Page 221 / 249 Scroll up to view Page 216 - 220
System
216
Administration
A user with the administration access control is permitted to edit any configuration file on
the CyberGuard SG appliance.
It should be given to trusted users who are permitted to
configure and reconfigure the unit.
Diagnostic
The diagnostic access control allows a user to view status reports, the technical support
report, the system log and other read only pages.
No capability is granted to allow such
a user to edit any of the configuration on the CyberGuard SG appliance.
This access
control can be granted to technical support users so they can attempt to diagnose but not
fix any problems which occur.
Encrypted save/restore all
A user with this access control can dump and restore the entire CyberGuard SG
appliance's configuration via the encrypted save and restore option on the
Advanced
page.
Such a user cannot edit the configuration nor even see the configuration files
themselves.
This access control can be allocated to a technician whom you want to be
able to restore units to a known good configuration but to whom you do not wish to grant
full administration rights.
User settings
A user with this access control can edit users' login information, create new users and
modify access controls for other users.
Without this access control, users can only
change their own passwords.
Because this access control allows a user to edit their own
permissions, it is best left such that only the
root
user has it.
The
root
user is special.
This user alone has one access control which cannot be
removed.
The
root
user is always able to edit user settings and thus they can grant
themselves any access control if need be.
The
root
user also has the capability to set
User ID
and
Group ID
when editing or creating users.
It is best to leave these fields
blank when creating a new user as this lets the CyberGuard SG appliance automatically
allocate and manage them.
If somebody with the user settings access control attempts to edit the
root
user (apart
from
root
themselves), they must enter the administrative password (i.e. the password for
the
root
account).
Page 222 / 249
System
217
Internet access (via access controls)
A user with this access control is permitted controlled access to the web through the
CyberGuard SG appliance’s web proxy.
See the
Access control and content filtering
section in the chapter entitled
Firewall
for details on controlling LAN users’ web access.
Password
The CyberGuard SG appliance’s administrative (
root
) password is used to restrict access
to the
Web Management Console
web administration pages (
Web Admin
) and the
CyberGuard SG appliance itself.
The CyberGuard SG appliance administrative
password is the ‘key’ to the security of your network and must be kept secret.
It is
recommended that you choose a password that is easy for you to remember but hard for
unauthorized people to guess.
A potential security issue may be introduced by having a network-connected CyberGuard
SG appliance accessible, using the factory default password.
To prevent this, the
password for the CyberGuard SG appliance should be changed when Setup Wizard is
run or the
Web Management Console
web administration pages are accessed for the first
time.
The CyberGuard SG appliance administrative password can be changed at any time using the
Web Management Console
web administration pages by clicking
Password
in the
System
menu.
Note
The username is
root
.
The factory default CyberGuard SG appliance administrative
password is
default
.
Diagnostics
Diagnostic information and tests are provided through the
Web Management Console
web administration pages.
Diagnostics
To access this information, click
Diagnostics
under
System
.
This page displays
information including the current firmware version, network settings and the status of
Internet and VPN connections.
Page 223 / 249
System
218
Figure 11-3
Network tests
Basic network diagnostic tests (
ping
,
traceroute
) can be accessed by clicking the
Network Tests
tab at the top of the
Diagnostics
page.
Page 224 / 249
System
219
Advanced
The options on the
Advanced
page are intended for network administrators and
advanced users
only
.
Warning
Altering the advanced configuration settings may render your CyberGuard SG appliance
inoperable.
System log
The system log contains debugging information that may be useful in determining
whether all services for your CyberGuard SG appliance are operating correctly.
The CyberGuard SG appliance also provides the option of re-directing log output to a
remote machine using the syslog protocol.
Enable this option by selecting
Enable
Remote Logging
, entering the IP address of the remote machine and clicking
Apply
.
Log output is color coded by output type.
General information and debug output is black,
warnings and notices are blue, and errors are red. The pull down menu underneath the
log output allows you to filter the log output to display, based on output type.
Refer to
Appendix C
for details on configuring and interpreting log output.
Configuration files
Clicking
Configuration Files
allows you to select and edit the CyberGuard SG
appliance’s configuration files manually.
Generally, this should only be done at the
request of customer support.
The CyberGuard SG appliance’s entire configuration may be backed up remotely.
Doing
this is highly recommended as to minimise downtime in the event of a configuration loss.
The configuration may be backed up in plain text, or encrypted with a password.
To backup to a plain text file, click
store/restore
and copy and paste the configuration
into a text editor on the remote machine.
Restoring is simply a matter of copying and
pasting the configuration from the text file back into the same field on the CyberGuard SG
appliance and clicking
Submit
.
Page 225 / 249
System
220
You may also upload additional configuration files from your computer to the CyberGuard
SG appliance under
Upload file
.
To backup to an encrypted file, click save and restore, enter a password and click Save
under Save Configuration.
To restore from this file, browse for the backup configuration
file, enter the password you used to save it and click Restore under Restore
configuration.
Flash upgrade
Periodically, CyberGuard may release new versions of firmware for your CyberGuard SG
appliance.
If a new version fixes an issue you’ve been experiencing, or a new feature
you wish to utilize, contact CyberGuard SG technical support for information on obtaining
the latest firmware.
You can then load the new firmware with a flash upgrade.
Note
Please read the appendix entitled
Firmware Upgrade Practices and Precautions
before
attempting a firmware upgrade.
There are two methods available for performing a flash upgrade.
The first is to download the
netflash.exe
for the appropriate model and version to which
you will be upgrading.
This is a Windows program that automates the upgrade
procedure.
Be sure to read the release notes before attempting the upgrade.
The second is to download the binary image file (.bin).
This can then be transferred from
a PC on the local network into the CyberGuard SG appliance’s flash memory by way of a
TFTP server.
This method involves the following steps:
1. Download the appropriate
.bin
file.
2. Start up a TFTP server.
Windows users can download a TFTP server program
from:
Note
Although we recommend it, this program is not supported by CyberGuard.

Rate

4 / 5 based on 3 votes.

Popular SnapGear Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top