Planet Technology CS-500 User Manual

Browse online or download User Manual for Routers Planet Technology CS-500. Planet Technology CS-500 User's Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 215
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - User’s Manual

Content Security Gateway User’s Manual Content Security Gateway CS-500 User’s Manual

Page 2

Content Security Gateway User’s Manual Chapter 2: Hardware Installation 2.1 Installation Requirements Before installing the Content Security Gateway,

Page 3 - Table of Contents

Content Security Gateway User’s Manual The fields in the IPSec Autokey window are:  Name: The VPN name to identify the VPN tunnel definition. The nam

Page 4

Content Security Gateway User’s Manual  Remote Gateway or Client – Dynamic IP: Select Remote Gateway or Client if there is onl

Page 5

Content Security Gateway User’s Manual  My ID/Peer ID: My ID and Peer ID are optional parameters. If we choose to enter My ID/ Peer ID, they couldn’

Page 6 - Chapter 1: Introduction

Content Security Gateway User’s Manual  Disable PPTP: Check to disable PPTP Server.  Enable PPTP: Check to enable PPTP Server. Encryption: t

Page 7 - 1.2 Package Contents

Content Security Gateway User’s Manual Step 3. Click OK to save modifications or click Cancel to cancel modifications. Modifying PPTP Server Step 1

Page 8 - 1.5 Specification

Content Security Gateway User’s Manual 4.3.8.3 PPTP Client This function allows the Content Security Gateway dial-up to remote PPTP server and acces

Page 9

Content Security Gateway User’s Manual Adding a PPTP Client Step 1. Select VPN→PPTP Client. Step 2. Configure the parameters.  User name: Specify

Page 10 - 2.2 Operation Mode

Content Security Gateway User’s Manual Step 4. Click OK to save modifications or click Cancel to cancel modifications Removing PPTP Client Step 1. Se

Page 11 - Internet

Content Security Gateway User’s Manual Step 2. Configure the parameters  Name: Specify the Tunnel name. This should be unique and can not be the sa

Page 12 - Chapter 3: Getting Started

Content Security Gateway User’s Manual Modifying a Tunnel Step 1. Select VPN→Tunnel. Step 2. In the Tunnel window, find the Tunnel that you want t

Page 13 - 3.2 Configure WAN interface

Content Security Gateway User’s Manual The WAN and DMZ side IP addresses are on the same subnet. This application is suitable if you have a subnet of

Page 14 - 3.4 Configure Policy

Content Security Gateway User’s Manual Step 3. When here are 5 examples of VPN setting. een two Content Security Gateways. d Windows XP Professio

Page 15 - STEP 4:

Content Security Gateway User’s Manual Step 3. In To Destination table, choose Remote Gateway-Fixed IP or Domain Name, enter the IP address desired to

Page 16 - Chapter 4: Web Configuration

Content Security Gateway User’s Manual Step 10. Click Tunnel and press New Entry to configure the further setting. Step 11. Enter Site_A as the new

Page 17 - 4.1.1 Admin

Content Security Gateway User’s Manual and Incoming Policy. Outgoing Policy: Incoming Policy: The Gateway of Company B is 192.168.20.1. The sett

Page 18

Content Security Gateway User’s Manual Step 4. In Authentication Method Table enters the Preshared Key. Step 5. In Encapsulation or Authentication

Page 19 - 4.1.2 Permitted IPs

Content Security Gateway User’s Manual Step 10. Click Tunnel and press New Entry to configure the further setting. Step 11. Enter Site_B as the new

Page 20

Content Security Gateway User’s Manual and Incoming Policy. Outgoing Policy: Incoming Policy: Example 2. Create a VPN connection between the Con

Page 21 - 4.1.4 Setting

Content Security Gateway User’s Manual Step 5. In Encapsulation or Authentication table, choose ISAKMP Algorithm. For communication via VPN, we choo

Page 22

Content Security Gateway User’s Manual subnet 192.168.10.0 with subnet mask IP 255.255.255.0. Step 12. In To Destination table, select Remote Client

Page 23

Content Security Gateway User’s Manual Configuration of WinXP The IP of remote user is 210.66.155.91. The settings of remote user are as the followi

Page 24

Content Security Gateway User’s Manual Chapter 3: Getting Started 3.1 Web Configuration STEP 1: Connect both the Administrator’s PC and the LAN port o

Page 25

Content Security Gateway User’s Manual Step 3. Enter the Console window, click Console(C) option and click Add/Remove Embedded Management Option. S

Page 26

Content Security Gateway User’s Manual Step 5. Choose Local Machine (L) for finishing the setting of Add. Step 6. Finish the setting of Add.

