continue with creation of the cluster  click Next     fa                    Figure 11 1 Create Cluster wizard Introduction screen    3 Click Next to display the Cre
104. cific extensions that you designate  For example  you may wish to allow  access only to HTML and graphics files to better control the types of data  transferred through your Internet connection        Caution  This service limitation is very restrictive  since all file extensions not  listed in the file are denied by the host system        To create a list of allowable filename extensions for HTTP rules  1 Expand the Access Controls folder   Select the Content Profiles folder in the SRMC and double click to expand it     2 Select the HTTP Document Content icon  Right click and select  New gt Extension to display the Extensions Properties page  as shown in  Figure 10 4     208 Content Filtering    Using content restrictions    SGSA HTTP Content Extension 1 Properties  New  HE    Allowed Extensions      Please enter the file extensions in web documents that are  allowed to be viewed   Example   gif        i    A Caution  All other extensions found will be restricted  The  information entered here pertains to rules that use the http  service        Figure 10 4 HTTP Content Extension Properties Page    3 In the provided field  enter the extensions you wish to allow  for example  gify txt      Enter several extensions at once  separated by a space or enter one at a time   Any extensions not listed are then disallowed if you create a rule that restricts  the HTTP proxy by file extensions     4 When finished  click the OK button in the properties page     Allowing URLs    For ordina
105. ck the LiveUpdate node   The information for the last LiveUpdate session appears in the right pane   3 Double click the entry in the right pane     In the IDS LiveUpdate Properties window  verify the entry in the LiveUpdate  Server field  change if necessary     141       Note  If you change the server address  you must save this information  before you proceed with step 5  After changing the server address  click OK  to close the IDS LiveUpdate Properties page  then click Save and  Reconfigure on the toolbar  Open the property page again  and then proceed  with step 5        5 Click Run LiveUpdate Now     A message notifies you that LiveUpdate has been run successfully     on Intrusion Detection System  IDS     Viewing IDS Alerts in the IDS Alerts Viewer    6 Click OK in the LiveUpdate status window to close the LiveUpdate Properties  page     Disabling the LiveUpdate scheduler    You can disable the LiveUpdate scheduler at any time     To disable the LiveUpdate scheduler    1 In the left pane  expand the IDS Components branch  and then expand the  Configuration branch     2 Click the LiveUpdate node   The information for the last LiveUpdate session appears in the right pane   Double click the entry in the right pane   In the IDS LiveUpdate Properties window  uncheck Enable Schedule    5 Click OK     Viewing IDS Alerts in the IDS Alerts Viewer    IDS attacks are logged in the logfile and appear in the IDS Alerts Viewer  IDS  alerts and other informational messages can appear
106. ckmark appears next to the link  When you ve finished  Finish Setup configuring all the required elements  click the Finish Setup link to save your    secure tunnel   Cancel Setup    A secure tunnel configuration requires that you set up the following   e Local End       Remote End  e PN Policy    Click the corresponding links on the left to begin        Figure 5 2 Introduction screen  S2S Tunnel Wizard    As the Introduction screen explains  see Figure 5 2   click on the links on the left  side of the screen to configure the corresponding component of the tunnel  It is  suggested that you follow the links in the order they appear  starting with Local  End     In the various wizards screens  you are asked to select a combination of security  gateways  network entities  and users with which to build your tunnel  If you have  not configured these tunnel components before beginning the wizard  you can  create a new security gateway  network entity  or user from within the wizard     To configure the Local End of a S2S tunnel using the S2S tunnel wizard    1 From the wizard Introduction page  click on the Local End link on the left  side of the screen     The Local End configuration page appears  see Figure 5 3      vpn   84    Configure S2S tunnels using the wizard    t  525 Tunnel Wizard xi    b   symantec  O             _   _  Introduction Local End  Local End To configure the local end of your secure tunnel  you select a local security    gateway  generally your Raptor system
107. cluster for propagation of configuration files only  click  Other replication     Click Next to display the Cluster members screen as shown in Figure 11 3     To add the first member to the cluster  click Add to display the Connect to  cluster member dialog box  as shown in Figure 11 4     Enter the IP address  password and management port number of the first  cluster member        Note  The Obtain read write access upon connecting check box is grayed  out and can not be edited  When the Cluster Wizard attempts to connect you  to an appliance  you must have read write access to add the appliance to the  cluster     Click OK   The Cluster wizard attempts to connect to the appliance     If this is the first time this appliance is being added to a cluster  the  Cluster members screen is re displayed  showing the IP address of the  appliance and verifying that you are connected     If the appliance is already a member of a cluster  a message asks if you  want to read the existing information for the appliance     If you click Yes  the name and description of the cluster to which the  appliance belongs replaces the name and description you provided in  Step 4  since the appliance can only belong to one cluster  The Cluster  members screen is displayed  showing the members of the appliance s  cluster     To add a new member to the cluster  click Add to display the Connect to  cluster member dialog box     You can also delete an existing member from the cluster by selecting the IP  
108. configuration     Configuring antivirus scanning for the SMTP proxy    The Proxy Services configuration you set up for SMTPD determines how virus  scanning is implemented for all rules for which SMTP is enabled as a Service and  for which antivirus scanning is enabled     To configure the antivirus settings for SMTP  1 In the left pane  expand the Access Controls node   2 Click Proxy Services     3 In the right pane  double click SMTPD to display the SMTPD Proxy  Properties page     4 Click the Antivirus Scanning tab     Antivirus Scanning 179    Configuring proxy services for antivirus scanning    Use this tab to control the behavior of virus scanning     SGSA  Services SMTPD Properties       Status   Timeout   Flow Control   Antispam l Trace l  Smart Server   ODMR Antivirus Scanning     amp  This setting controls the behavior of virus scanning        CarierScan Server IP address     CarrierScan Server port number        Block traffic if server is unavailable    Scan Options   Scan and Repair or Delete x   Which file extensions to scan    Only those in include list x   Include list         386   adt  arj   amg  bin  cab  cbt  cla  com  cpl  dll  doc  dot  drv  eml  e    Restore include list defaults  Exclude list     pe o       Figure 9 4 SMTPD Properties     Antivirus Scanning Tab    In the Antivirus scan server IP address field  enter the IP address of the  antivirus scan server that will be used to scan for viruses     180 Antivirus Scanning    Configuring proxy services 
109. configurations beyond those detailed in this chapter  refer  to the Symantec Enterprise Firewall and Symantec Enterprise VPN Configuration  Guide  provided on the Symantec Gateway Security CD ROM as a PDF file     64   Firewall    QuickStart wizard    QuickStart wizard    Use the QuickStart wizard to quickly set up your mail  FTP  and web services on  the firewall of the Symantec Gateway Security appliance     After you connect to the Symantec Gateway Security appliance  the configuration  taskpad appears in the right pane  Click on the QuickStart icon  see Figure 4 1   to access the QuickStart wizard  You can re run the wizard to make changes at  any time by selecting the Symantec Gateway Security appliance system icon in the  left pane  If you have taskpads turned on  the configuration taskpad containing  the QuickStart wizard icon will appear in the right pane     The QuickStart wizard gives you two firewall configuration options     Configure mail services     The Symantec Gateway Security appliance   s secure Simple Mail Transfer  Protocol  SMTP  proxy   SMTPD  enables you to pass SMTP mail by  application proxy  SMTPD supports transparent addressing  allowing  authorized internal systems to contact external systems directly  It also  checks all traffic entering and leaving your domain for known sendmail  attacks  and it uses heuristics to detect and record new types of attacks  The  QuickStart wizard can prepare all these configurations for you        Note  You can use 
110. configuring of the Symantec Gateway Security appliance  You will need to know  these passwords to do a configuration Backup and Restore  During the Restore  process  the original SRMC password is restored  The Root and SRL passwords  are not reset to their original state        Remote management password    You can change the Symantec Gateway Security appliance   s remote SRMC  password from the Remote Management Password property page     To specify a SRMC password   1 Expand the Base Components folder    2 Select the Remote Management Passwords icon in the left pane   3 Right click and choose New  gt  Remote Management Password     The Remote Management Password Properties page opens  see Figure 7 1      Management Console  Managing passwords    SGSA  Remote Management Password   Properties  New  2  x     Remote Management Password             Specify remote management type  system and password           r Remote Management Type       ni C Log Event Submission Intrusion Detection  C Logfile Retrieval C Read Only       Pot Na Detection      Port Number  426 Blacklist Timeout  minutes   fi 440             m Remote Management System    r Remote Management Password          a    Verify Password                Figure 7 1 Remote management passwords    In the Type section  select the Remote Management radio button  if it is not  already selected     In the Remote Management System field  type the IP address of the  Windows NT system running the managing SRMC     Type your new pas
111. ction      Content Updates for virus definitions and security signatures ensuring the  highest level of protection    e Global support from Symantec Security Response experts available 24x7  world wide in a variety of languages      Advanced features such as the Symantec Alerting Service and Technical  Account Manager role offering enhanced response and proactive security  support    Please reference our website for current information on Support Programs  The  specific features available may vary based on the level of support purchased and  the specific product you are using     Registration and licensing    If the product you are implementing requires Registration and or a License Key   the fastest and easiest way to register your service is to access our licensing and  registration site at www symantec com certificate  Alternatively  you may go to  http   www symantec com techsupp ent enterprise html  select the product you  wish to register and  from the Product Home Page select the Licensing and  Registration link        Contacting support    Customers with a current support agreement may contact the Technical Support  team via phone or web at www symantec com techsupp     When contacting support  please be sure to have the following information  available     Customer service    Product Release Level   Hardware Information   Available memory  Disk Space  NIC information   Operating System   Version and Patch Level   Network Topology   Router  Gateway and IP Address info
112. curity appliance ships with the components listed in  the following table     Table 1 3 Components list    Symantec Gateway Security   A single device  rack mount or stand alone  appliance       Five rubber feet For resting the appliance on a flat surface    Note  Models 5200 and 5300 do not come with rubber  feet        Rack mount brackets Hardware for rack mounting the appliance                16 Product Overview    Documentation    Software CD ROM   SRMC Management Console  GUI   containing     Restore Image     Adobe Acrobat Reader     The following documentation in PDF format       Symantec Gateway Security Appliance Installation  and Configuration Guide  this book       Symantec Enterprise Firewall and Symantec  Enterprise VPN Configuration Guide      Symantec Enterprise Firewall  Symantec Enterprise  VPN  and VelociRaptor Firewall Appliance Reference  Guide       Quick Start Card       License Key and Support A form which provides the license serial number and  Request form directions on how to obtain the license key and register  for 1 year of Gold support  This form also contains the  license for the appliance        Power cord A power cord required for the country in which the  appliance will operate  Available country cord types are   Australia  Euro  UK  and USA        Printed documentation   Symantec Gateway Security Appliance Installation  and Configuration Guide       Quick Start Card                Release Notes       Documentation    The Symantec Gateway Secu
113. daily and  updated whenever changes are made        Caution  Do not enable ratings for rules with HTTP if you do not have a ratings  list database  Otherwise  all HTTP requests that use the rule will be denied     Creating rating rule profiles    To create a ratings profile  1 Expand the Access Controls folder   2 Select the Content Profiles folder and double click to expand it     3 Double click the Rating Rule Profiles folder to expand it and display the  Rating Profiles and Rating Modifications icons in the right pane     Select the Rating Profiles icon     5 Right click and select New gt Rating Profile from the Action menu to display  the Rating Profile Properties page  see Figure 10 2      Content Filtering 203    Using content profiles    SGSA Rating Profile     DisallowSatanicCult Properties                Figure 10 1 Rating Profiles Properties   General tab    In the General tab  enter a name in the Name field    This is the name that becomes accessible from the Ratings Rule Properties  page    Enter a description of your profile     204 Content Filtering    Using content profiles             SGSA  Rating Profilet DisallowSatanicCult Properties    2x     General Rating Profile    A Please select the ratings for this profile        Allowed Ratings Disallowed Ratings  Alcohol Beer Wine T obaca Satanic Cult    Drugs Drug Culture   Full Nudity   Gross Depictions   Militant E xtremist   Partial Nudity  Questioniable Illegal G ambli  Racism Ethnic Impropriety  gt    Search 
114. ddresses as shown in Figure 11 12     Create Cluster Wizard a x     Cluster members  Use the buttons to Add or Delete cluster members   Use the checkboxes to enable or disable the propagation of configuration  files to cluster members        Cluster members        MES 16910102 Yes  MES 16910103 Yes  MAES 16910104 Yes    Add Delete    Cancel            Figure 11 12 Cluster members screen    High Availability and Load Balancing    236    HA LB Implementation    Setting Up VIPs    Setting up virtual IP addresses  VIPs  for this cluster is the next step  Each  machine in the cluster shares the same virtual IP address for a given subnet  and is  viewed as a potential candidate to receive packets  If one appliance fails  another  appliance handles any new requests  providing continued connectivity to your  network  Figure 11 13 shows our example with VIPs     Because the VIP is assigned to a subnet  all of the machines in the cluster on the  subnet are viewed as a single IP address  With load balancing configured  this  allows the cluster to spread the connections more evenly over several different  appliances  instead of always sending requests to one appliance        Note  The VIP should be assigned using an IP address higher than any of the  nodes supporting that VIP        High Availability and Load Balancing a    HA LB Implementation    Internet    VIP   Out 169 10 10 250    External Network Router  169 10 10 1    169 10 10 2    VIP   In 192 168 30 250  Dedicated    Heartbeat 
115. dge of the Root System  Password can disable the lock in order to continue working with the front panel   To enable locking    1 From the SRMC  select the Symantec Gateway Security appliance icon and  right click     Choose Properties to display the appliance   s Properties page   Select the System tab     Beside Front Panel Keypad Locking  choose the Enable radio button to lock  the front keypad  see Figure 7 12      SGSA  Connected  Properties 2  xi    General   Status   Paths   Passwords   Date Time System   License      The current system name  domain name and default gateway  i5 address        System Name      Sasa    Domain Name       yourdomain com    Default Gateway Address     ft 69 254 0 254       UPS Support    Stop C Start                   Front Panel Keypad Locking     Disable                 Figure 7 12 Enabling keypad locking    5 Click OK     6 Save and Reconfigure     130 Management Console    Front panel keypad locking    Use a locked keypad    To use a locked keypad    1    When you press an arrow key on the appliance front panel with the keypad  locked  the root password prompt displays  Type the root password that was  provided during setup  see Step 9 on page 40      To enter your Password  use the keypad Up  4  and Down  v  arrow buttons  on the appliance front panel to scroll through the alphabet characters  When  your Password character appears in the brackets      press the right arrow   gt    button on the keypad to make your selection and go on to
116. domain com      Using     somedomain com  or using   somedomain com  blocks  smith somedomain com  and blocks  smith someserver somedomain com    For blocking specific e mail addresses       Using  smith somedomain com  blocks only  smith somedomain com  but does not block    adam_smith somedomain com  or block  smith someserver somedomain com    To filter mail based on domain  1 In the left pane  expand the Antivirus Components node   2 Click Mail Options     3 Inthe right pane  double click MailFilter_Configuration to display the  MailFilter_Configuration Properties page     134 Antivirus Scanning    Using the mail filter options    4 Click the Domains tab        SGSA Mail Options    MailFilter_Configuration Properties 2  x   Maximum Mail Size   Virus Message   Invalid E mail    FileNames    FileSizes   Subjects Domains    Use this page to define domain names of mail messages to  be filtered        Messages coming from the domain names you enter below will be  rejected if the Antivirus Scan Option for the SMTP proxy is  Scan  and Delete  or  Scan and Repair or Delete      Domain Name  fl Add    Delete    Reset         Figure 9 11 Mail Filter Domains page    5 Inthe Domain field  type a text string   Search strings are not case sensitive  You can use the following characters     Use a question mark     as a wildcard to represent a single character     Use an asterisk     as a wildcard to represent zero or more characters       Use a backslash     as an escape character  For 
117. dwidth by focusing web access on business related content  At the same time   it decreases exposure to liability by restricting access to potentially objectionable  content  URL filtering can be configured on a global  per user  per user group  per  IP or per IP group basis     Features include     Internet access permissions based on rules and policies  URL override to permit access to sites that are blocked by the master database  Logs and reports    Logs can be exported to ASCII and  csv formats for representation in popular  reporting tools such as WebTrends     Comprehensive alerting    E Mail  SNMP  Pager  Audio and custom alerts can be configured to notify  administrators of policy breaches when users access web content against  their organization s policy     Access scheduling    Access to web content can be scheduled by time of day and day of week   maximizing flexibility     Transparent operation  No browser modification is required in client computers     Regularly updated URL lists    12 Product Overview    High availability load balancing    The Symantec Gateway Security appliance provides high availability and load  balancing technology for clustered appliances  In today s business environment   internet access is mission critical  In order to achieve the availability needed while  also maximizing your throughput  your security gateways need high availability  and load balancing  This new integrated offering ensures easier setup  better  performance  and higher 
118. e    100 IDS Info  IDS Signature Config  IDS Signature Config  signature  order check failed        252    IDS and antivirus scanning log messages    IDS Messages    IDS Alerts    Table B 3    IDS informational messages    Explanation    The order of the signatures in sigs conf attempted to be written to the  Symantec Gateway Security appliance is different from the file  currently on the appliance  Signature configuration changes are not  saved on the appliance        User Action    Re enter the signature configuration changes in the SRMC GUI  and  click Save and reconfigure           Message    100 IDS Info  IDS Signature Config  IDS Signature Config  field count  check failed        Explanation    At least one field for one or more signatures in sigs conf attempted to  be written to the Symantec Gateway Security appliance is different  from the file currently on the appliance  Signature configuration  changes are not saved on the appliance        User Action    Re enter the signature configuration changes in the SRMC GUI  and  click Save and reconfigure        IDS alerts report attacks when traffic coming through the firewall matches an  enabled IDS attack signature     Log messages that result from IDS alerts can be viewed by using either the logfile  viewer or the IDS Alerts viewer     The following table shows the format of IDS Alerts when viewing in the system    logfile window     Table B 4    IDS Alert formats             Event Type Alert log message icon  followed b
119. e    343 Antivirus Warning  The antivirus scan server   s  cannot be  resolved as a hostname       Explanation    The server specified in the config file could not be reached because  it is not a valid server name  or a name server could not be reached   or the IP address is invalid        User Action    Make sure that the server specified is a valid address and that there  is an entry in the local DNS server for the address           Message    343 Antivirus Warning  An invalid value was read for scan options   setting to default  Scan  Repair or Delete       Explanation    There was an error processing a configured value        User Action    Check the values of the Scan Options settings on the Antivirus  Scanning tab of the FTPD  HTTPD  and SMTPD proxies to make  sure that they are correct     Valid scan option values are     Scan and Log    Scan and Delete      Scan and Repair or Delete       256    IDS and antivirus scanning log messages    Antivirus scanning messages    Table B 6    Antivirus scanning messages    Message    343 Antivirus Warning  Unsupported extension scan option   setting to default  Scan All Files       Explanation    There was an error processing a configured value        User Action    Check the value of Which file extensions to scan settings on the  Antivirus Scanning tab of the FTPD  HTTPD  and SMTPD proxies  to make sure that they are correct     Valid values are     All files  Only those in include list       All except those in exclude list    
120. e  Configuration branch     2 Click Signatures   All available signatures appear in the right pane   3 Right click  then click Filter     135    136 Intrusion Detection System  IDS     Configuring the IDS component    4 On the Attack Type tab  click Display Selected to enable the attack type check  boxes        IDS Signatures Filter Properties    MDenial of Service Signatures    4  General Signatures    Protocol Decode Signatures  MSuspicious Activity Signatures  MUnauthorized Access Signatures                Figure 8 1 IDS Signatures Filter Properties Attack Type page    5 Check the check boxes for the attack types that you want to view in the  Signature List     6 Click OK   All signatures of the selected attack types appear in the right pane        Note  If no signatures match the selected filter criteria  a message appears in  the right pane        To filter signatures by operating system    1 Inthe left pane  expand the IDS Components folder  and then expand the  Configuration branch     2 Click Signatures     Intrusion Detection System  IDS  137    Configuring the IDS component    All available signatures appear in the right pane   Right click  then click Filter     On the Operating System tab  click Display Selected to enable the operating  systems check boxes     Check the check boxes for the operating systems that you want to view in the  Signature List     Click OK     All signatures that are affected by the selected operating systems appear in  the right pane     T
121. e  devices     2 Attach the rubber feet to the five indentations on the bottom of the  appliance  See Figure 2 1        Figure 2 1 Freestanding Model 5110 with rubber feet    3 Place the unit in a secure location away from foot traffic  The installation site  must meet minimum environmental specifications as described in Table 1 1     4 Check that the power source is adequate for the Symantec Gateway Security  appliance and that the outlet is located within reach of the supplied power    Installation a    Stand alone hardware installation    cord without stretching or putting strain on the cord  Refer to Connect  model 5110 to the network on page 25 or Connect models 5200 and 5300 to  the network on page 27 for details on attaching signal cables        Caution  Do not use an extension cord to supply power to this unit        After cabling the unit into the network  properly dress the cables and  position them away from foot traffic to avoid a potential tripping hazard     22 Installation    Rack mount instructions       Rack mount instructions    The following rack mount instructions apply to all appliance models        Note  Because rack hardware can differ from site to site  the screws shipped with  the unit may not be of the proper thread size for your needs  Before proceeding   obtain screws of the proper size and length for your rack installation if necessary        To mount the appliance in a standard 19 inch equipment rack    1 Connect the mounting brackets to the side
122. e Local  End and Remote End links  you can click the Finish Setup link to complete and  save the secure tunnel  If you have made any configuration errors  the wizard  will notify when you attempt to Save the tunnel in the Finish setup page  You can  go back to any link and make the necessary corrections     Figure 5 14 VPN Policy screen  S2S Tunnel Wizard    The Symantec Gateway Security appliance ships with several pre configured  VPN policies     From step 1 in this VPN Policy screen  see Figure 5 14   click the VPN policy  link     The VPN policy pull down menu appears  see Figure 5 15      92   VPN    Configure S2S tunnels using the wizard         symantec   Introduction  Local End    Remote End    VPH Policy  Finish Setup    Cancel Setup    Figure 5 15      525 Tunnel Wizard        VPN Policy    The YPN policy you select determines the privacy and integrity algorithms used for  encrypting and decrypting packets passing through your secure tunnel  There are  several pre configured policies for you to choose from depending on the level of  security you require     1  Select a pre configured  gt   for your  new tunnel  ike_sample_crypto_interop    ike_default_crypto_strang  Once your YPN policy selection  ike_default_c  End and Remote End links  you can click the Finish Setup link to complete and  save the secure tunnel  If you have made any configuration errors  the wizard  will notify when you attempt to Save the tunnel in the Finish setup page  You can  go back to any li
123. e check box        Note  If you select Block traffic if server is unavailable and the proxy is  unable to contact the antivirus scan server for scanning  the message is  rejected  The message is not forwarded to the intended destination  and an  error message is returned indicating that the message was rejected because  the antivirus scanner was not available        Use the Scan Options list to select how scanned files are handled     10    Antivirus Scanning 181    Configuring proxy services for antivirus scanning    Scan and Log  When a virus is detected during scanning  a log entry is  generated  No repair is attempted  and the file or message is forwarded to the  intended destination     Scan and Delete  When a virus is detected  the infected file is deleted  no  repair is attempted   and a log entry is generated     Scan and Repair or Delete  When a virus is detected  the antivirus scan server  attempts to repair the infected file  Infected files that cannot be repaired are  deleted  and a log entry is generated for each deleted file        Note  Correct functionality of the settings under Mail Options is dependent  on this SMTP Scan Options setting  If you plan to use some or all of the mail  filtering capabilities  you must select Scan and Delete or Scan and Repair or  Delete here        Use the Which file extensions to scan drop down list to select the file types  that will be sent to the antivirus scan server for scanning     Your choices are     All files  All files
