Home
InstantKey User Manual
Contents
1. 192 168 10 X 192 168 11 X 192 168 12 X O TT a U Gs NE ga A 2 Client User 192 168 10 10 24 Client User 192 168 11 10 24 Client User 192 168 12 10 24 Gateway 192 168 10 254 Gateway 192 168 11 254 Gateway 192 168 12 254 1 5 3 Users are NOT in the same networks as Firewall LAN If users are NOT in the same network as Firewall LAN interface we are required to configure routing for the SSL proxy to know the internal subnet and the internal gateway so as to forward the HTTPS response back to the correct client PC L7 Networks Inc 9 User Manual Chapter 1 Product Overview The device is connected between the core switch and the firewall Label A indicates that the bridge IP should be set in the network of the Firewall Switch segment say 172 1 1 251 with gateway set to 172 1 1 254 However the SSL proxy needs to know there are 192 168 10 X 192 168 11 X and 192 168 12 X subnets are below the L3 core switch 172 1 1 253 So you need to configure three routing rules for the device as 192 168 10 0 24 172 1 1 253 and 192 168 11 0 24 172 1 1 253 and 192 168 12 0 24 172 1 1 253 Label B in the figure indicates the management IP of the device say 192 168 10 199 Note that HTTPS traffic will still use its original IP to connect to the HTTPS server in stead of using the bridge IP However the system requires to lookup DNS through the management port 172 1 1 254 24 Bridge ip 172 1 1 251 24 Core Switch Routing table B
2. TRUE i hime e E eee PR HAJEN 3e nnl ogin rar tT K S eta oe B 3S 48 login rar 12ER fH sel lC MP tee tA Ty ERO BA p Pm SIM id Mars CA S A E L7 Networks Inc 101 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On Step 10 Paste the script to B login vbs 2354 E ini x the file BRO REO RO MAR BKH Right click on the Paste to paste the script to the file FIELD EA fe BALA BATE A 88a Unicode JERUSFIT S IBA Unicode ERFT gt Step 11 Confirm the scrip a Lec a E ARRE Q Aum o Confirm that the script content foption Explicit should be filled with correct AD pin gbinetwork objshell objexec Servers IP and correct Create the network object objNetwork management server s IP f Set objNetwork Createobject wScript Network Get the user name they are all correct please Anticipate that on windows 98 the user may not be logged on save the file strUser objNetwork UserName Here is the Do while Loop Do while struser wscript sleep 2000 Two Seconds struser objNetwork Username Loop Note the concatenation of struser with ampersand Wscript Echo user name amp struser Set objshell CreateobjectC wscript shell Set objExec objshell xec R 192 168 18 200 fet logon adclient exe 192 168 18 111 amp struser Do while gt ita E 0 wscript sleep 100 Your AD server Y
3. a P2P GoBoogy KUGDOO Rule 1 P2P Kugoo 3 PIGO Rule 1 EN P2P Pigo Pigo 100Bao 8 Always POCO Rule 1 Say Bm F P2P Poco Poco PP Point Allow l High 8 Always QQDOWNLOAD So Bev P2P QQDownload L7 Networks Inc 57 User Manual Chapter 8 App Policy Step 5 Select security profile Functions Content Manager App Policy policy On the toolbar of Secuirty Profile select the Status Policy Block to block all P2P applications us on Fsccurty to istes Status iti Action Schedule Rule Name Security Profile Pipe BE Allow bed P2P Kuro Allow a P2P DirrectConnect DirectConnect DC Allow i3 P2P OpenF T Crazaa Kice asy Allow P2P Ares Allow we P2P SoulSeek Allow Allow 3 Always KUGOD_Rule_1 Boss EF any P2P Kugoo Allow Always PIGO Rule 1 Boss GP any f P2P Pigo Pigo 100Bao Allow Always POCO_Rule_1 ge ger P2P Poco Poco PP Point Allow y Y P2P QQDomnload Allow Y P2p vagaa Allow X9 P2P Maze Allow gt P2P ClubBox ClubBoxGoGoBox Allow ls P2P Fs2You Allow NO P2P HuntMine Allow Always P2PDATA_Rule_1 Boss any 9 P2P P2pData Step 6 Select traffic profile Functions gt Content Manager gt App Policy gt policy On the toolbar of the Traffic Profile select the Status Policy profile Low to the P2P categ
4. an Chat MSN MSN Trillian Miranda G aim Allow default_pipe Y J PIP ule 1 SA any Se any Chat AOL AOL AIM Triton ICO Trillian Miranda S Allow default pipe PAR E amp 9 Tun oop XUNLEI BITTORRENT EDONKEY WINNY EZPEERPLUS aus GR aetaut pipe Allow l detault pipe Allow el default_pipe E Always Allow el default_pipe i Always R 2 j FOU Shared Files Allow l default_pipe T i Always GADU Rule 1 gt S any i Chat Gadu Gadu Gadu Kadu Miranda G aim Allow el default_pipe 19 Always UC Rule 1 S2 any ag ChatUC Sina UC Allow l detault_pipe amp Always POPO Rule 1 S any e ChatPOPO popo163 Allow l default pipe i Always TIRAS Sr any e ChatALiWangWang Taobao ALiWangWang Allow l default_pipe P 8 Always FETION_Rule_1 E any 3 Chat Fetion Chinamobile Fetion Allow amp default pipe B Always DOSHOW Rule 1 any 9 Chat DoShow Allow El default pipe 9 Always WEBIM Rule 1 any ChatWEBIM MSN Webmessenger eBuddy e M HE Allow l detault_pipe I 4 i Always X HTTP Rule 1 any E Web HTTP Allow l default_pipe LL Always HTTPDOWNLOA E2 any any Web Http Download zip rar exe isoAurmw rmwb w S Allow l default pipe mn 18 Always HTTPVIDEG_Ru any E Web Http Video flv mp swf Allow l default pipe L7 Networks Inc 56 User Manual Chapter 8 A
5. Status Please Input Your ID and Password L7 Networks Inc 19 User Manual Chapter 3 3 tier Architecture 3 3 4 1 Creating Devices Groups Step 1 Adding device group File gt Device Group Manager After you successfully enter the system please File Update Tools Help click the item Device Group Manager to add a new device or group y New Project ew Proje f Open Project Ctrl O 24 Edit Project Ctr E Close Project Ctrl C 9 Delete Project Ctrl D Exit Ctrl X Step 2 Adding a group File Device Group Manager New Group Right click at the Devices item and select the Device Group Manager New Group Delete Device Step 3 Input the Group name File gt Device Group Manager gt New Group Input the name of the group and then click the OK Hew Group button to continue After that the group name will display on the screen You can right click the item ca and select Rename Group or Delete Group to y Ea WU oet modify or delete the group A AS hears erus n ia A A Cancel ae _ L7 Networks Inc 20 User Manual Step 4 Creating New Device Right click on the existing group Group 1 and select New Device to add a new device Step 5 Edit related device information Input the device name and select an IP address which is previously registered by the ip set command of the device Click the OK button to store the settings Note You must setup the
6. Eus clickthe the OK button to continue Select a Project Select a Project from the list below Project information Step 3 Start managing the product File gt Open Project Now you can start managing your product dsc cia ariba ci A single project can control multiple device belonging to different groups Move the cursor to the device you want to manage and double click it the system will connect to the device and load the configuration to the management console screen L7 Networks Inc 26 Chapter 3 3 tier Architecture Part 2 Design Philosophy User Manual Chapter 4 Internal Data Processing Flow Chapter 4 Internal Data Processing Flow This chapter introduces the basic design principle and the steps to achieve the principle 4 1 Technology Nowadays many Internet users have installed IM and P2P applications which apply port hopping and HTTP tunnelling to avoid being checked or blocked To help MIS to overcome the issues 5 step Content Management is proposed to maximize the productivity security and minimize the threats TCO Total Cost of Ownership 5 Step Content Management Maximize Productivity Security Minimize Theats TCO Step 3 Behavior Mgmt O IM Game IM Chat File Recording Chat Recording Q9 messencer LETIN Keyword block le P2P Bandwidt qa Mgmt SKYDE in Ha dieti T S S C AN J Y Y Y Y Y Realtime Layer 7 to Layer 4 Interactive Deep
7. InstantKey User Manual L7 Networks Secure Networks at Layer 7 Copyright Copyright created on 2015 by L7 Networks Inc The copyright of the contents of the manual belongs to L7 Networks Any forms of reproducing the contents are not allowed If you want to transfer or copy the contents of this document you must get any approval from L7 Networks Trademarks All trademarks and registered trademarks are the property of their respective owners Technical Support This manual provides you a detailed installation amp setup guide of the product You can also download the documents from our website at http www l7 networks com L7 2005 products download html If you have any technical problems or suggestions please contact our technical support center Please prepare the following information to save the time when communicating Product model serial number where you can get it from CLI command sys ver Purchasing time amp maintainence contract When you get this product Briefly describe the problems amp the steps you have already tried service OL7 D 3F NO 289 Sinhu 3rd Rd Neihu District servic 886 3 666 8896 10F NO 25 MinZu Rd Hsinchu Taiwan Shanghai e 86 21 5434 9678 L7 Networks Inc R amp D Shanghai office Beijing service L 86 21 5434 9678 Alphasolutions Co Ltd Networks com Singapore SONCU 65 31503660 L7 Networks Inc Indonesia Networks com service L7 1 408 844 8850 Thailand ars
8. Yahoo ICQ AOL GoogleTalk Webim will equal to 32 of the outbound traffic 0 64 Mbps or inbound traffic 32 Mbps L7 Networks Inc 48 User Manual Chapter 7 Traffic Manager 7 3 Steps Step 1 Start the Traffic Manager Functions Traffic Manager Traffic Manager Check the Enable Traffic Management 4 Status 83 Policy amp amp Options Enable App Policy Description 1 Policy order Per IP Policy gt App Policy 2 App policy order top down first match Static Exempt Source Destination Enable Exempt Sources Exclude g Bypass v from App policy Dynamic Exempt Source Destination Enable Exempt Sources Exclude g any v from App policy Default Traffic Pipe Put unmatched traffic into E default_pipe v Step 2 Setup outbound bandwidth Functions gt Traffic Manager gt QoS Policy Input 2 at the Outbound Traffic field and then Step1 Define the default link sharing tree Step2 Create scheduled pipe policies from the default tree drag and drop the mouse for the bandwidth Description partitioning line You can drag it to allow High to Rightclicking the tree node allows you to create children occupy 50 of the total bandwidth Middle to Children can be setto borrow bandwidth from its parent node occupy 18 of the total bandwidth and Low to Note Any existing Pipe Policy will disallow you to edit the default tree hierachy occupy 32 of the total bandwid
9. amp subnetPQA amp amp SubnetRD L7 Networks Inc 64 User Manual Step 7 Editing group Enter the name and select host objects from the left column Click the gt gt to move the address object from the left to the right If you want to remove some address objects from the current group select the object in the right column and click the button Click the Finish button to finish the settings r a Add new IP Address group Chapter 9 Address amp Schedule Objects Function gt Management gt Object Manager gt Address gt Groups This is Group Editor Please enter your Group hame Hame All Hosts E Object HostPresident E Object HostChairman Selected Hosts m OhjectHastCEO Object HostC To E Object HostvicePresident E Object HostViceChairman Object HostCMO m Ohbject HostCEO m Object HostCFO Object HosiCTO Object SubnetMARKETING Object SubnetMANUFACTUR Step 8 Display existing address groups After you click the Finish button all groups will be shown on the screen Function gt Management gt Object Manager gt Address gt Groups Objects Groups E e GroupEmployee 3 amp GroupManager amp GroupServer m amp amp HostCEO E E2 Hostomo 82 HostCTO a amp ServerFTP m amp ServerHTTP 3 amp ServerMYSQL E ServersaL f E SubnetADM m amp amp SubnetFINANCE E2 SubnetMANUFACTURE m amp
10. 172 1 1 253 24 ore Switch 192 168 10 X 192 A X 192 168 12 X CC Switch 0 p Client User 192 168 10 10 24 Client User 192 168 11 10 24 Client User 192 168 12 10 24 Gateway 192 168 10 254 Gateway 192 168 11 254 Gateway 192 168 12 254 1 5 4 Users connects to internal proxy first If users are configured to use proxy to go to the Internet and the firewall limits that only the proxy IP 172 17 1 100 can go to the Internet we usually configure the deivce also in proxy mode to intercept SSL connections L7 Networks Inc 10 User Manual Chapter 1 Product Overview The device can sit as a standalone proxy only INT1 interface is needed to be connected or be connected between the core switch and the firewall In the latter case Label A indicates that the bridge IP should be set in the network of the Firewall Switch segment say 172 17 1 199 with gateway set to 172 1 1 254 However the SSL proxy needs to know there are 192 168 10 X 192 168 11 X and 192 168 12 X subnets are below the L3 core switch 172 1 1 253 So you need to configure three routing rules for the device as 192 168 10 0 24 172 1 1 253 and 192 168 11 0 24 172 1 1 253 and 192 168 12 0 24 172 1 1 253 Label B in the figure indicates the management IP of the device say 192 168 10 199 Note that HTTPS traffic will still use its original IP to connect to the HTTPS server in stead of using the bridge IP However the system requires to lookup DNS through the management port
11. 3 Tier Architecture Maximize the Performance Availability and Functionality Layer 7 network egipments often do computing extensive tasks and require better architecture to maximize the performance availability and functionality The product incorporates the 3 tier architecture to boost the performance for every purpose Denied P2P Tur bi iz ProxylM VolP St gt Y lt A 2 1 Tier 1 Device The device should aim at rapidly and accurately doing content inspection In such a way the device which is installed inline at the network will not influence the network performance 2 Tier 2 Management Server The management server takes the responsibility to centralize the management to multiple devices while accepting event logs into database for further reporting amp analysis 3 Tier 3 Management Client The management client can be any PC with a java enabled browser As long as he she can connect to the management server he she can control all the devices under the server L7 Networks Inc 14 User Manual Chapter 3 3 tier Architecture 3 2 Installing Management Server 3 2 1 Requirements v Operatiing System must be at least Windows 2000 2003 or Windows XP If your operating system is in English version please install your preferred language pack For example the Chinese Traditional language pack is prompted when you are installing the management server Click the Install button to start installa
12. Game IM NEWS P2P Photo Pornography Sports Stocks WebHD Chatroom Bronze Audio Video Drugs Gamble Hack WebMail Violent WebIM Blog Discuss Game IM Job NEWS P2P Photo Pornography Portal Proxy Social Sports Spyware Stocks Trade NewUser Tunnel Warez WebHD Chatroom Enable URL database to block Enable URL Database URLs Enable Diable Enable Log Only Log amp Block Log amp Block Block Only Action to take when the URL Action matches the URL database L7 Networks Inc 121 User Manual Chapter 12 Web Manager Categories Enable all categories Enable Diable Disable Block URLs that match anyone of l Block all categories the URL categories Enable Diable Advertisements Audio Vid Check the URL categories to be Enable Diable Enable eo Drugs etc enforced FIGURE 12 2 URL Web filtering fields Step 5 URL keyword blocking Functions Content Manager Web Global Policy URL Keywords Check the Enable URL Keyword blocking Categories to block any URL containing the keywords Status Web Profiles 8 Global Policy listed in the settings The product has preset amp Web Sites web Contents 5 Web Messages E Web Alert keywords You can change the keywords by 8 URL Keywords Categories Excluded Full Domains 5 Excluded URL Keywords right clicking the item Description Step 1 Edit the URL keywords and thei
13. Modify the keyword settings here Step 2 Goto Web Policy to add Custom into some permission I Step 3 Go to Content Policy to set some objectto the permission level s Sa iS E X E f 3 e J mp3 7 music J song 3 sing 5 movie s S s s Drugs Gambling 7 Hacking 7 Webmail 7 Pornography 2 Violence T WeblM un a 4 24 9 s s s Es s s Step 8 Assign Web Profiles Functions gt Content Manager Web gt Web Profiles You can define a new web profile by yourself to choose your preferred categories listed in our built in URL database L7 Networks Inc 112 User Manual Step 9 Setup John s Policy Go to Content Policy gt Policy and right click on that area to add a new user by clicking the New User Input John at the Name field and select the web profile rule john which was just created in the previous step Check the URL Rec to record the visted URLs by John Chapter 11 Configure APP Content with AD Single Sign On t Sal c veo Froles g Clozel Policy NO Nae Racked Catzqurzs Finin V rar lidan Ar Chad nm Neve 4e oh Bored Calzgo ies Peman sche 4853 Porta esha Pr ae Ana Redirect Soda CI Eras orks RN Trad ure wd Ul la cz Wares leven HO Rew User Create a new user Schedule Always v Virtual Group Others Basic Rule name rule 1 The Name fiel
14. ez Frotiz w k isxd D Ecred le wv Cc une nm lA Frofle sdo Prosi is num O Sihsdue RieNans Caturt sar Wua Go pz alas GAD Beck Irport OP Pie Iepect E Fils Bogert Please select ine accounts and groups v Objects 3 iv Pl Accounts 9 amp Administrator Administrator 4 amp Guest Guest 4 amp John John Y A Groups lu 42 Account Operalors v 5 Adminisirators 7 44 Backup Operators vi 4 Cert Publishers ui 24 Distributed COM Users 2 4 DnsAdmins fv DnsUadateProwy v 22 Domain Admins lu 24 Domain Computers 3 4 Domain Controllers Domain Guests Ok Cancel Fig 1 Functions Content Manager Content Policy Policy 107 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On f Ets TA Ply A acion biel v hun ddp wo M up we A i Apps ihe nme wo dab nma wl nt Pr Tine mala Cn ano Echezxlz Rui ime ore la Frafiz b tinatsi Figs Male i vum b His mm halny L aho Jorn FIx1 m Fkinun b RDI RD Fladom lina trnu d cp Fiuieam Malin b Odeimsrst Pies mn binu Cr Pudlz FIx1 m Fkinun Fizd m isI ru SS nemine Hiram bybnurn DnzUpzsls Hmm hinun A Dorais Flad rm l Inu E Doral c Fiaim is num s Lura Le BETERI brun Domain Us Fg m lelnrum b Entzn fiz lzInu he z m p ni ar tr ln Chere 3E Beck Import PP Tile Tapert File Eg