Page 27 - 4.1.5 Date/Time

Content Security Gateway User’s Manual Step 7. Click the right button of mouse in IP Security Policies on Local Machine and choose Create IP Security

Page 28 - 4.1.6 Mult

Content Security Gateway User’s Manual Step 9. Enter the Name of this VPN and optionally give it a brief description. Step 10. Disable Activate t

Page 29

Content Security Gateway User’s Manual Step 11. Completing the IP Security Policy setting and click Finish. Enable Edit properties. Step 12. In w

Page 30

Content Security Gateway User’s Manual Step 13. Click next. Step 14. Enter the WAN IP of Remote user, 210.66.155.91. - 120 -

Page 31

Content Security Gateway User’s Manual Step 15. click all network connections. Step 16. Choose Use this string to protect the key exchange (Preshare

Page 32

Content Security Gateway User’s Manual Step 17. Click Add. Step 18. Enter the name of IP filter and click “Add..”. - 122 -

Page 33 - 4.1.7 Route Table

Content Security Gateway User’s Manual Step 19. Click next. Step 20. In Source address, click down the arrow to select the specific IP Subnet and

Page 34

Content Security Gateway User’s Manual Step 21. In Destination address, click down the arrow to select the My IP Address. Step 22. Click next.

Page 35 - 4.1.8 DHCP

Content Security Gateway User’s Manual 3.2 Configure WAN interface After entering the username and password, the Content Security Gateway WEB UI scree

Page 36 - 4.1.9 Dynamic DNS

Content Security Gateway User’s Manual Step 23. Please enable edit properties, and click finish. Step 24. Please don’t enable Mirrored, and click O

Page 37

Content Security Gateway User’s Manual Step 25. Click OK. Step 26. Select Traffic-in and click next. - 126 -

Page 38

Content Security Gateway User’s Manual Step 27. Enable User Add Wizard and click add. Step 28. Click next. - 127 -

Page 39 - 4.1.10 Host Table

Content Security Gateway User’s Manual Step 29. Enter the name of filter action and click next. Step 30. Select Negotiate security and click next.

Page 40

Content Security Gateway User’s Manual Step 31. Click next. Step 32. Select Custom and click settings. - 129 -

Page 41 - 4.1.12 Logout

Content Security Gateway User’s Manual Step 33. Click Data Integrity and Encapsulation and choose MD5 and 3DES. Click Generate a New key after every 2

Page 42 - 4.2.1 LAN

Content Security Gateway User’s Manual Step 35. Select security and click next. Step 36. Click finish. - 131 -

Page 43 - 4.2.2 WAN

Content Security Gateway User’s Manual Step 37. Click Add. Step 38. Click next. - 132 -

Page 44

Content Security Gateway User’s Manual Step 39. Enter the WAN IP of company A, 210.66.155.90. Step 40. Select All network connections and click nex

Page 45

Content Security Gateway User’s Manual Step 41. Choose Use this string to protect the key exchange (Preshared Key). And enter the key, 123456789. St

Page 46

Content Security Gateway User’s Manual Default Gateway: This will be the Gateway IP address. Domain Name Server (DNS): This is the IP Address of the D

Page 47 - 4.2.3 DMZ

Content Security Gateway User’s Manual Step 43. Enter the name of IP filter and click “Add…”. Step 44. Click next - 135 -

Page 48 - 4.3.1 Address

Content Security Gateway User’s Manual Step 45. In Source address, click down the arrow to select the My IP Address. Step 46. In Destination addre

Page 49 - 4.3.1.1 LAN

Content Security Gateway User’s Manual Step 47. Click next. Step 48. Please enable Edit properties and click finish. - 137 -

Page 50

Content Security Gateway User’s Manual Step 49. Please don’t enable Mirrored and click ok. Step 50. Click ok. - 138 -

Page 51 - 4.3.1.2 LAN Group

Content Security Gateway User’s Manual Step 51. Select Traffic-out and click next. Step 52. Select Security and click edit. - 139 -

Page 52

Content Security Gateway User’s Manual Step 53. Enable Session key perfect forward secrecy (PFS) and click ok. Step 54. Select Security and click n

Page 53

Content Security Gateway User’s Manual Step 55. Please don’t enable Edit properties and click finish. Step 56. Click apply first and then click o

Page 54 - 4.3.1.3 WAN

Content Security Gateway User’s Manual Step 57 Click the right button of mouse in IPSec choose Assign option. Step 58. Ping the remote gateway o

Page 55

Content Security Gateway User’s Manual Company B External IP is 211.22.22.22 Internal IP is 192.168.20.X To Allow Company A, 192.