124. e cluster you want to verify    In the left pane  right click on the cluster name    Choose All Tasks  gt  Verify Cluster to display the Verify Cluster Wizard   Click Next     If there are cluster members that are not connected  the Connect to cluster  members screen is displayed  Enter the password for the system whose IP  address is displayed and click Next     ao BR WwW N    6 Repeat step 5 until all members are connected  at which point one of the  following screens is displayed       Ifthe Completing the Wizard screen displays  saying that the  configuration is in a consistent state  the verification process has been  completed successfully  Click Finish to close the Verify Cluster Wizard     High Availability and Load Balancing   22      Preparing to create a cluster          Ifthe Cluster configuration not in sync screen is displayed  continue at  step 7     Choose a cluster member from the list and click Next     If the member you chose is valid  the Verify cluster screen is displayed   showing the cluster information of the member     a Click Next  The Cluster configuration chosen screen is displayed  This  screen is read only     b Click Next to display the Completing the Wizard screen     c Click Finish to write the configuration of the selected cluster member to  all other members     If the member you chose is not valid  a message box tells you that the  member s information is incorrect and cannot be restored     a Click OK to clear the message and return to the
125. e file into a self contained  virtual computer  The program executes in this virtual computer as if it were  running on a real computer  Inside this virtual computer  the polymorphic virus  runs and decrypts itself  Striker then scans  detects  and repairs the virus     LiveUpdate       Symantec   s LiveUpdate    technology ensures that you are not at risk of infection  by newly discovered viruses  Updated virus definitions files  which contain the  necessary information to detect and eliminate viruses  are supplied by Symantec  at least every week and whenever a new virus threat is discovered  The Symantec  Gateway Security appliance can be configured to poll the Symantec LiveUpdate  servers to determine whether updated definition files have been posted  If new    Antivirus Scanning 165    Antivirus scanning on the Symantec Gateway Security appliance    virus definitions are available  Symantec Gateway Security downloads the proper  files and installs them in the proper location  Virus protection stays current  without interruption in protection     Antivirus scanning on the Symantec Gateway  Security appliance    The Symantec Gateway Security antivirus scan server listens on a TCP IP address  and port number  The SMTP  HTTP  and FTP proxies on the Symantec Gateway  Security appliance are configured to act as clients that pass files for scanning to  the antivirus scan server via this port     The Symantec Gateway Security appliance can be configured to do any of the  followi
126. e recipient automatically receives a license from the original licensor to  copy  distribute or modify the Program subject to these terms and  conditions  You may not impose any further restrictions on the recipients     exercise of the rights granted herein  You are not responsible for enforcing  compliance by third parties to this License     If  as a consequence of a court judgment or allegation of patent infringement  or for any other reason  not limited to patent issues   conditions are imposed  on you  whether by court order  agreement or otherwise  that contradict the  conditions of this License  they do not excuse you from the conditions of this  License  If you cannot distribute so as to satisfy simultaneously your    10    11    265  GNU GENERAL PUBLIC LICENSE    obligations under this License and any other pertinent obligations  then as a  consequence you may not distribute the Program at all  For example  if a  patent license would not permit royalty free redistribution of the Program by  all those who receive copies directly or indirectly through you  then the only  way you could satisfy both it and this License would be to refrain entirely  from distribution of the Program     If any portion of this section is held invalid or unenforceable under any  particular circumstance  the balance of the section is intended to apply and  the section as a whole is intended to apply in other circumstances     It is not the purpose of this section to induce you to infringe an
127. e report  close the browser window to return to the SRMC    Each report is saved to    Program Files Symantec Raptor Management Console   reports IDS appliance IP ExecSumYYYYMMDDHHMMSS htm    where appliance IP is the IP address of the appliance and where  YYYYMMDDHHMMSS is the year  month  day  hour  minute and second  that the report was generated     Viewing an existing Executive Summary report    To view an existing Executive Summary report    1    2  3  4    Select the appliance for which you want to view a report    Expand the IDS Components branch    Expand the IDS Reports branch  and then click Executive Summary   In the right pane  double click the report that you want to view     The report data appears in a new window     Deleting an existing Executive Summary report    To delete an existing Executive Summary report    Ou fF WwW DY    Select the appliance for which you want to view a report    Expand the IDS Components branch    Expand the IDS Reports branch  and then click Executive Summary   In the right pane  click the report that you want to delete    Right click  then click Delete Report     In the confirmation dialog box  click Yes     Intrusion Detection System  IDS  147    IDS notifications    IDS notifications    Notifications provide a way to alert designated individuals or systems when  messages are logged on your appliance     This section describes the notifications you can send in response to IDS Alerts     You can specify the type of notification the
128. e source IP address of the attack       254    IDS and antivirus scanning log messages    IDS Messages       Table B 5 IDS Alerts viewer format  Destination IP The destination IP address of the attack  OS Impacted The operating systems that can be affected by this attack       The following sample IDS message shows the format of a High severity IDS  message in the logfile  The format will be the same for Low and Medium severity  messages  except that the message number will be either 525 or 550  respectively     20 IDS Alert 99496591 2 62962 51 Whisker 192 166 1 1 an 155 64 1 3  n       Oo    6 66 06    Where   1 Message number  2 Indicates IDS Alert    3 Time in seconds and microseconds     gt     Attack name    5 Source IP address    an    Source port  7 Destination IP address    8 Destination port    IDS and antivirus scanning log messages 255    Antivirus scanning messages    Antivirus scanning messages    There are two types of messages associated with the antivirus scanning       Customizable messages that are sent to users when viruses are detected    For more information about these messages  see Customizing virus  messages on page 197       System logfile messages    This section describes the messages that are sent to the system logfile     These messages are all 343 Antivirus warnings  The following table lists the  messages  describes why each message was generated  and provides a user action    where possible     Table B 6    Antivirus scanning messages    Messag
129. e unrepairable infections or that  violate the established mail policy are blocked  while clean files and infected files  that can be repaired are allowed to pass through     162      Antivirus Scanning    About Symantec AntiVirus    About Symantec AntiVirus    Symantec Gateway Security features Symantec AntiVirus technology via an  antivirus scan server installed on the appliance  The Symantec Gateway Security  antivirus scan server detects viruses  worms  and Trojan horses in all major file  types  for example  Windows files  DOS files  and Microsoft Word and Excel  files   The antivirus scan server also detects mobile code  such as Java      ActiveX    and standalone script based threats  Symantec Gateway Security  utilizes Symantec   s key antivirus engine technologies  including Bloodhound     for heuristic detection of new or unknown viruses and Symantec   s Norton  AntiVirus Extension  NAVEX      which provides protection from new classes of  viruses automatically via LiveUpdate     The Symantec Gateway Security appliance antivirus scan server also includes a  decomposer that handles compressed file formats and nested levels of files  For  embedded files  scanning can be limited to certain file types based on extension     The scan server handles the following archival and encoded file types         amg       arj      gzip     mime    Jha   e tar        uue      Zip    Symantec AntiVirus technology is fully supported by the Symantec Security  Response Team     Symantec
130. elecommuters  and remote offices     The Symantec Gateway Security appliance uses VPN tunnels to send encrypted  and encapsulated IP packets over public networks securely to another VPN  server  Symantec   s  Psec compliant Symantec Enterprise  SEVPN  VPN Client  7 0 is optional and available with the full VPN function cross grade license     VPN features include     e VPN Policies    The Symantec Gateway Security appliance ships with pre configured general  VPN policies which you can apply to your secure tunnels     For example  there are IPsec IKE policies and IPsec Static policies  You can  apply these policies to each IKE or IPsec Static secure tunnel you create       Support for third party IKE clients    Symantec Gateway Security supports scalable policy management for any  IKE compliant  third party mobile client through tunnels based on users and  user groups     See the Symantec Enterprise Firewall and Symantec Enterprise VPN Configuration  Guide for more information     Intrusion Detection System  IDS     The Symantec Gateway Security appliance provides network based intrusion  detection technology designed to fortify your organization   s perimeter defenses   it transparently monitors traffic on the network to prevent security violations and  to protect in house resources  The Intrusion Detection System  IDS  technology  monitors network traffic for suspicious behavior and responds to intrusion  attacks in real time  Features include       Detection of attacks    D
131. entry in the right pane        IDS LiveUpdate Properties    http    liveupdate  symantec com       E  Dany  fe Weekly     EAGAN          Figure 8 2 IDS LiveUpdate Properties page    4 Inthe IDS LiveUpdate Properties page  verify that the LiveUpdate Server  field is pointing to the correct server  change if necessary     5 Check Enable Schedule if it is not already checked     Intrusion Detection System  IDS   Configuring the IDS component    6 Doone of the following       Click Daily if you want LiveUpdate to run every day  Then  enter the  time to run LiveUpdate       Click Weekly if you want LiveUpdate to run at the same time on a  specific day of every week  Select the day of the week  then enter the time  to run LiveUpdate       Click Monthly if you want LiveUpdate to run at the same time on a  specific day of every month  Select the day of the month  then enter the  time to run LiveUpdate     7 Click OK   The LiveUpdate scheduler configuration is saved in memory on the SMRC     though the Symantec Gateway Security appliance does not activate the scheduler  until you save and reconfigure     To save and reconfigure      Click Save and reconfigure on the toolbar  or right click and choose All  Tasks gt Save and Reconfigure     Running LiveUpdate on demand    You can run LiveUpdate manually at any time to update attack definition files     To run LiveUpdate on demand    1 In the left pane  expand the IDS Components branch  and then expand the  Configuration branch     2 Cli
132. er  For example  precede   or    with   to match a literal   or   in a file name  To match a literal    use        7 Click Add     Antivirus Scanning 189    Using the mail filter options    The file name you have specified displays  prefaced by the action the antivirus  scan server will take  For example   Reject Message  love vba     The File Name field clears  letting you specify another file name  You can add  multiple file names  For each file name you specify  you first select how the  antivirus scan server handles messages with attachments that match that file  name     8 To remove a file name from the list  select it in the list and click Delete   9 To start over with a blank list  click Reset   10 When you have finished  click OK     Filtering mail by attachment file size    When you filter mail by attachment file size  you specify one or more file sizes  that are known to be threats and specify how the antivirus scan server handles  messages that contain attachments of any of the listed file sizes  The antivirus scan  server can reject the entire message or deliver the message with the attachment  removed  any attachments that are not a listed size are not removed and are  delivered with the message      Note  This filter can be used during in a virus outbreak situation to further  protect your network  In the case of a new e mail born virus  if you know the  exact file size of the infected attachment  you can use this information to block  the infected e mail at the
133. er handles messages    Antivirus Scanning 187    Using the mail filter options    that contain attachments with any of the file names listed  The antivirus scan  server can reject the entire message or deliver the message with the attachment  removed  Any attachments that do not match the listed file names are not  removed and are delivered with the message     For each full file name you want to filter  you enter a separate text string  If the  text string you enter matches the file name of any attachment  the message is  handled accordingly     Wildcard characters can be used to match when you are not sure of an exact file  name or want to block all attached files with a given extension  For example  to  block all attachments with the word virus somewhere in the file name  type   virus  as the subject search string  To block all attachments with the  exe  extension  type   exe        Note  This filter can be used during in a virus outbreak situation to further  protect your network  In the case of a new e mail born virus  if you know the file  name of the infected attachment  you can use this information to block the  infected e mail at the firewall  You can protect your network immediately  even  before virus definitions for the new virus have been posted        To filter mail based on file name  1 Inthe left pane  expand the Antivirus Components node   2 Click Mail Options     3 Inthe right pane  double click MailFilter_Configuration to display the  MailFilter_Configurati
134. er that are used to connect to it        Note  The Obtain read write access check box is grayed out and cannot be  edited  It indicates that when the Cluster Wizard attempts to connect you to  the specified appliance  you must be able to obtain read write access to add  the appliance to the cluster        Click OK and the Cluster wizard will attempt to connect to the appliance           If this is the first time this appliance is being added to a cluster  the  Cluster members screen is redisplayed  showing the IP address of the  appliance and verifying that you are connected       Ifthe appliance is already a member of a cluster  a message asks if you  want to read the existing cluster information for the appliance     If you click Yes  the name and description of the cluster to which the  appliance belongs replaces the name and description you provided in  step 4  since the appliance can only belong to one cluster  The Cluster  members screen is displayed  showing the members of the appliance s  cluster     To add a new member to the cluster  click Add to display the Connect to  cluster member dialog box     You can also delete an existing member from the cluster by selecting the IP  address and clicking Delete     Enter the IP address  password  and management port number of another  appliance and click OK     The new member s IP address is added to the Cluster members screen and  your connection is verified     Repeat steps 10 and 11 for each cluster member to be added    
135. ering    The Symantec Gateway Security appliance provides flexible internet content  filtering technology  This increases worker productivity and preserves valuable  bandwidth by focusing web access on business related content  At the same time   it decreases exposure to liability by restricting access to potentially objectionable  content  URL filtering can be configured on a global  per user  per user group  per  IP or per IP group basis     202      Content Filtering  Using content profiles    Using content profiles    The Symantec Gateway Security appliance enables you to restrict certain classes  of URLs based on a website ratings service  This service  called the WebNOT  Ratings Service  provides subscribers with frequently updated ratings database of  URLs that are categorized by topic  New updates are downloaded automatically  to the appliance from the WebNOT site on the internet  A subscription to  WebNOT is included with the Symantec Gateway Security appliance Gold and  Platinum support contracts     The Symantec Gateway Security appliance also comes with a pre installed  WebNOT ratings list database to enable content filtering as soon as the appliance  is installed and configured  The pre installed database is fully functional and  useful for evaluation purposes  however  it is a version based on the ship date of  the appliance  It is updated to the latest version within 24 hours after you install  the appliance with the product key  The WebNOT database is checked 
136. es     You can later change these settings  from the SMTPD and or individual rule properties              m Specify recipient s domain below     m Check against REL   New site  Add      Delays  mail abuse org       l Add    Remove      Figure 4 10 Anti Relay screen                       lt  Back Cancel         11 On the Anti Relay page  define the default anti relay settings for your SMTP  mail rules     No Source Routed Address allowed is enabled by default  This causes SMTP  to refuse all e mail to addresses specified using source routing syntax  such as   host1  host2 user symantec com     If you disable this check box and specify a Domain name in the Specify  recipient s domain name field  the SMTP proxy will only accept the e mail if  the final destination is one of the acceptable recipient domains     If you disable this check box and do not specify a recipient domain  the  SMTP proxy will accept e mail for all addresses  source routed or not     You can also specify an RBL site against which the address should be checked   12 Click Next     Firewall 75    SMTP Wizard       SMTP Configuration Wizard    Check DUL bere  Check sender s address against sites with dialup and dynamically assigned IP sites           O dialups  mail abuse org             Figure 4 11 Check DUL screen    13 On the Check DUL page  specify the domain name of a dial up user list   DUL   or check the domain name provided     As with the RBL  this instructs SMTP to check the sender s address against a
137. es and DNS 103    Setting up routes    To create a route  1 Select the Routes icon  right mouse click and choose New  gt  Route     The Route Properties window opens  see Figure 6 3         SGSA  Route   Properties  New     Route      Ry Please specify the route properties             Destination Address   192 168 3 0  Netmask  255 255 255 0  Gateway Address  192 168 1 62       Cancel   Help         Figure 6 3 Route Properties  New  screen    2 Type the Destination network  In our example  it is the network behind the  inside router  192 168 3 0     Type the appropriate netmask  In our example  255 255 255 0   In the Gateway Address field  type the address of the router     For example  192 168 1 62  This is the router address on the same network as  the Symantec Gateway Security appliance inside interface     5 Click OK to save route information and close the Route Properties window   Any connection for an address in the range of 192 168 3 0 to 192 168 3 254 is  directed to the router  192 168 1 62      You would repeat this procedure to create a static route for the 192 168 5 0 subet     104      Routes and DNS    Configure the DNS proxy    Configure the DNS proxy    The DNS proxy provides a simple way to handle name service at your site  It does  not provide private information to outside users     This chapter uses the xyz   com network  shown in Figure 6 1  as a typical  example of how to configure the DNS proxy  It includes only basic functionality   The example network
138. essary  change the management port for the  cluster member whose IP address is shown     Click Next to connect     When all members of the cluster are connected  the Completing the Wizard  screen is displayed     Click Finish to delete the cluster configuration from all members     If you are deleting a software HA LB cluster  you will be prompted to reboot  so that cluster information can be removed from the registry     Viewing Cluster Properties       Note  Although you can view the properties of a cluster  the details you see are  read only  If you want to make changes  you must do so by using the Modify  Cluster wizard  For more information  see Modifying a cluster        To view the properties of a cluster    1  2    Expand the cluster s folder in the left pane   Connect to a member of the cluster     You must be connected because the cluster configuration information is  stored on the cluster members     Right click on the cluster s icon and choose Properties  The cluster s  Properties pages are displayed    The General tab shows the name and description of the cluster  and tells you  what type of cluster it is    The Member field gives the IP address of the connected member    Click the Members tab     This tab lists the members of the cluster and indicates whether they are  enabled for propagation    If the cluster is an Integrated Software High Availability and Load Balancing   HA LB  cluster  click the VIPS tab to view information about the Virtual IP   VIP  addres
139. et and on  each of your subnets     The ping command uses Internet Control Message Protocol  ICMP  echo  packets to see if you can connect to a computer  You can ping using either name  or address     Use ping ina command prompt window on your machine running SRMC  The  syntax for ping is     ping IP address or ping computer name    If you ping by name  the ping utility first attempts to find the address  If it  cannot find the address  because of DNS or WINS problems  ping responds  with    bad IP address     If it finds the address  ping proceeds     If you ping by address  ping sends a request for a response  If the computer is  working and if you can reach it  you receive reply messages  If the computer is  down or something is wrong with the network between you and the other  computer  ping tells you the computer is unreachable or that the request has  timed out     The following section refers to the routed network example in Figure 6 1 and  uses the computer names shown in Table 6 2     Table 6 2 Routed network example computer names    192 168 1 1 wkst1       192 168 1 2 wkst2       192 168 3 12 wkst12            From a computer behind the appliance  such as wkst 1in our example   ping a computer on each subnet behind the Symantec Gateway Security  appliance as follows     ping wkst2 xyz com    ping wkst12 xyz com    Routes and DNS 109    Verify connectivity    Both of these computers should be reachable  If either of these commands  fails  try again  using addresses 
140. etalins shen Pies Sra tele ee ois teats we Saat aed eae Lady ene aA AS ees C 271  8   Exclded Softwares  oa then ule ated oases E oe Rie yl oes Baal s C 272    D Serial Port Cable    Serial 9 Pin Cable Specifications         0    ccc cee ee cee cece ccc cece eee eee D 273  Index    Chapter       Product Overview    The Symantec Gateway Security appliance integrates core Symantec technologies  into a unique  integrated solution to effectively prevent security breaches at the  perimeter  The appliance combines mature firewall  antivirus  intrusion  detection  content filtering  and virtual private network  VPN  capabilities in a  single  ready to deploy system     All functions are managed by a common console and utilize a common reporting  structure for easy to understand data collection  The Symantec Gateway Security  appliance provides network security at the gateway between the Internet and a  corporate network or between network segments  Using the Symantec Raptor  Management Console  SRMC   all functions can be configured and managed  either locally or remotely  The Symantec Gateway Security appliance provides all  of the network security you need in one appliance that is easy to install  configure   and operate     The Symantec Gateway Security appliance maximizes the security of your  network without compromising performance  It provides you with the ability to  easily manage your network security and make modifications as your security  needs evolve     The Symantec Ga
141. etect atomic network based attacks and report the alerts to the SRMC  The  atomic signatures detect many widespread attacks including Teardrop     10    Product Overview    Whisker  Girlfriend  NOOP  buffer overflow  and various attacks specific to  various operating systems  Windows  Solaris  Linux  etc   and applications   services  HTTP  DNS  etc       Respond to network attacks with pre configured actions such as dropping  attack packets           Separate IDS monitoring  configuration  and reports views    View and respond to attack alerts in real time using the IDS Alerts Viewer  and the notifications feature     Configure signatures to be on or off  and gated or not gated   Generate configuration and Executive Summary reports       LiveUpdate of attack signatures    Antivirus scanning    The Symantec Gateway Security appliance provides advanced  high performance  virus scanning and repair  The Symantec Gateway Security appliance features  include award winning antivirus technologies that make Symantec an industry  leader in virus protection software  Symantec AntiVirus technology is one of the  fastest  most effective virus solutions available for detecting and preventing  malicious virus attacks  The Symantec Gateway Security appliance detects  malicious viruses  worms  and Trojan horses in all major file types  including  mobile code and compressed file formats  Virus definitions and engines are  updated automatically via Symantec s LiveUpdate technology  with no  in
142. ewly created cluster appears as an icon  in the left pane  By expanding it  you can see all the members of the cluster     You may want to delete the previous individual appliances that are now  members of the cluster     The Integrated Software HA LB cluster the members of the cluster will start  to work as an integrated software HA LB cluster after rebooting     Creating a cluster for appliance file propagation or hardware HA LB    Clusters can be used to propagate configuration information such as rules  users   and entity definitions from one appliance to other appliances  The following  procedure does not involve any HA LB configuration     Before you run the Cluster Wizard  make sure that the IP addresses and  passwords of all the appliances you want to add to the cluster have been defined  on all the Symantec Gateway Security appliances that will be added to the cluster     High Availability and Load Balancing   222    Preparing to create a cluster    To create a cluster of appliances for propagation of configuration files or  hardware HA LB    1    oo A W N    10    Click the Symantec Raptor Management Console icon to display the Getting  Connected taskpad     Click the New Cluster icon to display the Cluster Create Wizard    Click Next to display the Create a new cluster screen as shown in Figure 11 2   Enter a name and description for the cluster    Click one of the following radio buttons      To create a hardware HA LB cluster  click Hardware HA LB    To create a 