15. men eP Enangute2368129598 eles 207 46 95 153 i 1 1 4 Fig 2 10 3 2 2 Manually assign web login account names in content policy rules Step 1 Add a new rule Functions gt Content Manager gt Content Policy gt Policy Here we want to audit the IM conversation file transfers L7 Networks Inc 75 User Manual Chapter 10 Configure APP Content with WebLogin URL access of the RD group f Status fb Polos g actos First right click on the policy iSt m s Grup HMernfie v Jah Ponia area and select the New User apor amp checui S vrtual sroap w Prchle w WebPratle Y liec to add a rule Fill in the Name I TE A ii E Conditor Acien gt field with RD and check the GChadule Rule Name Mama Ik Profile Wee rofle Vidual Groups Enable of the MSG Rec and the E mm File Hec Upload the configuration DotauilLiser Lo J zi nii Schedule Always w VirtualGroup Others Basic Rule name rule RD Name RD The Name field could be AD account AD group or Web Login account Ih MSG Rec Enable C3 Disable File Rec Enable O Disable MSN Account Allow Yahoo Account AOL Account Allow ICQ Account Allow IM Service fp atinim Yad URL Rec Enable O Disable Web POST Allow Yeb Service Platinum Finish Cancel 10 3 2 3 Import web login users into content policy
16. version of the management server Please click EV MM gt gt e i the About to check for version LS ES L7 Networks Inc 32 User Manual Chapter 4 Internal Data Processing Flow Step 2 Version display Help About After the About is invoked the Figure will show About WE you the version in details Note The version consistency between the yz A etw device and the management server lies in the first E EE EA two segment of a version number For example in this example the management server is in version 2 2 01 This software will apply to all 2 2 based devices Namely devices ranging from version 2 2 0 to 2 2 13 can use this management software Only 2 2 matters The following numbers L7 Networks Management Console do not count Version5 0 01 20140226 Copyright C reserved L7 Networks Inc Copyright c L7 Networks Inc All Rights Reserved L7 Networks Inc 33 User Manual Chapter 4 Internal Data Processing Flow L7 Networks Inc 34 User Manual Chapter 4 Internal Data Processing Flow Part 3 Network Monitoring L7 Networks Inc 35 User Manual Chapter 5 Traffic Discovery Chapter 5 Traffic Discovery This chapter shows you how to catch internal thieves to further setup policy rules to manage them 5 1 What Is On Your Networks The often heard advice to know your network is needed by broadband and WAN operators more than ever before Being able to identify the applications and use
17. 7 days for you to trial After that periold the function will not work anymore but just bypass the in out traffic It will not interrupt your network but just disable each function After you have decided to purchase the product your system intetrator will give you a deal license key to make permanent effectiveness of each purchased function Step 1 Enter license Update License Click the License item to enter the license key Update Tools Help y Upload configuration Update pattern E Update URL database 2 License Status Option L7 Networks Inc 138 User Manual Step 2 Input License Key Enter the license key and click the OK button Step 3 Update license successfully After you successfully update the license the dialog will pop up Click the OK button to continue Chapter 15 oystem Maintainence Update License License Key Please input Lincense Key License Key BL 4041 a D 5E8A 5B824 3 540C DB5C81 C Cancel Cancel Information Update license succeffuly 15 6 Upgrading Patterns URL DB 15 6 1 Auto Upgrading Patterns URLDB Step 1 Auto Upgrade Configuration Click the Option L7 Networks Inc Update Option Update Tools Help Upload configuration Update pattern Update URL database y License 25 License Status Option de 139 User Manual Chapter 15 oystem Maintainence Step 2 Input Update Center Informati
18. Admin are nearly unlimited in session count and bandwidth The members in group Sales are limited to have 200 sessions and 1Mbps upload bandwidth and 1Mbps download bandwidth What is more each IP should have a limited P2P usage only allowed to occupy 100 sessions of the total 200 sessions o 5Mbps of the 1Mbps upload bandwidth and 0 5 Mbps of the download bandwidth ADSL Router DMZ Router Firewa EXT MGT SYS Product Device w p Core Switch Admin Sales Guest L7 Networks Inc 41 User Manual Chapter 6 Per IP Manager 6 2 Methodology The product should first setup a default policy for all IP address to have an initial limit for the session count upload bandwidth and the download bandwidth as follows Then define the general limits for the members in the group Admin Then define the general limits for the members in the group Sales Finally you will have to define the sub rule for the group oales Add a per ip app policy rule for the group sales as follows Upload 1000Mbps any Upload 1 Mbps Sales 00 Upload 0 5 Mbp Sales P 100 6 3 Steps Step 1 Start the Per IP Manager Management gt Per IP Limit Manager gt Status 2 om Upload 1000Mbps Admin Any my me 2P Status Policy Quota Profile Check the Enable Per IP Manager If you want to add some IPs in the excluding list click the Exclude radio box and select the interested group v Enab 2 Far IF Wansger
19. Description Police onder Far gt LT gt L4 2 Par lP aolicy order to9 6o0om last malc Exempt Source Destination Exclude a any v ftam e Per IP Limit Policy Step 2 Edit the Default Rule Management gt Per IP Limit Manager gt Policy 1 Status Policy Quota Profile Right click the Any ruleand select the Edit Policy Description Note Packets are top down matched with the policy Only the last matched policy takes effects Note Bandwidth policy priority Per IP gt L gt L4 Block policy priority L4 Per IP gt L7 Status Condition Action 2nd level Actiontwhen exceeding qu i Rule Name Src Service Session Upload Download Quota Session Upload Download 1000 Mbps 1000 Mbps Add Per IP policy Add Per IP app policy Edit policy L7 Networks Inc 42 User Manual Chapter 6 Per IP Manager Step 3 Edit the Default Rule Management gt Per IP Limit Manager gt Policy Right click the Any ruleand select the Edit Policy Edit your Per IP policy Rule name Default rule Per IP Internal IP Session limit Upload limit 1000 Mbps Download limit 1000 Mbps Note Zero means no limit Quota Use Quota Quota policy Reduced Policy Session limit Upload limit Download limit SSS Step 4 Edit the Default Rule Management gt Per IP Limit Manager gt Policy Right click the Any ruleand select th
20. GODOWNLOAD M pos 2 Y P2P Q0Download O Block amp log l High G A _ gt lt _ _ _ ________ AA e gt L7 Networks Inc 58 User Manual Chapter 8 App Policy 8 4 3 Setup VoIP policy by App Policy Rules Step 1 Enable the App Policy Functions gt Content Manager gt App Policy gt Status Check the Enable App Policy Status Policy Enable L Manager Description 1 Policy order Per IP L gt L4 2 L policy order top down first match 3 Set needless policy to Never to avoid performace drop rExempt Source Destination Rove C3 Exclude E2 HostCTO w fromthe L7 policy Z ul p e r Default Traffic Pipe Put unmatched traffic into High w Step 2 List VolP group Functions Content Manager App Policy policy Select the VoIP in the List field then all VoIP Status Policy policy rules will be displayed on the screen List category gt Protoco Apply Schedule w security Trafic to listed Category Condition Action Dst Protocol Security Profile Pipe E any B Chat MSN MSN Trillian Miranda G aim Allow l High e any ChatYahoo Yahoo Trillian Miranda G aim Allow El High E any A Chat AOL AOL AIM Triton IC Q Trillian Miranda Allow El High T IS T Y e any D ChatXMPP Google Talk G aim amp Allow l High QQ Rule 1 e
21. H323 NetMeeting i Allow l High A Working VOIPBUSTER R Boss Q VolP VolPBuster Allow l High List 9 vor IM Protocol M Apply Schedule w Security iM Policy E NO Status Condition Schedule Rule Name sre Dst Protocol A Working SKYPE Rule 1 La Boss E any B volP Skype 4 Working BKYPEFILE Rut Boss Eg any VoIP Skype File Transfer Action Pipe El High Block amp log l High 4 Working F SKYPEOUT_Rul Boss E any o WolP SkypeQut Block amp log l High 4 Working SIP Rule 1 La Boss E any KT VoIP SIP MSN Voice Yahoo VoiceMWagaley Te Block amp log l High A Working H323 Rule 1 a Boss amp any QU VolP H323 NetMeeting Block amp log l High 4 Working VOIPBUSTER_R Y Boss E any Q VoIP VoIPBuster Block amp log l High Functions Content Manager App Policy policy Status Policy List var M Protocal It Apply Schedule Security x Traffic M to listed NO Status Condition Action Schedule Rule Name Src Dst Protocol Security Profile L 4 Working SKYPE Rule 1 La Boss E any BS vorP Skype Pipe 4 Working l SKYPEFILE_
22. Java applet technology So you need to install Java virtual machine in your browser When you first connect to the management server with IE you will be prompt to install the Java plug in into your PC After that when you first login to the system it requires a relatively long waiting time to download and run the program Please be patient 18 User Manual Chapter 3 3 tier Architecture Step 1 Connecting to Mgt Server Connect to http 10 1 1 10 Select an IP address for the management server s to control the product ex 192 168 168 1 Open bsec your IE browser and enter http lt management B server IP For example enter http 10 1 1 10 to connect to the management server When the security alert window pops up click OK to trust our java applet Only when you click OK can the program successfully run on your system Secure WEIWO S PEMAI Note If make your management server locate in the same subnet of your device Step 2 Choose the language The product currently offers several languages You can select your favorite one to control the interface Plezse seiect your language Language Setting Dialog Note After you have entered the login page you have to go to Tools gt Language Setting to change the language settings Step 3 Login Enter the username and password default admin admin After that you will enter the system Networks SOCO NOORE AL Umm ID admin Password ee eee
23. Panlo System MaintalfieriCB A iunuundurnauyeinmareyionuunedusnaeentuunueds 131 Chapter 14 Mangement Server Maintainence oocccccccncccccncccncnccnnnncnnnnnononononnononnnnnonarnnnnnnnnnnnenoss 132 14 1 Introduction to Management Servet tiie cordance eel Se eee a ee eee ee 132 14 2 Configuring the Management Servel ccccccccccssssececcceessececceeeusececeseaeeeessseuseceeessuegeeeeessaaeeeeessaaaeeees 132 Chapter 15 System Maintain iG cisma dioere id A A AAA 136 15 1 SOO 136 15 2 Upgrade Firmware through TET iia land 136 15 3 BACKUP CONIO e XP PP DE ER 137 15 4 ROSOR Cle al 6 ramen HD Lm 138 15 5 Enabling Optional Module eb ish terere edad ada 138 15 6 Upgrading Patterns 7 URLE DB at obedit cas o nt A AOS 139 15 6 1 Auto Upgrading Patters JU REBB i utn Vit tia ds 139 15 6 2 Manually Upgrade Application PatternS ccccooonncnnccccconnonncnnnancnnnonnnancnnnnnnonncnnonononncnnnnonnnnrnnnnnnnos 141 15 6 3 Manually Upgrading URLDB occccccoccnncccccccccnnccccoccnnnonononononononancnnnnonnnncnnnonnnnnrnnnnonnnnrnnnnonnnnrnnnnnnnas 142 15 6 4 Restore to Factory Default AE GL Iis ies do dut Eon ato aea acus queo tex pex To M opea ad Reve een N 143 15 6 5 Restore to Factory Default in CLI Emergency Mode ooccccccoccnccccnccnccnoccncononcnnconanonconancnnononcnnnnnas 143 15 6 6 SONME CONTO pr PPS 143 Chapter 16 Advan
24. Policy gt QoS Policy E Content Manager S Content Policy a SIM Ka Web E Webmail d Data Leakage Preven S DLP Policy M IM 3 EMail 3 FileTransfer amp WebiM WebHD BPA sarees Toolbar L7 Networks Inc 1 35 bittorrent H 192 168 18 48 Eric MJ TCP Me UDP Mr UDP iel UDP Bel UDP fit UDP fie UDP Me UDP e UDP fit UDP Meel UDP Je UDP ie UDP 155087 128 39 165 17229688 2 unli 804 unli 1365529 109 201 133 19 27104 unli 1 36552mb 77 166 106 133643354 unli 136552m gt 79 177 138 27 2467444 unli 1 36552m 89 151 215 18640306 2 unli 76 29 81 2862504 4 unli 136552 85 68 20 25251413 2 unli 1 36552 75 103 220 10624874 2 unli 136552mb 36 69 40 10965535 2 unli 136552 85 243 255 20352885 9 unli 136552mb 71 46 115 16950533 4 unli 136552 202 65 201 6614016 4 unli M i 1365528 31 172 63 225 136552mbp AL ad nnm s 1 1 1 1 1 1 1 1 1 1 1 1 1 26 74 M 159 98 26 74 M 159 98 A 57 419 124 577 57 419 124 577 27 817 25975 Foooaaaooooou 1 35M 14 57 M 1 35M 14 57M 1 1M 822 84 Refresh every 3s Ib aal lalalala lalalala is 4 30 User Manual Chapter 4 Internal Data Processing Flow Display Hide the status area Upload config E2 Group object Inverse of the selected group object Inverse of the selected host object Management g 7 Date options f
25. Professional Copyright i 1985 2001 Microsoft Corporation HPA QD sao ARAL TEST h E 1 8 SS ee jae jie f Windows TBFHELT IS REP RER SU PHRASE PU Kitchen Computer A Mary s Computer CERTAIN microsof b5c4Bl test com IA ede DA et Gu a A wo ge Go q 15 2 LL ike LD o zt Sora bv SL SEL AGES Sr BO TE RUBEZSE A e TS Bm E 2 95 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On 11 3 1 4 Setup AD Import at Management Server Step 1 Setup AD Import Information Windows 2003 Server IP 192 168 18 190 Mgt Server IP 192 168 18 45 Mgt Server OS Windows XP Professional Device IP 192 168 18 92 Netmask 255 255 225 0 Go to Object Manager gt Dynamic Dynamic Objects and click te AD import button Fill in the AD server s IP and port then click the Auto Fetch User DN and Base DN You will find that the following field are automatically filled up with parameters Enter the password for the administrator of the AD server and click the Next button Step 2 Select Import options As Fig 1 shows it has found 31 groups and 10 users Now the system will prompt to ask for import options The first is to delete all existing objects and then import The second is to preserve existing objects and replace it if duplicated The third is to preserve existing objects without importing any objects Select one of the
26. Server Service on at TCP 6565 L7 Networks Inc 132 User Manual Chapter 14 Mangement Server Maintainence Step 2 Setup Email Server Monitor Server Status Click the Edit button and select the the By Local Server option Input the IP address of the DNS Server If you want to alert the administrator by SMTP email please check the By SMTP Server option Either the two ways of sending the email should be tested to verify that if it really works with your preferred server You can test it by clicking the Test button If it works you can then decide to enable the email alerts or not by checking the Enable Disable Mail Alert If enabled input the Check Period min field so that the program will check if there are any message it should alert every that periold Step 3 Customized Email Monitor Server Status Message Move the cursor at the text input area and click it You can use the variables Date App Action User to compose your email contents Variable Description Example FIGURE 14 1Alert email variables Step 4 FTP Setup Monitor gt Server Status At the FTP Setup page you can use FTP to do backup Check the Enable FTP Backup and check the Backup only option You can then choose the FTP backup schedule by a daily basis weekly basis or monthly basis Input your exact time to backup the data in the pop up dialog For example click the Daily button then select 15 00 to ask the system
27. Terminal Type Hyper Terminal 115200 L7 Networks Inc 17 User Manual FIGURE 3 2 HyperTerminal settings Step 1 Login system The default ID and Password is admin admin After logging you can use CLI commands to change the password Step 2 Configure management port IP Type en to enter Privilege Mode Type ip set command to configure the MGT interface and the Management Server related IP information Step 3 Assign management server IP Type sys mgtserver to start assigning the device s management server 3 3 4 Connecting to Device e COM1 PuTTY scan login login login admin gt en nf ip set lease enter the IP IP Address 192 Netmask 255 255 Default Gateway Primary DNS 168 95 1 0 0 0 0 Secondary DNS Your configuration is conf ig guration for this device 17 93 192 168 17 93 E 255 255 0 17 951 192 gt 168 O94 7 68 168 17 251 Gateway Primary Secondary DNS Management Server DOWN UP UP EXT DOWN want to apply and save setting Do you really Waiting for system Instantscan sys mgtserver Choose met server mode 2 3 system time Tue Jan 20 12 35 56 2009 want to adjust device system time Y ag server 192 168 17 192 166 you really want to apply an list successfu Do x Update filter done InstantScs ing Chapter 3 3 tier Architecture DOWN n The product s management system uses
28. amp SubnetMARKETING rj E amp SubnetPQA m E SubnetRD Step 9 Upload config to the device Check the Upload Configuration item or click the icon to upload the current configuration to the device Update Upload Configuration Update Tools Help 2 Upload configuration Update pattern Update URL database License 55 License Status Option A If some object is referred by some group or some policy rule before you delete this object you have to delete the policy or group first Otherwise you will not be able to delete the object L7 Networks Inc 65 User Manual 9 3 2 Schedule Control Step 1 Deleting the default schedule The product has provided two default schedules for you If they cannot meet your needs you can modify the schedule or delete it immediately In the following examples we will delete default schedules and add a new schedule to demonstrate the process Note Please note that before you can delete a schedule you must make sure there is no rule referring to the schedule to be deleted The example at the top right one is to delete a group You must delete the schedule inside the group so as to delete the whole group Step 2 Right click the schedule Right click at the schedule area and select the Add Schedule option Step 3 Adding a new schedule Enter the name of the schedule Click the OK button to close the dialog otep 4 Editing time Rig
29. any E2 any A chaton Allow l High 18 Always QOQCHATROOM E any e any 9 chat QQChatRoom Allow l High 1 l 9 Always QOMEDIA Rule 1E any E2 any Q chat 00 Media File TranstenVoice Video Allow El High i Always QOSHARE Rule e Chat QQ Shared Files Allow l High Always GADU Rule 1 i Chat Gadu Gadu Gadu Kadu Miranda G aim Allow el High 18 Always UC Rule 1 ue ChatUC Sina UC Allow l High i9 Always POPO Rule 1 E any e ChatPOPO popo163 Allow l High H 1 T a Always ALIWANGWANS E any e ChatALiWangWang Taobao ALiWangiWang dE Allow e High d Always FETION Rule 1 g any E2 any E Chat Fetion Chinamobile Fetion Allow l High i9 Always DOSHOW Rule 4 S2 any E any 9 Chat DoShow Allow l High 4 E Always W EBIM Rule 1 an E any 9 ChatWEBIM MSN WebmessengereBuddyfe M Allow el High 18 Always HTTP_Rule1 ea E2 any e Web HTTP Allow l High gt Always HTTPDOWNLOA o Step 3 Choose schedule Functions Content Manager App Policy policy On the quick configuration toolbar select the Polar WorkingHours item in the Apply field All the us ano Scheaule T to listed n listed policy rules will be set to the same Tum Schedule m schedule Of course you can setup each rule Schedule Rule Name Sre Dst 9 Always Protocol Security Profile Pipe z 5 M one by one too SKYPE Ru