Page 56 - 4.3.1.4 WAN Group

Content Security Gateway User’s Manual Step 6. In IPSec Algorithm Table, choose Data Encryption + Authentication. We choose 3DES for ENC Algorithm and

Page 57

Content Security Gateway User’s Manual Destination Address – select “Outside_Any” Service - select “ANY” Action - select “Permit” Click on OK to apply

Page 58 - 4.3.1.5 DMZ

Content Security Gateway User’s Manual Step 13. Click OK to finish the Tunnel setting of Company A. Step 14. If you want to configure bi-direction V

Page 59

Content Security Gateway User’s Manual Step 1. Enter the default IP of Company B’s Content Security Gateway, 192.168.20.1. Click VPN in the menu bar o

Page 60 - 4.3.1.6 DMZ Group

Content Security Gateway User’s Manual Step 7. Choose GROUP 1 as the Perfect Forward Secrecy setting, and leave the default setting with 28800 secon

Page 61

Content Security Gateway User’s Manual Step 14. If you want to configure bi-direction VPN connection, you should enable Tunnel setting in Outgoing a

Page 62

Content Security Gateway User’s Manual Step 3. In To Destination table, choose Remote Gateway-Fixed IP or Domain Name, enter the IP address desired to

Page 63 - 4.3.2 Service

Content Security Gateway User’s Manual Step 10. Click Tunnel and press New Entry to configure the further setting. Step 11. Enter Site_A as the new

Page 64 - 4.3.2.2 Custom

Content Security Gateway User’s Manual Incoming Policy: - 151 -

Page 65

Content Security Gateway User’s Manual Step 2: Configure VRT-311 VPN policy as the following: - 152 -

Page 66

Content Security Gateway User’s Manual 4.4 Policy This section provides the Administrator with facilities to sent control policies for packets with di

Page 67 - 4.3.2.3 Group

Content Security Gateway User’s Manual The fields in the Outgoing window are:  Source: Source network addresses that are specified in the LAN sect

Page 68

Content Security Gateway User’s Manual Chapter 4: Web Configuration 4.1 System The Content Security Gateway Administration and monitoring configurat

Page 69 - 4.3.3 Schedule

Content Security Gateway User’s Manual Step 2: Configure all the parameters. Source Address: Select the name of the LAN network from the drop down l

Page 70

Content Security Gateway User’s Manual Removing the Outgoing Policy Step 1. In the Outgoing policy section, locate the name of the policy desired to

Page 71 - 4.3.4 QoS

Content Security Gateway User’s Manual Step 1: Click Incoming under the Policy menu to enter the Incoming window. The Incoming table will display cur

Page 72

Content Security Gateway User’s Manual Source Address: Select names of the WAN networks from the drop down list. The drop down list contains the names

Page 73

Content Security Gateway User’s Manual Removing an Incoming Policy Step 1: In the Incoming window, locate the name of policy desired to be removed an

Page 74

Content Security Gateway User’s Manual The fields in WAN To DMZ window: Source: Source networks, which are addresses specified in the WAN section o

Page 75 - 4.3.5.1 Auth Setting

Content Security Gateway User’s Manual Step 2: Configure the parameters. Source Address: Select names of the WAN networks from the drop down list. The

Page 76 - 4.3.5.2 Auth User

Content Security Gateway User’s Manual Step 2: In the Modify Policy window, fill in new settings. Step 3: Click OK to do save modifications. Rem

Page 77

Content Security Gateway User’s Manual Entering the DMZ To WAN window: Click DMZ To WAN under Policy menu and the DMZ To WAN table appears displaying

Page 78

Content Security Gateway User’s Manual Step 2: Configure the parameters. Source Address: Select the name of the DMZ network from the drop down list

Page 79

Content Security Gateway User’s Manual DHCP: Administrator can configure DHCP (Dynamic Host Configuration Protocol) settings for the LAN (LAN) network