143. example  precede   or    with   to match a literal   or   in a file name  To match a literal    use        6 Click Add   The domain displays in the list     The Domain name field clears  letting you enter another domain name  You  can add multiple domain names     7 To remove a domain name from the list  select it in the list and click Delete   To start over with a blank list  click Reset   9 When you have finished  click OK     Antivirus Scanning 195    Using the mail filter options    Filtering mail by maximum mail size    You can specify a maximum size for mail messages  This maximum size includes  the entire message including any and all attachments  Messages that exceed this  maximum mail size are rejected     A value of 0  the default value  indicates no maximum size  By default  no  messages are rejected based on maximum size     To filter mail based on maximum mail size  1 In the left pane  expand the Antivirus Components node   2 Click Mail Options     3 Inthe right pane  double click MailFilter_Configuration to display the  MailFilter_Configuration Properties page     4 Click the Maximum Mail Size tab           SGSA  Mail Options MailFilter_Configuration Properties     _2  x   FileNames   File Sizes   Subjects   Domains    Virus Message   Invalid E mail    a This setting allows antivirus scanning to reject mail messages    a  2 based on size           Mail messages of a size greater than what you enter below will be  rejected if the Antivirus Scan Option for the SMT
144. existing profile to use in a rule  A ratings  profile is a list of topics grouped together under one name or profile  These  profiles are used to determine which URLs are blocked     Ratings Rule Properties E 21x     Please select the appropriate rating profile for this rule            Rating Profile  DAE    OK Cancel Help      Figure 10 3 Ratings Rule Properties Page    7 Select a profile from the drop down menu   8 Click the OK button to assign the Rating Profile to the rule   9 Click OK in the Rule Properties page to save the Rule     Searching capabilities    You can search for specific URLs among the extensive database of rated URLs  from the Ratings Modifications Properties page  under the Rating Rule Profiles  icon     To locate a specific URL in the Ratings database  1 Expand the Access Controls folder  Select the Content Profiles folder and  double click to expand it     2 Double click the Rating Rule Profiles folder     206 Content Filtering    Using content profiles    The Ratings Profiles and Rating Modifications icons appears in the right  pane     Select the Ratings Modifications icon     Right click and select All Tasks gt Search to open the Ratings Modifications  URL dialog box     Key in the URL you are searching for in the ratings database   You can enter the entire URL or the IP address   Click the OK button     The search process may take several seconds  Once your URL is found  you  can edit its rating     Customizing WebNOT ratings lists    You can custo
145. f Sections 1  and 2 above  provided that you also do one of the following     Accompany it with the complete corresponding machine readable source  code  which must be distributed under the terms of Sections 1 and 2 above  on a medium customarily used for software interchange  or     Accompany it with a written offer  valid for at least three years  to give any  third party  for a charge no more than your cost of physically performing  source distribution  a complete machine readable copy of the corresponding  source code  to be distributed under the terms of Sections 1 and 2 above on a  medium customarily used for software interchange  or     Accompany it with the information you received as to the offer to distribute  corresponding source code   This alternative is allowed only for    264    GNU GENERAL PUBLIC LICENSE    noncommercial distribution and only if you received the program in object  code or executable form with such an offer  in accord with Subsection b  above      The source code for a work means the preferred form of the work for making  modifications to it  For an executable work  complete source code means all  the source code for all modules it contains  plus any associated interface  definition files  plus the scripts used to control compilation and installation  of the executable  However  as a special exception  the source code  distributed need not include anything that is normally distributed  in either  source or binary form  with the major components
146. f it does not work from there  the problem is more likely in your  Internet router or your ISP s name server     Check to see that your default gateway is set properly     110 Routes and DNS    Verify connectivity    Chapter       Management Console    The Symantec Raptor Management Console  SRMC  is the graphical user  interface for managing and monitoring all functions on the Symantec Gateway  Security appliance     Once you have connected to the Symantec Gateway Security appliance  you can  use the SRMC to edit information you entered during the initial Symantec  Gateway Security appliance configuration  such as passwords and license key  data  and all other configuration tasks  Because the communications between the  SRMC and the Symantec Gateway Security appliance are encrypted  you can  securely manage the appliance from a remote location     You can manage several appliances from a single SRMC and also manage a single  appliance from several SRMCs  You can also manage a mixture of Symantec  Gateway Security appliances  Symantec Enterprise Firewalls  and Symantec  Enterprise VPNs from the same SRMC     The Symantec Gateway Security appliance comes with an additional management  utility called SRL  Secure Remote Login   which offers an encrypted secure  communication to the Symantec Gateway Security appliance at the command  line level  to allow remote access to the operating system if needed  The SRMC is  designed to provide access to all needed operating system configu
147. fication    a    Enter the user name of the page recipient in the User field   For numeric pagers  the name field is an identifier within SRMC     Enter the recipient s phone number and PIN in the Pager Number field   using commas to indicate pauses in the dialing sequence  Paging tends  to be sensitive to timing  You will need to experiment by adding or  removing commas     Complete the sequence with a numeric code followed by      pound  sign and semicolon only      For example  if a recipient is using a numeric pager with a phone  number of 111 2222  a PIN of 1234  and a numeric code of 9999  the  entry in the Phone field would be as follows     1112222     1234    9999      The pager displays the numeric code when activated     To specify an alphanumeric Page notification    a  b    Enter the PIN of the page recipient in the User field     Enter the recipient s phone number in the Page Number field  using  commas to indicate pauses in the dialing sequence     For example  if a recipient is using an alphanumeric pager with a phone  number of 111 2222 and a PIN of 1234  the entries in the user and page  number fields would be as follows     1234  1112222  The pager displays the text of the log message when activated        Note  The paging provider must support the TAP protocol  also known as  the Motorola IXO alphanumeric paging protocol   Set your modem speed to  2400 or even 300 bps to maintain compatibility with the TAP protocol  definition        Click OK to save your 
148. for antivirus scanning    The bind address you select here is dependent on whether you want local or    Table 9 2    remote scanning and on how the antivirus scan server that will do the  scanning has been configured  Use the following table for guidance     Configure the antivirus settings for SMTP       The antivirus scan server and    127 0 0 1  the    127 0 0 1  the       the proxy are on the same loopback interface  loopback interface   appliance  and the scan server is   configured to accept only local   connections   The antivirus scan server and 0 0 0 0  eth1  or eth0O The physical IP    the proxy are on the same  appliance  and the scan server is  configured to accept both local  and remote connections    address of the  appliance running  both the proxy and the  antivirus scan server       The proxy will request scanning  from an antivirus scan server on  a different appliance  thus  that  scan server is configured to  accept remote connections from  this appliance     0 0 0 0  eth1  or ethO    The physical IP  address of the  appliance running the  antivirus scan server       In the Antivirus scan server port number field  enter the port on which the    antivirus scan server listens     This port number must match the port number of the selected antivirus scan  server  specified in the Global_Antivirus_Configuration for that scan server     To block messages if the antivirus scan server is not available for scanning   check the Block traffic if server is unavailabl
149. ftware  the Linux OS  and all its applications  The appliance remains  powered on  but no software is running     3 It is safe to turn the Symantec Gateway Security appliance off when the LCD  display reads  PLEASE SWITCH POWER OFF NOW      4 You must now power cycle the appliance to bring it back up     Perform a system reboot from SRMC    From the SRMC All Tasks menu  you can remotely perform system reboots     To reboot from SRMC    1 Right click from within SRMC and select System Reboot from the All Tasks  menu  see Figure 7 6      2 Confirm this reboot     A System Reboot restarts the Symantec Gateway Security appliance software   The Linux OS and all its applications are brought down and then restarted     Management Console    122    Back up configuration files    Back up configuration files    From the SRMC All Tasks menu  you can perform manual system backups of  your configuration files     Configuration files are stored the Symantec Gateway Security appliance  Back up  files are stored on the SRMC machine  Backed up files are identified by hostname   date  and time  with an   rfwcfg extension     For example  Symantec Gateway Security 2002 March 15 13 51 48 rfwcfg    To do a manual configuration file backup  1 Right click from within SRMC and select Backup from the All Tasks menu     The Backup dialog box is displayed   see Figure 7 7      sa  Please enter the local backup file name  2       Local backup file name     Files Symantec Raptor Management Console backup
150. ftware and software documentation are   Commercial Items   as that term is defined in 48 C F R  section 2 101  consisting  of  Commercial Computer Software  and  Commercial Computer Software  Documentation   as such terms are defined in 48 C F R  section 252 227   7014 a  5  and 48 C F R  section 252 227 7014 a  1   and used in 48 C F R   section 12 212 and 48 C F R  section 227 7202  as applicable  Consistent with 48  C F R  section 12 212  48 C F R  section 252 227 7015  48 C F R  section 227 7202  through 227 7202 4  48 C F R  section 52 227 14  and other relevant sections of  the Code of Federal Regulations  as applicable  Symantec s computer software  and computer software documentation are licensed to United States Government  end users with only those rights as granted to all other end users  according to the  terms and conditions contained in this license agreement  Manufacturer is  Symantec Corporation  20330 Stevens Creek Blvd   Cupertino  CA 95014     6  Export Regulation     7  General     You agree to comply strictly with all applicable export control laws  including the  US Export Administration Act and its associated regulations and acknowledge  Your responsibility to obtain licenses as required to export  re export or import  the Appliance  Export or re export of the Appliance to Cuba  North Korea  Iran   Iraq  Libya  Syria or Sudan is prohibited     If You are located in North America or Latin America  this Agreement will be  governed by the laws of the State
151. gateway          cece eee eee eee eee 6 101  Creating static  rOUtes ss  u3d tetas signee Bes Go ates  WG aad oe AS Gane ee 6 102   Configure the  DNS proxy order cers  seoideeleneg  amp  RAAR EAR Sus  ah wero eee a RLRE 6 104  Provide private DNS file address statements                      0000  6 104  Provide hosts pub file information               0 0    cece cece 6 107    Very Connec VRY iA 208s ese is ee Be ie ea de ee ISS Ae oie es 6 108    3    Contents  7 Management Console  Monitor Symantec Gateway Security appliance         0    cee eee eee eee 7 112  Managing passwords         0    ccc cece eee eee eee enna es 7 114  Remote management password          00  e cece eee eee eens 7 114  Root and secure remote login passwords             0 00 c cece eee ees 7 116  Chang   system settings     lt i  caaduc eee waded eee bau atone Saw cdwke sede a bets 7 117  Change the date and time            cc eee e eee eee eee 7 118  Detine a license Key srov secieiecen aeavetayavesesye waerd ome rid siacath  wre abe aver r 7 119  Perform a system shutdown from SRMC       0    cc cece cece cece eee ees 7 121  Perform a system reboot from SRMC            cc cece ccc ect eeeees 7 121  Back up configuration files 2 0 0    eee ccc ccc ccc ccc cece eect eee ees 7 122  Restore configuration files osese errire teris cece cence eee eee 7 124  Apply patches to the Symantec Gateway Security software                 00000  7 126  Manage log DEn gisa a O a tee KE oe inate aa EEE ee teed 7 127  
152. gram does not understand MX records  only addresses     When you specify a mail address in the form jane acme com  the appliance  must be able to convert acme com directly into an IP address  You can  accomplish this by making an entry for acme com in the appliance   s hosts  file  For more information  see Provide private DNS file address statements  on page 104     Click OK to save your notification     Intrusion Detection System  IDS  155    IDS notifications    Page notifications    A Page notification causes the appliance to page a recipient        Note  To use page notifications  you must have a Hayes compatible modem and  you must specify its COM port through the NOTIFYD Properties page        To configure a Page notification  1 Expand the Monitoring Controls folder and select the Notifications icon     2 Right click and choose New gt IDS Notifications to display the General tab of  the Notification Properties page     3 Choose PAGE from the Action drop down list   Click the Severity tab     5 Check one or more of the check boxes to choose the severity level or levels for  which the notification will be triggered     6 Click the Page tab        NA E T E i 2 x     General   Severity Page    id    Please enter the pager information for this notification        User   Pager Number        Figure 8 9 Notifications     Page Tab    156    IDS notifications    Intrusion Detection System  IDS     7 Complete one of the following procedures     8    To specify a numeric Page noti
153. he  feature to display the feature   s properties page     262      GNU GENERAL PUBLIC LICENSE    GNU GENERAL PUBLIC LICENSE    Version 2  June 1991    Copyright  C  1989  1991 Free Software Foundation  Inc   59 Temple Place   Suite 330  Boston  MA 02111 1307  USA    TERMS AND CONDITIONS FOR COPYING  DISTRIBUTION AND  MODIFICATION    1    This License applies to any program or other work which contains a notice  placed by the copyright holder saying it may be distributed under the terms  of this General Public License  The    Program     below  refers to any such  program or work  and a    work based on the Program    means either the  Program or any derivative work under copyright law  that is to say  a work  containing the Program or a portion of it  either verbatim or with  modifications and or translated into another language   Hereinafter   translation is included without limitation in the term    modification      Each  licensee is addressed as    you        Activities other than copying  distribution and modification are not covered  by this License  they are outside its scope  The act of running the Program is  not restricted  and the output from the Program is covered only if its  contents constitute a work based on the Program  independent of having  been made by running the Program   Whether that is true depends on what  the Program does     You may copy and distribute verbatim copies of the Program   s source code as  you receive it  in any medium  provided that y
154. he Symantec Gateway Security appliance   s date and time  through the SRMC   To change the date and time    1 Connect to the Symantec Gateway Security appliance  see Connect to  Symantec Gateway Security appliance on page 54      2 Select the appliance system icon of the connected appliance in the left pane     Management Console 119    Change system settings    3 Right click and choose Properties   The appliance   s properties page opens     4 Select the Date Time tab  see Figure 7 4      SGSA  Connected  Properties E zi xi    General   Status   Paths   Passwords          System   License      fa Please set date  time and time zone as necessary   d       I Change Date and Time       Time and Date        Timezone  US Eastern       Figure 7 4 Change date and time    Check the Change Date and Time checkbox to change the current settings     From the Time and Date and Timezone pull down fields  choose the  appropriate settings     7 Click OK when finished   Changes take effect immediately     Define a license key    If necessary  you can enter a license key for the first time or change the current  Symantec Gateway Security appliance license key through SRMC from the license  tab of the appliance   s properties page  For further license key information  see  Get your license key on page 45     120 Management Console    Change system settings    To enter or change your license key  1 Select the appliance   s icon in the left pane     2 Right click and choose Properties to display
155. he threat listed in the message is a virus trojan worm  an  additional message is displayed     Threat description is  lt threat name gt     Where threat name is the name of the threat  or the name of the  first threat if more than one threat is detected         Explanation    Messages of this sort are sent if an attack is detected        User Action    Take appropriate action to address the attack           Message    343 Antivirus Warning  Error extracting headers from data  received from antivirus scan server    343 Antivirus Warning  Aborting receive to prevent buffer overflow       Explanation    There was an error processing the antivirus scan server response   The antivirus scan server interface will return an error to the proxy  and the proxy will drop the connection        User Action    Contact customer support        260 IDS and antivirus scanning log messages    Antivirus scanning messages    Appendix       Licenses    The LINUX operating system used in Symantec Gateway Security appliance is  covered by the GNU General Public License  The firewall software is covered by  the Symantec license included with the license serial number     To view licensed and enabled features   1 Select the icon of the connected appliance in the left pane   2 Expand the Base Components folder    3 Click the System Features icon     The licensed features and their status  Enable or Disable  is displayed in the  right pane  If you want to change the status of a feature double click on t
156. hese conditions  and telling the user how to view a copy of this License    Exception  if the Program itself is interactive but does not normally print  such an announcement  your work based on the Program is not required to  print an announcement      These requirements apply to the modified work as a whole  If identifiable  sections of that work are not derived from the Program  and can be  reasonably considered independent and separate works in themselves  then  this License  and its terms  do not apply to those sections when you distribute  them as separate works  But when you distribute the same sections as part of  a whole which is a work based on the Program  the distribution of the whole  must be on the terms of this License  whose permissions for other licensees  extend to the entire whole  and thus to each and every part regardless of who  wrote it     Thus  it is not the intent of this section to claim rights or contest your rights  to work written entirely by you  rather  the intent is to exercise the right to  control the distribution of derivative or collective works based on the  Program     In addition  mere aggregation of another work not based on the Program  with the Program  or with a work based on the Program  on a volume of a  storage or distribution medium does not bring the other work under the  scope of this License     You may copy and distribute the Program  or a work based on it  under  Section 2  in object code or executable form under the terms o
157. ially harmful regular  expressions that can be used to try to hack into your server  When incoming  URLs are checked against this file  access via these  url patterns  is denied     To initiate a check of this file  you must do three things     Determine the weaknesses against which you want to defend  These are  frequently published by organizations such as Network Security Focus at  http   www nsfocus com or by third party products to prevent attacks  through weaknesses in their software     Edit the httpurlpattern cf file to specify the regular expression that should be  rejected     Many URL patterns are defined in this file  You can make this file more  generic or more specific based on the needs of your environment  For more  information about editing this file  see the Symantec Enterprise Firewall and  Symantec Enterprise VPN Reference Guide     Create a rule for HTTP access that will check incoming URLs against the list  in httpurlpattern cf     To create a rule using http url patterning    1  2  3    4    Create a new rule   From the Services tab  choose http  as the service     From the Advanced Services tab  click Add to display the Service Parameters  dialog box     Enter http urlpattern in the parameter field  then click OK     Examples     Content Filtering oe    Using content restrictions    If you have a public server www xyz com  all documents you serve are stored  under that default directory  Someone trying to penetrate your network  could use the string ww
158. iance models  5110  5200 and  5300  as a rack mounted component or as a stand alone device      Connecting the Symantec Gateway Security appliance to your network      Performing the initial setup of your Symantec Gateway Security appliance       Note  Installation procedures differ for Symantec Gateway Security appliance  model 5110  and the 5200 and 5300 models  due to the different layouts of their  front and back panels        Cautions and warnings    Because this is an electrically powered device  adhere to the listed warnings and  cautions when installing or working with the Symantec Gateway Security  appliance        Warning  Read the installation instructions before connecting the system to its  power source        20 Installation    Stand alone hardware installation       Note  Refer to Important safeguards on page 243 for information regarding the  setup and placement of the Symantec Gateway Security appliance        Stand alone hardware installation    The Symantec Gateway Security appliance model 5110 ships with five rubber feet  for use when the appliance is set up as a freestanding unit        Note  Models 5200 and 5300 do not come with rubber feet        To install the Symantec Gateway Security appliance as a stand alone device    1 Make sure that the installation site has a smooth and level surface  such as the  top of a computer table  Also  avoid placing the Symantec Gateway Security  appliance in an area with a lot of clutter  such as books or other hardwar
159. ications    This tab provides the information necessary to support unauthenticated   non private traps     7 Enter the Host name and Port number provided by the SNMP system  administrator     8 Complete the Source Party  Destination Party  and Context fields by  entering the OID values provided by SNMP administrator     An OID is a sequence of integers separated by periods  such as 1 3 1 6 1 4     9 Click OK to save your notification     Chapter       Antivirus Scanning    The possibility of a virus attack is a serious negative aspect of the Internet  Viruses  can easily spread in the Internet environment and pose major threats to critical  business operations and financial investment  Implementing antivirus protection  at the firewall is a critical step in protecting your network against viruses and  other related threats  The Symantec Gateway Security appliance provides  comprehensive virus protection and lets you control antivirus scanning by  individual proxy so you can configure virus protection specifically to meet your  needs     Antivirus scanning on the Symantec Gateway Security appliance is implemented  as a client server relationship  The SMTP  HTTP  and FTP proxies on the  appliance are configured to act as clients that pass files to the antivirus scan  server  When you specify antivirus scanning for a particular proxy  files are  passed by the proxy to the antivirus scan server  which in turn scans the files for  viruses and mail policy violations  Files that hav
160. iginally backed up these files  using a password to restore and decrypt the keys files on a another machine  you  must enter this same password on the new machine when you restore        Caution  This procedure assumes that the new machine has the same IP  addresses and hostname as the original  Otherwise  you may have to edit  configuration files by hand  using SRL  after restoring them to the new machine        To restore backup configuration files to your Symantec Gateway Security  appliance    1 Right mouse click from within SRMC and select Restore from the All Tasks  menu to display the Restore Property window  see Figure 7 8      fa Please enter the local backup file name  oD       Local backup file name     Files Symantec Raptor Management Console backup    Browse         IV Set Recover password    Recover password        Verify        Cancel   Help         Figure 7 8 Restore property page    2 From the Local backup file name field  use the Browse button to locate the  backed up   rfwcfg file you created     Management Console 125    Restore configuration files    If you typed a recovery password when you backed up the files on the  original machine  select the Set Recover password check box and type the  same password here to decrypt your secret keys on the second machine        Note  If you did not enter a password when you originally backed up these  files  you can restore the configuration files to the same machine but you  cannot successfully restore the files to 
161. igs conf files do not match    User Action Contact Customer Support    Message 100 IDS Info  IDS LiveUpdate  IDS LiveUpdate process completed with  no change   Explanation The same or newer version of the files is already installed  there is no    need to update        User Action    None        250 IDS and antivirus scanning log messages    IDS Messages                Table B 3 IDS informational messages  Message 100 IDS Info IDS LiveUpdate  Schedule set failed  Explanation The scheduled update was not set successfully in the system schedule   User Action Re enter the schedule event in the LiveUpdate Properties window   Message 100 IDS Info  IDS LiveUpdate  Schedule set successfully       Explanation The scheduled update is set successfully in the system schedule                 User Action None    Message 100 IDS Info  IDS LiveUpdate  Schedule clear failed   Explanation The scheduled update was not removed successfully from the system  schedule        User Action Ensure that the Enable Schedule checkbox is not checked in the  LiveUpdate Properties window  If the problem persists  contact your  administrator to manually remove the entry in the system schedule                 Message 100 IDS Info  IDS LiveUpdate  Schedule cleared successfully   Explanation The scheduled update was removed successfully from the system  schedule    User Action None           Message 100 IDS Info  IDS LiveUpdate  LiveUpdate Now Failed       Table B 3    IDS and antivirus scanning log messages 25
162. ing  slowly for temperature warnings and quickly for temperature failures  If  the Symantec Gateway Security appliance is in danger of overheating  a  log message is sent to SRMC                 3 The Power button turns the power to the appliance on and off        Initial Setup 33    Front panel layout   models 5200 and 5300    Table 3 2 Model 5200 and 5300 front panel descriptions       4 The LCD screen displays the Symantec Gateway Security appliance  version number and system health monitoring information     The LCD screen is the same on all models  It allows you to monitor  appliance status  modify configuration parameters  and re initialize the  appliance  The displays available at the LCD panel are as follows       System startup self tests    Performance monitoring    System menu  see Use the system menu on page 43     As the appliance boots up  the LCD displays status messages        5 The front panel push buttons let you enter network information  directly into the appliance  see Front panel controls on page 34                  34       Initial Setup  Front panel controls    Front panel controls    The front panel controls are the same on all models  Use the following push  button instructions to enter all required setup information  detailed in the Initial  network configuration procedure on page 38  into the Symantec Gateway  Security appliance        Note  The front panel buttons perform dual functions  These functions depend  upon whether the appliance is in ini