30. can choose to new Ob Web Promes edit copy delete the service profile Chapter 13 Encryption Web Manager Encryption Recorder gt Web gt Web Profiles wo ame Custom URLDB Categories Built in URLDB Categories Excluded websites l Pam 9 Ld New Service Edit Service Copy Service Delete Service Delete All Bronze NewUser L L7 Networks Inc 126 Block FullDomaims URL Keywords WebMail WebIM Discuss IM Chatroom WebMail WebIM Blog Discuss Game IM NEWS Photo Pornography Sports Stocks Chatroom Audio Video WebMail WebIM Blog Discuss Game IM NEWS P2P Photo Pornography Sports Stocks WebHD Chatroom Audio Video Drugs Gamble Hack WebMail Violent WebIM Blog Discuss Game IM Job NEWS P2P Photo Pornography Portal Proxy Social Sports Spyware Stocks Trade Tunnel Warez WebHD Chatroom User Manual Step 4 Edit service profile Choose Block from the Built in Website Categories in the leftmost tree You can see a lot of categories of the built in URL Chapter 13 Encryption Web Manager Encryption Recorder Web Web Profiles 2 08 _ Ll Edit web profile Service Name 7 Edit Service dy O Custom Web Edit here to help define Service Name database Select the categories you want to block For those categories already selected to the left side they are in grey disable state at the right sid
31. complete sys tcpdump commands are listed as below Sys tcpdump external Dump external port packets External Sys tcpdump external Dump external port packets interactive interactively Sys tcpdump sys tcpdump internal montones dump Sys tcpdump internal Dump internal port packets interactive interactively L7 Networks Inc 151 Product User Manual Appendix A Sys tcpdump Dump management port Interactive management packets interactively Interactive FIGURE A 6 sys tcpdump A 2 CLI Commands Emergency Mode If the system accidentally crashes and requires you to enter the emergency mode press Ctrl e when the prompt shows to you Enter admin without any password to enter the emergency mode Non privileged mode Command Emm Deseo 3 ET fenabie en Embe Emere priviedoeamoas lem SCR ecm O oo O Seo Pares related sings e ip ping 202 11 22 33 Sending ICMP for network debugging ip traceroute Tracing the routes for network debugging Lo o Site related settings Display the current time FIGURE A 7Non Priviledged Mode in Emergency CLI Privileged mode Seti o Preta configuration EN e ms SemoupiPadressiriedeies EN EE ip tftp upgrade image FILENAME Upgrade firmware from the TFTP server upgrade 192 168 168 170 ip traceroute 202 11 22 33 Tracing the routes for network debugging m Ste setings 0 am ye Sempmecwenimedae O mi ratio Surco es
32. defined Chat MSN Security Profile Action of the policy allow or block Allow Block Traffic Profile del of the policy the bandwidth class the traffic belongs oo Middle Middle Figure 8 2 Field description of the App Policy policy L7 Networks Inc 55 User Manual Chapter 8 App Policy 8 4 2 Setup P2P policy by App Policy Rules Step 1 Enable the App Policy Functions gt Traffic Manager gt App Policy gt Status Check the Enable App Policy 4 Status g Policy Options Enable App Policy Description 1 Policy order Per IP Policy gt App Policy 2 App policy order top down first match r Static Exempt Source Destination v Enable Exempt Sources Exclude amp amp Bypass from App policy r Dynamic Exempt Source Destination Enable Exempt Sources Exclude amp any y from App policy r Default Traffic Pipe Put unmatched trafficinto l default pipe v Step 2 List the P2P group Functions Content Manager App Policy policy Select the P2P in the Group listbox as a filter Policy to only show P2P policy rules List Category w Protocol w Apply Schedule v Securiby w Traffit w tolisted Condition Action Sre T Protocol Security Profile Pipe ule 1 e any i Rule 1 B2 any S any y ChatYahoo Yahoo Trillian Miranda G aim dE Allow El default pipe M
33. enforcement Iter enforcement Exclude Functions Content Policy Action fh Status fb Poiry BA Acton us Grouse NO Gmup srme Desnmnn W Frotie eb Frefta he Fem Iso EE NT Lars saut gow nans lo users reg strapon hewtisa ev ser Fig 1 Functions gt Content Policy gt Policy la Status n uc An Lg must Grout v HPT v ed Frofls izb Pte e lolskd 530 HP cite Wa 1018 rua Sroucs Aph Schidue Ws Suu w MWP fe v Donation Figivum iadi Lens gue Fizxi um 2 izk D Pilky 9A Action Let unusiGro p w ly Pte w wacbP cflc a AEN iha ETNE Cina a Pi ni wl parti M de a alt a Echzdue RucNare Co dtzn Arion Home Dzfzuk se Dz s Hizer Pa Fyiwm Duer Uzzr Dele t 115 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On ust Enable the MSG Rec to Edit enable the recording of chat messages as shown in Fig 4 Schedule O Always w Virtual Group AE Basic Rule name rule 1 Name John The Name field couid be AD account AD aroup or Web Login account IM MSG Rec Enable Disable File Rec O Enable Disable r EX MSN Account Allow y AOL Account Allow v Yahoo Account Allow w ICQ Account Allow B IM Service Platinum Web URL Rec Enable O Disable Web POST Web Service Relogin the AD client John to Fig 4 the AD domain and use the l account to logi
34. from different Account Manager people You can setup the accounts and their Authority Manager Group Description corresponding permissions di User admi Admin Administrator Group t e i MIS MIS Audit Audit E N Field Description The account name of the user who can enter the system Admin the most powerful user who can do anything in the device You should strictly disallow the IT member to own this permission except for the initial stage of the deployment of this device MIS This level s permission includes the configuration of any policy rules without touching any recorded data or reports Audit This level s permission includes browsing of chat contents URL access logs and reports m test Description Detailed description of an account FIGURE 16 1 Account Manager Step 3 Edit an account Tool Account Manager User Add User Input the name of the account and input the E u description of the account Enter the password and its confirmation After that click the OK button to finish the settings User Information Name Group Description test account Password Confirm L7 Networks Inc 146 User Manual Chapter 16 Advanced Multi Layer Architecture Step 4 Successfully created Information When you successfully create an account you will be notified a dialog as in the right figure Click the OK butto
35. login script to the AD server tery PR gt aak aS AA 3 Windows Eds 11192 168 18 200 metlogon BR REO WAC eA LAT AH O 0O Pre paar 5 x9 XO E A nse mopem 152 KB Qu FARRAR L Active Directory Users and Computers lt 3 File Action View Window Help e Gm SAR em i dn ve Soa amp Active Directory EH 2888 Mail Nom 3 8 Ty a m 3 Builtin SEWER builtinDomain C Computers AES Sh 3 Domain Cont MAREFA rollers ABB ER fur J ForeignSecur HARAN ityPrincipals SE amp 3 L7 Taipei 1e HINES AR A p e SE y J Users PRES HEM Slt New All Tasks Default container For upar Default container For dom Default container For secu Default container for upgr View New Window from Here Refresh Export List Help 4 Displays Help for the current selection 98 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On Step 4 Edit group policy In the Properties page select ere PAFA the Group Policy tab and click the Default Domain EE BEBE AEH gt RARA AE PES PMC Policy Then click the Edit button to edit the default domain policy EE CP BERE B EAB Eg Be ae ae SII Fis BE BES Mail taipei I com tw pan Sis Ln imm Ai E A RET PIERE ar p uus PERERA RID Step 5 Assign login script I mi Group Policy Object Editor Use the Group Policy O
36. mgtserver in CLI to explicit tell the device where to send the logs otep 2 Is there any personal firewall or antivirus system installed in your management server If yes turn it off Step 3 Open 4 ports in your personal firewall TCP 80 TCP 1080 TCP 3306 and UDP 514 Step 4 Check if the LogServer service has been started 4 Why can t I see anything at the console Ans Please make sure that the baud rate and parameters are 115200 8 N 1 L7 Networks Inc 154 Product User Manual Appendix C Appendix C Syslog Format System Log Format Product time 2005 01 10 12 57 27 mod SYS sev lt 1 2 3 4 5 gt tier2 TIER lid lt LID gt msg lt Message gt by lt user system gt from lt IP console system gt Download configuration Upload configuration Database is full Database is cleanup Backup database to 192 168 17 130 Send report to user yourCompany com Information Restore database from 192 168 1 1 Send alert to user yourCompany com M01 Change Report Center setting Change Syslog setting Login success Login fail miss password Change E Mail Alert setting Change FTP Backup setting sDevice tier23z L7 Networks Inc 155 P roduct User Manual Appendix C S11 S11 tt nop Policy patem updated to version 0000x Waring tt Ae Policy patem upore nastea om A VDB update has failed 29 ss O L7 Networks Inc 156 P roduct User Manual Appendix C Ss hep Potoy pan
37. options and click the Next button L7 Networks Inc Server setting ServeriP 192162 18 190 Port 389 Auto Fetch User DE and Da User DN cnzAdminististor en Users DCz lesLDC z cor Base DN DC 1est DC com Password ew e Server Type OAD 2000 AD 2003 5 OpenLDAP Advanced Detecting Found 31 groupis Found 10 user s ay Import options Delete existing objects and then Import C5 Preserve existing objects and replace it if duplicated O Preserve exisbng objects Dont import User Manual As Fig 2 depicts the system has shown the users and the groups from the AD server Click the Download login vbs and adclient exe to download the needed files to your disk Please copy these files to the AD server for later use Click the Finish to finsifh the AD import Now you can see many users and groups in the dynamic objects as shown in Fig 3 L7 Networks Inc Chapter 11 Configure APP Content with AD Single Sign On AD Import Step 3 3 ES Detecting Created 31 group s Skipped 1 groupis Created 9 user s Skipped 1 user s Install login ybs and adclient exe on AD server Read installation guide Download login vbs and adclient exe lt Back Fig 2 Finish m rolexInbun Somer Sets name Gps Malta cn usn zou pms sas cri m enh nes hp do Arms tee Tam 1 Misr Arina nal hara VAL Satu nw aie ey
38. or join a domain click Change Change carcel top 86 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On 11 3 1 2 51 AD HP L Active Directory Users and Computers Step 1 Add an AD account at the AD Server For security reasons it is not suggested to use administrator so oftenly So we create a new account first Login to the DC and run the program dsa msc There will be a AD Users and Computers management console as Fig 1 shows We use this console to create a new account lt 3 File Action View Window Help m A gg m n dar dc e Active Directory Users and Computer Active Directory Users and Computers allot test com 2 objects Saved Queries E 3 test com pe Description L Saved Queries Folder to store your Favor gg test com Domain First expand the test com and right click on the Users Choose Create gt User as Fig 2 shows L Active Directory Users and Computers EM Fille Action View Window Help 7 m ABE pm e NE a e e 6 Active Directory Users and Computer PASCO ipf sr 2 Saved Queries B E tesE com A a 0 88 Builtin 5aved Queries Folder to store your Favor Lf Computers cam Domain BREA Domain Controllers Delegate Control Find Mi Computer All Tasks Contact Leen oD New Window From Here O JnekorgPersan Properties MSM Queue Alias Printer Help Shared Folder Create a
39. parameters 3 3 1 Starting the System Turn on the power of the device after the booting process the system will prompt you with the user name and password The default settings of the user name and password are admin amp admin After you have entered the system you can use CLI command to change the password Detailed CLI commands are listed in Appendix L7 Networks Inc 16 User Manual Chapter 3 3 tier Architecture 3 3 2 System Architecture The product is transparently installed at the network exist without changing any existing network architecture The management server together with the management system and reporting system will provide you a very easy to use interface for policy management Administrators can setup a series of policy rules according to existing network architectures or companies policy A single management server can control multiple devices and can accept events logs from multiple devices As long as you understand the basic installation steps you can follow your network architecture to install the product Detailed installation example is listed in the below figure y ADSL Router Management Client connects to the Management Server and then connect to the Device Figure 3 3 3 tier architecture example scenario 3 3 3 System Parameters Use the RS 232 console cable to connect the device to the desktop PC Please refer to the following HyperTerminal settings to setup the HyperTerminal 115200
40. project click the gt gt button to remove your selected devices Select the devices into the project Select Mode a General gt Group Project information Name Selected Devices All Devices E ta Group_1 em Device 1 em Device 2 Cancel Project Mode If you want each of your devices has individual settings choose this mode If you want each of your devices has the same settings choose this mode Moreover when rol you use this mode all data will be integrated into the same report system No matter which p device you have modified the settings will be updated to the Base Device configuration Other devices will refer to the Base Device as its configuration FIGURE 3 3 Project mode L7 Networks Inc 22 User Manual Chapter 3 3 tier Architecture General Mode Step 1 Creating a new project File New Project Select General as the project mode This mode New Project is suiFigure for most cases Enter the project name and select devices from the right column runs hee DUR E Click the lt lt to move the device from right to left If ON i 7 Enter the name of this project New a group device by right click the objects you want to remove some devices from the current project select the device in the left Select the devices into the project column and click the gt gt button Click the OK button to finish the settings Select Mode General Gro
41. server To change an option click Back To begin the operation click Nest Back Cancel Fig 10 L7 Networks Inc 84 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On Active Directory Installation Wizard The wizard is configuring Active Directory This process can take several minutes ar Once you click the Next button considerably longer depending on the options you have selected the AD server is being installed with the software as Fig 11 shows A few minutes later the installation process will complete Sometimes it requires more time especially when it configures the DNS service Creating the System Volume C SwINDUVVSSSSSVEL Cancel Fig 1 1 Active Directory Installation Wizard E4 Completing the Active Directory Installation Wizard The software is finally installed as Fig 12 shows clive Directory is now installed on this computer For the a domain test cor This domain controller ig assigned to the site D efault First Site M ame Sites are managed with the chive Directory Sites and Services administrative tool DNS was nat configured for the domain After restarting the computer you should complete configuration of DNS for the new demain To close this wizard click Finish Back Cancel Fig 12 Active Directory Installation Wizard After you click the Finish button it will prompt you to reboot immediately Click th
42. setting up the network properties of the Windows XP as Fig shows IP Hip QD FAB W BUR W 482 rm o 2H CORE MOLAR EBzhdsUK IP We EM Lc m RS MASS SA IP RE Computer Name MyName IP 192 168 18 72 Netmask 255 255 225 0 BR Fa ms SSA Bix os RES e 192 gA ms Bess A DNS Server 192 168 18 190 51 L7 Networks Inc 93 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On Step 2Switch to domain users Right click on the My Computer TOL T 4 Ju and select Properties fill in the BIET Ap ESL KS SE FUE EZ computer name field AMENA Sl At the PEE FIRE H HEUS Actest WEE E 2 BE microsof b5c461 eua ram E3 ENE RADERA LS at ERNE Micron ad af o AIR I Administrator gt HE M ANC MRE REF ALABAMA Y gt OH GENERE BA HERMS OK f OI s E gis fal 2 HAD A PY MA A TIL LESER PRADA PASADA a HP D Administrator Sra p FoR E 4 L7 Networks Inc 94 User Manual Step 3 Login to AD domain As shown in Fig 1 you can choose to login to the PC itself or to login to the domain TEST After logging in right click on the My Computer and select Properties Click the Computer Name to verify if the domain is at the test com L7 Networks Inc Chapter 11 Configure APP Content with AD Single Sign On a KA Windows Microsoft d Windows ME
43. settings Since the Product can recognized the detailed behaviors of each application the MIS can setup individual policies The user s information can be easily integrated with enterprises user database such as LDAP Active Directory POP3 S IMAP S and RADIUS L7 Networks Inc 28 User Manual Chapter 4 Internal Data Processing Flow 4 Step 4 Deep Content Inspection The MIS may also want to do advanced filtering of the contents In the Figure the Product can detect block viruses in compressed files and worms spread in IM windows For extreme security the conversations can be recorded And if the users violate the policy to say forbidden keywords the Product will instantly inform the users the company s IM policy 5 Step 5 Offline Report Analysis Finally reporting and analysis can help the MIS to find out the problem Tens of graphical reports are presented including daily weekly monthly bandwidth usage IM behavior conversation recording and policy violation Reports can be customized searched and emailed with PDF HTML attachment by user defined schedule 4 2 Procedures The product can control the most popular Instant Messengers IM Peer to Peer P2P Remote control VoIP applications and Web contents You can make use of these tool to manage your network to prevent information leakage or wake up the productivity of some employees It can not only block those applications but can manage them by behavior or contents In t