Page 80 - 4.3.5.3 Auth Group

Content Security Gateway User’s Manual Content Blocking: Select Enable to enable Content Blocking. Max. Concurrent Sessions: The maximum concurrent se

Page 81

Content Security Gateway User’s Manual 4.5 Mail Security This section provides the Administrator to configure Mail Security rule for protecting clie

Page 82 - 4.3.5.4 Radius Serve

Content Security Gateway User’s Manual When receive unscanned mail, it will add the tag in front of the e-mail subject. Mail Relay: After scanning t

Page 83 - 4.3.5.5 POP3

Content Security Gateway User’s Manual Mail Relay setting is complete. The external mails send to planet.com.tw that will be received by CS-500 and re

Page 84 - 4.3.6.1 URL Blocking

Content Security Gateway User’s Manual STEP 2﹒Add the second setting in Mail Relay function of Configure:  Select Allowed External IP of Mail Relay

Page 85

Content Security Gateway User’s Manual STEP 1﹒Add the first setting in Mail Relay function of Configure:  Select Domain Name of Internal Mail Server

Page 86 - 4.3.6.2 Scripts

Content Security Gateway User’s Manual efficiency of the employees and will not lose the important information of enterprise. In this chapter, we w

Page 87 - 4.3.6.3 P2P

Content Security Gateway User’s Manual Check sender account: Select to allow CS-500 checking sender’s account when it receives the mail, if the sender

Page 88 - 4.3.6.5 Download

Content Security Gateway User’s Manual Below is the information needed for setting up the Rule: • Rule Name: The name of the custom spam mail determ

Page 89 - 4.3.7 Virtual Server

Content Security Gateway User’s Manual Adding a new Rule Step 1: Click on the New Entry button and the Rule window will appear. Step 2: Fill in

Page 90 - 4.3.7.1 Mapped IP

Content Security Gateway User’s Manual Settings of the Administration table Admin Name: The username of Administrators for the Content Security Gatewa

Page 91

Content Security Gateway User’s Manual 4.5.2.3 Whitelist To determine the mail comes from specific mail address that can send to the recipient without

Page 92

Content Security Gateway User’s Manual Removing a Whitelist Step 1: In the Rule window, find the policy to be removed and click the corresponding R

Page 93 - 4.3.7.2 Virtual Server

Content Security Gateway User’s Manual Adding a new Blacklist Step 1: Click on the New Entry button and the Blacklist window will appear. Step 2:

Page 94

Content Security Gateway User’s Manual Step 2: A confirmation pop-up box will appear, click OK to remove the Host Table or click Cancel. 4.5.2.5

Page 95

Content Security Gateway User’s Manual Example: How to train mail into CS-500 STEP 1﹒Create a new folder SpamMail in Outlook Express:  Press the ri

Page 96

Content Security Gateway User’s Manual STEP 2﹒In Inbox-Outlook Express, move spam mail to SpamMail Folder:  In Inbox, select all of the spam mail

Page 97

Content Security Gateway User’s Manual STEP 3﹒Compress the SpamMail Folder in Outlook Express to shorten the data and upload to CS-500 for training

Page 98

Content Security Gateway User’s Manual STEP 4﹒To copy the route of SpamMail File in Outlook Express to convenient to upload the training to CS-500:

Page 99 - 4.3.8.1 IPSec Autokey

Content Security Gateway User’s Manual STEP 5﹒Paste the route of copied from SpamMail file to the Spam Mail for Training field in Training function

Page 100

Content Security Gateway User’s Manual Note: 1. The training file that uploads to CS-500 can be any data file and not restricted in its sub-name, b

Page 101

Content Security Gateway User’s Manual Removing a Sub Admin Step 1. In the Administration table, locate the Admin name you want to edit, and click o

Page 102 - 4.3.8.2 PPTP Server

Content Security Gateway User’s Manual 4.5.2.6 Spam Mail This item will show the top chart that represents the received and sent spam mail from reci

Page 103

Content Security Gateway User’s Manual Definition: Virus Scan Engine: Select Clam to enable Anti-virus function or Select Disable to disable it.. Th

Page 104

Content Security Gateway User’s Manual 4.5.3.2 Virus Mail This item will show the top chart that represents the received and sent virus mail from reci