163. ions etasan aeree aaa ccc a ee ence E E A 8 157    9 Antivirus Scanning    About Symantec AntiVirus    any e E E EEN EKE EARS ENE E a E 9 162  Viros Getectlon  e a EEE A be Ra dea AAE SINEERA E 9 163  Antivirus scanning on the Symantec Gateway Security appliance                  9 165  Configuring antivirus scanning           0  eee eee ees 9 165  Local versus remote scanning            0  cece eee eee eee eee eee 9 166  Configuring the antivirus scan Server        00  cece eee eee eee 9 168  Updating virus definitions          cece cece cece eee eee eee eee eee e enna 9 171  Running LiveUpdate on demand           0 0    cece eee eee eee 9 171  Scheduling LiveUpdate to run automatically           0 0 0 0    cee eee  9 173  Configuring proxy services for antivirus scanning            0    cece eee eee eee 9 173  Configuring antivirus scanning for the FTP and HTTP proxies            9 174  Configuring antivirus scanning for the SMTP proxy                 06  9 178  Enabling antivirus scanning in a rule         6  eee ee eee eens 9 183  Using the mail filter options 2 0 0 0    cece eee eee eens 9 186  Filtering mail by attachment filename                   0 0    eee eee 9 186  Filtering mail by attachment file size        0    rerni ni r eee 9 189  Filtering mail by subject         e eE EAS ce eee eee eens 9 191  Filtering mail by domain            eae ERTAKDA AAEE REA DEES 9 193  Filtering mail by maximum mail size         0 0    cece eee 9 195  Rejecting invalid mail messages
164. iple  copies of your program can run at once     7 Click OK to save your notification     Mail notifications    A Mail notification sends the text of a message to the person you designate        Note  Mail notification messages are NOT encrypted  The text of the message is  clear text  Information on the operation of your appliance included in Mail  Notifications could be used in an attack  For this reason  plan your notifications  carefully so that they will not go over public networks        154    Intrusion Detection System  IDS     IDS notifications    To configure a Mail notification    1  2    Expand the Monitoring Controls folder and select the Notifications icon     Right click and choose New gt IDS Notifications to display the General tab of  the Notification Properties page     Choose MAIL from the Action drop down list   Click the Severity tab     Check one or more of the check boxes to choose the severity level or levels for  which the notification will be triggered     Click the Mail tab        SGSA Notification Notification  6 Properties  New  S 2j xj    General   Severity Mail       Please enter an e mail address in which to send mail for this    notification     Account           Figure 8 8 Notifications     Mail Tab    In the Account field  enter the e mail address of the mail recipient     The hostname portion of the e mail address must be the hostname of the  mail server and the recipient must have an account or alias on that server     The notification pro
165. ise VPN Configuration Guide     3 Use the Action drop down list to choose the way in which the notification  will take place     BLACKLIST  Sends the blacklist notification to a specified firewall address  CLIENT PROGRAM  Launches a client program   MAIL  E mails the text of the log message to a designated person   PAGE  Transmits a message to a designated paging device   SNMPV1  Sends an SNMP alert to a designated system    Intrusion Detection System  IDS     IDS notifications    SNMPV2  Sends an SNMP alert to a designated system  Depending on the action you select  an additional tab will be displayed     Use the Time Range drop down list to select the time range during which  this notification applies     Use  lt ANYTIME gt  if you want the notification to be active at all times     Access the Time Range Properties page to create a new Time Range  Once  created  the Time Range is selectable via the drop down list  For more  information about setting Time Ranges  see the Symantec Enterprise Firewall  and Symantec Enterprise VPN Configuration Guide     Use the tab that was displayed when you selected an action to configure  details of the notification     The following sections describe the configuration of the different kinds of  notifications     Click the Severity tab        SGSA Notification  Notification  2 Properties  New  E 2  x     General Severity   Mail        Please select the severity levels which will trigger this  notification        r Severity  T High    T Medi
166. isplay the HTTPD Proxy Properties page     4 Click the Antivirus Scanning tab     5    Antivirus Scanning    Configuring proxy services for antivirus scanning    Use this tab to control the behavior of virus scanning     SGSA Services  FTPD Properties    Status   Timeout   Port Restrictions Antivirus Scanning      Fig This setting controls the behavior of virus scanning   iy       Figure 9 3    Antivirus scan server IP address fi 27 0 0 1    Antivirus scan server port number fi 344   8 ver is unavailable J   Scan Options   Scan and Repair or Delete 7   Which file extensions to scan    Only those in include list 7     Include list            386   adt   arj   amg  bin  cab  cbt  cla  com  cpl  dll  doc  dot  drv  eml  e    Restore default list      Exclude list     pe o             FTPD Properties     Antivirus Scanning Tab    In the Antivirus scan server IP address field  enter the IP address of the  antivirus scan server that will be used to scan for viruses     175    176 Antivirus Scanning    Configuring proxy services for antivirus scanning    The bind address you select here is dependent on whether you want local or    Table 9 1    remote scanning and on how the antivirus scan server that will do the  scanning has been configured  Use the following table for guidance     Configure the antivirus settings for FTP or HTTP       The antivirus scan server and  the proxy are on the same  appliance  and the scan server is  configured to accept only local  connections    127 0 0
167. ity that acts as the originator of the packets being sent or the final  destination of the packets passing through the tunnel     Remote End  VPH Policy  Finish Setup 1  Select an existing local security gateway using an already configured    security gateway entity   Cancel Setup Or    Select       to create a new local security gateway     ethl  2  Select network entity using an already configured network  entity     Or  Create a new local protected entity to serve as the originator of tunnel  packets or the final destination for tunnel packets     Once your local end selections are made  click the Remote End link     Figure 5 4 Local interface pull down menu    3 From the interfaces available in the pull down menu  select the outside  interface  eth0  to become your local security gateway  This displays the New  Security Gateway dialog box     4 In the dialog box  type a name for your gateway  Our example uses West  see  Figure 5 5      New Security Gateway 1 x   Name      west  Network Interface      etno    Cancel         Figure 5 5 New Security Gateway dialog box  local end    5 Click OK  your new security gateway will be used as the local security  gateway     vpn   83    Configure S2S tunnels using the wizard    Step 2 of the Local End screen gives you two ways to specify the originator or  the endpoint for tunnel packets       By selecting an existing network entity    By creating a new local protected entity    In this case  we will create a new entity to represent 
168. iveUpdate Vv  Vv  Girlfriend Unauthorized Access    Me    Wind  E p Reports   M Glimpse _CGI Unauthorized Access    Me    ALL  rA Sa Ea Vv  Vv  HTTP_Etc_Passwd_Download Unauthorized Access    Me    Linux     6 Monitoring v  v  ICMP_Dest_Proto_Unreachable Protocol Decode Sign    Me    ALL    6 November  2001 lv  Vv  ICMP_Host_Redirect Protocol Decode Sign    Me    ALL  Alerts Vv  M ICMP_Net_Redirect Protocol Decode Sign    Me    ALL  B aens    LY rcmp_t05 Host Redirect Protocol Decode Sign    Me    ALL  PBalertszo0110  Y  WY   ICMP_TO5_Net Redirect Protocol Decade Sign    Me    ALL  ay Alerts 20011109 1 Vv    IP_Timestamp Protocol Decode Sign    Me    ALL  6 Alerts 20011109 lv  Vv  Land Denial of Service Sig    Me    Wind  6 Alerts 20011108 lv  M Malformed_   HTR_IDC_Or_STM    Suspicious Activity Si   Me    ALL g  E    Antivirus Components zi Tal neers pee ae area gee ae     ofl        Done        A checkmark in the Enabled column for the attack name indicates that the  signature is enabled for detection  A checkmark in the Gated column for the  attack name indicates that the signature is to be gated upon detection     You can filter the signatures in the list  For more information  see the following  section Filtering signatures     Filtering signatures    You can filter your view of detectable attack signatures by attack type  operating  system  and or severity     To filter signatures by attack type    1 In the left pane  expand the IDS Components folder  and then expand th
169. l Setup  Setup wizard    Setup Wizard X x     Completing Symantec Gateway Security  Setup Wizard    The Setup Wizard has successfully   WA Completed the initial setup of your system     In order for these changes to take effect  you must click on  Finish to save the setup  exit the wizard and reboot the  system           Figure 3 17 Setup Wizard completion page    19 Click Finish     After you have successfully completed the Symantec Gateway Security  appliance Setup Wizard  see Figure 3 17   you are prompted to reboot the  appliance  When the reboot is complete  the Symantec Gateway Security  appliance is up and running        Note  You must access the logon screen again to connect to the Symantec  Gateway Security appliance  see Connect to Symantec Gateway Security  appliance on page 54         Once you have completed the Symantec Gateway Security appliance Setup  Wizard the first time  you can access it again from the Configuring your  Symantec System taskpad and edit any system information   See Figure 4 1      Chapter       Firewall    The SRMC provides two automated wizards for setting up the firewall features of  the Symantec Gateway Security appliance       The QuickStart Wizard provides a quick way to configure mail  FTP  and web  services for the Firewall       The SMTP Wizard provides a quick way to configure rules to provide anti   spamming and anti relay protection and prevent your internal mail server  from being used as a spam relay     For setting up firewall 
170. lected  Either press E to accept this default or press the    right arrow   gt   key to select  Out  for outside  Then press E to enter your  selection     For the network in Figure 3 3  you would select  Out   All address  information you enter in the next steps is applied to the interface you select  here    Enter the Symantec Gateway Security appliance interface IP address  Use the  arrow buttons on the front panel to enter all data  Press E to move to the next  LCD screen when the data is complete   For button operation instructions   see Front panel controls on page 34      IP Address   000 000 000 000    This is the address of the Symantec Gateway Security appliance interface that  is closest to the managing SRMC     For the network in Figure 3 3  you would enter 169 254 0 1        Note  If the SRMC is offsite  as in Figure 3 3  or simply not behind the  Symantec Gateway Security appliance in question  enter the outside interface  IP address  If the SRMC is behind the Symantec Gateway Security appliance   enter the appropriate inside interface IP address        Enter the netmask address for the IP address you just entered   Netmask   000 000 000 000    Initial Setup   29    Initial network configuration procedure    For the network in Figure 3 3  you would enter 255 255 255 0 as the  netmask     Enter the Gateway address to serve as the default gateway for the Symantec  Gateway Security appliance     If you have an internal SRMC behind an internal router  you must enter
171. lick OK     Antivirus Scanning 17    Using the mail filter options    Customizing virus messages    When an infection is found  and repaired or deleted  in a MIME encoded  message scanned by the antivirus scan server  the antivirus scan server can be  configured to add two types of messages to the mail message to warn the recipient  that a virus was found  Default text is provided  Either or both messages can be  customized     You can customize     The file repair message  which is added to the body of an e mail message  when an infected attachment is repaired or is deleted because it contained an  unrepairable virus or because it violated the established mail policy    For more information  see Editing the File Repair Message on page 198     The file remove message  which is placed in a text file called infection txt and  attached to an e mail message in place of an infected attachment that must  be deleted because it cannot be repaired    The file remove message is used only when an attachment is removed  because it contains a virus  It is not used when the attachment is removed  because of a mail policy violation     For more information  see Editing the File Remove Message on page 200     To update e mail messages when an infected file is repaired or deleted    1  2  3    In the left pane  expand the Antivirus Components node   Click Mail Options     In the right pane  double click MailFilter_Configuration to display the  MailFilter_Configuration Properties page     198 
172. llects on all  connections and connection attempts to the gateway     To view the system logfile messages   1 Expand the Monitoring Controls node    2 Expand the Logfiles icon    3 Click the month of the log file you want to view   A list of logfiles is displayed in the right pane   The logfiles are named by date  with the extension in the format yyyymmdd   For example  logfile 20010918   4 Double click the logfile you want to view to display the events it contains in    the right pane     The format of messages in the system logfile is provided in Table B 1              Table B 1 System Logfile Message Format  eee  Event Type Lists the type of message being logged  information  warning   etc    System Name Lists the system name where the logged event took place  Component Lists the daemon or action that is being logged  PID Lists the Process ID number of the logged event       Timestamp The time the attack was logged on the appliance       IDS and antivirus scanning log messages 247    IDS Messages       Table B 1 System Logfile Message Format    Message Number Lists the log number of the event or action       Message Text Lists further detail about the log entry       IDS Informational Messages    This section describes IDS informational messages  which have a message  number of 100     The format of IDS informational messages is provided in Table B 2           Table B 2 IDS informational message formats  Event Type Information  System Name System name  as entered in the Sy
173. llowing section Enabling Disabling  the IDS component     Because the Firewall VPN sends packets to the IDS  the Firewall VPN must be  enabled for IDS to function     Initially all signatures are enabled for detection by default  The gated option is  turned on or off as appropriate for each signature  You can configure detection  and gating options at the signature level in the SRMC     134 Intrusion Detection System  IDS     Configuring the IDS component    Enabling Disabling the IDS component  You can enable or disable the IDS component in the SRMC     To enable or disable the IDS component   1 Expand the Base Components branch    2 Click the System Features icon    3 Inthe right pane  double click the Intrusion Detection System component   4    In the IDS Properties window  check Enable Intrusion Detection System if  you want to enable IDS attack detection  uncheck the check box if you want  to disable IDS attack detection     5 Click OK     Configuring IDS Signatures    You can specify the signatures that you want the IDS to detect by enabling and  disabling signatures  then marking each enabled signature as either gated or non   gated in the Signature List     When a signature marked as gated is detected by the IDS  the packets associated  with that attack are not allowed to pass through the IDS engine and an entry is  written to the logfile  When non gated signatures are detected  the packets  associated with that attack are allowed to pass through the IDS engine and an
174. manufacturing     VPN    95  Configure VPN Client tunnels using the wizard      Configure VPN Client tunnels using the wizard    The VPN client tunnel configuration displayed in Figure 5 18 is an example of a  secure tunnel set up between a LAN behind a Symantec Gateway Security  appliance and a VPN client in the field  The following pages walk you through the  process of using the VPN Client Tunnel Wizard to set up the components of this  tunnel     In Figure 5 18  West is once again our local VPN Server in this example and  JSmith is the user name for our Symantec Enterprise VPN Client  SEVPN   The  goal of this configuration is to establish a VPN uniting the subnet behind the  local Symantec Gateway Security appliance with the SEVPN client JSmith     Local  West   SecurityGateway  206 7 7 2       The  Subnet Manufacturing Internet  192 168 10 0  Netmask SEVPN Client  255 255 255 0 JSmith       Figure 5 18 VPN Client secure tunnel  To configure a VPN Client tunnel    To begin using the wizard  from the SRMC Configuring your Symantec System  taskpad  see Figure 4 1   click the VPN Client Tunnel Wizard icon  The  Introduction screen shown in Figure 5 2 appears     96   vpn    Configure VPN Client tunnels using the wizard    The wizard screens as well as the configuration procedures for both the S2S and  VPN Client Tunnel Wizards in our examples are identical with one exception   configuring the remote end  Because the local end in this second example is the  same as in the fi
175. mize your ratings lists  changing the categories to which web sites   news groups  and Gopher sites belong  This feature allows you to adjust for  special circumstances     For example  suppose your company prohibits sites rated as Sports  However   your company does considerable business in the Arctic Ocean and needs to refer  to a site called www arctic_ocean com  which  for whatever reason  is rated as  Sports     To modify the rating    1    5    Located the URL you want to modify using the previous procedure  See  Searching capabilities on page 205      Once the URL is located  it appears in the Location field of the Ratings  Modifications Property page  ready for editing  For this example  http     www arctic_ocean com     Enter a description of the location  For example  Site dealing with economic  development in the Arctic region     Select the Rating Modification tab     Select Sports in the Ratings field and use the  gt  gt  button to move it to the  Location rated as field     Click OK     You can also add categories to a site s Ratings list  Prefix Web sites with http        Content Filtering 207    Using content restrictions    Using content restrictions    HTTP Document Content restrictions  accessible via the Access Controls   Content Profiles folder  allow you to control access to web content according to  file extension  URL  and by MIME type     Allowing extensions    You can use the Allow Extensions service limitation to allow access only to files  with spe
176. n the following manner        Network IP address information is erased     SRMC workstation connection information is erased       License information remains intact        5 The front panel push buttons let you enter network information  directly into the appliance  see Front panel controls on page 34                  32   Initial Setup    Front panel layout   models 5200 and 5300       Front panel layout   models 5200 and 5300    The Symantec Gateway Security appliance models 5200 and 5300 front panel  as  shown in Figure 3 2  contains six data entry and navigation keys and a two line   16 character liquid crystal display area  The initial configuration of the Symantec  Gateway Security appliance takes place at the unit   s front panel  where you enter  and modify parameters such as system and network IP addresses        E    Figure 3 2 Symantec Gateway Security appliance model 5200 and 5300 front    A  on    3    panel  Table 3 2 Model 5200 and 5300 front panel descriptions  1 The Status Indicators signal network activity  ethernet connections     and hard disk drive activity     blinks when there is traffic on the network interfaces  K e     labeled 0 for outside and 1 for inside      glows steadily to indicate an active connection on the network  A interfaces  labeled 0 for outside and 1 for inside      CO blinks when there is activity on the hard disk drive  labeled 0  1  SS through 3 are not used         2 The Temp indicator blinks to indicate temperature status  blink
177. nes that a file is not able to be infected  it immediately goes on  to the next file     Bloodhound and executable viruses    Bloodhound uses artificial intelligence  AI  technology to isolate and locate the  various logical regions of each program it is told to scan  It analyzes the program  logic in each of these components for virus like behavior and simulates this  behavior to determine whether the program is a virus     Bloodhound and macro viruses    Symantec Bloodhound Macro technology uses a hybrid heuristic scheme to  detect and repair more than 90 percent of all new and unknown macro viruses  automatically  For example  every time the antivirus scan server scans a Microsoft  Word document  Bloodhound Macro sets up a complete virtual Word  environment into which it loads the document  The macros contained in the  document are run as they would be in the word processing application   Bloodhound Macro monitors the macros as they run and watches for them to  copy themselves from the host document to another virtual document   Bloodhound Macro also stimulates the copied macros and verifies that they can  further propagate     164    Antivirus Scanning  Virus detection    Norton AntiVirus Extension  NAVEX     technology    NAVEX is a technology that lets Symantec update the scanning engine during  routine virus definitions updates  That means no inline revisions or time   consuming upgrades are necessary to ensure that your antivirus protection stays  current  regardless 
178. ng a new VPN Client  user named Jsmith     vpn   27    Configure VPN Client tunnels using the wizard    2 From the Remote End VPN Client Wizard page  see Figure 5 19   click the  Create a new IKE enabled VPN Client user link available in step 1  The New  IKE enabled User dialog box appears  see Figure 5 20      New IKE enabled User    j xj  Name     JSmith    An authentication method must be specified for a mobile user   You can select using Certificate or Shared Secret or both     IV Certificate    M Shared Key   OxDA03e4D SASDF84SDOS409SDFLQJESC       Figure 5 20 IKE enabled User dialog box    3 Inthe New IKE enabled User dialog box  type the Name of the VPN Client  user  JSmith      4 Select the authentication method s  this user will use  You can select  Certificate  or Shared Key  or both           Ifyou select Certificate  you must create an Entrust Certificate and  provide it to the user  See the section on configuring certificate  authentication in the Symantec Enterprise Firewall and Symantec  Enterprise VPN Configuration Guide           Ifyou select Shared key  enter a shared key of 20 or more printable  characters  Record the shared key so that you can provide it to the VPN  Client user     This example shows the use of both a certificate and s shared key   5 Click OK     Your new user  JSmith  is automatically entered in the first part of step 1  see  Figure 5 21      98   ven    Configure VPN Client tunnels using the wizard    s  YPN Client Tunnel Wizard         
179. ng through the antivirus scan server   e Perform antivirus scanning    Also  depending on your configuration  the antivirus scan server can attempt  repair of infected files and delete those files that cannot be repaired       Enforce a configurable mail policy  where the scan server scans mail messages  for policy violations based on the mail policy you establish for incoming and  outgoing SMTP traffic       Note  Some of these mail filters can be used during an e mail born virus  outbreak to further protect your network  For example  once you have  information on the characteristics of a new virus  you can use this  information to block an infected mail message right at the firewall  before it  affects your network  You can protect your network immediately  even  before virus definitions for the new virus have been posted          Add a customizable message to mail messages where an infected attachment  has been repaired      Add a customizable message to mail messages where an infected attachment  has been deleted because it could not be repaired    Configuring antivirus scanning    To implement antivirus scanning on the Symantec Gateway Security appliance   you must do the following       Configure the antivirus scan server via the Antivirus Components node   including     166 Antivirus Scanning    Antivirus scanning on the Symantec Gateway Security appliance      Specifying the bind address and port number on which the antivirus  scan server listens    For more informati
180. nk and make the necessary corrections        VPN policy pull down menu    3 Select an existing policy from the pull down menu     In this case  we are selecting the pre configured ike_default_crypto_strong    policy  Once your tunnel is configured  you can exit the wizard and access the    property page for this VPN policy to view its components        Caution  The VPN policy must be the same for both ends of the tunnel   Administrators must exchange this information  Refer to the Symantec  Enterprise Firewall and Symantec Enterprise VPN Configuration Guide for    details        To finish the configuration of the S2S tunnel  1 Click the Finish Setup link on the left side     The Finish Setup screen is displayed  with a check mark beside the VPN  Policy link to indicate that the VPN Policy configuration is complete     vpn   23    Configure S2S tunnels using the wizard       e  525 Tunnel Wizard xi   9 symantec  oo     Introduction Finish Setup  Local End   Here are your current selections   Remote End    Local Security Gateway Vest 206 7 7 3  VPH Policy   Local Network Entity manufacturing 192 168 10 0  S ity G  E  206 7 7 2  Finish Setup Remote Security Gateway East 6 7  Remote Network Entity finance 192 168 20 0  Cancel Setup YPN Policy ike_default_crypto_strong  Click on Finish to accept the changes or Save to save and reconfigure  If you  need to make any changes  click on the left pane links   Although this wizard creates the secure tunnel and all the necessary tunnel  c
181. non condensing                 es Product Overview    Appliance models and specifications          Power requirements Input rating 100 240V  50 60Hz  Maximum power 50 watts  consumption             Model 5200      250 node license     Four 10 100Base T ethernet network interfaces     Serial console interface     Serial port for uninterruptible power supply  UPS     LCD display and keypad for easy set up    e     Six status indicator LEDs    Model 5300      Unlimited node license   e Four 10 100Base T ethernet network interfaces     Serial console interface     Serial port for uninterruptible power supply  UPS     LCD display and keypad for easy set up    e     Six status indicator LEDs       Figure 1 2 Symantec Gateway Security appliance Model 5300    Product Overview 15    Components list                Table 1 2 Models 5200 and 5300 specifications  pano Se  Dimensions 17 50 in  x 22 75 in  x 1 75 in  44 5 cm x57 8 cm x 4 5 cm   Fits a standard 19  equipment rack  single rack unit  height  Weight 20 lbs  9 kg   Network interfaces Four 10 100Base T ethernet connections  User interface 2 x 16 liquid crystal display on front panel    LEDs  transmit receive  2   link  2   disk activity  1    temperature       Operating environment 32   to 95   F  0   to 35   C     10  to 90  humidity  non condensing           Power requirements Input rating 100 240V  50 60Hz  Maximum power 100 watts  typical   130 watts  max   consumption                Components list    The Symantec Gateway Se
182. ntec warranty 267  Symmetric routing 241  System  ID 41  information 42  menu  factory reset 43  network setup 43  shutdown 43  system ID 43  UPS setup 43  messages at setup 28  name 58    restarting 121  settings   changing 117  shutdown   from SRMC 121    T  TCP IP addresses  address transforms 8  Temperature 30  32  Tera Term Pro 128  tgz file 126  Time and date  changing 118    U    Uninterruptible Power Supply  UPS  connec   tion  models 5200 5300 28  Updating  IDS attack signatures using LiveUpdate 139  using Live Update 139  UPS setup 43  URL  blocking 202  ratings profile 202  restricting 207  wildcard character 209  User documentation 16    V  Verifying  clusters 224  connectivity 108  Viewing  Executive Summary report 146  IDS  alerts 142  signatures in the Signature Configura   tion window 134  VIPs    configuring addresses 236    Virus  detection 163  updating definitions 171    Ww  Warranty 267  Web setup 64  WebNOT 202  WebNOT Ratings Service 202  Wizards  cluster 214  S2S tunnel 77  setup 56  tunnels 79  95  Worksheets  network configuration 36    Index    281    282   Index    