44. the Mame Sun NE Tue wed Thu Fri Sat StartTime Stop Time area and click you will get an icon like 4 HE wi Morning 00 00 Step 7 Browse the results Functions Content Manager Object Manager Schedule Objects Now we have two schedule objects We can j Groups start grouping them into a schedule group ESOO ciet Op epepeeel Step 8 Creating a new group Functions Content Manager Object Manager Schedule Groups Since the working hours for company ABC objects Groups include 8 30 12 00 and 13 00 17 30 we 9 eme TE have to group them into a group object so as Lc to facilitate management of policy rules Right Derete roui S click on the area and select the Add Group Edit Entry item Step 9 Input the group name Functions Content Manager Object Manager Schedule Groups Input the group name and click the OK button to continue Add Group Please input Group name Hame WorkingHours L7 Networks Inc 67 User Manual Chapter 9 Address amp Schedule Objects Step 10 Open the schedule group Functions Content Manager Object Manager Schedule Groups Right click on the schedule group object Objects Grouss WorkingHours and select the Edit Entry EN Name Schedules item WorkingHours Empty set Add Group otep 11 Edit the schedule group Functions Content Manager Object Manager Schedule Gr
45. the report of all statistics is ON Edit settings here to help define your new project aggregated from all the devices in this project Click the OK button to finish the settings Group Setting Base Device E Beso Lo Group 1 Device 1 Back Step C9 Cancel L7 Networks Inc 24 User Manual Chapter 3 3 tier Architecture 3 3 4 3 Deleting a Project Step 1 Click the Delete Project File Delete Project Check the Delete Project option ew Device Group Manager c 7 5 New Project Ctri P f Open Project Ctrl O 24 Edit Project Close Project gt Delete Project Step 2 Deleting a project File Delete Project Select the project you want to delete and uage click the OK button to continue Select a Project Note 1 Once you click the OK button the project will be immediately removed from the system 2 Running project cannot be removed Project_1 You must close the project first and then remove the project select a Project from the list below Project information CUA SIA 3 3 4 4 Open an Existing Project Step 1 Open project File gt Open Project Click the Open Project item File Update Tools Help ew Device Group Manager c 7 5 New Project Ctrl P Open Project 4 Edit Project b Close Project 2 Delete Project L7 Networks Inc 25 User Manual Chapter 3 3 tier Architecture Step 2 Select a project to open File gt Open Project Select a project you want to open and
46. the screws inside the packing to lock the L shape lockers with the device Finally lock the device to the chassis Please check if the following network equipments are ready or not 1 Device 2 Swich Hub 3 Desktop or notebook PC with copper network interface L7 Networks Inc 4 User Manual Chapter 1 Product Overview 1 3 Wiring 1 Power Connect the power to the power socket and turn on the power switch 2 Console Use RS 232 console cable to wire between the console port and the desktop PC Set up the HyperTerminal of your PC into 115200 N 8 1 and no hardware flow control 3 MGMT Interface the management interface is used for uploading configuration or accepts logs from the device The management server must be in the same subnet of the management interface 4 Internal Interface this interface connects to the internal network switch at your LAN side 3 External Interface this interface connects to the external network device such as ADSL modem or router firewall at your WAN side 6 HA Interface this interface connects to another same product to provide high availability function so as to make sure that the function will still work even hardware failure occurs 1 4 System Defaults amp Examples In the following Figure you can lookup the default value of the device Remember the the INT amp EXT interfaces do not need any IP address when they are operating in bridge mode The order of each interface in differen
47. 1 User Manual Chapter 8 App Policy Step 4 Upload config Update Upload Configuration Check the Upload Configuration item or click File Update Tools Help i pr the _ icon to upload the current Te Upload configuration configuration to the device EA ie Update pattern E Update URL database y License 25 License Status Option Step 5 Skype File Events Functions Reports App Policy Event View From the right figure we can see that the RD Functional view Policy View Personal View Event View whose IP is 192 168 17 58 attemps to use Skype to transfer files However it was blocked P goo60501 v OK E i4 by the product Application Description Protocol Src Port Dst Port 2006 05 18 13 59 38 skypefile BLOCK skypefile DP 192 168 17 58 25991 192 168 17 56 A Tips 1 If you want to select or deselect some rule you can use Ctrl left click to adjust the selected policy rules 2 Ifthe background color of some rule appears as light yellow it means that you have already selected the rule If you want to quickly adjust settings to all the selected rules just select the appropriate options in the toolbar You can even drag amp drop the mouse to select multiple rules at a time L7 Networks Inc 62 User Manual Chapter 9 9 1 Address amp Schedule Objects Chapter 9 Address amp Schedule Objects Th
48. 1 14 Scenario 1 Generate reports with IP addresses mapped to AD user group names 2 Configure APP Content policy rules by matching AD user group names 11 2 Methodology 1 1 Map IP addresses in reports to AD user account names _b _b bo bo bo bh 4 4 4 4 4 4 4 C 1 1 1 1 1 2 Con 2 2 2 2 L7 Networks Inc 1 Adda Domain Controller DC in Windows 2003 Server 2 Add an AD user account in a Windows 2003 Server 3 Use the newly added accout at Windows client PC to login to the AD Server 4 Execute AD Import 5 Install AD logon script into the AD Server 6 Configure device to accept AD login events 7 Relogin from Windows client PC and check sys ad show to see if the PC appears figure policy rules to match AD user accounts for filtering 1 Go to Object Manager gt Dynamic Objects Import all user account names from the AD server 2 Assign AD user accounts AD groups in App Policy rules 3 Assign AD user accounts AD groups in content policy rules 4 Import all AD user accounts into content policy rules 78 User Manual 11 3 Steps Chapter 11 Configure APP Content with AD Single Sign On 11 3 1 Map AD User Accounts to IP in Reports 11 3 1 1 Add a Domain Controller DC in Windows 2003 Server Step 1 Add components As an example if the AD server is Windows 2003 Server with client PC using Windows XP Professional Windows XP Home does not support AD DC Name www f4b3ffe209b IP address 192 1
49. 2 168 1 199 Note that HTTPS traffic will still use its original IP to connect to the HTTPS server in stead of using the bridge IP However the system requires to lookup DNS through the management port 1 5 2 Users are in the same networks as Firewall LAN Multiple Subnets If users are in the same network as Firewall LAN interface but the interface is binded with multiple IPs for multiple subnets say 192 168 10 254 192 168 11 254 and 192 168 12 254 Only one physical port of the Firewall s LAN interface is logically segmented into three subnets The device is connected between the core switch and the firewall Label A indicates that the bridge IP should be set in the network of the Firewall Switch segment with multiple IP addresses say 192 168 10 251 192 168 11 251 and L7 Networks Inc 8 User Manual Chapter 1 Product Overview 192 168 12 251 And these three bridge IPs should be assigned with three different gateways say 192 168 10 254 192 168 11 254 and 192 168 12 254 Label B in the figure indicates the management IP of the device say 192 168 10 199 Note that HTTPS traffic will still use its original IP to connect to the HTTPS server in stead of using the bridge IP However the system requires to lookup DNS through the management port Gateway 192 168 10 254 24 Gateway 192 168 12 254 24 Gateway 192 168 11 254 24 External Bridge ip 192 168 10 251 24 Bridge ip 192 168 11 251 24 Bridge ip 192 168 12 251 24
50. 3 if the r x l l environment has no operating Permissions compatible with pre Wwindowe 000 server operating systems svstems older than Windows select this option if you ran server programs on pre Windows 000 server operating sa systems ar on Windows 2000 or Windows Server 2003 operating systems that are members of pre indewis 000 domains PN Anonymous users can read information en this domain Permissions compatible only with Windows 2000 or windows Server 2003 operating systems Select this option if vau run server programe only on Windows 2000 or des Server 003 operating systems that are members of Active Director domains Orly authenticated users can read information an this domain Next we have to setup the restore password Please remember this password very carefully lt Back Cancel Fig 9 Active Directory Installation Wizard E Summary Review and confirm the options you selected Fig 10 is to confirm all the above settings Tou chose to Configure this server as the first domain controller in a new forest of domain trees a The new domain name is testicom This is also the name of the new forest The NetBl05 name of the domain is TEST Database folder C AWINDOWS NTOS Log file folder CAWINDOMW SANTOS STYSYOL folder CAAWINDOWS VS S V0L The ONS service will be installed and configured on this computer This computer will be configured ta use this ONS server as its preferred ONS
51. 68 18 190 Netmask 255 255 255 0 Gateway 192 168 18 1 DNS 192 168 18 190 this machine itself is to be a DNS server By default DNS Server component is not installed So we need to add the component by ourselves Go to Control Panel gt Add or Remove Programs click the Add or Remove Windows Components you will see the Windows Components Wizard as in Fig 1 By default all network services are added Click the Details to choose the componets by yourself Check only the DNS Server and uncheck all the others as Fig 2 shows Finally click the OK and continue to step next to finish the DNS Server installation Please make sure that the CD of Windows Server 2003 is available Otherwise it will prompt you with a file not found alert and require manually setup the path L7 Networks Inc Windows Components Wizard El Windows Components au can add or remove components of windows To add ar remove a component click the checkbos 4 shaded box means that only part of the component will be installed To see what s included in a component click Details Components lt lt Microsoft NET Framework 2 0 a2 Other Network File and Print Services HB Security Configuration Wizard CI Bil Subhsustem for HIME hased Annlicatinns Description Contains a variety of specialized network related services and protocols Total disk space required 17 5 MB space available on disk Tfl l 2 ME ees
52. 72 63 225 8064 unli 1 123K 150B 3 3 Ob Ob ir UDP 136552m 109 201 133 19 2710 unli 1 712B 3228 0b Ob e UDP 136552m 77 166 106 13364335 4 unli 0B 67B 0b Ob e UDP 136552m 79 177 138 2724674 4 unli 0B 67B 0b Ob ite UDP 136552m 89 151 215 18640306 4 unli 0B 67B 0b Ob Mee UDP 136552mb 76 29 812862504 4 unli 0B 67B 0b Ob ir UDP 136552mp 85 68 20 25251413 4 unli 49B 67B 0b 0b Me UDP 136552m 75 103 220 10624874 unli 68B 67B 0b Ob Te UDP 136552mp 36 69 40 10965535 unli 95B 67B 0b Ob ir UDP 136552mp 85 243 255 2035288562 unli 0B 67B 0b Ob ir UDP 136552mb 71 46 115 16950533 4 unli 0B 67B 0b Ob ite UDP 136552mp 202 65 201 6614016 4 unli 0B 67B 0b Ob Fed ein came FIGURE 5 1Realtime traffic discovery fields All Filter Internal IP 132 Port Directi Pipe v Application Update External IP 132 w Port Protoc Bridge v Bandwidth bps 000444000000 bl ol o e e e e e OD L7 Networks Inc 36 User Manual Step 2 Display supported applications You can go to our official website and click the release note of each pattern release There will be a support list hyperlink to describe the protocol application that is supported in that version of pattern L7 Networks Inc LT Werworks Application Feel muppar protocol E warchne 2 087 108 Support Ligi saaksin Pra LEL LI Em Epermep 9 5 BREL TE D c ora d Id
53. ATRA E Update URL database y License 25 License Status Option Step 2 Upgrade patterns Update Update pattern Click the OK button to start updating application patterns Current pattern version is 2 1 01 150 The latest version is 2 1 01 151 Do you want to upgrade pattern now L7 Networks Inc 141 User Manual Step 3 Upgrade patterns from CLI Enter privileged mode in CLI and then input sys module update pattern or sys module update all to check for any update Chapter 15 oystem Maintainence InstantScan sys module update all ud im engine version 2 0 02 is the latest one on the device No upgrade is nee e ls parten version 2 1 01 151 is the latest one on the device No upgrade is n eeded A new version 1 0 00 003 is issued Please upgrade the newest av database versi on to the device Do you really want to continue upgrade V N1 N y Upgrade av database from 192 168 17 97 This process may take a long time so please be patient Successfully update the av database new version 1 0 00 903 A new version 2 0 00 002 is issued Please upgrade the newest url database vers ion to the device Do you really want to continue upgrade V N1 N y Upgrade url database from 192 168 17 97 This process may take a long time so please be patient Successfully update the url database new version 2 0 00 002 InstantScant 15 6 3 Manually Upgrading URLDB Step 1 Upgrade URLDB from UI C
54. After you have configured the system you can backup the configuration in case you need to restore the settings 15 2 Upgrade Firmware through TFTP FIGURE 15 1 Upgade firmware from TFTP server Step 6 Setup a TFTP server Place a TFTP server program at the root directory such as CX Place firmware file with extension bin at the root directory of the TFTP server Setup the PC to be at the same subnet of the device management port Enter en to enter the priviledged mode otep 7 Upgrade firmware InstantScan ip tftp upgrade image IS 50 2 0 02 bin 192 168 168 170 l l Fetching from 192 168 168 170 or IS 50 2 0 02 bin Enter the ip tfto upgrade image lt FILENAME gt 192 168 168 170 After that the device will reboot Upgrading right away However make sure the upgrade is 9YStem will reboot now successful without any errors such as checksum error After reboot enter the CLl and use sys ver to check the version of the system Press ctrl e in 5 secs to start with emergency kernel Booting Checking Initial Key of this device InstantScan login L7 Networks Inc 136 User Manual Chapter 15 oystem Maintainence Step 8 Check version after upgrade InstantScan login admin Password After rebooting the system please check if all Welcome to InstantScan version amp settings are correct InstantScan en InstantScan ip show Gateway 192 165 166 254 Primary DNS 168 25 1 1 secondary DNS 0 0 0 0
55. Back Cancel Help Fig 1 Networking Services To add or remove a component click the check bos 4 shaded bas means that only part of the component will be installed To see what s included in a component click Details acomponents of Metworking Services Internet Authentication Service Remote Access Quarantine Service a PPC over HTTP Proxy mi Simple TCPAP Services L 3 Windows Internet Mame Service WINS Description Sets up a DNS server that answers query and update requests For DNS names Total disk space required 16 5 MB Mee Space available on disk 17171 3 MB m 19 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On ee Foz Step 2 Install AD Active Directory Installation Wizard Ea After installing DNS Server we can start to install Active Directory Go to Start Run to enter dcpromo you will see the Active Directory Installation Guide Click the Next button in Fig 1 There will be a compatibility requirement that PCs versions must be newer than Windows 95 and NT 4 SP3 cannot logon to the DC of Windows Server 2003 We suggest to at least use Windows 2000 or newer versions of Windows to be the AD client machines Welcome to the Active Directory Installation Wizard This wizard helps pon install Active Directory services on this server making the server a domain controller IF this is the first time vau have installed Active Directory it is recommended that yo
56. Chat QOChatRoom Allow QOMEDIA_Rule_1 QOSHARE_Rule GADU Rule 1 SF any EP any O Chat QO Media File TransferVoice Video m E any 0 Chat 00 Shared Files Allow i Chat Gadu G adu Gadu Kadu Miranda G aim Allow UC Rule 1 E Allow FOPO Rule 1 Allow LIWANSWANS Allow FETION Rule 1 Allow DOSHOW Rule 1 Allow EBIM Rule 1 Allow EE Lu Ma Step 4 Select the Source IP Function Management App Policy policy CEO amp CTO shoud has the complete Sts Poicy permission to access the Internet We have List Chat w Protocol Apply Schedule w Security w Traffic w to listed created a group Boss HostCEO HostCTO status Condition Action Schedule Rule Name Protocol Security Profile Pipe in the last chapter Selecting the the icon E Boss means that all users except the Boss will apply to the App Policy rule 1 e Working MSN Rule 1 J ChatMSN MSN Trillian Miranda G aim Allow EJ High gt Chat Y ahoo Y ahoo Trillian Miranda Gaim Allow Chat AOL AOL AIM TritonfICO Trillian Miranda He Allow gt ChatXMPP Google Talk G aim Allow A chatoo Allow Chat QQChatRoom Allow QI Chat Q0 Media File TransterVoice Video dE Allow QI chat Qo Shared Files Allow ing GADU_Rule_1 i C