Page 105 - 4.3.8.3 PPTP Client

Content Security Gateway User’s Manual 2. Click OK. 3. High Risk: Select drop and log function. 4. Medium Risk: Select drop and log function. 5. Lo

Page 106

Content Security Gateway User’s Manual Max. Threshold □ Pkts / Sec: Configure the value to define the Syn Flood signature. Blocking Time: Set up the t

Page 107 - 4.3.8.4 Tunnel

Content Security Gateway User’s Manual Name: The System Manager can name the signature. Protocol: Select the protocol which wants to be detected and p

Page 108

Content Security Gateway User’s Manual  Destination Port: Enter 80:80.  Risk: Select High.  Action: Select Drop and enable Log function.  Cont

Page 109

Content Security Gateway User’s Manual 4.6.3 IDP Report CS-500 can make intrusion detection and prevention record to a Log report, and allow administr

Page 110

Content Security Gateway User’s Manual  Enable Anomaly Flow IP Blocking: Select this option to enable the Anomaly Flow IP blocking function. Once th

Page 111

Content Security Gateway User’s Manual ÍÍ Traffic Log Table The table in the Traffic Log window displays current System statuses: Definition:  Tim

Page 112

Content Security Gateway User’s Manual Copyright Copyright (C) 2005 PLANET Technology Corp. All rights reserved. The products and programs described

Page 113

Content Security Gateway User’s Manual Add Permitted IPs Address Step 1. Click New Entry button. Step 2. In IP Address field, enter the LAN IP addres

Page 114

Content Security Gateway User’s Manual 4.8.1.2 Event When the Content Security Gateway WAN detects events, the Administrator can get the details, suc

Page 115

Content Security Gateway User’s Manual Step 2. Follow the File Download pop-up window to save the event logs into a specific directory on the hard dr

Page 116 - Configuration of CS-500

Content Security Gateway User’s Manual Download Logs Step 1. Click Log in the menu bar on the left hand side and then select the sub-selection Connect

Page 117

Content Security Gateway User’s Manual Log Mail Configuration: When the Log Mail files accumulated up to 300Kbytes, router will notify administrator b

Page 118

Content Security Gateway User’s Manual 4.8.2.1 Setting Select Setting to configure what type of Accounting Report will be logged at CS-500. There are

Page 119 - Configuration of WinXP

Content Security Gateway User’s Manual ÍÍ Outbound Source IP Accounting Report Pull down the menu and select Source IP to show the outbound source IP

Page 120

Content Security Gateway User’s Manual Outbound Destination IP Accounting Report Pull down the menu and select Destination IP to show the outbound des

Page 121

Content Security Gateway User’s Manual When LAN users connect to WAN Service Server through CS-500, all of the Downstream / Upstream / First Packet

Page 122

Content Security Gateway User’s Manual ÍÍ Inbound Source IP Accounting Report Pull down the menu and select Source IP to show the inbound source IP

Page 123

Content Security Gateway User’s Manual Pull down the menu and select Destination IP to show the inbound destination IP accounting report. When WAN h

Page 124

Content Security Gateway User’s Manual 4.1.3 Software Update Under Software Update, the admin may update the device’s software with a newer softwar

Page 125

Content Security Gateway User’s Manual When WAN host connect to LAN host through CS-500, all of the Downstream/Upstream/First Packet/Last Packet/Dur

Page 126

Content Security Gateway User’s Manual setup by the Administrator. How to use Statistics The Administrator can get the current network status from sta

Page 127

Content Security Gateway User’s Manual Entering the Statistics window The Statistics window displays the statistics of current network connections.

Page 128

Content Security Gateway User’s Manual 4.8.4 Status In this section, the device displays the status information about the Content Security Gateway.

Page 129

Content Security Gateway User’s Manual 4.8.4.2 Authentication Entering the Auth Status window Click on Status in the menu bar, then click Authenticat

Page 130

Content Security Gateway User’s Manual IP Address: The IP address of the host computer MAC Address: The MAC address of that host computer Interfa

Page 131

Content Security Gateway User’s Manual ÍÍ Exporting Content Security Gateway settings Step 1. Under Backup/Restore Configuration, click on the Downl

Page 132

Content Security Gateway User’s Manual Importing Content Security Gateway settings Under Backup/Restore Configuration, click on the Browse button ne

Page 133

Content Security Gateway User’s Manual System Name Setting Input the name you want into Device Name column to be the device name. Email Setting Step

Page 134

Content Security Gateway User’s Manual Web Management (WAN Interface) The administrator can change the port number used by HTTP port1 anytime. (Remo

Page 135

Content Security Gateway User’s Manual to the network. You can choose to enable LAN, WAN or DMZ interface to allow send out the RIP protocol in a p

Page 136

Content Security Gateway User’s Manual To-Appliance Packet Logging Whesoun the function is selected, the CS-500 will record the packets that contain

Page 137

Content Security Gateway User’s Manual Step 4. Update system clock every □ minutes You can set the interval time to synchronize with utside servers.

