Page 671 / 944 Scroll up to view Page 666 - 670
Chapter 44 Endpoint Security
ZyWALL USG 50 User’s Guide
671
The following table gives an overview of the objects you can configure.
Table 208
Configuration > Object > Endpoint Security > Add
LABEL
DESCRIPTION
Show Advance
Settings / Hide
Advance
Settings
Click this button to display a greater or lesser number of configuration
fields.
General Setup
Object
Name
Specify a descriptive name for identification purposes. You can enter up
to 31 characters (“0-9”, “a-z”, “A-Z”, “-”, “_” with no spaces allowed).
Description
Enter a description of this object. It is not used elsewhere. You can use
alphanumeric and
()+/:=?!*#@$_%-
characters, and it can be up to 60
characters long.
Passing
Criterion
Select whether the user’s computer has to match just one of the
endpoint security object’s checking criteria or all of them.
Checking
Item -
Operating
System
Endpoint
Operating
System
Select the type of operating system the user’s computer must be using.
The checking items in the rest of the screen vary depending on the
selected operating system. If you select
Mac OSX
, there are no other
checking items.
Others
allows access for computers not using Windows, Linux, or Mac
OSX operating systems. For example you create Windows, Linux, and
Mac OSX endpoint security objects to apply to your LAN users. An
“others” object allows access for LAN computers using Solaris, HP,
Android, or other operating systems.
Windows
Version
If you selected Windows as the operating system, select the version of
Windows here.
Endpoint
must
update to
Windows
Service
Pack
If you selected Windows as the operating system, you can enter the
minimum Windows service pack number the user’s computer must have
installed. The user’s computer must have this service pack or higher. For
example, “2” means service pack 2.
Leave the field blank to have the
ZyWALL ignore the Windows service pack number.
Checking Item
- Windows
Update and
Security Patch
If you selected Windows as the operating system, you can select whether
or not the user’s computer must have the Windows Auto Update feature
activated.
You can also use the table to list Windows security patches that the
user’s computer must have installed. The user’s computer must have all
of the listed Windows security patches installed to pass this checking
item. Click
Add
to create a new entry. Select one or more entries and
click
Remove
to delete it or them.
Page 672 / 944
Chapter 44 Endpoint Security
ZyWALL USG 50 User’s Guide
672
Checking Item
- Personal
Firewall
If you selected Windows as the operating system, you can select whether
or not the user’s computer is required to have personal firewall software
installed. Move the permitted personal firewalls from the
Available
list
to the
Allowed Personal Firewall List
. Use the [Shift] and/or [Ctrl]
key to select multiple entries. The user’s computer must have one of the
listed personal firewalls to pass this checking item. For some personal
firewalls the ZyWALL can also detect whether or not the firewall is
activated; in those cases it must also be activated.
Checking Item
- Anti-Virus
Software
If you selected Windows as the operating system, you can select whether
or not the user’s computer is required to have anti-virus software
installed. Move the permitted anti-virus software packages from the
Available
list to the
Allowed Anti-Virus Software List
. Use the [Shift]
and/or [Ctrl] key to select multiple entries. The user’s computer must
have one of the listed anti-virus software packages to pass this checking
item.
For some anti-virus software the ZyWALL can also detect whether
or not the anti-virus software is activated; in those cases it must also be
activated.
Checking Item
- Windows
Registry
If you selected Windows as the operating system, you can use the table
to list Windows registry values to check on the user’s computer.
Use the
Operation
field to set whether the value for the registry item in
the user’s computer has to be equal to (
==
), greater than (
>
), less than
(
<
), greater than or equal to (
>=
), less than or equal to (
<=
), or not
equal to (
!=
) the value listed in the entry.
Click
Add
to create a new entry. Select one or more entries and click
Remove
to delete it or them.
The user’s computer must pass all of the listed Windows registry value
checks to pass this checking item.
Checking Item
- Application
If you selected Windows or Linux as the operating system, you can use
these tables to list applications that a user’s computer must be running
and other applications that it cannot be running.
Use the
Process that endpoint must execute
table to list processes
that the user’s computer must have running. The user’s computer must
have all of the listed applications running to pass this checking item.
Use the
Process that endpoint cannot execute
table to list processes
that the user’s computer are not permitted to have running. The user’s
computer must not have any of the listed applications running to pass
this checking item.
Include the filename extension for Linux operating systems.
Click
Add
to create a new entry. Select one or more entries and click
Remove
to delete it or them.
Table 208
Configuration > Object > Endpoint Security > Add
(continued)
LABEL
DESCRIPTION
Page 673 / 944
Chapter 44 Endpoint Security
ZyWALL USG 50 User’s Guide
673
Checking Item
- File
Information
If you selected Windows or Linux as the operating system, you can use
this table to check details of specific files on the user’s computer.
Use the
Operation
field to set whether the size or version of the file on
the user’s computer has to be equal to (
==
), greater than (
>
), less than
(
<
), greater than or equal to (
>=
), less than or equal to (
<=
), or not
equal to (
!=
) the size or version of the file listed in the entry.
Click
Add
to create a new entry. Select one or more entries and click
Remove
to delete it or them.
The user’s computer must pass one of the listed file information checks
to pass this checking item.
OK
Click
OK
to save your changes back to the ZyWALL.
Cancel
Click
Cancel
to exit this screen without saving.
Table 208
Configuration > Object > Endpoint Security > Add
(continued)
LABEL
DESCRIPTION
Page 674 / 944
Chapter 44 Endpoint Security
ZyWALL USG 50 User’s Guide
674
Page 675 / 944
ZyWALL USG 50 User’s Guide
675
C
HAPTER
45
System
45.1
Overview
Use the system screens to configure general ZyWALL settings.
45.1.1
What You Can Do in this Chapter
Use the
System > Host Name
screen (see
Section 45.2 on page 676
) to
configure a unique name for the ZyWALL in your network.
Use the
System > Date/Tim
e screen (see
Section 45.3 on page 676
) to
configure the date and time for the ZyWALL.
Use the
System > Console Speed
screen (see
Section 45.4 on page 681
) to
configure the console port speed when you connect to the ZyWALL via the
console port using a terminal emulation program.
Use the
System > DNS
screen (see
Section 45.5 on page 681
) to configure the
DNS (Domain Name System) server used for mapping a domain name to its
corresponding IP address and vice versa.
Use the
System > WWW
screens (see
Section 45.6 on page 689
) to configure
settings for HTTP or HTTPS access to the ZyWALL and how the login and access
user screens look.
Use the
System > SSH
screen (see
Section 45.7 on page 706
) to configure
SSH (Secure SHell) used to securely access the ZyWALL’s command line
interface. You can specify which zones allow SSH access and from which IP
address the access can come.
Use the
System > TELNET
screen (see
Section 45.8 on page 711
) to configure
Telnet to access the ZyWALL’s command line interface. Specify which zones
allow Telnet access and from which IP address the access can come.
Use the
System > FTP
screen (see
Section 45.9 on page 713
) to specify from
which zones FTP can be used to access the ZyWALL. You can also specify from
which IP addresses the access can come. You can upload and download the
ZyWALL’s firmware and configuration files using FTP. Please also see
Chapter 47
on page 737
for more information about firmware and configuration files.
Your ZyWALL can act as an SNMP agent, which allows a manager station to
manage and monitor the ZyWALL through the network. Use the
System >
SNMP
screen (see
Section 45.10 on page 715
) to configure SNMP settings,
including from which zones SNMP can be used to access the ZyWALL. You can
also specify from which IP addresses the access can come.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top