57. Com 1 408 844 8841 Solution One Ltd Remote support Launch your SSLVPN client tunnel exe which has already accompanied with the management server software Select a tunnel for our support team to connect to your live place to solve the problem for you Or you can use TeamViewer to setup a remote desktop for us to do the troubleshooting for you About This Manual This manual use the web based user interface WBI of the product to describe how to setup the product In order to help you how to use the product you must understand the how to use WBI Who should read this manual This manual teaches you the detailed configuration of the product Any one who are responsible to setup monitor decide the content policy or receive the report should read this manual Related Documents e Product CD Refer to the documents inside the CD e Quick Installation Guide QIG QIG can assit you to quickly install the hardware and software e Online support Online support gives you MSN Skype amp SSLVPN connectivity that allows our support team to contact you and to see your desktop without opening your firewall settings e Web site support Refer to the website information including the most updated firmware pattern release note or the most upcoming features that will be release in the future Contact The methodologies provided in this manual has already been tested and verifed If you have found any functions that has already bee
58. Content Offline Report Learning Normalization Behavior Mgmt Inspection Analysis 1 Step 1 Plug amp Play Real time Discovery Learning To help the network administrators solve the above problems Product provides the Plug amp Play Discovery as the step 1 procedure Just plug in the wire and the Product will replay the network traffic in real time You can see how many MSN tunnelled in the HTTP and see how many IM peers are chatting The chatting process will automatically be learned by Product and can be further imported to your configuration 2 Step 2 Layer 7 to Layer 4 Normalization After discovering for a while if you decide to manage the traffic you can start to block something using the App Policy In the Figure the Product has normalize the traffic The MIS can easily control the Product just like what layer 4 firewalls can do Furthermore the Product can help you stop non standard IM connection For example the MSN will automatically detect the firewall settings If the MSN cannot find a way out through standard port 1863 it will try to connect to an HTTP proxy However anyone can manually conFigure his her MSN settings to use any HTTP SOCKS4 SOCKS5 proxies in the world including those in your company What is WOrSe users can connect to many WebIM pages to chat with their browsers The Product can help you handle those situations 3 Step 3 Interactive Behavior Management Nevertheless the MIS would like to do individual policy
59. DIS zen P bier WeTih le CEN ARR wnaem s Ins dae Fray mms m darme zoman Conul Wine n Commins aman Guess aman Uses et se adie DECEDERE Assign AD user in the Policy Rules Functions gt Traffic Manager gt L4 Policy gt Policy Eh Sn A PON Api eile s n AARS UAR a nni ecred de w Simio w clon R vw Misius Pond rinn R Ir Hav Encma F Src nit Prodi 3 oho fdor Functions gt Traffic Manager gt L7 Policy gt Policy 104 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On SA 3tzluz f amp Foley Fher Chet v 15 HEN mph ahon doom nz mb is sd ncn Kisar wwe ai S hcdue feudo v Pr wx Gn DEL n al AA nomm AA c Acheul Ruk Nime f imema F FED Procal 11 3 2 3 Assign AD users groups in Content Policy Rules Step 1 Insert a new rule Functions gt Content Manager gt Content Policy gt Policy Right click on the empty area b Linus Sh POY fg lun of the rules Select New User Lisl via BME tr Frofle ul web Prae z to add a new rule for a new An cha la wo it Dp MPa wo Sean Fifa w Y inka user group DA f Contan a cduc Sula Haz ars IAPAA L7 Networks Inc 105 User Manual Step 2 Manually assign AD user in the rule Input the AD account in the Name field For example we input John in that field Below the field is the permission settings for this account as shown in Fig 1 Click Finish to finish adding a content policy
60. E 4 Working QQSHARE_Rule Boss L Boss any SE any chat QOChatRoom QI chat OO Media File Transfer Voice Video Qt chat00 Shared Files Allow Allow Allow El High l High El High 4 Working GADU_Rule_1 e Boss pa E any 1 Chat Gadu G adu G adu Kadu Miranda Gaim Allow l High 4 Working UC_Rule_1 e Boss Sr any H ue Chat UC Sina UC Allow e High 4 Working POPO Rule 1 any ls Boss Er G Chat POPO popo153 Allow l High A Working ALIWANGWANG 4 Working FETION Rule 1 Boss Ez A Working DOSHOW_Rule_1 e Boss 2 any any any La Boss 3 ChatDoShow Chat ALiW angWang Taobao ALiWangWang 3 Chat Fetion Chinamobile Fetion Allow Allow Allow El High l High e High A Working WEBIM Rule 1 k Boss 52 any Chat WEBIM MSN Webmessenger eBuddy e M Allow l High Step 6 Select the Traffic Profile Select the Middle in the Traffic listbox to apply the middle bandwidth policy to all listed Function gt Management gt App Policy gt policy us son csm y EE MM to listed Chat applications Status Trafic Condition Action Schedule 4 Working Rule Name MSN_Rule_1 Protocol 4 Working YAHOO Rule 1 La Boss any B v ey Chat MSN MSN Trillian Miranda G e Low lock amp log gt Chat Y ahoo Y ahoo Tr
61. Functions Content Manager App Policy policy List VoIP IY Protocol Apply Schedule w Security L Traffic w to listed Policy S tatus Condition Action Schedule 4 Working Rule Name SKYPE_Rule_1 SKYPEFILE Rul 4 Working Sre n up SKYPEOUT_Rul E 4 Working SIP Rule 1 4 Working H323_Rule_1 Working VOIPBUSTER R ff Policy cf any Protocol VoIP Skype File Transfer security Profile dE Allow Pipe VolP SkypeQut Allow IT VelP SIP MSN Voice Yahoo Voice Wagaley Te Allow QP VolP H323 NetMeeting Allow S volP VolPBuster Allow List 9 voir y Protocol ha Apply Schedule w NO Status Condition Schedule Rule Name Src Dst 4 Working SKYPE_Rule_1 e Boss B any B volP Skype 4 Working SKYPEFILE_Rul 1 Boss le B VoIP Skype File Transfer to listed Action Security Profile Pipe lock amp lo 32 Allow l High Allow l High 4 Working SKYPEOUT_Rul I Boss E any C volP StypeOut Allow l High 4 Working SIP_Rule_1 La Boss T VelP SIP MSN VoicerYahoo VoicefWagaley Te Allow l High A Working H323_Rule_1 a Boss Qj VoIP
62. IP address from the device first before you can add a new device After you have added a device with the right Figure the IP address will not appear again when you add another new device L7 Networks Inc Chapter 3 3 tier Architecture File Device Group Manager New Device Device Group Manager Devices fa Hew Group Rename Group Hew Device is Delete Device File gt Device Group Manager gt New Device New Device ON Enter an unique name and related information for the device Device imformation 21 192 168 168 201 Content Management Firewall LF Networks InstantScan 100 Cos cae User Manual Chapter 3 3 tier Architecture 3 3 4 2 Creating a Project Step 1 Creating a new project File New Project Select New Project to create a new project File Update Tools Help ew Device Group Manager Ctri T New Project Ctr P f Open Project Ctrl O jM 4 Edit Project Ctil E y Close Project Ctrl C Delete Project Ctrl D i Exit Ctrl X Step 2 Creating a new project File gt New Project gt New Project First please check the Project Mode Project Eius Name and select the wanted devices from the All Devices tree like field Then click the lt lt button to vucECHTdLUIN add youl chosen devices to the Selected Devices Cy Enter the name of this project New a group device by right click the objects field If you want to remove some devices from the current
63. In proxy mode users are required to manually assign https proxy server to 172 17 1 199 3129 This can also be done by using Active Directory settings to force all users to have such settings The device will use the IP 172 17 1 199 to go to the Internet The Firewall should allow 172 17 1 199 to go out to outside port 443 servers If needed port 53 should also be opened for that IP 172 17 1 254 24 CA External Bridge ip 172 17 1 199 24 172 17 1 253 24 Proxy 172 17 1 100 192 168 10 X 192 168 11 X 192 168 12 X ES T PES ea IE set to proxy Client User 192 168 10 10 24 Client User 192 168 11 10 24 Client User 192 168 12 10 24 Gateway 192 168 10 254 Gateway 192 168 11 254 Gateway 192 168 12 254 L7 Networks Inc 11 User Manual Chapter 2 2 tier Architecture Chapter 2 2 tier Architecture This chapter introduce to you how to install the management server software to control the system 2 1 Installing Management Client 2 1 1 Requirements Y Operatiing System must be at least Windows 2000 2003 or Windows XP If your operating system is in English version please install your preferred language pack For example the Chinese Traditional language pack is prompted when you are installing the management server Click the Install button to start installation Language pack installation Ta display language characters correctly you need to install the following lanquage pack Chinese Traditional Never install any l
64. L7 Mbps for the upload limit In this way those IP in the UnlimitedGroup will have a max 100Mbps Status Condition Action 2nd level Action when exceeding qu bidirectionally Rule Name Src Service Session Upload Download Quota Session Upload Download Default rule e any any o 1000 Mbps 1000 Mbps Admin ER Admin w any 1000 Mbps 1000 Mbps Add Per IP policy Add Per IP app policy Edit policy Delete policy Step 9 Edit the new rule Management gt Per IP Limit Manager gt Policy Select the UnlimitedGroup and enter 100 Mbps for the download limit 100 Mbps for the upload limit In this way those IP in the UnlimitedGroup will have a max 100Mbps bidirectionally L7 Networks Inc 45 User Manual Chapter 6 Per IP Manager Edit your application policy Description Sales 2 App Service P2P Session limit 100 Upload limit 05 Mbps Download limit 0 5 Mbps Note Zero means no limit Step 10 Edit the new rule Management Per IP Limit Manager Policy imi Status Policy QuotaProfile Select the UnlimitedGroup and enter 100 Mbps s MES CUM for the download limit 100 Mbps for the upload Description limit In this Way those IP in the UnlimitedGroup Note Packets are top down matched with the policy Only the last matched policy takes effects will have a max 1 00Mbps bidirectionally Note Bandwidth policy priority Per IP L7 gt L4 Block poli
65. M Rule 1 La Boss any ChatWEBIM mMSN Webmessenger eBuddy e M Block amp log El High Step 7 Browse the policy Browse the Chat policy rules to make sure that all your settings are properly set L7 Networks Inc 54 Function Management App Policy policy User Manual Chapter 8 LLL App Policy Status Policy List e Chat M Protocol M Apply 8chedule MI L Security ly Traffic N to listed status Condition Action Schedule Rule Name sre l Protocol Security Profile Pipe Working MSN_Rule_1 e Boss any y Gc Chat MSN MSN Tirillian Miranda G aim 9 E Block amp log amp Middle Working YAHOO Rule 1 re any le Chat Y ahoo Y ahoo Trillian Miranda G aim le Block amp log a Middle A Working AOL Rule 1 e Boss E any A Chat AOL AOL AIM Triton ICO Trillian Miranda e Block amp log a Middle A Working XMPP_ Rule 1 Boss a any E Chat XMPP Google Talk G aim F Block amp log amp Middle 3 Working 2Q_Rule_1 e Boss 2 any a ChatQQ le Block amp log a Middle A Working QQCHATROOM je Boss E any Chat QOQChatRoom le Block amp log e Middle A Wosing a IQQMEDIA Rule 18 Boss e any m Chat QQ Media File VANER EVO lOANE 1 0 Block amp log amp Middle P Working laasuanE Rule e Boss y E amy e Chat QQ Shared Files lo Bio Block amp log a Middle 4 Working GADU_Rule_1 e Boss E any E Chat Gadu Gadu Gadu Kadu Miranda G aim B
66. Management Server 10 1 1 10 INTERNAL EXTERNAL MGT 192 166 166 201 255 255 255 0 InstantS3canf 15 3 Backup Config Step 1 Backup configuration Tools Config Backup Click the Tools in the menu and check the Config Tools Help Backup a 2A Account Manager 3 Change Password E gt Language Setting 2 SNMP Control amp Config Backup gt Config Restore Step 2 Store the backup config Tools Config Backup Select the directory you want to store the backup Backup x file Input the filename and click the Backup to nah the backup LII a RI File Name O50 705 Files of Type CBC Backup Config File bef C c L7 Networks Inc 137 User Manual Chapter 15 oystem Maintainence 15 4 Restore Config Step 1 Restore configuration Tools Config Restore Click the Tools in the menu and check the Config Tools Help Restore SS Account Manager 28 Change Password Language Setting 2 SNMP Control Config Backup Config Restore _ Step 2 Select the config to restore Tools gt Config Restore and click the Restore to finish the restore cn ala BE File Hame Hir gs Ber Files of Type CBC Backup Config File bcf 15 5 Enabling Optional Module When you have not purchased the product the default license key in the product are trial license This means that all the functions are valid for a given period say
67. Manual Chapter 9 Address amp Schedule Objects 9 3 1 Address Settings Step 1 Adding an address object Function Management Object Manager Address Objects Right click on the item of HostCEO and select Objects Groups Edit you can start editing the content of the amp objects object The product has already provided you several objects You can edit them directly or delete them all HostPresident HostViceChairman HostvicePresident ServerFTP 9 ServerHTTP ServerMY SQL ServerSQL SubnetADM SubnetFINANCE SubnetMANUFACTURE SubnetMARKETING SubnetPQA SubnetRD Step 2 Editing the HostCEO object Change the IP address of HostCEO into 192 168 168 2 if your CEO has an IP address of that xt HostCEO IP Address Subnet Range Host IP 192 168 168 2 IPAddress Description Range Format Example Subnet He ess of the subnet__ XXXX __192 168 168 0 pangs Host IP__ IP address of an host address object FIGURE 9 1 Definition of an address object otep 6 Adding object group Function Management Object Manager Address Groups Right click on the group item and select the co Groups Add item e TTE c B i H amp amp Hobo E amp amp HostCMO E EL HostCTO E amp amp ServerFTP a amp ServerHTTP m amp SererMYSQL j amp amp ServersQL 2 GubnetADM S2 SubnetFINANCE E amp amp SubnetMANUFACTURE E E SubnetMARKETING
68. P2P GoBoogy x P2P Kugoo T PIGO Rule 1 x m P2P Pigo Pigo 100Bao le Allow POCO_Rule_1 P2P Poco Poco PP Point Allow E Allow Allow QODOWNLOAD 2 P2P QOD ownload MAGAA Rule 1 Y p2p vagaa Step 4 Select source IP Since CEO and CTO has full permission to access the internet resource we use the group Boss HostCEO HostCTO created in the last chapter We select the the Icon 88ss to apply Security Profile all users to the App Policy except the group E Ad xD puc dae TEL Boss E Always BITTORRENT R a D P2P Bittorrent Bittorrent Bite omet uT orrent Bits Allow l High Y P2P eDonkey eDonkey Owernet eMule agaa el High id P2P Winny l High P2P ezPeerPlus amp High El High l High El High l High Functions gt Content Manager gt App Policy gt policy Staus Policy eee Condition Action Protocol Status Rule Name Pipe Always unlei XunleiFlashGet D S Lite Allow EZPEERPLUS Allow FASTTRACK R Allow a P2P F asttrack Kazaa Grokster iMesh GNUTELLA_Rul i P2P Gnutella Foxy ezPeer Bearshare Gnucleus Allow Tes ER any e P2P Kuro E any KURO_Rule_1 DIRECTCONNE a P2P DirrectConnect DirectConnect DC dE Allow 9 P2P OpenF T Crazaa Kce asy P2P Ares OPENFT Rule 1 SOULSEEK Rul Se Y P2P SoulSeek GOBOOGY Rul
69. Rul BB Boss T E any 2 VoIP Skype File Transfer e Working T SKYPEOUT_Rul B Boss E any e VolP SkypeOut 4 Working SIP_Rule_1 La Boss E any R WolP SIPIMSN Voice Yahoo VoicefWagaley Te O Block amp log 4 Working H323 Rule 1 Boss e any Qj VoIP H323 NetMeeting Block log 4 Working I VOIPBUSTER R Boss Ez any K VolP VolPBuster Block log 60 olP olPBuste Chapter 8 App Policy User Manual 8 4 4 Blocking VolP Skype File Transfer Step 1 Edit the Object Manager Since the R amp D department is not allowed to Functions Content Manager Object Manager Address Objects Objects Groups use Skype File Transfer we must include the IP address of the R amp D department 192 168 17 1 192 168 17 254 Right click the SubnetRD and select the Edit Button Step 2 Setup the IP of the R amp D The address object can be a subnet range or host We can setup the SubnetRD to be a range object of 192 168 17 1 192 168 17 254 or a subnet object of 192 168 17 0 24 Click the OK button to finish the setting Step 3 Block Skype File Transfer of RD during office hour According to the company s policy all VoIP software packages are blocked except the Skype However all R amp D members are not allowed to transfer files through Skype during office hours In the last chapter we ha
70. Security Group In n Guests Security Group ain Users Security Group erprise 4 Security Group up Policy Security Group User El E Administrator User cert Publishers User ema Admins Security Group PORT 38 User Security Group Security Group Security Group Security Group Description Built in account For admini Chapter 11 Configure APP Content with AD Single Sign On Members of this group are Designated administrators All workstations and serve All domain controllers in th All domain quests All domain users Designated administrators Members in this group can Built in account For guest Group For the Help and Su Servers in this group can Designated administrators This is a vendor s account Members of this group ha Delegates control of objects in this Folder Delegation of Control Wizard 89 Fig 1 Welcome to the Delegation of Control Wizard This wizard helps vau delegate control of Active Directory objects You can grant users permission to manage users groups computers organizational units and other objects stored in Active Directory To continue click Mest Cancel User Manual Chapter 1 1 Configure APP Content with AD Single Sign On Delegation of Control Wizard Click the Add button to add the previously created Users or Groups account John as Fig 3 and Select o
71. Setting SNMP Control gt Config Backup Config Restore Tools SNMP Control 143 User Manual Chapter 15 oystem Maintainence r Ensteo HIM Natum Iran ind mt ican Sytem incom FICE Contact info Das Coman pub See commmmty i 4 frusit host Irae commu Pol ras desthation 17 ea een Eme L7 Networks Inc 144 User Manual Chapter 16 Advanced Multi Layer Architecture Chapter 16 Advanced Multi Layer Architecture This chapter introduces the advanced multi layer architecture for management 16 1 Scenario A company should have its architecture The hierarchy of the architecture includes different divisions to facilitate the responsibility If the device is used to collect the content of the networks the data is very sensitive to the hierarchy of the company s architecture If an IT member who is managing the product has the full permissions to access the recorded contents it would be very dangerous If he or she can read the data of another divisioin or the data of his her boss the one who is under the management of his her boss will have larger permission than his her boss Actually auditing belongs to the department of auditing not the IT member The system should have a mechanism to separate the data and control of the system 16 2 Objectives oince a content recorder is related to personal privacy the data should be kept confidentially The product s advanced l