Page 138

Content Security Gateway User’s Manual Multiple Subnet settings Click System on the left side menu bar, select Configure then click Multiple Subnet to

Page 139

Content Security Gateway User’s Manual Table of Contents CHAPTER 1: INTRODUCTION ...

Page 140

Content Security Gateway User’s Manual Step 1: Find the IP address you want to modify and click Modify. Step 2: Enter the new IP address in Modify M

Page 141

Content Security Gateway User’s Manual Sales: Alias IP of LAN interface - 168.85.88.65, Netmask: 255.255.255.192 Procurement: Alias IP of LAN interfac

Page 142

Content Security Gateway User’s Manual Step 4: Adding a new WAN to LAN Policy. In the Incoming window, click the New Entry button. Modify a Multipl

Page 143

Content Security Gateway User’s Manual 4.1.7 Route Table In this section, the Administrator can add static routes for the networks. Entering the Rou

Page 144

Content Security Gateway User’s Manual Step 4. Click OK to add the new static route or click Cancel to cancel. Modifying a Static Route: Step 1. In

Page 145

Content Security Gateway User’s Manual 4.1.8 DHCP In the section, the Administrator can configure DHCP (Dynamic Host Configuration Protocol) setting

Page 146

Content Security Gateway User’s Manual Dynamic IP Address functions  Subnet: LAN network’s subnet  Netmask: LAN network’s netmask  Gateway: LAN n

Page 147

Content Security Gateway User’s Manual ÍÍ Click Dynamic DNS in the System menu to enter Dynamic DNS window. The icons in Dynamic DNS window: !: Up

Page 148

Content Security Gateway User’s Manual Service providers: Select service providers. Sign up: to the service providers’ website. WAN IP Address: IP Add

Page 149

Content Security Gateway User’s Manual 4.1.10 Host Table The Content Security Gateway’s Administrator may use the Host Table function to make the Co

Page 150

Content Security Gateway User’s Manual 4.3 POLICY OBJECT ...

Page 151

Content Security Gateway User’s Manual ÍÍ Below is the information needed for setting up the Host Table: • Host Name: The domain name of the server

Page 152

Content Security Gateway User’s Manual Removing a Host Table Step 1: In the Host Table window, find the policy to be removed and click the correspo

Page 153

Content Security Gateway User’s Manual Step 2. Click Logout the Content Security Gateway. Step 3. Click OK to logout or click Cancel to discard the c

Page 154

Content Security Gateway User’s Manual IP Address: The private IP address of the Content Security Gateway’s LAN network is the IP address of the LAN p

Page 155

Content Security Gateway User’s Manual Username: Enter the PPPoE username provided by the ISP. Password: Enter the PPPoE password provided by the ISP.

Page 156

Content Security Gateway User’s Manual IP Address: The dynamic IP address obtained by the Content Security Gateway from the ISP will be displayed here

Page 157

Content Security Gateway User’s Manual Ping: Select this to allow the WAN network to ping the IP Address of the Content Security Gateway. This will

Page 158 - 4.4.1 Outgoing

Content Security Gateway User’s Manual HTTP: Select this to allow the device WEBUI to be accessed from the WAN network. This will allow the WebUI

Page 159

Content Security Gateway User’s Manual DMZ Interface: Display DMZ NAT Mode /DMZ TRANSPARENT Mode functions of DMZ to show if they are enabled or disa

Page 160

Content Security Gateway User’s Manual How to use Address Table With easily recognized names of IP addresses and names of address groups shown in the

Page 161 - 4.4.2 Incoming

Content Security Gateway User’s Manual 4.4.4 DMZ To WAN & DMZ To LAN...

Page 162

Content Security Gateway User’s Manual If you want to enable Get Static IP address from DHCP Server function, enter the MAC Address then check the G

Page 163

Content Security Gateway User’s Manual 4.3.1.2 LAN Group Entering the LAN Group window The LAN Addresses may be combined together to become a group.