183. o filter signatures by attack severity    1    In the left pane  expand the IDS Components folder  and then expand the  Configuration branch     Click Signatures    All available signatures appear in the right pane    In the right pane  right click  then click Filter    On the Severity tab  click Display Selected to enable the severity check boxes     Check the check box for each severity level that you want to view in the  Signature List     Click OK   All signatures of the selected severity appear in the right pane     Specifying which signatures the IDS detects    You can specify the signatures that you want the IDS to detect     To specify the signatures that the IDS detects    1    In the left pane  expand the IDS Components folder  and then expand the  Configuration branch     Click Signatures     All available signatures appear in the right pane  A checkmark in the Enabled  column for the attack name indicates that the signature is enabled for  detection     You can select multiple records in the list       To select consecutive records  click the first item  press and hold down  SHIFT  then click the last item     138    Intrusion Detection System  IDS   Configuring the IDS component      To select records that are not consecutive  click the first item  press and  hold down CTRL  then click each item     3 Right click  then click Properties     In the Properties window  check the Enabled checkbox to enable all selected  signatures  To disable the selected signatures  
184. ocal      eth0    If you select eth0  the antivirus scan server accepts only scan requests from  the eth0 interface  By default  this is the inside interface     170 Antivirus Scanning    Configuring the antivirus scan server    ethl    If you select eth1  the antivirus scan server accepts only scan requests from  the eth1 interface  By default  this is the outside interface        Note  On some appliances  additional interfaces may be available        5 Enter the TCP IP Port Number on which the antivirus scan server listens     This port number must be exclusive to the antivirus scan server  The default  port number is 1344  If you use a port number other than the default  select a  number greater than 1024 that is not in use by any other program or service     6 Click OK to save your configuration     Antivirus Scanning ee    Updating virus definitions    Updating virus definitions    The virus definitions used by the Symantec Gateway Security appliance to detect  and repair viruses are updated using Symantec   s LiveUpdate technology   Updated virus definitions files are supplied by Symantec at least every week and  whenever a new virus threat is discovered  The Symantec Gateway Security  appliance can be configured to poll the Symantec LiveUpdate servers periodically  to check for updated definition files  If new virus definitions are available  the  proper files are downloaded and installed in the proper location        Note  You must have an Internet connection in order
185. of platform  even against new virus threats     The scanning engine is made up of dozens of complex search algorithms  CPU  emulators  and other program logic  The scanning engine examines a file to  determine whether the file contains viruses  The scanning engine scans files and  disks for virus fingerprints  unique sequences of bytes known to be contained in  viruses   These fingerprints are stored in the virus definitions files downloaded  each week  The scanning engine also repairs infected files     Occasionally  a new virus or class of viruses emerges that cannot be detected by  existing scanning engines  These viruses require new algorithms for detection     and consequently a new scanning engine  With the NAVEX technology   Symantec engineers can quickly upgrade the fundamental Symantec AntiVirus  scanning engines  with no extra cost or effort required on the part of the  customer     Striker technology    Striker technology identifies polymorphic computer viruses  which are the most  complex and difficult viruses to detect  Like an encrypted virus  a polymorphic  virus includes a scrambled virus body and a decryption routine that first gains  control of the computer  and then decrypts the virus body  However  a  polymorphic virus also adds a mutation engine that generates randomized  decryption routines that change each time a virus infects a new program  As a  result  no two polymorphic viruses are the same     Each time Striker scans a new program file  it loads th
186. ole  Symantec Raptor Management Console              Name     Password     Management Port  fai 8      IV Obtain read write access upon connecting    coe _     Figure 3 11 SRMC logon screen       Type the IP address of the Symantec Gateway Security appliance interface in  the Name field   The IP address you gave the appliance during initial setup      Type the SRMC Password that the Symantec Gateway Security appliance  displayed during the initial setup procedure   See Initial network  configuration procedure on page 38      Click OK     When you attempt to connect through the SRMC for the first time  the  Symantec Gateway Security appliance Setup Wizard starts automatically  It  prompts you for required Symantec Gateway Security appliance  configuration setup information  You must complete this wizard before you  can begin managing Symantec Gateway Security appliance  See instructions  in the next section        Caution  Anyone who can access the SRMC can connect to the Symantec  Gateway Security appliance once the password has been entered  Be sure to  keep the password for the administering computer a secret        5    56   initial Setup    Setup wizard       Setup wizard    The Symantec Gateway Security appliance Setup wizard automatically starts  when you connect to a Symantec Gateway Security appliance for the first time  from the SRMC  The Setup Wizard prompts you for the following setup  information that is necessary to run Symantec Gateway Security appliance       S
187. omponents for you  once you ve completed the wizard  you can access the  property pages for all the items you ve selected and make changes   Name   manufacturingtofinance Finish   Save    Figure 5 16 Finish Setup  S2S Tunnel Wizard    The Finish Setup screen  see Figure 5 16  displays the selections you have  made in the previous screens  If you have failed to make a required selection   that item appears with the word  undefined  beside it in the Finish Setup  screen and that link has no check mark beside it on the left side of the screen     If you were unable to complete any of the screens up to this point  simply  click on that screen   s link in the left pane to go back     2 The Finish Setup screen assigns a default name to your tunnel     In the Name field  enter your own name for the secure tunnel before you  save     In Figure 5 16  we have named the tunnel manufacturingtofinance     3 If each left pane item has a check mark beside it  you can now click the Save  button to save your secure tunnel configuration     If there are any errors in your configuration  a message notifies you that the  configuration is invalid  You can then click on any of the left side links to  make the necessary corrections     When you have completed and exited the tunnel wizard  you can view your  configuration in SRMC by expanding the Virtual Private Networks folder     94    VPN    Configure S2S tunnels using the wizard    clicking on the Secure Tunnels  and then double clicking the ent
188. on  see Configuring the antivirus scan server on  page 168       Configuring LiveUpdate to ensure that your virus protection remains  current    For more information  see Updating virus definitions on page 171       Establishing your mail filter policy to optionally block mail based on  total message size  attachment size or file name  message subject  or  message origin    For more information  see Using the mail filter options on page 186       Create specific rules  via the Rules icon under the Access Controls node  to  implement antivirus scanning by specifying FTP  HTTP  or SMTP as a service  and enabling antivirus scanning for that service or create a rule that allows  multiple services which can each have antivirus enabled    For more information  see Enabling antivirus scanning in a rule on page  183       Configure the way in which antivirus scanning is implemented for each  proxy service  FTPD  HTTPD  and SMTPD  via the Antivirus Scanning tab  on the Proxy Services properties page for each proxy    For more information  see Configuring proxy services for antivirus  scanning on page 173     When you create specific rules for SMTP  HTTP  or FTP  you must enable  antivirus scanning for any rule for which antivirus scanning is to occur  You can  have multiple rules for a given proxy  and antivirus scanning must be enabled  independently for each rule  For each proxy service  SMTPD  HTTPD  and  FTPD   you configure the manner in which antivirus is implemented for that  p
189. on Properties page     188 Antivirus Scanning    Using the mail filter options    4 Click the File Names tab        SGSA  Mail Options MailFilter_Configuration Properties 1 2  x   Maximum Mail Size   Virus Message   Invalid E mail    File Names   File Sizes   Subjects   Domains    Use this page to define file names of attachments to be  filtered        Messages with attachment names you enter below can be rejected  or the attachment can be removed from the message if the Antivirus  Scan Option for the SMTP proxy is    Scan and Delete  or  Scan and  Repair or Delete         Reject the Message    Remove the Attachment    FileName  oS Add       Figure 9 8 Mail Filter File Names page    5 Select how the antivirus scan server handles messages that contain an  attachment with a specified file name     Your choices are       Reject the message   the antivirus scan server rejects all messages that  contain an attachment with a specified file name       Remove the attachment   the antivirus scan server removes any  attachments with a specified file name and delivers the rest of the  message  including attachments with file names that have not been  specified for removal     6 In the File Name field  type a file name   Search strings are not case sensitive  You can use the following characters     Use a question mark     as a wildcard to represent a single character     Use an asterisk     as a wildcard to represent zero or more characters       Use a backslash     as an escape charact
190. onnection if configured to do so           Message 343 Antivirus Warning  Failed send on antivirus scan server socket  due to  lt error   gt        Explanation The firewall could not send data to the antivirus scan server        User Action Make sure the antivirus scan server is up and running and  accepting connections           Message 343 Antivirus Warning  Out of Memory     343 Antivirus Warning  Error checking extension           Explanation An error occurred while checking a file against the file extension  list  User Action No user action is needed  Since this may signal an attack  the file is    automatically scanned           Message 343 Antivirus Warning  select failed due to  lt error   gt     343 Antivirus Warning  recv failed due to  lt error   gt        Explanation There was an error receiving data from the antivirus scan server   which caused the proxy to drop the connection        Table B 6    IDS and antivirus scanning log messages 259    Antivirus scanning messages       Antivirus scanning messages    User Action    Check to make sure the antivirus scan server is up and running           Message    343 Antivirus Warning  The antivirus scan server detected   lt threat gt  and  lt action gt     Where threat can be one of the following      one or more viruses trojans worms      apolicy violation     both an infection and a policy violation  and action can be one of the following      took no action     repaired the file     deleted or rejected the file    If t
191. ore we need to have a different VIP configured for each one     DNS resolvers must be configured to point to the individual IP addresses of the  appliances  not the VIP addresses     Finally  we configure a static route on the 169 10 10 1 router  outside network    internet  that says that all traffic destined for the 169 10 10 0 24 network should  go through the VIP 169 10 10 250     To configure VIPS  use the Create Cluster Wizard and follow the steps in  Creating a cluster for software high availability load balancing on page 215   When you get to the Define primary subnet and virtual IP addresses screen  you  would assign a subnet to be the heartbeat network and assign VIP addresses to  cluster members as shown in Figure 11 14     High Availability and Load Balancing   229    HA LB Implementation       Create Cluster Wizard E xi    Define primary subnet and virtual IP addresses   Choose the subnet to be used as the heartbeat or control network   Click the Edit button to specify the virtual IP addresses  VIPs  for the members of the cluster        Subnet  192 168 30 0 hd    Cluster member information        Virtual IP address  BB 192168300 192 168 30 250  BA 172 168 6 0 172 168 6 250  BA 192 168 1 0 192 168 1250  BB 16910100 169 10 10 250    Edit   Clear All VIPs         E       Figure 11 14 Define primary subnet and virtual IP address screen    We use the VIP addresses as reference points to previous definitions that would  otherwise use a physical address  Doing this rem
192. ormation  Specify the system information to be used by this system     System name     Domain name    yourdomain com  Default gateway IP    10  1  11  License   eval pve59f917423    Tl    Lock Front Panel Keyboard          cmos         Figure 3 13 Setup Wizard System Information page    Enter a System Name for the Symantec Gateway Security appliance     Each appliance ships with a pre configured system name  You can change  this name here if necessary     Type the Domain Name for the system   A domain name is displayed by default  Change this to match your domain     The Default Gateway IP field displays the information you typed during the  appliance initial setup process     You can change this IP address  if necessary     Type the License Key  To obtain this license key  you must provide your  System ID and product serial number  see Get your license key on page 45    If you do not type a license key here  the Symantec Gateway Security  appliance will run for a 30 day grace period     Check the Lock Front Panel Keyboard checkbox if you want to disable the  buttons on the front panel of the appliance     Initial Setup  Setup wizard    Setup Wizard Be xj    System Features  Specify the system features you want to enable on this system        Check the features you want to enable and clear the features you want to  disable  The system features shown here are based on the license key in the  previous page  not the system s current setting     System Feature                    
193. ote  The default Include and Exclude lists contain the recommended file  types to protect your network against viruses and other types of malicious  code  To minimize potential exposure to infection  use care in editing  extension lists  For maximum security  you can choose to scan all file types  regardless of extension  but be aware that performance may be impacted  during periods of peak usage        If you have selected Only those in include list from the Which file extensions  to scan list  optionally edit the Include list to add or remove file extensions   Add any additional file extensions you want to scan  Delete any extensions  that you do not want to scan       Use a semicolon     to separate file extensions     Use a single period to indicate a file without an extension     Use a question mark     as a wildcard     If you make changes to the list of included files and want to restore the  default list of files  click Restore default list     If you have selected All except those in exclude list from the Which file  extensions to scan list  optionally edit the Exclude list to add or remove file    ne Antivirus Scanning    Configuring proxy services for antivirus scanning    extensions  Add any file extensions you do not want to scan  Delete any  extensions that you want to scan         Use a semicolon     to separate file extensions     Use a single period to indicate a file without an extension     Use a question mark     as a wildcard     12 Click OK to save your 
194. ou conspicuously and  appropriately publish on each copy an appropriate copyright notice and  disclaimer of warranty  keep intact all the notices that refer to this License  and to the absence of any warranty  and give any other recipients of the  Program a copy of this License along with the Program     You may charge a fee for the physical act of transferring a copy  and you may  at your option offer warranty protection in exchange for a fee     You may modify your copy or copies of the Program or any portion of it  thus  forming a work based on the Program  and copy and distribute such  modifications or work under the terms of Section 1 above  provided that you  also meet all of these conditions     You must cause the modified files to carry prominent notices stating that you  changed the files and the date of any change     You must cause any work that you distribute or publish  that in whole or in  part contains or is derived from the Program or any part thereof  to be    263  GNU GENERAL PUBLIC LICENSE    licensed as a whole at no charge to all third parties under the terms of this  License     If the modified program normally reads commands interactively when run   you must cause it  when started running for such interactive use in the most  ordinary way  to print or display an announcement including an appropriate  copyright notice and a notice that there is no warranty  or else  saying that  you provide a warranty  and that users may redistribute the program under  t
195. ou do not  use it to connect directly to the system  Provide this root password to  customer support if your machine requires maintenance        Note  You cannot change your passwords on the Symantec Gateway Security  appliance itself        Initial Setup  Initial network configuration procedure    10 The System ID displays   System ID is    428a0d60 for example     You provide this System ID to Symantec to obtain your license key  see Get  your license key on page 45 for information on obtaining a license key    Write the System ID on the worksheet provided in this manual and press E     11 You are next asked if you would like to save your setup information   Save Setup     Yes  No     By default  No is selected  If you press E here to enter No  Symantec Gateway  Security restarts the setup procedure and you must re enter your network  information     To save your setup data  press the left   lt   arrow key to select Yes and press E  to save it  When you select E  the following message should display     Saving Config       Config Saved   12 Press and hold down E to reboot     The Symantec Gateway Security appliance is now ready to be configured  using the SRMC  For more information see Chapter 4  Configure using  SRMC wizards     4l    42   Initial Setup    Display system information       Display system information    Once the initial network configuration is complete  and the appliance is rebooted   the LCD enters a monitoring mode that it remains in during normal system 
196. ou to provide a virtual IP address  VIP  for the    cluster member  This IP address is used to represent the identity of the cluster  to outside machines and routers        Note  You must assign at least one VIP address to each subnet of the cluster        High Availability and Load Balancing   221    Preparing to create a cluster    17 The VIP address can be assigned in three different ways  depending on your  cluster requirements       Enter a Virtual IP Address for the cluster member without doing  anything else in this dialog box     This creates a normal VIP that is free to participate in load balancing  It  does not have any type of  stickiness  associated with it       Enter a Virtual IP Address for the cluster member and check the This  VIP is sticky check box     This creates a sticky VIP that will stay on the node it is assigned to as  long as that node is healthy  If the node goes down  the VIP is  transferred to another node in the cluster  When the original node  comes back up  the VIP stays with the node that it transferred to     e Enter a Virtual IP Address for the cluster member  check the This VIP is  sticky check box  and choose the IP address of a preferred appliance for  the VIP to be associated with     This creates a sticky VIP that has a preference for the IP address you  select  It will stay with the node it is assigned to as long as that node is  healthy  If the node goes down  the VIP is transferred to another node in  the cluster  When the node the
197. our manufacturing  subnet shown in Figure 5 1     From the second part of step 2  select the Create a new local protected entity  link to display a pull down menu of allowed entity types  see Figure 5 6        525 Tunnel Wizard   x      9 symantec  oe  Introduction Local End  Local End To configure the local end of your secure tunnel  you select a local security  Remote End gateway  generally your Raptor system s outside interface  and the protected  teiL network entity that acts as the originator of the packets being sent or the final  VPH Policy destination of the packets passing through the tunnel   Finish Setup 1  Select West using an already configured security gateway entity   Or  Cancel Setup Select a local interface to create a new local security gateway     2  Select an existing network entity using an already configured network  entity   Or    Y   to serve as the originator of tunnel packets or the final  tunnel packets        Once ya Group plections are made  click the Remote End link        Figure 5 6 Local protected entity pull down menu    7 In this example  we select Subnet from the pull down menu to create the  192 168 10 0 manufacturing subnet displayed in Figure 5 1  A New Subnet  dialog box appears  see Figure 5 7      84   VPN    Configure S2S tunnels using the wizard       CEET     manufacturing       192 168 10 0          Figure 5 7 New Subnet dialog  local end    8 Inthe dialog box  type a Name for your subnet entity  in this case   manufacturing  and t
198. ource IP address of the attack    Destination IP  The destination IP address of the attack    OS Impacted  The operating systems that can be affected by this attack     Click on an alert in the right pane  then click Page Up on the keyboard to  view the previous alerts logfile     Click Page Up  Page Down  Home  and End on the keyboard to navigate to  all records in the IDS Alerts Viewer     Updating the View in the IDS Alerts Viewer    Though the SRMC automatically updates the view of the current logfile every 15  seconds while the IDS Alerts Viewer is open  you can update the view of the  logfile at any time     To update the view of the current logfile    Right click in either the left or the right pane  and then press F5     Intrusion Detection System  IDS  145    IDS Reports    IDS Reports    You can generate both an Fxecutive Summary report and a Configuration report  that contain IDS information for an appliance     Configuration Report    The Configuration Report provides the current configuration of each attack  signature  along with configuration information for LiveUpdate for the selected  appliance     To generate a Configuration report   1 Select the appliance for which you want to generate a report    2 Expand the IDS Components branch    3 Expand the IDS Reports branch  and then click Configuration Report   The report  ConfigReport htm  appears in the right pane and is saved to     Program Files Symantec Raptor Management Console   reports IDS appliance IP     
199. oval     In the File size field  enter a file size  in bytes    Click Add     The file size you have specified displays  prefaced by the action the antivirus  scan server will take  For example   Reject Message  20000     The File size field clears  letting you specify another file size  You can add  multiple file sizes  For each file size you specify  you first select how the  antivirus scan server handles messages with attachments that match that file  size     8 To remove a file size from the list  select it in the list and click Delete     Antivirus Scanning 191    Using the mail filter options    9 To start over with a blank list  click Reset   10 When you have finished  click OK     You can also configure the antivirus scan server to reject messages that exceed a  maximum size limit  For more information  see Filtering mail by maximum mail  size on page 195     Filtering mail by subject    To filter by subject  you specify one or more subject lines  or strings to be found  within subject lines  that are known to be threats  Messages with these subject  lines are rejected     Subject strings you specify are matched against the subject line of each e mail   Wildcard characters can be used appropriately to match when you are not sure of  the exact subject line  Any white space  tabs or spaces  at the beginning of the  subject line is ignored  White space at the beginning of your search string  the  text you enter for the subject line filter  is also ignored  White space at
200. oves any single point of failure   In our example  three appliances are virtually known by one VIP address and  seem to be one appliance  They still have different physical addresses  but  everybody addresses each appliance by its virtual IP address  Multiple machines  in the cluster can have the same virtual IP address  so if one fails  another can take  its place and no additional routing needs to take place     The one SRMC exception to addressing the Symantec Gateway Security  appliances by their VIP address is connecting to appliances and managing them   You cannot use the VIP address in the SRMC because you cannot be guaranteed  of connecting to the specific appliance you desire  Any appliance on your  network could be the active one at any given time  Therefore  all SRMC  connections must be directed to the real IP address of the security gateway you  wish to manage     240      HA LB terms    High Availability and Load Balancing  HA LB Implementation    Incident node    Only one machine has control of the VIP at any given time  This machine is  referred to as the incident node  The incident node receives ownership of the VIP   and all communication requests directed to the VIP are handled by the incident  node     When a communication request comes in to the incident node  the incident node  is responsible for       Serving the request    Passing on the initial request to another node in the cluster      Passing on the request to the node that is currently serving the
201. p has enough information to start copying the program files  If you want to review or  change any settings  click Back  If you are satisfied with the settings  click Next to begin  copying files     Current Settings        Target Directory  Folder  C  Program Files Symantec Raptor Management Console   Additional Components   None    InstallShield          Figure 3 7 SRMC Start Copying Files window    8 Click Next to install SRMC and display the Setup Status window   see Figure 3 8   which shows the progress of the installation     Symantec Raptor Management Console Setup xi    Setup Status       Symantec Raptor Management Console Setup is performing the requested operations     Installing   C      Symantec R aptor Management Console bin raptor65 ico    Sa 22           InstallShield       Figure 3 8 SRMC Setup Status window    Initial Setup 53    Install SRMC    When all the files are installed  SRMC InstallShield Wizard Complete window  appears  see Figure 3 9      Symantec Raptor Management Console Setup    InstallShield Wizard Complete       The InstallShield Wizard has successfully installed Symantec  Raptor Management Console  Before you can use the  program  you must restart your computer           No  will restart my computer later     Remove any disks from their drives  and then click Finish to  complete setup           Figure 3 9 SRMC InstallShield Wizard Complete window    9 Specify whether to reboot now or later  then click Finish     10 When you reboot the Symantec
202. page notification     You must also specify the com port that will be used to connect to the pager     To specify the com port    1    Expand the Base Components folder     Intrusion Detection System  IDS  157    IDS notifications    2 Click the Gateway Services icon and then double click NOTIFYD in the right  pane     3 Select the Com Port tab and choose the appropriate com port from the pull   down menu     Comport 0 is the default for paging   4 Click OK     SNMP notifications    You can configure the Symantec Gateway Security appliance to send traps  containing alert messages to network management stations  Currently  two  versions of SNMP exist        SNMPv1     SNMPv2    The SRMC Notifications Properties page enables you to specify each type of  SNMP notification  The firewall does not support gets and sets by SNMP     You follow the same process in setting up SNMPv1 and SNMPv2 notifications as  for other notification types  The only difference consists in the information you  must enter in SRMC   s text fields  This information must be supplied by the  system administrator of the device to which the appliance sends SNMP traps     For SNMP managers to understand traps  the names of any device specific  variables to be exchanged must be agreed upon  Their variable names are stored  in the Management Information Base  MIB  of the agent and manager software   Although the appropriate MIB values for Symantec Gateway Security appliance  SNMP alerts are pre configured in the 