72. US a a io a alo aus ls a pl Do a a 12 2 1 Installing Management Clear NAAA a edad 12 2 1 1 Requirements a ie 12 2 1 2 e r ee ee 12 Chapter 3 SNE AICMILG CIRC stedoniadiiii ELTE 14 3 1 ada is 3 ler isedeif taee T ccc M 14 3 2 installing Management Servers aces onte es teo egt ve tte bs ee ue t A eue a tum DEA epo us 15 3 2 1 giso icf M e S 15 3 2 2 A 19 3 2 3 IristallingaJava TRUTIITIC soe situs nc e tle eet tabe seus te Dae dai tb Neq dient ko uc So demus ERE 16 3 9 C nng rnng Prod UCi DEREN TL E 16 3 3 1 Starting ne ys DAR EET T mum 16 3 3 2 SVSIGm ATChlte CIUNG ecce ums des papae equo het o v cte ao 17 3 3 3 System Parametros ae 17 3 3 4 HA RM EET 18 Palta Design PMO SOO NY ooi a a elas ipea A rufa medir Sauf afe 27 Chapter 4 Internal Data Processing FIOW scsi 28 4 1 TECNO e E 28 4 2 miser Oc cer M UN OE MES 29 4 3 OES adh Ugh 1 as C TU SU MTM 30 4 4 ICONS genet RC ee 30 4 5 FOGDA mc 32 4 6 Miciien fq c 32 Part NetWork MONRNON O ooo oooe dria AND 35 chapter o ramie DISCOVET T 36 5 1 What Is on Your NS o 36 Pata Tranoc Managel uidi iiis eu do 40 Chapter 6 PeriP Manager uioisesoc iain oc me qen LI ees a qund isum ends 41 6 1 wie gebcpc 2 ee ee eR em ne e
73. al v 3 Sexy v Love s Functions gt Content Manager Content Policy gt Policy Now User Schedule Always Virtual Group Others Basic Rule name rule 1 RDGROUP The Name field could be AD account AD gre IM MSG Rec Enable O Disable File Rec O Enable Disable MSN Account Allow Yahoo Account Allow AOL Account Allow ICO Account Allawe IM Service Platinum Web URL Rec O Enable Disable Web POST Allow Web Service lt Platinum Step 6 Enable Web Manager Functions gt Content Manager Web gt Status L7 Networks Inc 111 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On Check the Enable Web 84 Status 89 Web Profilas 3 Global Policy Manger checkbox Enable Web Manager rDescripilor Web Manager allows you to Mier urmanteo sites Curing the ofice ours Exempt Source Destination TJ Enedle Exempt Sources Exclude amp R HostCEO w from the web filter enforcement O Include amp amp HostCTO inthe web filter enforcement Step 7 Add custom Functions gt Content Manager gt Web gt Global Policy gt Web site gt Custom Keywords Status f Web Profiles f amp Global Policy In the Custom tab you can add delete modify the igi Web Sites 5 Web Contents S Web Messages keywords Custom amp Trusted Dest Description Step 1
74. anguage packs Install Cancel FIGURE 2 1 Language pack installation screen v A Hard disk space at least 80GB available space but we strongly suggest to have 120GB available space v CPU at least Pentium 4 v Memory atleast 256MB but we strongly suggest to at least have 512MB v f your operating system is Windows XP service pack 2 with built in Firewall enabled you must follow the steps below to open the ports UDP 514 TCP 1080 and TCP 3306 In this way all packets from or to the management server will not be blocked 1 Goto Start Settings Network Connection 2 Right click the Local Area Network and select Content 3 Goto Advance gt Settings gt Exception and click the Connection Ports 4 Enter the name and the port number to allow the following network ports Name Port Number Protocol Database Server 3306 TCP HTTP Server 80 TCP FIGURE 2 1 Firewall settings of management server 2 1 2 Procedures 1 Install the Management Server 2 Install the AD Log Server 3 Upgraing the Management Server 4 Browsing the CD L7 Networks Inc 12 User Manual Chapter 2 2 tier Architecture 5 Uninstall Management Server Management Client connects to the Device directly L7 Networks Inc 13 User Manual Chapter 3 3 tier Architecture Chapter 3 3 tier Architecture This chapter introduce to you how to install the management server software to control the system 3 1 What is 3 tier Architecture
75. any one of the item in the function list this area will show the details of the function 5 Status Any messages will be put into this area for you to know the status of the configuration You can push the icon to hide the status area amp Management Console DefaultProject File Update Tools Report Help 3 amp Server kt 192 168 18 120 Project DefaultProject PREMIERES 2 Project 1 Toolbar x 3 Upload Config LEA Summary 8 App View 22 IP View 22 User View 2 Policy View 22 Pipe View All Internal IP Session Bytes Packets Bandwidth bps Internal IP Name Count Port ExemallP Port Pipe in Out In Out in Out 434 734 95 PF Applications 3 56G 4 897 4046 1 35M 14 57M a ww Chat 3 114 22 1121K 2273 198 E E Enterprise 2T 25 41K 102 69 266 1 130 ki dhcp 2 300B 300B 1 1 9 dns 25 12K 10 86 K 265 265 4A snmp 0B 91 54K 0 864 es FileTransfer 7041M 3 39 G 4 825 3 842 ve Game 22K 268K 37 60 Legacy 318 83 267 92 1 000 755 EA P2P 26 77M160 05 58 021 126 169 Filter 132 Port Directi Pipe v Application External IP 132 Port Protoc Bridge v O Functions Monitor 0 8 System Status Report Center E File Search Object Manager tH Static Dynamic un n Login 4 Management 1 35M 14 57 M d Traffic Manager 2 Per IP Policy 24 IPv6 Policy tA App
76. ate idi Functions gt Content Manager IM gt Status f Status f IM Profiles 2 Global Policy fi amp Options Enable IM Manager Description IM Manager allows you to manage IM behaviorsi contents peers Matching priority 1 Explicitly specified IM account 2 AD name 3 AD group Users out of the schedule will apply the their IM Groups chosen IM Service Enable Exempt Sources Exclude rule 1 w fromthe IM Manage enforcement IM over oroxy v Filtertrecord IM over HTTP SOCKS4 SOCKSS proxy servers Functions gt Content Manager Web gt Status 114 User Manual Step 12 Use OU to store the private data in AD tree As long as you assign the AD group or your manually created virtual group in the OU field users private logs will be put under the OU First right click on the Organization Units and select Add Group to create a virtual group In this example we add a virtual group named AE as shown in Fig 1 Next select the AE in the OU field in the rule rule 1 as shown in Fig 2 Next right click on the rule and select Edit User to enter the dialogue as shown in Fig 3 L7 Networks Inc Chapter 11 Configure APP Content with AD Single Sign On 2 Status f Web Profiles 4 Global Policy Iv Enable Web Manager Desctcrption Web Manager allows you to filter unwanted sites durina the office hours v Enable Exempt Sources i y from the web Fiter
77. ayered management and auditing mechanism can define multiple accounts with different permissions Hence IT member can set policy rules but cannot see the recorded data Auditing department can only see the recorded data but they cannot set policy rules Administrators can see all the data and can also control all the policy rules 16 3 Methodology Currently the device has 3 permissions including 1 Admin the most powerful user who can do anything in the device You should strictly disallow the IT member to own this permission except for the initial stage of the deployment of this device 2 MIS This level s permission includes the configuration of any policy rules without touching any recorded data or reports 3 Audit This level s permission includes browsing of chat contents URL access logs and reports 16 4 Steps When you first login into the product you can go to the Account Manager to edit the users and passwords that will access the device 16 4 1 Creating a New User Account Step 1 Setup user account Tool Account Manager Click the Account Manager item Tools Help Account Manager A Change Password Language Setting 2 SNMP Control gt Config Backup Config Restore L7 Networks Inc 145 User Manual Chapter 16 Advanced Multi Layer Architecture Step 2 Adding new user account Tool Account Manager User Add User The product allows multiple logins
78. b page which comes from forbidden web site will be filtered out WebServer3 140 112 1 4 di Internet FIGURE 12 2 Denying access to illegal websites through web filtering 2 As described in FIGURE 12 2 the user PC1 1 is browsing websites that contains stock information violence or even sex Some websites may contain video or audio which may waste the Internet bandwidth of the company What is worse the contents may lower the productivity of your employees 12 2 Objectives 1 Block HTTP objects such as cookies Java applet and ActiveX from web pages 2 Disallow employees from visting illegal websites 12 3 Methodology 1 Setup web objects to filter cookies or Java applets 2 Setup the web filter to block websites by URL The URL filter can be setup to analyze by URL keywords or built in URL database Traffic matching the URL will be blocked L7 Networks Inc 119 User Manual 12 4 Steps Chapter 12 Web Manager Step 1 Enable Web Filter Check the Enable Web Filter to enable the web filter Functions gt Content Manager gt Web gt Status 2 Status 4 Web Profiles 2 Global Policy 4 Enable Web Manager Note that when you enable the function all port 80 http requests will be processed by the web filter The HTTP responses are not processed becaused of performance and compatibility Issues Step 2 Define exempt sources You can define the IP range to apply the web filter function By de
79. bject File Action View ES Editor to select Users gt e amp mim mem Big E Login Logout script Right gt atx click on the Login and select ee the Properties O SRA E Ra J Windows E amp 3E eee ternet Explorer 4 O RAET gt Extended L7 Networks Inc 99 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On un y EE 3 xl Choose Add and then click the Browse button Step 6 Assign login script TA ERR E Default Domain Policy t FH E 1 8 meis 1815248 00 Ame Step 7 Assign login script III Right click on the blank area and select the New gt Text file Fe er ERNST Sse LTD EME Tui s BEC ge BEBE gt RE APE Ctrl z HA osse ar 4 BE HATE NE E cma S BARE BE al WordPad 2214 ads FASS Re BELO m ms es L7 Networks Inc 100 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On Step 8 Assign login script BE xj IV BD Onm c 7 EE we T Change the file name as i m OP login vbs q i llogin vbs sumant FE BEZI gr NBN Lm fans LATEA 83 QD riesco ba E PRO Tai S ee Th PRES f 4 d Step 9 Edit login script Right click on the login vbs and select Edit to edit the content of the file seen Es Open with Command Prompt m8 Print 1 Add to HFS BETTER ARCH
80. c contains illegal contents or activities All famous IM such as MSN Yahoo AIM ICQ will automatically cheat the firewall with port hopping behavior The IM Manager will stop their port hopping traffic and only allow them to use their standard ports Their standard ports are 1863 5050 5190 and 5190 correspondingly So once you enable the IM Manager for example MSN over HTTP will be blocked L7 Networks Inc 29 Chapter 4 Internal Data Processing Flow by the IM Manager As a result the MSN will be force to go in its standard port 1863 The device then just needs to check for standard ports This is a balance between performance and convenience If your Firewall does not open outbound port 1863 you need to open that to let the MSN traffic pass through its standard way If you really don t want to open any other outbound ports except for port 80 you need to start the Encapsulation Manager which allows you to manage the IM Web contents even the IM Web traffic goes in HTTP SOCKS tunnels through proxies 4 3 User Interface The system contains 5 windows area User Manual 1 Toolbar This area includes menu items and quick configuration buttons 2 Project This area lists the devices in the opened project 3 Function After you double click one device this area will show you the available functions of the device The functions are categorized into Monitor Management and Report groups 4 Management After you single click on
81. ced Multi Layer Architecture o ccccconccncoconcncononnnnononenonnnncnnononcnnnnnaronconanincnnnos 145 16 1 o A T 145 16 2 Sun PP rade Gabsinacesma a dead snesamsesasuuatnedbiaunaupiauale E 145 16 3 MEIN OCOIOGY pasmado 145 16 4 lo m 145 16 4 1 Creating a New User Accor 145 16 4 2 MOI Pas elfe M A eae eee 148 ADDE NAIK avt E ee ete Eee etn een ee ee eee eee eee 149 Appendix A Command Line Interface ooooocccccooccnconoccncnnnncncnnoncnnononononnnncnnnnoncnnnnnnnons 150 A 1 CLI Commands Non Priviledged Mode cccssccccccccceeeesseeeeeeeeeeeaeesseeeeeeeeseaaaaeeeeeeeessaaaseeeeeeeessnaas 150 A 2 GLI Commands Emergency Moldes ii eee 152 Appendix B Troubleshooting occcooocccooccoconccnconcononnnonnoncnnonnconnnncnnnnnrnnnnnrnnonnrnnnnnrnnnnnnnns 154 APRENDES SUSIOS Formal rn 155 Part 1 Overview User Manual OAbout This Manual New Release 5 0 01 L7 Networks Inc 3 User Manual Chapter 1 Product Overview Chapter 1 Product Overview This chapter briefly introduces to you how to quickly install the product What are employees doing at work Employees often use Outlook to receive emails Internet Explorer to browse websites Instant Messengers IM such as MSN Skype to chat with friends and P2P software such as BT eDonkey Xunl
82. cncnnas 71 10 1 A eo dI o DE Lei el lese lodi eee 71 10 2 Methodology rc 71 10 3 wil 71 10 3 1 All members are required to login via captive portal page every 8 hours except the boss 71 10 3 2 Match rules using Web Login account names eessssessessseseeee nennen nennen nnne nnns 74 Chapter 11 Configure APP Content with AD Single Sign On cccoccncccoccncccconococonococononacnnnnacnnnnannnnnas 78 11 1 Jo A c tboaeSuacnnsauateoasanteunes 78 11 2 MENO RR tm 78 11 3 vi 79 11 3 1 Map AD User Accounts to PIM FHeDOFIS c3 etiani atit cho Diae is 79 11 3 2 Map IP addresses In Reports lo AD NAMES cai 103 11 4 A mealxatnplesse errada 108 11 4 1 Manage RD People s ACUVIUGS 25 5 e Ltbud me UD sua PUN Geh a 108 11 4 2 rn a steed Alene ak ae eae Sd tea A 108 Chapter 12 Web Manada AAA 118 12 1 Scena Okse a a a hunateuan tdi atutieuaatady 118 12 2 elle CER A UL A E E A T E T A E E EOT 119 12 3 Vifsipiere o e o inisee a a a eee ae 119 12 4 E21 01S EAA N A A E EENE A A AE AAA AAE Nee EE N E A AE EA AE E Ne ee 120 Chapter 13 Encryption Web Managel ccccccseccceeseeceeeeeeeeeceeeeeeeseeeeeseeeeeseeesseeeessaeeessaeeesaeeeeas 124 13 1 SIN MIR RR 124 13 2 Seen e TET A cn pes 124 13 3 MENOS arini ERN ERR 124 13 4 corr ULP Mente cnet eee 125
83. cy Policy Sh Statue S Polity Filter Me Cal w 18 MSN apty actions in selactedrules at once Venen Seteuuie e LM Action Securty Ponie Conditori Dern Sous Schedule Rula Name riernal P Prose nk KESA Sule 1 A UE E Functions gt Content Manager gt IM gt Status B Status 4 IM Profiles Global Policy 4 Options v Enable IM Manager Descriptor IM Manager allows you lo manage IM vehamorsicontante peers Malcning priority 1 Explicitly specified IM account 2 AD name 3 4D group Users out of the schedule will apo the their IM Groups chosen IM Service Evermot Source f Destination Enable Exempt Sources Exclude WM rule 1 w fromthe IM Manager enforcement Include WM SemerHTTP w Inthe It Manager enforcement I over proxy Functions gt Content Manager IM gt Global Policy gt IM Content gt Chat 110 User Manual 5 3 Create Content Policy Go to Content Policy gt Policy and right click on the area to choose New User In the Name field we select the RDGROUP and select the Enable in the MSG Rec field to record the MSN messages Click the Finish to confirm Chapter 11 Configure APP Content with AD Single Sign On f Status BA IM Profiles f Global Policy 4 Options fa IM Peers E IM Contents Ea IM Security a IM Messages E Chat E File Enable keyword filtering S Keywords v 3 Dirty Words v Name v 3 Confidenti
84. cy priority L4 Per IP gt L7 NO ES Rule Name Sre Service Session Upload Download Guota Session Upload Download 1 Default rule g any oe any E 1000 Mbps 1000 Mbps Admin E2 Admin any 1000 Mbps 1000 Mbps Sales e Sales any 1 Mbps 1 Mbps Sales 2 amp sales P2P 0 5 Mbps 0 5 Mbps L7 Networks Inc 46 User Manual Chapter 7 Traffic Manager Chapter 7 Traffic Manager This chapter introduces how the Traffic Manager works for your needs People often use Outlook to receive emails Internet Explorer to browse websites IM such as MSN Skype to communicate with friends and P2P such as KaZaA BitTorrent eMule to download files With effective management IM P2P can be a very good communication medium However P2P often consumes a huge amount of bandwidth Eat all you can eat style of bandwidth consumption makes internal networks and external networks face the challenges Bandwidth at external networks is occupied by P2P so mission critical applications cannot obtain adequate bandwidth Internal subscribers compete for the limited bandwidth at external networks causing unfairness among the internal subscribers For telecom operators and campus network administrators simutaneously solving internal and external bandwidth problems becomes the most critical demand Organizations that emphasize network performance may have deployed L4 bandwidth management systems BT Xunlei FlashGet MSN Yahoo ICQ AOL Skyp
85. d could be AD account AD git Id MSG Rec Enable Disable File Rec Enable Disable MSN Account Allow Yahoo Account Allow AOL Account Allow ICQ Account Allows IM Service Platinum Web URL Rec Enable C5 Disable Web POST Allow Web Semice rule john Step 10 Create IP Groups Functions gt Object Manger static Address gt Static Object L7 Networks Inc 113 User Manual Go to Object Manger gt Static gt Address Static Objects and right click on the tree root or any tree node of the tree Select the Add in the pop up meu and give a meaningful name in the Name field Select the Range and input 192 168 18 20 in the Start IP field and input the 192 168 18 30 in the End IP field Click the OK button Step 11 Exclude Specific IPs Check the Exempt Source Destination option and select the Exclude option to enter the host rule 1 L7 Networks Inc Chapter 11 Configure APP Content with AD Single Sign On f Ail x Lab PS mr DATAN 3l Liste Gips Dzsrrnzlon iplmdt TSN here v nitidis th dad Ho zloz W Hasita Ae aa da m 2 nans mca edd A OOO EN 8 hocico M W Hosiisanrar Rave me Multa Ps A Suina E Hoce Sram W Hostica reside rm Hoz BInitiF 122102 13 20 rrr isin 0 SK Curcel amp bct DM Sheet inance rabe de Oe ee A E ALDANA TH amp h sl 24 t