Page 164

Content Security Gateway User’s Manual Group. AdStep 1. N Group window, click the New Entry button to enter the Add New Address Group Step 2 In wor

Page 165

Content Security Gateway User’s Manual Step 2. wStep 3. vailable address list, and click the Add>> button to add Step 4. list, and click the

Page 166

Content Security Gateway User’s Manual 4.3.1.3 WAN Entering the WAN window Step 1. Click WAN under the Address menu to enter the WAN window. The

Page 167

Content Security Gateway User’s Manual Step 2. In the Add New Address window, enter the settings for a new WAN network address. Step 3. Click OK to ad

Page 168

Content Security Gateway User’s Manual 4.3.1.4 WAN Group Entering the WAN Group window Step 1. Click the WAN Group under the Address menu bar to en

Page 169

Content Security Gateway User’s Manual window will appear. Step 2. In the Add New Address Group window the following fields will appear:  Name: e

Page 170

Content Security Gateway User’s Manual Removing a WAN Group Step 1. In the WAN Group window, locate the group to be removed and click its correspond

Page 171 - 4.5.1 Configure

Content Security Gateway User’s Manual Adding a new DMZ Address: Step 1. In the DMZ window, click the New Entry button. Step 2. In the Add New Addr

Page 172

Content Security Gateway User’s Manual Chapter 1: Introduction The innovation of the Internet has created a tremendous worldwide venue for e-business

Page 173

Content Security Gateway User’s Manual Removing a DMZ Address: Step 1. In the DMZ window, locate the name of the network to be removed and click t

Page 174

Content Security Gateway User’s Manual Adding a DMZ Group: Step 1. In the DMZ Group window, click the New Entry button. Step 2. In the Add New Add

Page 175 - 4.5.2 Anti-Spam

Content Security Gateway User’s Manual Modifying a DMZ Group: Step 1. In the DMZ Group window, locate the DMZ group to be modified and click its cor

Page 176 - 4.5.2.1 Setting

Content Security Gateway User’s Manual Removing a DMZ Group: Step 1. In the DMZ Group window, locate the group to be removed and click its correspo

Page 177 - 4.5.2.2 Rule

Content Security Gateway User’s Manual and the server port ranges from 0 to 1023. How do I use Service? The Administrator can add new service group na

Page 178

Content Security Gateway User’s Manual Step 1. Click Custom under it. A window will appear with a table showing all services currently defined by the

Page 179

Content Security Gateway User’s Manual Modifying Custom Services Step 1. A table showing the current settings of the selected service appears on the

Page 180

Content Security Gateway User’s Manual 4.3.2.3 Group Accessing the Group window Step 1. Click Group under it. A window will appear with a table disp

Page 181

Content Security Gateway User’s Manual Step 3. Enter the new group name in the group Name field. This will be the name referencing the created group

Page 182

Content Security Gateway User’s Manual Removing Service Groups In the Remove confirmation pop-up box, click OK to remove the selected service group

Page 183 - 4.5.2.5 Training

Content Security Gateway User’s Manual 1.2 Package Contents The following items should be included: CS-500  Content Security Gateway  User’s Manual

Page 184

Content Security Gateway User’s Manual The following items are displayed in this window: Name: the name assigned to the schedule Configure: modi

Page 185

Content Security Gateway User’s Manual Step 1. In the Schedule window, find the policy to be modified and click the corresponding Modify option in the

Page 186

Content Security Gateway User’s Manual Configuration of QoS Click QoS in the menu bar on the left hand side. ÍÍ Definitions: Name: The name of the

Page 187

Content Security Gateway User’s Manual Modify QoS Step 1. Click QoS in the menu bar on the left hand side. Click the Modify button to modify QoS. D

Page 188

Content Security Gateway User’s Manual Step 2. Configure the LAN host or WAN host IP address that need to filter with QoS feature. Be aware that th

Page 189

Content Security Gateway User’s Manual Step 4. Enable the QoS rule in Outgoing or Incoming Policy. 4.3.5 Authentication By configuring the Authentic

Page 190 - 4.5.3.1 Setting

Content Security Gateway User’s Manual Authentication Port: The port number used for user login page. Generally, when user want to access WAN netw