203. ply cord from the appliance to an electrical outlet or  UPS supply unit     For UPS configuration details  see Connect an Uninterruptible Power Supply   UPS  on page 28     26 Installation    Power on the model 5110       Power on the model 5110    Turn on the power by pressing the On Off switch on the back of the Symantec  Gateway Security appliance       The hard disk spins up  the fans turn on  and the LCD screen lights up       A number of status messages are displayed on the LCD screen as the  appliance completes its boot process     Back panel of models 5200 and 5300    This section describes the features of the back panel of the Symantec Gateway  Security appliance models 5200 and 5300     o E eG        Git E 7    Figure 2 6 Models 5200 and 5300 back panel    Table 2 2 Models 5200 and 5300 back panel    1  The Power socket receives the AC cord that is provided        2  The USB port is not currently supported        3   Auxiliary 1 and Auxiliary 2 network connectors enable Ethernet network  connections and accept the 10 100Base T network cables        4  The Serial connector allows you to connect a UPS to the serial port for  smart UPS support  See Connect an Uninterruptible Power Supply   UPS  on page 28                 Installation ai    Connect models 5200 and 5300 to the network    Table 2 2 Models 5200 and 5300 back panel       5  The Serial console port  155200 Bps  allows you to connect a terminal  emulator to act as a system console  This lets you logon to the 
204. r free     THE ABOVE WARRANTIES ARE EXCLUSIVE AND IN LIEU OF ALL OTHER  WARRANTIES  WHETHER EXPRESS OR IMPLIED  INCLUDING THE  IMPLIED WARRANTIES OF MERCHANTABILITY  FITNESS FOR A  PARTICULAR PURPOSE AND NONINFRINGEMENT OF INTELLECTUAL  PROPERTY RIGHTS  THIS WARRANTY GIVES YOU SPECIFIC LEGAL  RIGHTS  YOU MAY HAVE OTHER RIGHTS  WHICH VARY FROM STATE  TO STATE     4  Disclaimer of Damages     SOME STATES AND COUNTRIES  INCLUDING MEMBER COUNTRIES OF  THE EUROPEAN ECONOMIC AREA  DO NOT ALLOW THE LIMITATION  OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL  DAMAGES SO THE BELOW LIMITATION OR EXCLUSION MAY NOT  APPLY TO YOU     TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND  REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF  ITS ESSENTIAL PURPOSE  IN NO EVENT WILL SYMANTEC OR ITS  LICENSORS BE LIABLE TO YOU FOR ANY SPECIAL  CONSEQUENTIAL   INDIRECT OR SIMILAR DAMAGES  INCLUDING ANY LOST PROFITS OR  LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE  SOFTWARE EVEN IF SYMANTEC HAS BEEN ADVISED OF THE  POSSIBILITY OF SUCH DAMAGES     IN NO CASE SHALL SYMANTEC S OR ITS LICENSORS  LIABILITY EXCEED  THE PURCHASE PRICE FOR THE APPLIANCE  The disclaimers and  limitations set forth above will apply regardless of whether you accept the  Software or the Appliance     271  SYMANTEC APPLIANCE LICENSE AND WARRANTY AGREEMENT    5  U S  Government Restricted Rights     RESTRICTED RIGHTS LEGEND  All Symantec products and documentation  are commercial in nature  The so
205. rLink are registered  trademarks of 3Com Corporation  Compaq is a registered trademark of Compaq  Corporation  Zip and Jaz are registered trademarks of lomega Corporation   SuperDisk is a trademark of Imation Enterprises Corporation  Rainwall is a  registered trademark of Rainfinity Corporation  This product includes software  developed by the Apache Software Foundation     Other product names mentioned in this manual may be trademarks or registered  trademarks of their respective companies and are hereby acknowledged     Technical support    As part of Symantec Security Response  our global technical support group  maintains support centers throughout the world  Our primary role is to respond  to specific questions on product feature function  installation  and configuration   as well as to author content for our web accessible Knowledge Base  We work  collaboratively with the other functional areas within Symantec to answer your  questions in a timely fashion  such as working with Product Engineering as well  as our Security Research Centers to provide Alerting Services and Virus  Definition Updates for virus outbreaks and security alerts     Highlights of our support offerings include       A range of support options giving you the flexibility to select the right  amount of service for any size organization      Telephone and Web support components providing rapid response and up   to the minute information      Upgrade Insurance delivering automatic software upgrade prote
206. rations  See Use  secure remote login on page 128 for further details on SRL       Management Console    Monitor Symantec Gateway Security appliance    Monitor Symantec Gateway Security appliance    Before you move into more advanced management functions  it is important to  understand the monitoring capabilities of the Symantec Gateway Security  appliance  The Symantec Enterprise Firewall and Symantec Enterprise VPN  Reference Guide deals with monitoring in detail     The Logfiles window allows you to view logfiles that contain information about  the Symantec Gateway Security appliance   s operation  To access this window   click on Logfiles in the SRMC root directory     Table 7 1 lists a few messages you may encounter right after setup  For a full list  of messages  see the log file messages appendix of the Symantec Enterprise Firewall    and Symantec Enterprise VPN Reference Guide  A number of common problems  are discussed in depth in Knowledge Base  accessible from the Symantec  Customer Service Support website at http   www  symantec  com              techsupp    Table 7 1 Setup  Number   Message Explanation  120   TYPE Info  informational_message   This message logs information  such  as  license status and DNS problems   121   statistics  duration  seconds  This message logs statistics about a  user  user  auth  auth type  connection  Elements are optional  sent  amount  rcvd  amount  but occur in this order  Info 121 can  srcif  source interface  src  source    be u
207. re  as  described in Initial network configuration procedure on page 38  or access it  from the appliance System Menu described in Use the system menu on page  43       Locate the product serial number on the Symantec Gateway Security License  Key Request and Support Registration form     After you obtain your license key  you can enter it as part of the Symantec  Gateway Security SRMC Setup Wizard procedure  see QuickStart wizard on page  65   If you do not enter the license key in the Setup Wizard during the initial  configuration procedure  use the SRMC System Properties to enter your license  key at a later time     46   Initial Setup    Restoring the Symantec Gateway Security appliance operating system       Restoring the Symantec Gateway Security appliance  operating system    The Symantec Gateway Security CD ROM ships with the Symantec Gateway  Security appliance  It contains a Symantec Gateway Security appliance operating  system restore program  In the unlikely event that a complete reinstallation of the  software is required  you can boot this CD ROM in a PC connected to the  appliance        Caution  Before you use this procedure  contact Customer Support as this  operation will result in the complete overwriting of your existing Symantec  Gateway Security appliance configuration  All configuration data will be lost        The requirements for the PC running the operating system restore program are     APC whose BIOS is set up to allow you to boot from a CD ROM    
208. re 3 15 Setup Wizard Network Interfaces page    From the list of ethernet interfaces displayed in the Network Interfaces field   shown in Figure 3 15   select the interface that you want to configure     The Symantec Gateway Security appliance provides a maximum of four  ethernet connections  which are all listed  You can configure and edit the  ethernet connections you see here  but you cannot add new ones     After you select the interface to configure  type the interface IP address in the  corresponding field     Type the interface netmask     From the Type pull down list  select where this interface is on the network   Inside or Outside         Note  When you configure eth0 and eth1 interfaces  Inside or Outside   the  values in this field cannot be changed        If you want to enable DHCP on the eth1 outside interface  check the Use  DHCP check box to enable DHCP     Click Apply to accept your edits     Initial Setup 61    Setup wizard    16 Repeat steps 11 through 15 for each interface you are configuring  Click Next  to move to the next page when you are finished     17 You are then prompted to set the Date and Time  see Figure 3 16         Setup Wizard    System s Date and Time  Set Date and Time of the system    02 07 2002 14 01             Figure 3 16 Setup Wizard System   s Date and Time page    If the date and time settings are incorrect  click the Set Date and Time check  box and edit these settings     18 Click Next to complete the setup wizard     62    Initia
209. res using LiveUp   date 139  viewing alerts 142  Incident node 240  Informational messages 247  Initial setup procedure 38  Installation  connecting  power cord 25  27  to network 25  27  powering on  model 5110 26  models 5200 5300 28  rack mount appliance 22  SRMC 48  49  Uninterruptible Power Supply  UPS  con   nection 28  Intrusion Detection System    Index   277    see IDS  IP address  configuring during initial setup 38  configuring virtual IP addresses for clusters  236    K  Keypad  using locked 129  130    L  LEDs  See Status indicators   License  GNU general public 262  Symantec appliance license and warranty  agreement 267  License Key 58  obtaining 44  119  Lithium battery 243  LiveUpdate 164  antivirus 171  disabling the scheduler 142  IDS 139  140  141  142  running on demand 141  171  scheduling 140  171  Load balancing  network resources 232  Local antivirus scanning 166  Locked keypad  using 130  Log files  managing 127  Log messages  antivirus 255  IDS 247  Login  remote 128    M   Mail  notification 153  setup 64    278   Index    Management Information Base  MIB  157  Managing  Gateway security functions 12  log files 127  MIME types 211  Monitoring  Gateway security functions 12  mode 42    N  Netmask  configuring during initial setup 38  Network  address information 35  configuration 35  configuration worksheets 36  connections  model 5110 25  models 5200 5300 27  flat 100  interfaces 59  resources  load balancing 232  routed 100  setup 43  status indica
210. ress and port number of the antivirus scan server that will handle the  antivirus scanning for that proxy  If scanning is to be provided by a scan server on  another appliance  use the IP address for that appliance and the port number on  which the scan server on that appliance is listening  If scanning will be local   performed by the antivirus scan server on the same appliance as the proxy   the  configuration for that proxy should point to the local antivirus scan server     For more information  see Configuring proxy services for antivirus scanning on  page 173     167    Antivirus Scanning    168    Configuring the antivirus scan server    Configuring the antivirus scan server    The antivirus scan server is configured via the Antivirus Components node   Under the Configuration icon  the Global_Antivirus_Configuration Properties  page lets you specify the bind address and port number on which the antivirus  scan server listens  Proxies pass files to be scanned to the antivirus scan server via  this port  The port number must be exclusive to the antivirus scan server  The  default port number is 1344     The bind address you select can depend on how you plan to distribute the  workload for Symantec Gateway Security antivirus scanning on your network   You can limit the scan server to local scanning only or allow remote connections  to the antivirus scan server     The bind address and port number specified in the proxy configuration for any  proxy  FTPD  HTTPD  or SMTPD  
211. rity appliance functionality is described in three  manuals       The Symantec Gateway Security Appliance Installation and Configuration  Guide  this book     This guide covers all the functionality of the Symantec Gateway Security  appliance except firewall and VPN features       Symantec Enterprise Firewall and Symantec Enterprise VPN Configuration  Guide    Product Overview 17    Checking the hardware    This guide covers topics related to the firewall and VPN features  including   base components  access controls  secure tunnels  VPN policies  remote  policies  and monitoring controls  It is provided in PDF format on the  Symantec Gateway Security appliance Software CD ROM       Symantec Enterprise Firewall  Symantec Enterprise VPN  and VelociRaptor  Firewall Appliance Reference Guide    This guide provides advanced technical information about network security  and advanced configuration examples     You will need to use all these manuals to fully configure and manage the  Symantec Gateway Security appliance     Checking the hardware    After carefully unpacking the Symantec Gateway Security appliance  compare the  actual kit contents with Table 1 3 to ensure that you have received all ordered  components  Follow the instructions on the Quick Start Card to install and set up  the appliance     18 Product Overview    Checking the hardware    Chapter       Installation    This chapter describes the following procedures           Installing the Symantec Gateway Security appl
212. rmation   Problem Description     Error Messages Log Files     Troubleshooting performed prior to contacting Symantec      Recent software configuration changes and or network changes    Contact Enterprise Customer Service online at http   www symantec com  select  the appropriate Global Site for your country  then chose    Service and Support      Customer Service is available to assist with the following types of issues     Questions regarding product licensing or serialization  Update product registration with address or name changes    General product information  eg  features  language availability  dealers in  your area     Latest information on product updates and upgrades  Information on upgrade insurance and maintenance contracts  Information on Symantec Value License Program   Advise on Symantec s technical support options  Non technical presales questions    Missing or defective CD ROMs or manuals       1 Product Overview    Firewall  0 cmp cbuidscate isonet EE EE E ETE 1 8  WIRING EET E ta cated eine E ae E AELE AA EA AE ree 1 9  Intrusion Detection System  IDS               eee eee eee eee eee eee 1 9  Antivir  s SCANNING   asec erie eg erreia iea wie ere E E EE E eels 1 10  Content filtering i442  cict rrik ertrar EEE ENESE EAE EERE 1 11  High availability load balancing           0  ccc eee ees 1 12  Symantec Raptor Management Console             0 0  c cece eee eee ee 1 12  Appliance models and specifications         0    cece cece eee eee eee ees 1 13  OOM TI
213. roxy  For example  the Proxy Services configuration you set up for FTPD  determines how virus scanning is implemented for all rules for which FTP is  enabled as a service and for which antivirus scanning is enabled     Local versus remote scanning    For most networks  all virus scanning will be local  That is  virus scanning for all  proxies is handled by the single antivirus scan server on the same appliance as the  proxies themselves  If you are using multiple Symantec Gateway Security  appliances or clusters  you may want to allow remote  serviced by an antivirus  scan server on another Symantec Gateway Security appliance  antivirus scanning  for one or more proxies  The independent configuration options for each proxy    Antivirus Scanning  Antivirus scanning on the Symantec Gateway Security appliance    service  SMTPD  HTTPD  and FTPD  let you point to another antivirus scan  server on another appliance for scanning on one or more proxies     The Global_Antivirus_Configuration Properties page lets you configure the local  antivirus scan server  The IP address and port number that you select for the local  scan server can be used to control whether remote scanning for another appliance  is permitted  If permitted  the local antivirus scan server will service connections  from proxies on other appliances     For more information  see Configuring the antivirus scan server on page 168     The Proxy Services configuration for each individual proxy lets you select the IP  add
214. rst example  only the differing remote end VPN Client  configuration procedure is detailed in the following pages  For more information  see Configure S2S tunnels using the wizard on page 79     To configure the Remote End of the VPN Client Tunnel    1 Click on the Remote End link on the left side of the screen  The Remote End  configuration page appears  see Figure 5 19      The Remote End screen of the VPN Client Tunnel Wizard gives you three    ways to specify the single entity that will serve as both the remote security  gateway and the tunnel endpoint       By selecting an existing IKE enabled user    By creating a new IKE enabled user          By selecting an existing user group    LT x   b symantec  6 22 5 eS  Introduction Remote End    Local End 2 To configure the remote mobile end for your secure tunnel  you select an IKE     enabled user or user group to act as both the remote security gateway and the    Remote End tunnel endpoint     VPH Policy  1  Select an existing IKE enabled user using an already configured user   Finish Setup Or    Create a new IKE enabled mobile user for your tunnel   Cancel Setup  Or  Alternatively  if you have already configured user groups in SRMC  you    can select an existing user group to serve as both the remote security  gateway and tunnel endpoint     Once your remote end selection is made  click the VPN Policy link        Figure 5 19 Remote End screen  VPN Client Tunnel Wizard    For the network example in Figure 5 18  we are creati
215. ry HTTP services  you can use the Allow URLs service limitation to  allow access only to specific URLs        Caution  This service limitation is very restrictive  since all URLs not are not  specified as allowed are denied by the host system        To create a list of allowable URLs for HTTP rules  1 Expand the Access Controls folder   2 Select the Content Profiles folder and double click to expand it     3 Right click the HTTP Document Content icon and select New gt URL from  the menu     Content Filtering 209    Using content restrictions    4 Inthe Allowed URLs Property page  enter a URL you wish to allow in the  provided field  The wildcard     is permitted as the last character in an entry  and permits any URL that matches the characters before it     The following are sample entries   http   xyz abc com intro overview html    http   foo bar edu salestuff    The wildcard can only be used as the last element of a pathname in a URL  It  cannot be used as part of a host name  The following examples will not work     http   xyz    used in the host portion of the URL     http   xyz abc com   overview html  not final   5 When finished  click OK     You must create a separate allowed URL for each URL you want to allow  Repeat  steps 1 through 4     All rules employing this service limitation only allow HTTP access to the URLs  that are specified as allowed  Users will only be able to access and retrieve  information from URLs listed  Access to all other URLs is blocked        
216. ry for the tunnel  you created  see Figure 5 17      You can also open the property pages for the entities and the tunnel you have just  created  From those property pages  you can check your configuration and make  any edits  if necessary  Refer to the Symantec Enterprise Firewall and Symantec  Enterprise VPN Configuration Guide for more detailed tunnel configuration  information                 fai rmc70    Console Root  Symantec Enterprise Management Symantec Raptor Management Console SGSA  Cont   oj xj      Console Window Help O S H       14  x     action view Favorites    e  gt  Alm B eG  HESA    Name   Description   Local Entity   Local      Remote      Remote         Gmanufacturingtofinance New secure    manufacturing West East finance ike_defaul                           Tree   Favorites                  C Console Root  B 7 Symantec Enterprise Management  B   Symantec Raptor Management  E  565A  Connected   H E Base Components  H  Access Controls  B  Virtual Private Networks  G2 Secure Tunnels    VPN Policies  E   IKE Policy  E  Remote Policies   Q Monitoring Controls  a  IDS Components   amp    Antivirus Components       Figure 5 17 Configured S2S secure tunnel in SRMC    You must configure both ends of the tunnel  Run the S2S Wizard on the remote  end of the tunnel  and specify the setup information in the reverse manner as the  procedure in Configure S2S tunnels using the wizard on page 79  For example   local would be East and finance and remote would be West and 
217. s of the appliance towards the  front or the rear of the case  See Figure 2 2       symantec     E i i al     ax mil       Figure 2 2 Rack mount bracket installation    2 Secure the mounting brackets to the equipment rack  See Figure 2 3 or  Figure 2 4     Installation  Rack mount instructions              OO000000    AZ  o oooooooo    ce     Figure 2 3 Rack mount rack installation   front           OBOOO0000       opopooooooo    9 symantec     Figure 2 4 Rack mount rack installation   back    23    24 Installation    Back panel of model 5110       Back panel of model 5110    This section describes the features of the back panel of the Symantec Gateway  Security appliance model 5110        Figure 2 5 Model 5110 back panel    Table 2 1 Model 5110 back panel    1  The Cooling fans maintain a proper operating temperature  Ensure that  the ventilation holes in the front and back are not blocked        2      Auxiliary 2 network connectors enable Ethernet network connections and  accept the 10 100Base T network cables        3   Auxiliary 1 network connectors enable Ethernet network connections and  accept the 10 100Base T network cables        4  The Serial console port  155200 Bps  allows you to connect a terminal  emulator to act as a system console  This lets you logon to the system  console and access the appliance Linux OS locally  For serial cable  specifications see Serial 9 Pin Cable Specifications on page 273        5  The Serial connector allows you to connect a UPS to 
218. s utilize updated URL lists  firewall products utilize updated firewall  rules  vulnerability assessment products utilize updated vulnerability data  etc    collectively  these are referred to as  Content Updates    You may obtain Content  Updates for any period for which you have purchased a subscription for Content  Updates for the product or otherwise separately acquired the right to obtain  Content Updates  This license does not otherwise permit you to obtain and use  Content Updates     3  Limited Warranty     Symantec warrants that the media on which the Restore Software is distributed  will be free from defects for a period of thirty  30  days from the date of purchase  of the Appliance  Your sole remedy in the event of a breach of this warranty will  be that Symantec will  at its option  replace any defective media returned to    269  SYMANTEC APPLIANCE LICENSE AND WARRANTY AGREEMENT    Symantec within the warranty period or refund the money you paid for the  Restore Software     Symantec warrants that the Software will perform on the Appliance in substantial  compliance with the written documentation accompanying the Appliance for a  period of thirty  30  days from the date of purchase of the Appliance  Your sole  remedy in the event of a breach of this warranty will be that Symantec will  at its  option  repair or replace any defective Software returned to Symantec within the  warranty period or refund the money you paid for the Appliance     Symantec warrants that 
219. scanning      Use a single period to indicate a file without an extension     Use a question mark     as a wildcard     If you make changes to the list of included files and want to restore the  default list of files  click Restore default list     11 Ifyou have selected All except those in exclude list from the Which file  extensions to scan list  optionally edit the Exclude list to add or remove file  extensions  Add any file extensions you do not want to scan  Delete any  extensions that you want to scan       Use a semicolon     to separate file extensions     Usea single period to indicate a file without an extension     Use a question mark     as a wildcard     12 Click OK to save your configuration     Antivirus Scanning 183    Enabling antivirus scanning in a rule    Enabling antivirus scanning in a rule    To enable antivirus scanning for the FTP  HTTP  or SMTP proxy in a rule  you  must enable the appropriate proxy as a service and make sure that application  data scanning is enabled in the rule     To create a rule with antivirus scanning enabled  1 Inthe left pane  expand the Access Controls node   2 Right click Rules and choose New  gt  Rule to display the Rule Properties page     3 Write the rule in accordance with the chapter on Rules in the Symantec  Enterprise Firewall and Symantec Enterprise VPN Configuration Guide     Click the Miscellaneous tab    Make sure that the Application Data Scanning check box is checked   Click the Services tab    To configure the
220. se button on the background screen and select  Properties from the list  then choose the Settings tab to view or modify the  screen resolution     Check your Windows NT or Windows 2000 setup before continuing     Your system must have Internet Explorer version 5 0 or later     Check the release notes and the Symantec Service and Support website   www  symantec com techsupp   from time to time to see if new  service packs are recommended     Initial Setup 49    Install SRMC    Symantec recommends that the system and SRMC partition s  be formatted  using NTFS    To install SRMC   1 Logon as Administrator    2 Insert the Symantec Gateway Security appliance distribution CD ROM     3 Use your file browser to locate the Setup exe file  It is located in the directory  ClientSoftware SymantecRMC 3DES  or DES      4 Double click on the Setup exe file   The SRMC Setup Welcome window appears  see Figure 3 4      Symantec Raptor Management Console Setup J        Welcome to the InstallShield Wizard for  Symantec Raptor Management Console    The setup wizard will install Symantec Raptor Management  Console on your computer  To continue  click Next       Figure 3 4 The SRMC welcome window    5 Click Next to display the SRMC License Agreement window   see Figure 3 5      50    Initial Setup  Install SRMC    Symantec Raptor Management Console Setup J x   License Agreement  Please read the following license agreement carefully        Press the PAGE DOWN key to see the rest of the agreement    
221. security than other high availability load balancing  solutions on the market     When two or more Symantec Gateway Security appliances are available  the  failure of one appliance causes the other appliance to automatically pickup the  workload of the failed appliance     Symantec Raptor Management Console    The Symantec Raptor Management Console  SRMC  is the graphical user  interface for managing and monitoring all functions on the Symantec Gateway  Security appliance     Product Overview 13    Appliance models and specifications    Appliance models and specifications    Model 5110      50 node license     Four 10 100Base T ethernet network interfaces     Serial console interface     Serial port for uninterruptible power supply  UPS     LCD display and keypad for easy set up    e     Six status indicator LEDs       Figure 1 1 Symantec Gateway Security appliance Model 5110       Note  Symantec Security Gateway appliance ships with either High Encryption   3DES AES  or DES encryption                 Table 1 1 Model 5110 specifications  eae ee O  Dimensions 17 00 x 12 50 x 1 75 inches  43 2 x 31 8 x 4 5 cm   Fits a standard 19  equipment rack  single rack unit  height  Weight 9 Ibs 3 oz   4 2 kg   Network interfaces Four 10 100Base T ethernet connections  User interface 2 x 16 liquid crystal display on front panel    LEDs  transmit receive  link  collision  100 M  disk  activity  temperature       Operating environment 32   to 108   F  0   to 40   C     10  to 90  humidity  
222. sed by custom applications for  port  dst  dest port  op  option  accounting   arg  file  result  result   proto  protocol  notes  501   access from incoming to outgoing Suspicious Activity Monitoring has           rule    time period        been triggered  While heavy access  can indicate an attack  soon after you  install  it is more likely that your  thresholds are too low on heavily  used services  http in particular            Management Console 113    Monitor Symantec Gateway Security appliance          Table 7 1 Setup  Number   Message Explanation  516   CPU Temperature is low high This message indicates that the    Symantec Gateway Security  300 MHz appliance     appliance temperature is slightly  lower or higher than the normal    450 MHz appliance  operating temperature   Normal Range 0   to 80      Normal Range 0   to 70         616   CPU Temperature is too low high This message signals that the  Symantec Gateway Security  appliance temperature has reached a  critical level                    a    Management Console  Managing passwords    Managing passwords    Once the Symantec Gateway Security appliance is connected  see Connect to  Symantec Gateway Security appliance on page 54   you can use SRMC to make  changes to the information you entered and the passwords you made note of  during the initial setup procedure        Note  Remember to document and save your passwords  Passwords for the  SRMC  Root  and Secure Remote Login  SRL  may be requested during future  