86. e Google Talk can emulate themselves to behave like web or email to cheat firewalls tunnel through proxy servers or even encrypt themselves with SSL Network administrators cannot manage them completely 7 1 Scenario In order to manage the bandwidth of FTP administrators hope to put FTP service into the Middle class and limit the Middle class to occupy only 18 of the inbound and outbound bandwidth individually InstantScan ex p Firewall e sae FTP Server 140 113 179 4 High SC y Mbps Middle I KY n i exci DID 0 36 Mbps Low 3264 0 64 Mbps FIGURE 7 1 Outbound bandwidth management L7 Networks Inc 47 User Manual Chapter 7 Traffic Manager FTP Server 130 115 179 4 High 541 SOMbps Middle ie 18 Mbps Low 92 32 Mbps FIGURE 7 2 Inbound bandwidth management 7 2 Methodology The product can separate the inbound outbound traffic into at least 3 classes as in the below Figure The total bandwidth of the outbound traffic is 2Mbps and the total inbound traffic is 100 Mbps Inbound 100 Mbps Middle 1896 18 Mbps Low 3296 32 Mbps According to the Figure if some applications are classified into the class Low the maximum outbound bandwidth will be 0 64 Mbps and the maximum inbound bandwidth will be 32 Mbps For example if MSN Yahoo ICQ AOL GoogleTalk are classified into class Low the bandwidth of MSN
87. e Restart Now to reboot the system Windows must be restarted before the changes made by the Active Directory Installation wizard take effect Don t Restart How Fig 13 L7 Networks Inc 85 User Manual After the reboot we will check what are the differences First of all we will find that the speed for booting or shutdown the system becomes slower And we can see that the login user interface contains a new field Log on to Choose the TEST domain to login then we will be login to the TEST AD domain After we have successfully logged into the system we can check the My Computer gt Properties Click the Computer Name tab Fig 15 you will be seeing that the domain is test com In this way we have make a normal Windows 2003 Server become a Domain Controller DC L7 Networks Inc Chapter 11 Configure APP Content with AD Single Sign On Log On to Windows tr de f Windows Se Standard Edition Copyright E 2005 Microsof Corporalion User name Administrator Password Log on Fa TEST Cancel Shut Dawn Options lt lt Fig 14 System Properties Advanced Remote General Hardware Windows uses the following information to identity your computer on the network Computer description For example IIS Production Server or Accounting Server Full computer name allot test com Domair test com To rename this computer
88. e Edit Policy 9 5 Pale ustaProtte Description Note Packets are top down matched with the policy Only the last matched policy takes effects Note Bandwidth policy priority Per IP gt L gt L4 Block policy priority L4 gt Per IP gt L7 Status Condition Action 2nd level AUF ARFON exceeding qu Rule Name Sre Service Session Upload Download Quota Session Upload jefault rule EP any any 1000 Mbps 1000 Mbps Add Pe erlPpolicy Add Per IP app policy Edit policy Delete policy L7 Networks Inc 43 User Manual Chapter 6 Per IP Manager Step 5 Limit the session bandwidth Management Per IP Limit Manager Policy Change the session limit to O unlimited and that 0 means unlimited Rule name Admin r Ber IP mma mn le Session limit f Upload limit 1000 Download limit 000 Mbps Mote Zero means no limit r Quota Use Quota uota policy Reduced Policy Session limit Upload limit Download limit Step 6 Add a new rule Functions Traffic Manager App Policy Right click to add a new rule for UnLimitedGroup Status Policy Quota Profile rDescription Note Packets are top down matched with the policy Only the last matched policy takes effects Note Bandwidth policy priority Per IP gt L7 gt L4 Block policy priority L4 Per IP gt L7 Condition Acti
89. e and cannot be selected again When users visit the websites in those selected categories they will be blocked However the built in database of custom URL keywords may accidentally block the wrong websites You can edit the Excluded websites by editing the Full Domain Groups or URL Keyword Groups L7 Networks Inc fg Block H Bulit in Websi Block 1 4 Excluded web igi Full Doma fp URL Keyw Name Silver This name can be appointed in the Content Policy All users one group of groups appointed as this service name the service will be limited to this authority established of tactics fp Service Name Custom Webs p Block id Bulit in Websi 0 EmA 1 4 Excluded web Full Doma y URL Keyw if Service Nam a Custom Webs p Block Bulit in Websi fip Block E Excluded we off URL Keyw Edit web profile Bulit in Website Categories Block Please select the listed list of right side into the left side Be blocked by websites chosen Blocked Categories WebMail WeblM Blog Discuss Game IM NEWS Photo Pornography Sports pama All Page 1 Child Care E Prostitution Crime Drugs ga ri Bad mm pm Gamble Violent i Non Office 1 Friends rjj pem rm Edit web profile Excluded Full Domain Groups Please selectthe listed list of right side into the left side These URL will not be blocked and traff
90. e no other P2P applications during the office hours During the office hours R amp D members are not allowed to transfer files through Skype n 8 3 Methodology 1 Allow all traffic from CEO and CTO 2 Aside from CEO and CTO employees can only use MSN Other IMs are all blocked 3 Aside from CEO and CTO employees are allowed to use Skype other P2P or VoIP software are strictly forbidden 4 During the working hours R amp D members are not allowed to transfer files through Skype 8 4 Steps 1 Enable the App Policy Setup the scheduling of the working hours and permit all traffic from the Boss group Allow MSN but block all other IM software Allow Skype but deny all other P2P VoIP software During the office hours block R amp D s Skype File Transfer activities w N Note The default action of the device is Allow So if you don t set it to block but leave it as allow it is better to set it to never because that would greatly improve the throughput 2 Ifthe product is deployed outside the NAT firewall all the discovered traffic will be from the same IP address b L7 Networks Inc 51 User Manual Chapter 8 App Policy 8 4 1 Setup IM Policy by App Policy Rules Step 1 Enable the App Policy Function Management App Policy Check the Enable App Policy Status 4 Policy 4 Options Enable App Policy Description 1 Policy order Per IP Policy gt App Policy 2 App polic
91. efWagaley Te S Allow H323 Rule 1 e any Y VoIP H323 NetMeeting Allow VOIPBUSTER_R any CQ VoIP VoIPBuster Allow i l E ELE Rue E any E P2P Xunlei Xunlei FlashGet D S Lite Allow E 4 BITTORRENT R ER any E 5 P2P Bittorrent Bittorrent Biteomet uTorrent Bits S Allow EDONKEY Rule E any S Y P2P eDonkey eDonkey Owernet ehule agaa 2 Allow 4 4 WINNY Rule 1 2 any E il P2P Winny Allow Step 3 Select the Schedule group Function gt Management gt App Policy gt policy Select the WorkingHours schedule group to apply that schedule to all the rules regarding to the Chat group You may also consider to manually select the schedule for individual applications L7 Networks Inc 52 User Manual Chapter 8 App Policy List Chat y Protocol Schedule Security w L Traffc w to listed Schedule Status Rule Name Src MSN Rule 1 ER any EZ any gl Schedule Always Action J Security Profile Pipe rillian Miranda G aim AHOO_Rule_1 S any E any Allow l High o Trillian Miranda G aim OL Rule 1 any E any MPP Rule 1 E any E any poe QQ Rule 1 g any e any Allow l High Triton IC Q Trillian Miranda Allow l High AI Allow A chat oo Allow QOCHATROOM e any e any
92. ei KaZaA Kuro ezPeer to download ilegal data Among them Email and IM are the channel for information leakage or virus intrusion while P2Ps are the bandwidth killers and may contain many spyware What is worse IM wastes employee s productivity by friends interrupt during the office hours However IM can save communication cost and even make communications more efficient so that many enterprises are willing to allow IM Tough IM P2P Tunneling Through Firewall Enterprises that emphasize network security may have deployed Email Web auditing management systems In comparison IM and P2P lack the auditing recording behavior management content management bandwidth management because IM P2P software are optimized to tunnel through Firewalls MSN Yahoo ICQ AOL Skype Google Talk can tunnel themselves to behave like Web Email to cheat Firewalls tunnel through proxy servers or even encrypt themselves Network administrators cannot manage them completely 1 1 Packing Please check your packing and make sure you have the following accessories If you have questions please ask your local dealers m Quantity dl _ E RdHHE 3 shape chassis locker E E K screw RJ 45 network cable AC power cable ES 232 console cable FIGURE 1 1 Items included in the package 1 2 Hardware Installation The product can be locked onto a standard 19 inch chassis or placed on any Figures Please use
93. ept the name shown or type a new name named test Back Cancel Fig 5 Next we need to assign the path t store th AD database Active Directory Installation Wizard E4 and the event logs If the space Database and Log Folders in drive C is sufficient enough Specify the folders to contain the Active Directory database and log files keep the default setting as shown in Fig 6 For best performance and recoverability store the database and the log on separate hard disks Where do vau want to stare the Active Director database Database folder EXAMINANDO SANTOS Browse Where do vou want to store the Active Directory log Log folder C0WINDOWSANTDS Browse Back Cancel Fig 6 L7 Networks Inc 82 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On Active Directory Installation Wizard E Next we need to setup the Shared System Volume We Shared System Volume suggest to leave the default Specify the folder to be shared as the system volume path as shown in Fig 7 The SYSV L folder stores the server s copy of the domain s public files The contents of the SYSYOL folder are replicated to all domain controllers in the domain The SYSWDOL folder must be located on an NTFS volume Enter a location for the ST SVEUL folder Folder location Browse Back Cancel Fig 7 NM l Active Directory Installation Wizard E4 Noted t
94. er Fig 2 11 4 AReal Example 11 4 1 Manage RD People s Activities e For AD users in the RDGROUP no MSN at office hours They can MSN during non office hours but all chats will be recorded and filtered with keywords e X Forthe AD user account John his web browsing of news sports and some URLs will be blocked all the time e For users located at the IP range of 192 168 18 20 to 192 168 18 30 will not be filtered Use the organization unite to group the recorded data 11 4 2 Detailed Steps Step 1 Setup Functions Objects Manager Static Objects Schedule Object Check the original schedule BA c drezz EB s ned fe BA Se ace Oharts cap NS Rams ju A tee t 38 im irn thes bine Mutin j gt wud ta He con d 1300 7 30 L7 Networks Inc 108 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On Step 2 Add a schedule Functions gt Static gt Schedule gt Object Here we add a schedule B Address B Schecale g Sandre worktime for the office hours E Otiects El Sroups Ho Name Saar Time Stop Time Morag gt d j DO 3C anemoca Step 3 Import AD accounts Functions gt Object Manager gt Dynamic Object gt AD Import Go to Object Manager gt 9 Senate deee E Dessmk Qnae Dynamic Objects gt AD weno Import to import all AD Waima car usa fareni oc gi op az accnd Tania anne the pais ainur sn Tam accou nts and AD groups 1 AA uzcrs ops rl hezhz
95. er IP address and click the OK button Step 2 Add Web Login rules In the Policy tab there is a default rule Guest This rule applies to all users We want to exclude BOSS for Web Login in the following setup Right click on the policy area and click the Insert policy to insert a new policy named rule BOSS and select the object BOSS in the IP address field Choose Allow at the ACL field Select the Guest policy rule and choose Web Auth at the ACL field and double click the System Logout field to enter 8 hours Click the OK button and then upload the configuration L7 Networks Inc Chapter 10 Configure APP Content with WebLogin Add Web Login rules Functions gt Object Manager gt Static gt Address gt Static Object n Slate Objects 5 Static Guas Jesctuiton Applied H 1 284 calars fo do nct read to sudanticata MAT M Losicco Add new hozi E baste M Easton B osito LE posithaimer OB rostPresitert MEI Eaztacscharma Mame 2 IP Tynn O Buba O Ranga Host IP 192 38 1 69 L E BeroamA Su MA Serersar B8 Subnet 4 L E SubnatFINANCE LE subnet ANU ACITURE M Subnieslk 2HETING l E SuEnalP2A E A ce j tura Subrat 19778581 0774 wy GR 774 162 186 C24 162 156 2 0724 1n 3E Tres 15 Status f amp Policy BA arion Descriptor sessions are lop down matched ec the pole rty ihe fist matchec police takes eteris Condition Fula hane
96. er updated o verson Xxxx Wammg sar App Policy pater update nas alerce omea s ese for tre ig son AvDR updatea o version x000 mg son AVB update ras tatederor cose Jome sos URLDB update to version XXX wema sos URLDB update has falesleror codex me sas engine updatea to version O amg EN ES EN EN EN EN EN IM engine has failed error code XX App Policy engine updated to version X X XX S3 S31 S31 S32 S33 33 S34 S34 S35 S35 S36 i 936 i i S38 S39 i s resonedtoriuweusing SSS S43 S43 S44 S44 945 945 946 946 S47 i 948 S48 S49 S49 S50 S51 S52 reserved for future using BEEN URLDB restored to version X X XX XXX IM engine restored to version X X XX XXX App Policy engine restored to version X X XX EN EN EN EN sas sas EN sas APyengneresrelasisdemorcndei Oen ES sie EN sao sie EN Antivirus database engine updated to version X X XX Warning AVDB restored to version X X XX XXX Warning IM engine restore has failed error code XX reserved for future using Warn App Policy pattern restore has failed error code XX URL database engine restored to version X X XX URL database engine restore has failed error code XX Critical reserved for future using SWID Update Successfully Update database and then respond a new SWID NS S5 sew SEEK XX XX URL database engine update has failed error code XX XX XX URLDB restore has failed er
97. fault the function will Description Web Manager allows you to filter unwanted sites during the office hours Static Exempt Source Destination 4 Enable Exempt Sources Exclude E Bypass from the web filter enforcement Include ER any inthe web filter enforcement Dynamic Exempt Source Destination Enable Exempt Sources Exclude e any fromthe web filter enforcement apply on all computers Encrypted Https Website Enable Https Website Filtering Select Boss in the Exclude to Exclude Boss from web filter enforcement This function enables Https website filtering For example when connecting to https www facebook com the device will check its URL database and learn that itis a Social website Then it will match the policy rules to allow it or not Note Blocking an Https website will not display the custom warning page e Exempt Enable the exempt source function Enable Disable ources Exclude the selected users to apply the from the web filtering functions All other computers are enforced to do web filtering Exclude web filter enforcement Enable Disable Enable Boss Include the selected users to apply the Include inthe web web filtering functions All other filter enforcement computers are not enforced to do web filtering Enable Disable FIGURE 12 1 Exempt source fields L7 Networks Inc 120 User Manual Chapter 12 Web Manager Step 3 Define Excluded Domains Funct
98. ften require to authenticate users to know the exact identity of each users The Web Login function in the product can achieve this by the following steps 1 Force the subnet of R amp D employees to authenticate by web login Non login users are not allowed 2 Make the reports tagged with the authenticated Web Login user names 3 Configure APP Content policy rules to use the Web Login user names 10 2 Methodology 1 1 All members should authenticate every 8 hours except the boss 1 1 1 Enable Web Login 1 1 2 Add Web Login user names and password 1 1 38 Add Web Login rules 1 2 Setup rules using Web Login names for filtering 1 2 1 Assign Web Login user names in App Policy rules 1 2 2 Assign Web Login user names in Content policy rules 1 2 8 Import Web Login user accounts into content policy rules 10 3 Steps 10 3 1 All members are required to login via captive portal page every 8 hours except the boss 10 3 1 1 Enable Web Login Step 1 Enable Web Login Functions Object Manager Web Login Status Click the Web login status BR Stats Fasc Por M aco Select the Enable Web a M y 63 login gt and upload the configuration Enable Web Login rDescription Web Login allows you to authenticate users at their web browsers Upon login users will be notified with his time quota E 1 L7 Networks Inc 71 User Manual 10 3 1 2 Step 1 Add a Web Login account and its password In the Account field fill in
99. hat Gadu Gadu Gadu Kadu Miranda Gaim Allow ing UC_Rule_1 ad Chat UC Sina UC 8 Allow ing POPO_Rule_1 ChatPOPO popo163 8 Allow ChatALiWangWang Taobao ALiWangWang E Allow ing FETION_Rule_1 amp 2 Chat Fetion Chinamobile Fetion Allow ing DOSHOW_Rule_1 E Chat DoShow Allow ChatWEBIM MSN Webmessenger eBuddy e M Allow Step 5 Select the Security Profile Select the Block in the Security listbox to apply the block policy to all listed Chat applications Subsequently remember to choose Allow at the MSN policy rule since the company allows MSN during office Function Management App Policy policy hours L7 Networks Inc 53 User Manual Chapter 8 p Policy Ap Status Schedule Rule Name Sre 4 Working MSN Rule 1 4 Working YAHOO Rule 1 e Boss La Boss Action security Profile Pipe AIR d D gt Chat Y ahoo Y ahoo Trillian Miranda G aim Allow Allow l High El High 4 Working AOL Rule 1 La Boss amp Chat AOL AOL AIM Triton ICO Trillian Miranda 1 Allow l High 4 Working e Chat XMPP Google Talk G aim js Allow amp High d X A Miorking QQ Rule 1 MPP Rule 1 e Boss A chat oo 8 Boss Allow l High A Working QQCHATROOM 4 Working QQMEDIA Rule 1 Boss