Page 191

Content Security Gateway User’s Manual Definitions: Name:The name of the Authentication you want to configure. Configure: modify settings or remov

Page 192 - 4.6.1 Setting

Content Security Gateway User’s Manual NOTE: When the LAN user access to WAN network and do not use for a while, the connection will be time-out. U

Page 193 - 4.6.2 Signature

Content Security Gateway User’s Manual Modifying the Authentication User Step 1. In the Authentication window, locate the Auth-User name you want to e

Page 194

Content Security Gateway User’s Manual settings. WAN Connect to your xDSL/Cable modem or other Internet connection devices LAN Connect to your local

Page 195

Content Security Gateway User’s Manual 4.3.5.3 Auth Group Accessing the Auth Group window Click Authentication in the menu bar on the left hand side o

Page 196

Content Security Gateway User’s Manual Modifying Auth Group Step 1. In the Auth Group window, locate the Auth Group to be edited. Click its corresp

Page 197

Content Security Gateway User’s Manual Removing Auth Group Step 1. In the Auth Group window, locate the Auth Group to be removed and click its cor

Page 198 - 4.8.1.1 Traffic

Content Security Gateway User’s Manual Definition ♦ Enable RADIUS Server: Enable RADIUS Server Authentication. ♦ RADIUS Server IP: Enter RADIUS

Page 199

Content Security Gateway User’s Manual 4.3.6 Content Blocking Content Blocking includes “URL”, “Scripts”, “P2P”, “IM”, “Download” and “Upload”. URL:

Page 200 - 4.8.1.2 Event

Content Security Gateway User’s Manual Configure: To change the settings of URL Blocking, click Modify to change the parameters; click Delete to delet

Page 201 - 4.8.1.3 Connection

Content Security Gateway User’s Manual Step 1. In the URL window, find the policy to be removed and click the corresponding Remove option in the Confi

Page 202 - 4.8.1.4 Log Backup

Content Security Gateway User’s Manual ÍÍWhen the system detects the setting, the Content Security Gateway will spontaneously work. 4.3.6.3 P2P Step

Page 203 - 4.8.2 Accounting Report

Content Security Gateway User’s Manual will display at the top side. 4.3.6.4 IM Step 1: Click IM below Content Blocking menu. Step 2: Select IM dete

Page 204 - 4.8.2.2 Outbound

Content Security Gateway User’s Manual ÍÍ 4.3.6.6 Upload Step 1: Click Upload below Content Blocking menu. Step 2: Select Upload detective funct

Page 205

Content Security Gateway User’s Manual IDP Anomaly: Syn Flood, UDP Flood, ICMP Flood and more. Pre-defined : Backdoor, DDoS, DoS, Exploit, NetBIOS an

Page 206

Content Security Gateway User’s Manual assigns each computer a private IP address, and converts it into a real IP address through Content Security Gat

Page 207 - 4.8.2.3 Inbound

Content Security Gateway User’s Manual address of the WAN network, and the real IP is translated to a private IP of the LAN network. Mapped IP and Vir

Page 208

Content Security Gateway User’s Manual Modifying a Mapped IP Step 1. In the Mapped IP table, locate the Mapped IP you want it to be modified and clic

Page 209

Content Security Gateway User’s Manual 4.3.7.2 Virtual Server Virtual server is a one-to-many mapping technique, which maps a real IP address from t

Page 210 - 4.8.3 Statistic

Content Security Gateway User’s Manual Configure: To change the service configuration, click Configure to change the parameters; click Delete to delet

Page 211 - 4.8.3.2 Policy Statistics

Content Security Gateway User’s Manual Removing a Virtual Server Step 1. Click the virtual server to be removed in the corresponding Virtual Server

Page 212

Content Security Gateway User’s Manual Server (Load Balance Server).  External Service Port: Input the port number that the virtual server will

Page 213 - 4.8.4.1 Interface Status

Content Security Gateway User’s Manual  Virtual Server Real IP: displays the WAN IP address assigned to the Virtual Server  Service (Port): se

Page 214 - 4.8.4.3 ARP Table

Content Security Gateway User’s Manual Click OK to execute the change of the virtual server, or click Cancel to discard changes. NOTE: If the desti

Page 215 - 4.8.4.4 DHCP Clients

Content Security Gateway User’s Manual 4.3.8 VPN The CS-500 adopts VPN to set up safe and private network service, and combine the remote Authenticati

Comments to this Manuals

No comments