Page 161 / 428
Scroll up to view Page 156 - 160
Adding Internal Networks to Bridges
Chapter 8: Using Bridges
147
In the
My Network
page, the internal network appears indented under the bridge.
Table 25: Bridged Network Fields
In this field…
Do this…
Assign to Bridge
Select the bridge to which the connection should be assigned.
Bridge Anti-Spoofing
Select this option to enable anti-spoofing.
If anti-spoofing is enabled, only IP addresses within the
Allowed
IP Range
can be source IP addresses for packets on this
network.
Page 162 / 428
Adding Internal Networks to Bridges
148
Check Point ZoneAlarm User Guide
In this field…
Do this…
Allowed IP Range
Type the range of IP addresses that should be allowed on this
network.
Note:
When assigning IP addresses to machines in a bridged
network segment, the ZoneAlarm DHCP server allocates only
addresses within the allowed IP address range.
To enable clients to move between bridged networks without
changing IP addresses, configure identical IP address ranges
for the desired networks, thus allowing the IP addresses to be
used on either of the bridged networks.
Note:
Configuring overlapping or identical allowed IP address
ranges will decrease the effectiveness of anti-spoofing
between the bridged networks.
Spanning Tree Protocol - Port
Cost
Type the port's cost.
STP uses the available port with the lowest cost to forward
frames to the root port. All other ports are blocked.
It is recommended to set a lower value for faster links.
This field only appears if the bridge uses STP.
Page 163 / 428
Adding Internal Networks to Bridges
Chapter 8: Using Bridges
149
In this field…
Do this…
Spanning Tree Protocol - Port
Priority
Select the port's priority.
The port's priority is combined with the port's logical number to
create the port's ID. The port with the lowest ID is elected as
the root port, which forwards frames out of the bridge. The
other ports in the bridge calculate the least-cost path to the
root port, in order to eliminate loops in the topology and
provide fault tolerance.
To increase the chance of this port being elected as the root
port, select a lower priority.
Note:
If you select the same priority for all ports, the root port
will be elected based on the port's logical number.
The default value is 128.
This field only appears if the bridge uses STP.
Page 164 / 428
Deleting Bridges
150
Check Point ZoneAlarm User Guide
Deleting Bridges
To delete a bridge
1.
Remove all internal networks from the bridge, by doing the following for each
network:
a.
Click
Network
in the main menu, and click the
My Network
tab.
The
My Network
page appears.
b.
Click
Edit
in the desired network's row.
c.
In the
Mode
drop-down list, select
Enabled
.
d.
Click
Apply
.
2.
Click
Network
in the main menu, and click the
My Network
tab.
The
My Network
page appears.
3.
In the desired bridge’s row, click the Erase
icon.
A confirmation message appears.
4.
Click
OK
.
The bridge is deleted.
Page 165 / 428
Viewing the Event Log
Chapter 9: Viewing Reports
151
Chapter 9
This chapter describes the ZoneAlarm Portal reports.
This chapter includes the following topics:
Viewing the Event Log
.............................................................................
151
Using the Traffic Monitor
........................................................................
154
Viewing Computers
..................................................................................
158
Viewing Connections
...............................................................................
160
Viewing Wireless Statistics
......................................................................
161
Viewing the Event Log
You can track network activity using the Event Log. The Event Log displays the most
recent events and color-codes them.
Table 26: Event Log Color Coding
An event marked in
this color…
Indicates…
Blue
Changes in your setup that you have made yourself or as a result of
a security update implemented by your Service Center.
Red
Connection attempts that were blocked by your firewall.
Orange
Connection attempts that were blocked by your custom security
rules.
Viewing Reports