223. ses in use by the cluster     The virtual IP addresses list shows the cluster subnets and the VIP addresses  that are assigned to them     230    High Availability and Load Balancing  Preparing to create a cluster    To see details about a specific subnet  double click the subnet to display the  VIP addresses dialog box     To see details about a specific VIP address  double click the address   Click OK to close each additional dialog box you display   6 Click OK to close the cluster s Properties page     Propagating appliance configuration files    When you secure your network using multiple appliances  it is important to have  consistency between appliance configurations  You want to be sure that entities  are defined in the same way on all systems  and that the same authorization rules  and authentication procedures are in place     Propagation allows you to configure one appliance and copy the configuration  information to other appliances that are grouped in a cluster     Among the files that are copied to the other appliances is the host file from the  source machine  The source host file overwrites the target host files  rather than  merging with them     Do the following before running Propagate  so that DNS entries are not  overwritten    1 On the appliance from which you will propagate  use the DNS Records  Properties page to create an entry in the Hosts file for each of the other  appliances in the cluster     2 Create entities for the all configured interfaces of 
224. stem tab of the Properties  page   Component   kernel for module startup and shutdown messages      lograptor for all other messages                PID a dash       Timestamp The time the attack was logged on the appliance  Message Number 100   Message Text See list of messages in Table B 3        The message text can be any one of the messages listed in Table B 3  An  explanation and a description of user action for each message is included in this    table   Table B 3 IDS informational messages  Message 100 IDS Info  IDS kernel module startup       Explanation The IDS kernel module  ids o  has been started        User Action None        248 IDS and antivirus scanning log messages    IDS Messages    Table B 3 IDS informational messages  Message 100 IDS Info  IDS kernel module shutdown       Explanation The IDS kernel module has been shut down                             User Action None    Message 100 IDS Info  IDS LiveUpdate  Preparing for IDS LiveUpdate  Explanation LiveUpdate process starting    User Action None    Message 100 IDS Info  IDS LiveUpdate  LiveUpdate failed   Explanation There is a problem downloading the files from the LiveUpdate server     This may occur if one or more of the following occurs     The appliance cannot connect to the LiveUpdate server     The files cannot be located on the LiveUpdate server       The files downloaded from the LiveUpdate server cannot be  placed in the existing directory structure       The LiveUpdate file is corrupted        
225. stems  check  the Allow Internal Hosts Out check box     This allows internal systems to bypass the internal mail server   8 Click Next   The QuickStart wizard prepares the configurations you have specified   9 Click Next when the progress bar shows that the preparations are complete     10 The final Quickstart wizard screen displays  allowing you to choose when you  want to save and reconfigure the Symantec Gateway Security appliance     11 Make your selection and click Finish  If you choose not to reconfigure now   make sure that you do so at a later point     Quickstart firewall configuration results    When you have finished configuring your mail server and or web and FTP  services  the QuickStart wizard automatically creates the necessary rules and  redirected services to provide mail and or web service to your network     Firewall     9    QuickStart wizard    When QuickStart sets up your mail server  depending upon your wizard  selections  it configures the following     e A rule to allow all systems to send mail to the internal mail server  e A rule to allow the internal mail server to send mail to all systems    e Arule to allow hosts on the inside network to send mail to all systems  only if  the Allow Internal Hosts Out check box is selected       A service redirection to redirect SMTP traffic arriving at the appliance s  outside interface to the mail server    e Antivirus scanning of mail traffic  only if the Enable Antivirus Scanning  check box is selected     In
226. sword into the Remote Management Password field   Type the new password again into the Verify Password field   Click OK     115    16 Management Console    Managing passwords    Root and secure remote login passwords    You can change the Symantec Gateway Security   s root password and your Secure  Remote Login  SRL  password from the System Properties page   To change the Root and SRL passwords    1 Connect to the Symantec Gateway Security appliance  see Connect to  Symantec Gateway Security appliance on page 54      2 Select the icon of the connected appliance in the left pane  Right click and  choose Properties  The appliances Properties page opens  see Figure 7 2      SGSA  Connected  Properties q 21x    General   Status   Paths if    fa Change Passwords  wd    Change Root Password        3 Date Time   System   License         Change Secure Remote Login Password   Password  i  Verify          Figure 7 2 System Properties page  Password tab    3 Select the Passwords tab     You can change your Root password and or your SRL password here     4 Using the Root password or SRL password section of the screen  in the  Password field  type a new password     5 In the Verify Password field  type the new password again     Management Console a    Change system settings    6 Click OK     See Use secure remote login on page 128 for instructions on Secure Remote  Login  See the Symantec Enterprise Firewall and Symantec Enterprise VPN  Reference Guide for further information     Change
227. system  console and access the appliance Linux OS locally  For serial cable  specifications see Serial 9 Pin Cable Specifications on page 273        6 Outside Network connection  eth 1  enable Ethernet network connections  and accept the 10 100Base T network cables        7 Inside Network connection  eth 0  enable Ethernet network connections  and accept the 10 100Base T network cables        8  The Security lock hole is used to lock the unit to a secure location                 Connect models 5200 and 5300 to the network    The Symantec Gateway Security appliance models 5200 and 5300 back panel  provide a total of four ethernet connections  Your network connection  requirements may differ depending on your site   s configuration  Refer to Figure  2 6 for the connection instructions below     1 Plug the RJ 45 connector from the Internet into the Outside network  connection  6      2 Plug the RJ 45 connector from the LAN into the Inside network connection   7     3 Plug the RJ 45 connector from any other service network  if present  into the  Aux 1 network connection  3      4 Plug the RJ 45 connector from any other service network  if present  into the  Aux 2 network connection  3      Connect the power cord to models 5200 and 5300    To connect power to appliance models 5200 and 5300  1 Plug the power cord into the appropriate connector on the rear panel  1      2 Connect the power supply cord from the appliance to an electrical outlet or  UPS supply unit     28 Installation
228. t place where the DNS proxy looks for an address when  the request comes from a private system  You can add any other addresses to this  file  For example  you might want to add outside machines from your network  as  follows     169 254 1 2 news xyz com news  169 254 1 3 web xyz com www    You can also add frequently used hosts on the Internet to this file  Doing so can  skip several name request steps     Provide hosts pub file information    The hosts  pub file provides host to IP address and address to host mappings  for public systems  These are computers at your site that are intended for use by  both inside and outside users     The  etc hosts  pub file uses the same format as hosts  Each line must  include an address and a fully qualified name     The following examples show entries that might appear in the hosts  pub file  for the sample network in Figure 6 1  Again  a fully qualified host name is  required on each line     169 254 1 2 news xyz com  169 254 1 3 web xyz com  169 254 0 1 SymantecGatewaySecurity xyz com    Unlike information in hosts  information on systems in the hosts  pub file is  available to both public and private networks        Note  As in hosts  aliases are acceptable  as long as every line has a fully  qualified host name        108    Routes and DNS  Verify connectivity    Verify connectivity    On a system on the inside network  use ping to check whether your network is  set up properly  Verify that you can connect to computers on the Intern
229. t the Host radio button if it is not already selected     When you select a Type  the fields in the DNS Record Property page that  require data entry become available     In the Name field  type a fully qualified host name   In the Network Address field  type the IP address for the host   In the Alias es  field  type the host   s nickname s      You can type several nicknames at once into this field  separating each by a  space     In the Description field  type a Description and click OK     The information you enter is written to the hosts file  The hosts file  includes lines with an address and name  More than one name can be  included for an address     10 Click OK to close the DNS Record Properties page     The entries for the 192 168 1 0 and 192 168 3 0 subnets in the hosts file for the  example network in Figure 6 1 would look like this  Items are separated by one or  more spaces     192 168 1 17 SymantecGatewaySecurity xyz com  Symantec Gateway Security       192 168 1 22 server xyz com server  192168 1  wkst1 xyz com  192 168 1 2 wkst2 xyz com  192168313 wkst3 xyz com  192 168 3 10 wkst10 xyz com  192 168 3 11 wkst11 xyz com  192 168 3 12 wkst12 xyz com       Note  Aliases are acceptable  as long as every line has a fully qualified host name        Your hosts file should also contain the following line  specifying the localhost   or loopback  address     1270401 localhost xyz com localhost    Routes and DNS 107    Configure the DNS proxy    The hosts file is the firs
230. t want to connect to all  cluster members        Note  Symantec recommends that you connect to all cluster members when  modifying a cluster so that the modifications you make are distributed to all  members        Click Next           Ifthe option to automatically connect was checked  the wizard connects  to all cluster members  and then displays the Cluster members screen           Ifthe option to automatically connect was not checked on the previous  screen  the Connect to cluster members screen is displayed       Ifyou want to connect the cluster member whose IP address is shown   enter the password and  if necessary  change the management port  then  click Next to connect  Repeat for all cluster members to which you want  to connect       Ifyou do not want to connect to a member  select the Ignore this  member check box and click Next        Note  Modified cluster information is not copied to members which are  ignored        After you have been given the chance to connect to all cluster members  the  wizard displays the Cluster members screen     5    On the Cluster members screen  you can   e Click Add to add a new cluster member   e     Click Delete to delete a member of the cluster           Uncheck the check box to the left of a cluster member s icon to disable  the cluster member  This causes the cluster member to be ignored when  appliance configuration files are propagated       Ifa cluster member has been disabled  select the check box to enable the  cluster mem
231. terruption in virus scanning  The antivirus technology of the Symantec  Gateway Security appliance is scalable  high performing  and reliable     Features include     E mail  SMTP   Web  HTTP   and FTP traffic scanning      Configuration options for handling infected files      Trusted  industry recognized Symantec AntiVirus core technologies   including     NAVEX  Norton AntiVirus Extensible Engine  allows virus definition    AND engine updates without interruption in service or restart of  server s        Bloodhound provides heuristic detection of new and unknown viruses   for more comprehensive protection       LiveUpdate provides automated or manual updates for virus definitions  and engines to ensure that protection remains current against newly  identified threats     Content filtering    Product Overview H      Striker identifies polymorphic computer viruses  which can be some of  the most complex and difficult to detect     Policy object for scanning of e mail to optionally block messages by subject  line text  message origin  attachment file name or size  attachment type  and  overall message size for greater protection against rapidly spreading e mail   born viruses    Optional updating of e mail messages when an infected attachment is  repaired or deleted to warn recipients that a virus has been detected    The Symantec Gateway Security appliance provides flexible internet content  filtering technology  This increases worker productivity and preserves valuable  ban
232. teway Security appliance   Updating the attack definition files ensures that the IDS is looking for the most  recent attacks  If your attack definition files are outdated  newer attacks may go  undetected     You can either schedule LiveUpdate to run automatically  or run LiveUpdate on  demand  manually  for each appliance connected to the SRMC     When LiveUpdate is run  the most current IDS attack signatures and an updated  help file that contains the signature definitions are downloaded from the  LiveUpdate server to the appliance  New signatures are added to the signature list  and updated signatures replace existing signatures  Any configuration options set  for the updated signatures are retained  All new signatures are turned on by  default  The gated option is turned on or off as appropriate for each signature     An Internet connection is required for LiveUpdate     For more information  see Configuring IDS Signatures on page 134     140 Intrusion Detection System  IDS     Configuring the IDS component    Scheduling LiveUpdate    You can schedule LiveUpdate to run on an appliance at the same time every day   at the same time on a specific day every week  or at the same time on the same day  of every month     To schedule LiveUpdate for the IDS    1 Inthe left pane  expand the IDS Components branch  and then expand the  Configuration branch     2 Click the LiveUpdate node   The information for the last LiveUpdate session appears in the right pane   3 Double click the 
233. teway Security appliance is a unique security solution that  combines technologies from the Symantec Enterprise Firewall  Symantec  Enterprise VPN  intrusion detection  content filtering  and antivirus scanning in  one appliance     Product Overview    Firewall    The Symantec Gateway Security appliance includes technologies from Symantec   s  Enterprise Firewall technology to protect enterprise assets and business  transactions with one of the most secure  high performance solutions for  ensuring safe connections with the Internet and between networks  Its unique  architecture delivers security and speed  providing strong and transparent  firewall protection against unwanted intrusion without slowing the flow of  approved traffic on enterprise networks  Features include     Standard Proxies    These proxies handle common services  such as telnet  HTTP  FTP   RealAudio  and others  Standard proxies offer the highest level of logging  and ease of use     Unless specifically stated otherwise  when this manual describes how traffic is  passed  it does so using standard proxies     Custom Protocols    You can use the Symantec Raptor Management Console  SRMC  Protocol  Properties page to configure generic services provided by the hosts residing  on either side of the gateway  Custom or  generic  services include any  service not supported by one of the Symantec Gateway Security appliance   s  proxy server applications     Address Transforms    Address Transforms give you the abili
234. that will pass files for scanning to the  antivirus scan server must correspond to the bind address and port number  selected here     For more information  see Configuring proxy services for antivirus scanning on  page 173     To configure the antivirus scan server  1 In the left pane  expand the Antivirus Components node     2 Click Configuration     Antivirus Scanning 169    Configuring the antivirus scan server    3 Double click Global_Antivirus_Configuration in the right pane to display  the Global_Antivirus_Configuration Properties page     SGSA A   Config Global_Anti  irus_Configuration Properties sla Ed        General      Please specify the configuration for the antivirus server   a       Bind Address     lt LOCAL   127 0 0 1 gt        Port Number        Figure 9 1 AV Global Antivirus Configuration Properties Page      General Tab    4 Use the Bind Address drop down list to specify the IP address on which the  local antivirus scan server listens     Your choices are    lt LOCAL 127 0 0 1 gt     This address is known as the loopback interface  In this configuration  the  antivirus scan server only accepts connections from proxies that are running  on the same appliance  If you select the loopback interface  you must use the  same setting for any proxy  under the Proxy Services configuration for that  proxy  for which scanning will be local      lt ALL     0 0 0 0 gt     If you select ALL  the antivirus scan server accepts all requests that it receives   local and nonl
235. the SMTP Wizard to set up your mail server with anti   spamming parameters without configuring Web access as well   See SMTP  Wizard on page 70      Configure the appliance to allow inside users to access web and FTP services     At this point  your inside machines are cut off from the Internet  Allowing  HTTP and FTP access involves creating two simple rules called interface   based rules  They allow web and file transfer protocol access for your inside  users  The QuickStart wizard creates these rules for you     To use the Quickstart wizard for Symantec Gateway Security appliance firewall  setup    1    In the left pane  select the icon of the Symantec Gateway Security appliance  for which you are configuring mail and or web access to display the  Configuring your Symantec System taskpad  see Figure 4 1      If the taskpad is not displayed  pull down the View menu and choose  Taskpad     You can re enter the wizard to make changes at any time  by selecting the  system icon to display the Configuring your Symantec System Taskpad     Firewall 65    QuickStart wizard    Ti rmc70    Console Root  Symantec Enterprise Management  Symantec Raptor Management Cons    i     F3       fa Console Window Help     D  amp    a   2 6 x                Action view Favorites les amle   Sx  WpS          Tree   Favorites      C Console Root  B 7 Symantec Enterprise Management  B  amp  Symantec Raptor Management Cc  Em SGSA  Connected      Base Components     Access Controls      virtual Private
236. the hardware component of the Appliance  the   Hardware   shall be free from defects in material and workmanship under  normal use and service and substantially conform to the written documentation  accompanying the Appliance for a period of three hundred sixty five  365  days  from the date of purchase of the Appliance  Your sole remedy in the event of a  breach of this warranty will be that Symantec will  at its option  repair or replace  any defective Hardware returned to Symantec within the warranty period or  refund the money you paid for the Appliance     The warranties contained in this agreement will not apply to any Software or  Hardware which     A has been altered  supplemented  upgraded or modified in any way  or    B has been repaired except by Symantec or its designee     Additionally  the warranties contained in this agreement do not apply to repair or  replacement caused or necessitated by   i  events occurring after risk of loss  passes to You such as loss or damage during shipment   ii  acts of God including  without limitation natural acts such as fire  flood  wind earthquake  lightning or  similar disaster   iii  improper use  environment  installation or electrical supply   improper maintenance  or any other misuse  abuse or mishandling   iv   governmental actions or inactions   v  strikes or work stoppages   vi  Your failure  to follow applicable use or operations instructions or manuals  or  vii  such other  events outside Symantec s reasonable control 
237. the serial port for  smart UPS support  See Connect an Uninterruptible Power Supply   UPS  on page 28         6 Outside Network connection  eth 1  enable Ethernet network connections  and accept the 10 100Base T network cables                 Installation 25    Connect model 5110 to the network    Table 2 1 Model 5110 back panel       7 Inside Network connection  eth 0  enable Ethernet network connections  and accept the 10 100Base T network cables        8  The Power switch toggles the power on or off           9  The Power socket receives the AC cord that is provided              Connect model 5110 to the network    The Symantec Gateway Security appliance model 5110 back panel provides a total  of four ethernet connections  Your network connection requirements may differ  depending on your site   s configuration  Refer to Figure 2 5 for the connection  instructions below     To connect your network   1 Plug the RJ 45 connector from the Internet into the Outside network  connection  6     2 Plug the RJ 45 connector from the LAN into the Inside network connection   7     3 Plug the RJ 45 connector from any other service network  if present  into the  Aux 1 network connection  3      4 Plug the RJ 45 connector from any other service network  if present  into the  Aux 2 network connection  2      Connect power cord to model 5110    To connect power to the appliance model 5110  1 Plug the power cord into the appropriate connector on the rear panel  9      2 Connect the power sup
238. tial setup mode  see Initial network  configuration procedure on page 38   or if the system menu has been entered   see Use the system menu on page 43   Refer to the bulleted descriptions below        Up     and down  v  arrow buttons       During initial setup  use the up     and down  v  arrow buttons to enter the  IP addresses the appliance prompts you for  These buttons increment and  decrement the current number displayed on the LCD  When the first set of  numbers is correct  use the   gt   arrow button to move to the next set       When you enter the System Menu  see Use the system menu on page 43   use  the up     and down  v  arrow buttons to move to the previous menu item   A  or to the next  v  menu item     Left   lt   and right   gt   arrow buttons     During initial setup  use the left   lt   and right   gt   arrow buttons to move  across the LCD panel       When you enter the System Menu  see Use the system menu on page 43   use  the left and right arrow buttons to move to the previous menu item   lt   or to  the next   gt   menu item     E  Enter  button      During initial setup  when an IP address or other information is complete   press the E button to accept it      Press the E button to enter the System Menu when the Symantec Gateway  Security appliance is in monitoring mode  From the System Menu  use the E  button to accept displayed LCD data     S  Select  button       When you enter the System menu  use the S button to cancel out of a menu  item and ret
239. tickiness associated with it       Enter a Virtual IP Address for the cluster member and check the This  VIP is sticky check box       This creates a sticky VIP that will stay on its current node as long as that  node is healthy  If the node goes down  the VIP is transferred to another  node in the cluster  When the original node comes back up  the VIP  stays with the node that it transferred to       Enter a Virtual IP Address for the cluster member  check the This VIP is  sticky check box  and choose an IP address for the VIP association     This creates a sticky VIP that has a preference for the IP address you  select  It will stay with the node it is assigned to as long as that node is  healthy  If the node goes down  the VIP is transferred to another node in  the cluster  When the original node is back up  the VIP returns to it     228    High Availability and Load Balancing  Preparing to create a cluster    11    12    13    Deleting a cluster       Note  With symmetric routing turned on  sticky VIPs do not effect the node  that actually owns the connections  simply where the traffic is first seen  You  can implement your own symmetric routing by having sticky VIPs bound to  particular machines and then distribute them in a load balanced way  Then   turn asymmetric routing on and the incident node is the owner node for the  traffic        Click OK to process the Add a Virtual IP Address dialog box  then click OK  again to close the VIP Addresses dialog box     When all 
240. tifications   SNMP V1 Tab    Enter the Host name and Port number supplied by the SNMP system  administrator     In the Community field  enter the text string provided by the system  administrator of the SNMP device to which you want to send the  notification  The optional default value is public     Intrusion Detection System  IDS  159    IDS notifications    9 Click OK to save your notification     Configuring an SNMPV2 notification    Before you begin to create the notification  contact the system administrator of  the device to which the firewall sends SNMP traps for the host name and port  number and the OID values for the source and destination parties and the trap  context     To configure an SNMP V2 notification    1  2    Expand the Monitoring Controls folder and select the Notifications icon     Right click and choose New gt IDS Notifications to display the General tab of  the Notification Properties page     Choose SNMP V2 from the Action drop down list   Click the Severity tab     Check one or more of the check boxes to choose the severity level or levels for  which the notification will be triggered     Click the SNMP V2 tab        SGSA  Notification    Notification  8 Properties  New     2x     General  Severity SNMP v2    QE Please enter the SNMP v2 information for this notification        Host     Port  fez      Source Party  fo  Destination Party    O  Context          Figure 8 11 Notifications   SNMP V2 Tab    160 Intrusion Detection System  IDS     IDS notif
241. tion    first machine comes back up  communication requests will revert back to the first  machine until it is no longer available     Symmetric routing    Symmetric routing assures that any return packets for a connection go back out  through the same security gateway     Asymmetric routing    Asymmetric routing is the default mode for the appliance until the Cluster  Wizard is run for the first time  Asymmetric routing allows a return packet for a  connection to go back out through any security gateway in the cluster   Asymmetric routing provides for better network performance  especially if the  incident node is busy  State information must be maintained between all of the  nodes in the cluster for asymmetric routing to work properly     242   High Availability and Load Balancing    HA LB Implementation    Appendix       Important safeguards    For your protection  please read all these instructions regarding your Symantec  Gateway Security appliance     1    Read Instructions   Read and understand all the safety and operating instructions before  operating the appliance    Ventilation   The Symantec Gateway Security appliance   s vents  on the front  and the fan  opening s  on the back panel are provided for ventilation and reliable  operation of the product and to protect it from overheating  These openings  must not be blocked or covered  This product should not be placed in a built   in installation unless proper ventilation is provided    Lithium Battery   The lithium
242. tion  uncheck the Gated check box     5 Click Apply     Intrusion Detection System  IDS  139    Configuring the IDS component    Signature configuration changes are saved in memory on the SMRC  though the  Symantec Gateway Security appliance does not gate or not gate signatures based  on this configuration until you save and reconfigure     To save and reconfigure      Click Save and reconfigure on the toolbar  or right click in the left pane and  choose All Tasks gt Save and Reconfigure     Viewing additional information for a signature    You can view additional information for each signature that the Symantec  Gateway Security appliance can detect in the Signature List  You can also view  this information for each alert displayed in the IDS Alerts Viewer  That  information includes the attack name  severity  attack type  short description  OS  impacted by the attack  and any additional information for that attack signature     To view additional information for a signature      In either the Signature List or the IDS Alerts viewer  double click a signature     Using LiveUpdate to update attack signatures    The IDS LiveUpdate feature allows you to update the selected Symantec Gateway  Security appliance with a file that contains the most current IDS attack  signatures  This file can contain updates to existing signatures as well  To ensure  that you have the most current protection  you should regularly update the attack  definition files used by the IDS of the Symantec Ga
