Page 101 / 240 Scroll up to view Page 96 - 100
ProSafe VPN Firewall 200 FVX538 Reference Manual
Firewall Protection and Content Filtering
4-41
v1.0, March 2009
3.
Enter a
Schedule
for sending the logs. From the
Unit
pull-down menu, select: Never, Hourly,
Daily, or Weekly. Then fill in the Day and Time fields that correspond to your selection.
4.
In the
Security Logs
section, check the network segments radio box for which you would like
logs to be sent (for example, LAN to WAN under Dropped Packets).
5.
In the
System Logs
section, check the radio box for the type of system events to be logged.
6.
Check the
Yes
radio box to enable E-mail Logs. Then enter:
a.
E-mail Server address
– Enter the outgoing E-mail SMTP mail server address of your
ISP (for example, 172.16.1.10). If you leave this box blank, no logs will be sent to you.
b.
Return E-mail Address
– Enter the e-mail address of the user.
c.
Send To E-mail Address
– Enter the e-mail address where the logs and alerts should be
sent. You must use the full e-mail address (for example, [email protected]).
7.
The
No Authentication
radio box is checked by default. If your SMTP server authenticates
users, uncheck the radio box by selecting the authentication type—either
Login Plain
or
CRAM-MD5
—based on your SMTP server requirements. Then enter the user name and
password to be used for authentication.
8.
If you want to respond to IDENT protocol, check the
Respond to Identd from SMTP Server
radio box. The Ident Protocol is an Internet protocol that helps identify the user of a particular
TCP connection (a common daemon program for providing the ident service is identd).
9.
You can configure the firewall to send system logs to an external PC that is running a syslog
logging program. Click the
Yes
radio box to enable SysLogs and send messages to the Syslog
Server, then:
a.
Enter your
SysLog Server
IP address
b.
Select the appropriate syslog severity from the
SysLog Severity
pull-down menu. The
SysLog levels of severity are as follows:
LOG_EMERG (System is unusable)
LOG_ALERT (Action must be taken immediately)
LOG_CRITICAL (Critical conditions)
LOG_ERROR (Error conditions)
LOG_WARNING (Warning conditions)
LOG_NOTICE (Normal but significant conditions)
LOG_INFO (Informational messages)
LOG_DEBUG (Debug level messages)
10.
Click
Reset
to cancel your changes and return to the previous settings.
Page 102 / 240
ProSafe VPN Firewall 200 FVX538 Reference Manual
4-42
Firewall Protection and Content Filtering
v1.0, March 2009
11.
Click
Apply
to save your settings.
To view the Firewall logs:
1.
Click on the
View Log
icon opposite the
Firewall Logs & E-mail
tab. The
Logs
screen will
display.
2.
If the E-mail Logs options as been enabled, you can send a copy of the log by clicking
send
log.
3.
Click
refresh log
to retrieve the latest update; and click
clear log
to delete all entries.
Log entries are described in
Table 4-4
. Refer to
Appendix C, “System Logs and Error Messages”
for more information about log entry messages.
Figure 4-25
Table 4-4.
Firewall Log Field Descriptions
Field
Description
Date and Time
The date and time the log entry was recorded.
Description or Action
The type of event and what action was taken if any.
Source IP
The IP address of the initiating device for this log entry.
Page 103 / 240
ProSafe VPN Firewall 200 FVX538 Reference Manual
Firewall Protection and Content Filtering
4-43
v1.0, March 2009
Administrator Tips
Consider the following operational items:
1.
As an option, you can enable remote management if you have to manage distant sites from a
central location (see
“RADIUS Server External Authentication” on page 6-10
).
2.
Although rules (see
“Using Rules to Block or Allow Specific Kinds of Traffic” on page 4-2
) is
the basic way of managing the traffic through your system, you can further refine your control
with the following optional features of the VPN firewall:
Groups and hosts (see
“Managing Groups and Hosts (LAN Groups)” on page 3-6
)
Services (see
“Services-Based Rules” on page 4-2
)
Schedules (see
“Setting a Schedule to Block or Allow Specific Traffic” on page 4-28
)
Block sites (see
“Setting Block Sites (Content Filtering)” on page 4-29
)
Source MAC filtering (see
“Enabling Source MAC Filtering” on page 4-31
)
Port triggering (see
“Port Triggering” on page 4-35
)
Source port and
interface
The service port number of the initiating device, and whether it originated from the
LAN, WAN or DMZ.
Destination
The name or IP address of the destination device or Web site.
Destination port and
interface
The service port number of the destination device, and whether it’s on the LAN,
WAN or DMZ.
Table 4-4.
Firewall Log Field Descriptions (continued)
Field
Description
Page 104 / 240
ProSafe VPN Firewall 200 FVX538 Reference Manual
4-44
Firewall Protection and Content Filtering
v1.0, March 2009
Page 105 / 240
Virtual Private Networking
5-1
v1.0, March 2009
Chapter 5
Virtual Private Networking
This chapter describes how to use the virtual private networking (VPN) features of the VPN
firewall.
This chapter includes the following sections:
“Considerations for Dual WAN Port Systems” on page 5-1
“Using the VPN Wizard for Client and Gateway Configurations” on page 5-3
“Testing the Connections and Viewing Status Information” on page 5-12
“VPN Tunnel Policies” on page 5-15
“Certificate Authorities” on page 5-19
“Extended Authentication (XAUTH) Configuration” on page 5-23
“Assigning IP Addresses to Remote Users (ModeConfig)” on page 5-29
Considerations for Dual WAN Port Systems
If both of the WAN ports of the VPN firewall are configured, you can enable either Auto-Rollover
mode for increased system reliability or Load Balancing mode for optimum bandwidth efficiency.
This WAN mode choice impacts how the VPN features must be configured.
The use of fully qualified domain names in VPN policies is mandatory when the WAN ports are in
load balancing or rollover mode; and is also required for the VPN tunnels to fail over. FQDN is
optional when the WAN ports are in load balancing mode if the IP addresses are static but
mandatory if the WAN IP addresses are dynamic.
Refer to
“Virtual Private Networks (VPNs)” on page B-10
for more on the IP addressing
requirements for VPN in the dual WAN modes. For instructions on how to select and configure a
dynamic DNS service for resolving FQDNs, see
“Configuring Dynamic DNS (If Needed)” on
page 2-14
. For instructions on WAN mode configuration, see
“Configuring the WAN Mode
(Required for Dual WAN)” on page 2-8
.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top