243. to  move it to the Included Services list     b Select smtp  in the Included Services list and click Configure to display  the SMTP Rule Properties page     Antivirus Scanning 185    Enabling antivirus scanning in a rule    c Click the Antivirus tab     AntiSpam Relay  Advanced   ESMTP Antivirus      x    Please specify if this rule will include antivirus scanning of SMTP  traffic  Application Data Scanning has to be enabled for enabling  this option     I Enable Antivirus Scanning       Figure 9 7 SMTP Rule Properties Antivirus Page    d Check the Enable Antivirus Scanning check box   e Click OK     7 When you have finished writing the rule  click OK to close the Rule  Properties page     186      Antivirus Scanning    Using the mail filter options    Using the mail filter options    The Mail Options icon under the Antivirus Components node lets you establish a  mail policy to filter mail and mail attachments     You can filter mail based on       File names   specify one or more file names that are known to be threats  and  select whether messages that contain attachments with these file names  should be rejected or delivered with the attachment deleted       File size   specify file sizes of attachments  and select whether messages that  contain attachments of the specified size should be rejected or delivered with  the attachment removed       Subjects   specify one or more subject lines that are known to be threats so  that messages with these subject lines are rejected 
244. tors 32  Non gated signature 138  Norton AntiVirus Extension  NAVEX  technol   ogy 164  Notifications  Blacklist 150  Client Program 152  IDS 147  Mail 153  Page 155  SNMP V1 158  SNMP V2 159  NTFS 49    P    Page notification  alphanumeric 156  numeric 156    Password  entering for SRMC initial setup 39  managing using SRMC 116  root 40  Root and Secure Remote 116  Security Gateway Appliance 55  SRL 40  Patches  applying 126  Ping command  using 102  108  Power  applying for model 5110 26  applying for models 5200 5300 28  cord installation  model 5110 25  models 5200 5300 27  switch 27  Preferred node 240  Private DNS entries  configuring using SRMC 104  Profiles  WebNOT 204  Protocols  configuring custom services 8  Proxies  antivirus 174    DNS 104  Proxy services  configuring for antivirus scanning 173  FTP 174  HTTP 174  SMTP 178  Q  Quickstart wizard 64  R  Radware FireProof 224  Ratings profile    creating 202  customizing 206  Net Ratings 202    searching capabilities 205  Rear view  power switch 27  Refreshing  IDS alerts in the viewer 144  Remote antivirus scanning 166  Remote login 128  Reports  IDS  Configuration Report 145  Executive Summary 145  Reset 43  Restart system  from SRMC 121  Restore Files  from SRMC 124  Root  password 40  116  Routable addresses 8  Routed network 100  Routes  configuring default  using SRMC 101  Rules  antivirus 183  ratings profile 204    S  S2S Tunnel wizard 77  Safety  electric shock 244  equipment rack 244  Lithium battery 243  
245. trings are not case sensitive  You can use the following characters     Use a question mark     as a wildcard to represent a single character     Use an asterisk     as a wildcard to represent zero or more characters       Use a backslash     as an escape character  For example  precede   or    with   to match a literal   or   in a file name  To match a literal    use        6 Click Add   The text string displays in the list     The Subject field clears  letting you enter another text string  You can add  multiple subjects     7 To remove a subject from the list  select it in the list and click Delete   To start over with a blank list  click Reset     9 To filter mail messages that have a blank subject line  check the Block  messages with empty subject lines check box     10 When you have finished  click OK     Antivirus Scanning 193    Using the mail filter options    Filtering mail by domain    To filter by domain  you specify one or more domain names that are known to be  threats  The domain name search string that you enter is matched against  addresses in the From header of the e mail message  If the search string matches  an address  the message is rejected     You can use this filter to block mail from specific e mail addresses  as well as mail  from a specific domain  Wildcard characters can be used as necessary to control  exactly what you want to block  For example       Using    somedomain com  blocks  smith somedomain com  but does not block  smith someserver some
246. ty Setup     QuickStart     SMTP     S2S Tunnel     VPN Client Tunnel      Cluster    48   Initial Setup    Install SRMC    These wizards help you get your Symantec Gateway Security appliance up and  running quickly and easily  You can immediately begin securely passing traffic to  and from your protected network     Install SRMC    Install the SRMC on a system which meets the following hardware and software  requirements     Industry Standard PC   233 MHz Pentium II or higher  128 MB RAM   20 MB disk space   Ethernet card    Windows NT 4 0 Workstation or Server with Service Pack 6a or Windows  2000 Professional or Server with Service Pack 2  Service packs can be found  on the Microsoft website at http   support microsoft com  The system on  which you install the SRMC can not be a backup or primary domain  controller  PDC      The system must be listed on the Microsoft Windows NT 4 0 or Windows  2000 Hardware Compatibility List  HCL   Check the Microsoft web site at  http   www microsoft com     TCP IP must be installed     Microsoft MMC 1 2 must be installed  The executable that is used to install  MC is located on the Symantec Gateway Security CD in the following  location  ClientSoftware mmc immce exe     The computer must have network connectivity with Symantec Gateway  Security appliance  Ping an address on the same network as Symantec  Gateway Security appliance to check     You must have a color monitor with a minimum resolution of 1024x768  pixels  Click the right mou
247. ty to control addressing  letting you  present routable addresses for connections passing through a system  interface or secure tunnel  This helps you to route connections to the correct  destination when your site has addressing overlap issues or other routing  problems     Configuration Reports    You can generate and print full reports for every configurable item of the  Symantec Gateway Security appliance     Defense Against Denial of Service Attacks    A denial of service attack prevents legitimate users from accessing Internet  services by consuming network resources with an onslaught of continuous  service requests  You can configure your Symantec Gateway Security  appliance to quickly recognize this type of attack and immediately drop all  packets coming from a hostile source     See the Symantec Enterprise Firewall and Symantec Enterprise VPN Configuration  Guide for more information     VPN    Product Overview    The Symantec Gateway Security appliance includes technology from the  Symantec Enterprise VPN Server  which allows organizations to securely extend  their network perimeters beyond the enterprise firewall by providing VPN server  proxy secured scanning and personal firewall protection via the Symantec  Enterprise VPN client  A completely integrated and standards based solution  it  allows organizations to establish safe  fast  and inexpensive connections  enabling  new forms of business and secure access to information for authorized partners   customers  t
248. um    T Low             Cancel Help         Figure 8 5 Notifications Properties Page     Severity Tab    IDS messages are classified as High  Medium  and Low     Select one or more of the check boxes to choose the severity level or levels for  which the notification will be triggered     Click OK to save your Notification     150 Intrusion Detection System  IDS     IDS notifications    Blacklist notifications    When you configure one or more Blacklist notifications  the Notify daemon  looks for IDS Alert messages and sends messages to the blacklist daemon on the  specified firewall     The firewall then blocks traffic from the source IP address  specified in the IDS  Alert message  for the blacklist time specified        Note  Blacklist notifications are only available with an appliance that has  Intrusion Detection System  IDS  enabled        To configure a Blacklist notification  1 Expand the Monitoring Controls folder and select the Notifications icon     2 Right click and choose New gt IDS Notifications to display the General tab of  the Notification Properties page     3 Choose BLACKLIST from the Action drop down list   Click the Severity tab     5 Check one or more of the check boxes to choose the severity level or levels for  which the notification will be triggered     6    10  11    Intrusion Detection System  IDS  151    IDS notifications    Click the Blacklist tab     SGSA  Notification    Notification  5 Properties  New        General  Severity Blacklist      QE 
249. umber of this License which applies to it and    any later  version     you have the option of following the terms and conditions either of  that version or of any later version published by the Free Software  Foundation  If the Program does not specify a version number of this  License  you may choose any version ever published by the Free Software  Foundation     If you wish to incorporate parts of the Program into other free programs  whose distribution conditions are different  write to the author to ask for  permission  For software which is copyrighted by the Free Software   Foundation  write to the Free Software Foundation  we sometimes make    266    GNU GENERAL PUBLIC LICENSE    NO WARRANTY  1    exceptions for this  Our decision will be guided by the two goals of preserving  the free status of all derivatives of our free software and of promoting the  sharing and reuse of software generally     BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE  THERE IS  NO WARRANTY FOR THE PROGRAM  TO THE EXTENT PERMITTED  BY APPLICABLE LAW  EXCEPT WHEN OTHERWISE STATED IN  WRITING  THE COPYRIGHT HOLDERS AND OR OTHER PARTIES  PROVIDE THE PROGRAM    AS IS    WITHOUT WARRANTY OF ANY  KIND  EITHER EXPRESSED OR IMPLIED  INCLUDING  BUT NOT  LIMITED TO  THE IMPLIED WARRANTIES OF MERCHANTABILITY  AND FITNESS FOR A PARTICULAR PURPOSE  THE ENTIRE RISK AS TO  THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH  YOU  SHOULD THE PROGRAM PROVE DEFECTIVE  YOU ASSUME  THE COST OF ALL NECESSARY SERVIC
250. uncheck the Enabled check  box     5 Click Apply     Signature configuration changes are saved in memory on the SMRC  though the  Symantec Gateway Security appliance does not detect signatures based on this  configuration until you save and reconfigure     To save and reconfigure    e Click Save and reconfigure on the toolbar  or right click in the left pane and  choose All Tasks gt Save and Reconfigure     Marking a signature as gated or non gated    You can select the signatures that you want to be gated or non gated  The gated  option can be specified for signatures that are enabled     To gate a signature    1 In the left pane  expand the IDS Components folder  and then expand the  Configuration branch     2 Click Signatures     All available signatures appear in the right pane  A checkmark in the Enabled  column for the attack name indicates that the signature is enabled for  detection  a checkmark in the Gated column for the attack name indicates  that the signature is to be gated upon detection     You can select multiple records in the list       To select consecutive records  click the first item  press and hold down  SHIFT  then click the last item       To select records that are not consecutive  click the first item  press and  hold down CTRL  then click each item     3 Right click  then click Properties     In the Properties window  check the Gated checkbox to gate all selected  signatures upon detection  If the selected signatures should not be gated  upon detec
251. urn to the top menu level     Initial Setup 3  Network address information    Network address information    When the appliance boots for the first time  you must enter the network address  information for the SRMC that will manage the appliance  Refer to the network  configuration in Figure 3 3 for the examples given as part of the address setup  instructions in this section              Internet        news xyz com    169 254 1 2 169 254 10 1    169 254 10 254    Internet Router  169 254 0 254             web xyz com Aux 2 Outside  169 254 1 3 169 254 1 1 169 254 0 1  E S a a a a n LP     E QI  Aux 1 Inside  TRASES 192 168 6 6 192 168 1 17  Router 192 168 1 62    192 168 5 1    Server      192 168 1 22 192 168 1 1 192 168 1 2 192 168 1 3 192 168 3 65       192 168 5 2 192 168 5 3 192 168 5 4 192 168 3 10 192 168 3 11 192 168 3 12       Figure 3 3 Symantec Gateway Security appliance protected network    5    36   Initial Setup    Network configuration worksheet       Network configuration worksheet    During the Symantec Gateway Security appliance setup process  you are  prompted to enter network address information  Once those addresses are  entered  Symantec Gateway Security s LCD panel displays three passwords that  you will need to initiate remote management  Use the worksheet on the next page  to make note of the passwords  You can change them once you have set up the  SRMC to begin remote management  For details on changing passwords  see  Managing passwords on page 11
252. utton to move the cursor  to Yes and press the E button to enter it     Shutdown    When you press E on this menu item  you are prompted to confirm system  shutdown  Select Yes or No  Press E again to enter your selection     UPS setup    When you select this menu item  UPS  Uninterruptible Power Supply   you  are prompted to choose start or stop  To use a UPS unit  select start and press  E     System ID    Selecting this item causes the Symantec Gateway Security appliance to  display the system   s ID  You need to provide this system ID to Symantec to  obtain a license key     Press E to return to the system menu once the system ID is displayed on the  LCD  Press either the down arrow  v  key or the right arrow   gt   key to move  to the next menu item     Factory reset    If you press E on this menu item  you are prompted to confirm with Yes or  No  If you select Yes the Symantec Gateway Security appliance resets in the  following manner       Network IP address information is erased     SRMC workstation connection information is erased       License information remains intact     44    Initial Setup  Use the system menu       Caution  If you choose Yes  the appliance returns to its default state  This is  the state it was in when you first received the appliance  All network  information you have entered is lost as well as any configuration data  Only  licensing information is retained        LCD Lock    If you have enabled front panel keypad locking in system properties 
253. vpn   72    Configure S2S tunnels using the wizard    Configure S2S tunnels using the wizard    The secure tunnel configuration displayed in Figure 5 1 is an example of a site to  site tunnel  The following pages walk you through the process of using the  2S  Tunnel Wizard to set up the components of this tunnel     In Figure 5 1  there are two sites  Each site is protected by a Symantec Gateway  Security appliance  West is the local appliance in this example and East is the  remote VPN server  The goal of this configuration is to establish a VPN tunnel  uniting the subnets behind each firewall     Local  West  Remote  East   Security Gateway Security Gateway  206 7 7 3 206 7 7 2    F SGSA  East    The  Subnet Manufacturing Internet Subnet Finance  192 168 20 0  Netmask  255 255 255 0    192 168 10 0  Netmask    255 255 255 0       Figure 5 1 Site to site secure tunnel    To begin using the wizard  from the SRMC Configuring your Symantec System  taskpad  see Figure 4 1   click the S2S Tunnel Wizard icon  The Introduction  screen shown in Figure 5 2 appears     80    VPN    Configure S2S tunnels using the wizard    t  525 Tunnel Wizard   c x     Ss symantec  Tm EWE  Introduction Introduction  pocel En This wizard helps you to quickly and sucessfully setup a secure tunnel     Remote End  Navigate through this wizard by selecting the links on the left  Each link represents    VPH Policy a component of the tunnel you must configure  Once you ve completed a given  component  a che
254. w system files  reboot the  machine  or perform other troubleshooting or debugging tasks that are outside of  normal appliance operations  All remote traffic is encrypted  You must use the  SRMC version of Tera Term Pro  and not the standalone version     To make an SRL connection from SRMC to the Symantec Gateway Security  system    1    From your managing SRMC system  right click and choose All Tasks  gt  SRL  Client to display the Tera Term Pro window logon dialog box  see  Figure 7 11         Tera Term    connecting     YT    of xi  Eile Edit Setup Control Window Help          SRL Passwords xi  Passwords  Man ent  mm       SRL               Figure 7 11 Tera Term Pro window    Enter your SRMC password in the Management field   Enter your SRL password in the SRL field     You need this password to establish a secure connection  The Symantec  Gateway Security appliance displayed this password to you during the initial  setup procedure  You can change the SRL password through SRMC as  described in Managing passwords on page 114     4 Click OK     Once connected through SRL  you can securely perform any necessary  administrative functions on the Symantec Gateway Security appliance     Management Console 129    Front panel keypad locking    Front panel keypad locking    Locking the Symantec Gateway Security appliance provides additional security  against personnel who should not have access privileges to the appliance  If the  front panel is locked  only individuals with knowle
255. w xyz com     to access the parent directory of your  document directory if your server is not properly configured and secured     If the pattern       is present in the httpurlpattern cf file  such an access will be  blocked yet legal accesses are not affected     The unpatched version of a product ships with an insecure script  faxsurvey   which allows remote command execution with the privileges of the web  server process  This can be exploited simply by passing the command as a  parameter to the script     For example  an attacker could use the following URL to get your system  information    http   www  yoursite com cgi bin   faxsurvey uname 20 20da   They could use the following URL to get a copy of your password file     http   www  yoursite com cgi bin faxsurvey  bin   cat 20 etc passwd       Note   20 and  2d are not regular expressions  They are the encoding of  ISO Latin 1  representing a space and     respectively        Denying MIME types    You can restrict access to files based on Multipurpose Internet Mail Extension   MIME  Types  Unlike service limitations that apply on a per rule basis  MIME  restrictions apply globally to all http based services  Use this feature to prevent  downloading of certain usage formats  such as graphics files  or application    types     To limit MIME types    1    Expand the Access Controls folder and double click the Content Profiles  folder to expand it     Select the HTTP Document Content icon  right click  and choose  New gt M
256. where appliance IP is the IP address of the appliance     Executive Summary    The Executive Summary report is a high level overview of the number and risk  level of attacks seen during a specified date range  including a list of all alerts   categorized by High  Medium  or Low  in reverse chronological order  For each  alert  the alert name  the source IP  and destination IP are read from the logfiles   and then the severity and attack type are read from the signature configuration  file     A fourth category of Other may appear in the report  Alerts would fall into this  category if they appear in the logfile and the signature that triggered them has  been removed from the current signature configuration file on the appliance     Executive Summary reports are a good way to take periodic snapshots of your  overall network security     Generating a new Executive Summary report    To generate an Executive Summary report  1 Select the appliance for which you want to generate a report     146    Intrusion Detection System  IDS     IDS Reports    ao A UU N    Expand the IDS Components branch   Expand the IDS Reports branch  and then click Executive Summary   Right click in the right pane  and then click Run New Report     In the New Executive Summary Report dialog box  specify the date time  range for the report     Click OK     The Creating Report dialog box appears  indicating report generation  progress  then the report data appears in a new browser window     After viewing th
257. y     9 Press and release the Select  S  button until the    Boot From Net    option  appears on the LCD display     10 Press and release the Enter  E  button to begin net booting the Symantec  Gateway Security appliance from the Symantec Gateway Security CD ROM   The LCD display shows the    Loading Kernel       message     This step may take 15 minutes     11 Wait until    PLEASE SWITCH OFF POWER NOW    appears on the LCD  display  The restore process is now complete     12 Turn off the Symantec Gateway Security appliance     13 Remove the Symantec Gateway Security CD ROM from the CD ROM drive  on your PC     14 Restart your PC without Symantec Gateway Security CD ROM in the PC to  return it to normal service     15 Turn on the Symantec Gateway Security appliance and perform the initial  setup process again  For more information see Initial network configuration  procedure on page 38     The Symantec Gateway Security appliance is managed from a computer on your  network using the Symantec Raptor Management Console  SRMC  Graphical  User Interface     The SRMC installs on a Windows NT or Windows 2000 machine  and can  manage all Symantec Gateway Security appliance functions  including secure  tunnels and hardware system management such as reboots or shutdowns  You  can use the same SRMC to manage a mixture of Symantec Gateway Security  appliances  VelociRaptor appliances and Symantec Enterprise Firewalls    The SRMC provides automated wizards for      Symantec Gateway Securi
258. y patents or  other property right claims or to contest validity of any such claims  this  section has the sole purpose of protecting the integrity of the free software  distribution system  which is implemented by public license practices  Many  people have made generous contributions to the wide range of software  distributed through that system in reliance on consistent application of that  system  it is up to the author donor to decide if he or she is willing to  distribute software through any other system and a licensee cannot impose  that choice     This section is intended to make thoroughly clear what is believed to be a  consequence of the rest of this License     If the distribution and or use of the Program is restricted in certain countries  either by patents or by copyrighted interfaces  the original copyright holder  who places the Program under this License may add an explicit geographical  distribution limitation excluding those countries  so that distribution is  permitted only in or among countries not thus excluded  In such case  this  License incorporates the limitation as if written in the body of this License     The Free Software Foundation may publish revised and or new versions of  the General Public License from time to time  Such new versions will be  similar in spirit to the present version  but may differ in detail to address new  problems or concerns     Each version is given a distinguishing version number  If the Program  specifies a version n
259. y the word Alert   System Name System name  as entered in the System tab of the Properties  page    Component kernel   PID a dash       IDS and antivirus scanning log messages 253    IDS Messages             Table B 4 IDS Alert formats  Timestamp The time the attack was logged on the appliance  Message Number 525  550  575  Message Text Alert specific text       To view alerts using the IDS Alerts viewer   1 Expand the IDS Components node    2 Expand the Monitoring node    3 Click the month of the Alerts log you want to view   A list of Alerts logs is displayed in the right pane     The Alerts logs are named by date  with the extension in the format  yyyymmdd     For example  Alerts 20010918  4 Double click the Alerts log you want to view   The IDS Alerts are displayed in the right pane     New log messages appear at the bottom of the window  scrolling up previous  log messages  The SRMC automatically updates the view of the current  logfile every 15 seconds while the IDS Alerts Viewer is open     5 For more information about an alert  double click on the alert in the right  pane to display help on the specific IDS attack signature that generated the  alert     The following table shows the format of an alerts message in the IDS Alerts  viewer              Table B 5 IDS Alerts viewer format  Severity Severity of the attack  Attack Name The name of the attack signature  Attack Type The type of attack  Timestamp The time the attack was logged on the appliance       Source IP Th
260. ype the IP address of the subnet  in this case  192 168 10 0     9 Click OK  your subnet entity will be used as the local network entity     vpn   8      Configure S2S tunnels using the wizard         525 Tunnel Wizard 7    Ss symantec  e   _   _   _        Introduction Local End  tec To configure the local end of your secure tunnel  you select a local security    gateway  generally your Raptor system s outside interface  and the protected    Remote End network entity that acts as the originator of the packets being sent or the final  VPH Policy destination of the packets passing through the tunnel   Finish Setup 1  Select West using an already configured security gateway entity   Or  Cancel Setup Select a local interface to create a new local security gateway     2  Select manufacturing using an already configured network entity   Or    Create a new local protected network entity to serve as the originator of  tunnel packets or the final destination for tunnel packets     Once your local end selections are made  click the Remote End link        Figure 5 8 Completed Local End screen  S2S Tunnel Wizard    The local end of your secure tunnel is now configured     To configure the Remote End of an S2S tunnel using the S2S Tunnel Wizard  1 Click the Remote End link on the left side of the screen     The Remote End screen is displayed with a check mark beside the Local End  link to indicate completion  as shown in Figure 5 9     86   vpn    Configure S2S tunnels using the wizard  
261. ystem name   e Domain name     Default gateway     License key     System features     Network interfaces      Date and time    Caution  If you cancel out of this wizard without completing it at least once  you  cannot connect to the Symantec Gateway Security appliance  You will have to run  it again in order to access the appliance  Once you have completed the Symantec  Gateway Security appliance Setup Wizard  you can use the Setup Wizard to edit  system information at any time        To configure the appliance using the Setup Wizard   1 Click on the Symantec Gateway Security Setup Wizard icon in the  Configuring your Symantec System window   The Symantec Gateway Security appliance Setup wizard automatically starts    when you connect to a Symantec Gateway Security appliance for the first  time from the SRMC     Initial Setup at    Setup wizard    Setup Wizard Exi    Welcome to Symantec Gateway Security  Setup Wizard                      You MUST complete this wizard to begin managing the  system   This wizard configures the following information      system name     domain name     default gateway     license key     system features     network interfaces     system date and time    If you cancel out of this wizard without completing it at least  once  you cannot connect to the system     Click Next to continue        Figure 3 12 Setup Wizard Welcome page    2 Click Next to began using the Setup Wizard     58    Initial Setup  Setup wizard    Setup Wizard f x     System Inf
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
Samsung 400MX-3 Vartotojo vadovas  Gamber-Johnson 7160-0510 mounting kit  Mazda CX-7 Navigation Manual  as a PDF - Informatik IV  Bestmedia PLATINUM MyDrive  trackZEON User Manual  Hitachi 27UX01B CRT Television User Manual  Bedienungsanleitung Alpha-4L-Serie Tragbarer    Copyright © All rights reserved. 
   Failed to retrieve file