100. hat the first installation always encounters the DNS DHS Registration Diagnostics failed problem Although we Verfu DNS support ar install ONS on this computer have installed the DNS server but we have not configured it so there is no DNS server to Diagnostic Failed respond Here we are to The registration diagnostic has been run 1 time configure the DNS server and make this server as the first Warming Domain Controller functions like joining a domain logging onto a domain and Active Director replication will not be available until the DNS infrastructure hor DNS server Fig 8 Active Directory is correctly configured The wizard encountered an erar while trying to determine it the ONS server with which this domain controller will register supports dynamic updates For more information includina steps to correct this prablem see Help hd C have corrected the problem Perform the ONS diagnostic test again Back Cancel Fig 8 L7 Networks Inc 83 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On Active Directory Installation Wizard Permissions Next MUS choose default Select default permissions For user and group objects permissions for user and group objects Fig 9 We choose the second option that only Some server programe such as Windows NT Remote Access Service read information compatible with Windows 2000 stored on domain controllers or Windows Server 200
101. he following sections we will focus on how to overcome the problems in your networks IM Manager managed by H occat is A T T n 7 a a s e Ru pa i ca BO port gt lt Well knawn part s la i a E M oa ve fro a t A Packets in Tra fic Application Pa Te Yes P d n bw l i Firewall lt Allow trafic p Jp Discovery m i application Anal ba IP Area Ti a E UU FIGURE 4 1 Traffic flow in the device As displayed in FIGURE 4 1 the traffic flow through the device will be first enter the Traffic Discovery module Monitor gt Realtime to do layer 7 deep packet inspection followed by the App Policy module to block unwanted applications No matter the application use HTTP SOCKS tunnels to cheat IT experts all packets are analyzed by the layer 7 packet inspection engine Subsequently the App Policy will judge the final result by the source destination IP addresses and the real application name instead of port number When you enable the Web Manager all web traffic will be analyzed to see if the content of the traffic should be blocked or not A built in URL database can quickly check for unwanted websites and return warning message to the user immediately Moreover the URL access history of each person can be fully recorded for further investigation If you enable the IM Manager the traffic will be anaylized to see if the IM traffi
102. ht click on the area of the WH Morning rule and select the Edit Entry item L7 Networks Inc Chapter 9 Address amp Schedule Objects Functions Content Manager Object Manager Schedule Objects Objects Groups Name schedules pe orning Afternoon AA Objects Groups Name Start Time Stop Time Morning 08 30 12 00 13 00 17 30 uen gt Functions gt Content Manager gt Object Manager gt Schedule gt Objects Objects Groups NO Name Sun Mon Tue Wed Thu Fri Sat StartTime Stop Time a Add New Schedule Please input schedule name E eee Functions gt Content Manager gt Object Manager gt Schedule gt Objects Objects Groups Name oun Mon Tue Wed Thu Fri sal 1 WH Morning DO D 66 stop Time Add Schedule Delete Schedule LIN EI UNA EE pu E User Manual Chapter 9 Address amp Schedule Objects Step 5 Pick the start time Functions Content Manager Object Manager Schedule Objects Select the Start Time and click the OK button 4 2 Edit Start Time to close the dialog Time Hour 8 idi y Min 30 5i The settings for Stop Time are the same Step 6 Weekday schedules Functions gt Content Manager gt Object Manager gt Schedule gt Objects The office hours for company ABC are from j Groups Monday to Friday Move your mouse over
103. ibus TE m ns dez TR DEL QO IPNEHCI MAME Treo AI iAH kvail Hi Pa XO Paal Bill ro ii ra A SED Degli BECAS six Mirra Ud la s Xi Silla rule hi eagle ia bea Rare belie eer ek gel eh dee PE E him iki mima md bk inlimrimg cibi yi mazo ee mlki J 2 Bik Talfal 2 0 5 2 Aail 015 0 0 4 ed Pelee 7 5 Tikes Toon TL R23 Preta TUI a 1 rid a Thi Eaim a dad E Chapter 5 Traffic Discovery 3 RU a Diet Se Hiligleit 4 7 mala D Y OE a E AA Be EFF Elia Tasio Et Pimkv ini giis EP Rests ina Paria Tram Trend erro ta Wios Mere Cee zi B rada E EDT kii liri EKralPFl mh Gai iia M6 Bee Ri him mass error Bc arar Era Becr iz posti Fila Macia ZIH r ll FIF Trivial File Tawe Ter Free RC mmi 37 User Manual Chapter 5 Traffic Discovery L7 Networks Inc 38 User Manual Chapter 5 Traffic Discovery L7 Networks Inc 39 User Manual Chapter 5 Traffic Discovery Part 4 Traffoc Manager L7 Networks Inc 40 User Manual Chapter 6 Per IP Manager Chapter 6 Per IP Manager This chapter introduces how the Per IP Manager works for your needs Per IP Manager can setup many limits for each internal IP addresses such as session count upload rate download rate and hourly daily weekly quota 6 1 Scenario John and Marry belong to the group Admin Paul Zakk and Eric belong to the group Sales The members in group
104. ic limited Exceptional URL AII URL default 127 Bak ies OK Com User Manual Chapter 13 Encryption Web Manager Enable URL Database Dod URL database to block Enable Diable Acti to tak h the URL is dd l ction to take when the Action marches the LIBI dieta sees Log amp Block Log amp Block Block Only Enable all categories Enable Diable Block all categories E that match SUYO Enable Diable Disable the URL categories Advertisements Audio Vid Check the URL categories to be Enable Diable Enable eo Drugs etc enforced FIGURE 13 2 URL Web filtering fields Step 5 URL keyword blocking Functions gt Content Manager gt Web gt Global Policy gt URL Keywords Check the Enable URL Keyword blocking Categories to block any URL containing the keywords Status Web Profiles 8 Global Policy listed in the settings The product has preset amp Web Sites web Contents 5 Web Messages 5 Web Alert keywords You can change the keywords by E URL Keywords Categories 2 Excluded Full Domains 5 Excluded URL Keywords right clicking the item Description Step 1 Edit the URL keywords and their Categories here Step 2 Goto Web Web Profiles to add URL keyword groups into some permission level Step 3 Goto Content Policy to set some objectto the permission level Noted that keywords are partially matched against URLs For example keyword se
105. ierachy Upload bandwidth Download bandwidth High 50 0 50 0 Mb s Middle 18 0 18 0 Mb s 5 Low 32 0 32 0 Mb s Functions Traffic Manager App Policy Status Condition Action comm Name Dst Protocol Security Profile Pipe 4 Web Http Downlo ad zip rar exe iso wmwv rmwbaw Me Allow l High ES Web Htp Videofilm piant Allow l High Schedule Always Always ve E 18 Always laTTPVIDEO Ru ame praec Br Bam Denetrors ctw Bh ee A a NN Y FileTranster FTP ee eS Middle Alto amp volP Skype Allow l High O VoIP Skype File Transfer Allow l High Allow olP Skype File Trans FTP Rule 1 any ze any m Always E Always SKYPE Rule 1 SKYPEFILE Rul S OTEGUTRU t a Es Be Allow RE 9 VoIP VolP Buster e Allow 3 Always UNLEI_Rule_1 E E P2P Xunlei Xunlei FlashGet D S Lite Allow 31 E Always BITTORRENT R Bay any O P2P Bittorrent Bittorrent Bitcomet uTorrent Bits Allow el High 32 E Always EDONKEY Rule Ese P2P eDonkey eDonkey COwernet eMule agaa Allow l High Always WINNY Rule 1 P2P Winny Allow El High SIP Rule 1 H323 Rule 1 OIPBUSTER S any Se any amp Update Tools Help S gt lt li Upload configuration Update pattern i Update URL database y License 25 License Status Option 50 User Manual Chapter 8 App Policy Chapter 8 App P
106. illian Miranda G aim pes purity Profile Pipe Block amp log El High El High ES 4 Working AOL_Rule_1 La Boss E any A Chat AOL AOL AIM Triton ICQ Trillian Miranda Block amp log l High 4 Working XMPP_Rule_1 e Boss e any T D ChatXMPP Google Talk Gaim Block amp log amp High 4 Working QQ_Rule_1 any A Chat QQ Es Boss ER Block log l High 4 Working QQCHATROOM 4 Working QOMEDIA_Rule_18 Boss any 4 Working QOSHARE_Rule e Boss any 8 Chat QQChatRoom 0 chat QO Media File Transfer voice Video Y sos E2 any m Chat QQ Shared Files 44 Working GADU Rule 1 Block amp log Block log Block amp log El High El High El High Boss gt any 4 Woning UC Rule 4 i Chat Gadu Gadu Gadu IKadu Miranda G aim Block amp log l High La Boss Sr any ag ChatUC Sina UC Block amp log El High 4 Working POPO_Rule_1 La Boss any Chat POPO popo163 Block log l High 4 Working ALIWANGWANG LES er any e ChatALiWangWang Taobao ALiWangWang Block log e High 4 Working FETION Rule 1 La Boss Er any 3 Chat Fetion Chinamobile Fetion Block amp log l High 4 Working IDOSHOW Rule 1 us any ie Chat DoShow La Boss Block amp log fo 4 Working WEBI
107. ions gt Content Manager gt Web gt Global Policy gt Web Sites gt Edit the Excluded Full Domains to add Excluded Full Domains trusted domains and their groups Bs Status f amp Web Profiles 4 Global Policy Input the trusted domain by right clicking the e Stes LE wen Contents E wen messages 5 wen Atn group name Note that entering too many 5 URL Keywords Categories E Excluded Full Domains 3 Excluded URL Keywords domains will slow down the network Description perfo rmance Step 1 Edit the full domains and their groups here Step 2 Goto Web gt Web Profiles to add Excluded Full Domain Groups into some permission level Step 3 Goto ContentPolicy to set some objectto the permission level Search keyword 4 Excluded Full Domain Groups H E default File Import File Export Step 4 Enable URL database Functions Content Manager Web Web Profiles Check the Enable URL Database to use Status B Web Profiles 84 Global Policy the built in URL database You can select the categories of the URLs and the actions m l APP y NGA AE POUE MACE hat moa ue fas f a SsS Faroe JOR WebMail WeblM Blog Discuss Game IM NEWS Photo Pornography Sports Stocks Chatroom Silver Audio Video WebMail WebIM Blog Discuss
108. is chapter shows you how to setup objects for use with managing policy rules Scenario Company ABC hopes to manage all the permissions of all the IP address in the company However CEO amp CTO has the complete permission to access all the Internet resources Company ABC s working hours are from Monday to Friday 8 30 to 17 30 12 00 13 00 at noon is employee s free time to do anything According to the company s policy some IM or P2P applications are not allowed touse furing the office hours Objects of the same nature should be grouped together to facilitate the configuration of the policy rules Manage Depart 192 168 168 2 192 168 168 200 lastaniScan A gt Marketing M Firewall Department SS 2d 192 168 16 1 192 168 16 254 d gt o LR Le e Router 4 4 a ve v o la Lj e MCGMT Port e 192 168 168 201 Switched Huh e RD fF Department E Se iu d T8 gt f 192 168 17 1 192 168 17 254 A pat Cable Connection 9 Message Passing Management Client Se ent Server 10 1 1 1 9 2 Methodology 1 Assign CEO s IP address as 192 168 168 2 and CTO s IP address as 192 168 168 10 Then group CEO and CTO into a group object named boss 2 Assign several timeslots of the company s office hours Then group the timeslot schedule objects into a schedule group object named WorkingHours 9 3 Steps L7 Networks Inc 63 User
109. le 1 EZ any a Allow l High SKYPEFILE_Rul 52 an le Transfer Allow High Ru EE any Morin El Hig SKYPEOUT_Rul E any E any A Afternoon It Allow El High Pz SIP_Rule_1 E any E any e WorkingHou Voice Yahoo VoiceAfl agaley Te S Allow el High H323_Rule_1 e any E any VoIP H323 NetMeeting Allow l High VOIPBUSTER_R E2 any ER any e VolP VolPBuster Allow l High any EZ any e Web Http Download zip rav exe isoAumw rmvb w SE Allow El High L7 Networks Inc 59 User Manual Step 4 Choose source IP Since CEO amp CTO should have full permission to access the Internet resources we can assign the address object Boss setup in the last chapter to exclude them from being managed Select the Icon Boss to exclude them Step 5 Choose security profile In the quick configuration toolbar select Block to apply Deny policy to all listed rules Step 6 Choose the bandwidth class In the quick configuration toolbar select Low at the Traffic Profile field to limit all P2P applications in the Low traffic pipe Step 7 Adjust security profile of Skype According the policy of the company we allow the employees to use Skype So you have to adjust the security profile of Skype to the Allow state In this way the Skype traffic can pass through the product L7 Networks Inc Chapter 8 App Policy
110. lick the Update URL database Step 2 Upgrading URLDB Click the OK button to start updating the URLDB Step 3 Upgrading URLDB from CLI Enter privileged mode in CLI and then input sys module update url or sys module update all to check for any update L7 Networks Inc Update gt Update URL database y License 25 License Status Update Update URL database Current URL database version is 2 0 00 001 The latest version is 20 00 0607 Do you want to upgrade URL database now Con cmn InstantScan sys module update all hd im engine version 2 0 02 is the latest one on the device No upgrade is nee e n Baron version 2 1 01 151 is the latest one on the device No upgrade is n eede A new version 1 0 00 003 is issued Please upgrade the newest av database versi on to the device Do you really want to continue upgrade V N1 N y Upgrade av database from 192 168 17 97 This process may take a long time so please be patient Successfully update the av database new version 1 0 00 903 A new version 2 0 00 002 is issued Please upgrade the newest url database vers ion to the device Do you really want to continue upgrade V N1 N y Upgrade url database from 192 168 17 97 his process may take a long time so please be patient Successfully update the url database new version 2 0 00 902 InstantScant 142 User Manual 15 6 4 Step 4 Restore to factory default In CLI enter sys resetconf
111. lock amp log e Middle 4 Working UC Rule 1 e Boss e any m Chat UC Sina UC le Block amp log El Middle P Working Foro Rule 1 Be Boss g any ES ChatPOPO popo163 1 Block amp log a Middle 4 Working ALIWANGWANG s Boss E any la ChatALiWangWang Taobao ALiWangWang le 1 0 Block log e Middle 4 Working FETION_ Rule_1 gt Boss any s Chat Fetion Chinamobile Fetion O Block amp log l Middle 4 Working DOSHOW Rule 1 e Boss e any O Chat DoShow C Block amp log a Middle 4 Working WEBIM_ Rule_1 Boss 1 any E Chat WEBIM mMSN WebmessengereBuddy e M G Block amp log amp Middle E Description Range Format List all policy rules whose schedule field contains User defined Schedule the selected schedule item OI RIOUS Apply l to O il e zd rules whose security field contains Allow Block listed rofile the selected security item Traffic Profile List all policy rules whose traffic field contains the High Middle Middle selected bandwidth item Low FIGURE 8 1 Quick configuration toolbar for App Policy The internal IP address of the policy Note that the icon Subnet Range E Boss means inverse of the Boss address group Host The external IP address of the policy Note that the icon Subnet Range amp Boss means inverse of the Boss address group Host The applications of the passing traffic to be managed Pre
112. lock Java objects 4 Block cookies Fed Besmpton Filter web pages with Cookies objects Enable Disable FIGURE 12 4 Web object filtering Enable Keyword Blocking Enable URL keyword blocking Enable Diable adv advertise Keywords Input the keyword that may appear in the URL Keyword pattern adsrv banner splash FIGURE 12 5 URL keyword blocking fields L7 Networks Inc 123 User Manual Chapter 13 Encryption Web Manager Chapter 13 Encryption Web Manager This chapter introduces how to use Encryption Web Manager to manage your employee s HTTPS traffic 13 1 Scenario The web page which comes from forbidden web site will be filtered out WebServer3 140 112 1 4 pee Internet PC1 1 PC1 2 192 168 168 2 192 168 168 3 FIGURE 13 1 Denying access to illegal websites through web filtering 1 Asdescribed in FIGURE 12 2 the user PC1 1 is browsing websites that contains stock information violence or even sex Some websites may contain video or audio which may waste the Internet bandwidth of the company What is worse the contents may lower the productivity of your employees 13 2 Objectives 3 Disallow employees from visting illegal websites 13 3 Methodology 1 Setup the web filter to block websites by URL The URL filter can be setup to analyze by URL keywords or built in URL database Traffic matching the URL will be blocked L7 Networks Inc 124 User Man
113. n modified in the software hardware please email your suggested directions to our support email address service I7 networks com You can use email address to tell us your messages If you want to subscribe our e paper you can also email your address to the following email address service L7 Networks com You can visit our website to search for any advanced progress of this manual or information http www L7 Networks com Table of Contents PP e e PEE A Tecna SUDDO Meersen ir inniinn atc Conn mc T T ee li ADOUL TIS Wana ests sosa daa andina alada aaa lii wc OVEIVICW 22 5232 nena R P eee 2 NEW Release MP M 3 Gliapter 1 Product OVEIVICW ven ssi screg eines to senen ddnde odit niai den od cubes edet nip dq deno deena dudas D edcdedened 4 1 1 mici lo S 4 1 2 prarduaredascallcll o SEEK 4 1 3 A cr MEN 5 1 4 System Delatlts amp Examples isis didas 5 1 5 Setup IPC ROUES adela Eo 7 1 5 1 Users are in the same networks as Firewall LAN oonccccccncnnccccncococononncconcnnocoonnnnononcnnononcnnnonanenoss 7 1 5 2 Users are in the same networks as Firewall LAN Multiple Subnets esses 8 1 5 3 Users are NOT in the same networks as Firewall LAN oococconncnccccccnncccccnnccconnnnonononnononcnnconanenoss 9 1 5 4 Users connects to internal Proxy TS isa 10 Ghapler2 2 Ver AFGhIte
114. n to continue The user is added successfully Step 5 Display all accounts After you have finishing adding an account you Account Manager can see what you have entered in the Account 4 authority manager Manager window amp User y Group Step 6 Delete an account If you want to delete an account you only need Account Manager to select the Delete User item amp Authority Manager Group Description di User Admin Administrator Eg Group L7 Networks Inc 147 User Manual Chapter 16 Advanced Multi Layer Architecture 16 4 2 Modify Passwords Step 1 Change the passowrd Tool gt Change Password Click the Change Password item Tools Help 2 Account Manager lt A Change Password gt gt Language Setting 2 SNMP Control gt Config Backup Config Restore Step 2 Enter new password Tool Change Password Enter the Old Password and the New Change Password Password and enter the new password again in the Confirm field Click the OK button to finish Enter your old password and new password the settings Password Old Password pom New Password des Confirm mes mm L7 Networks Inc 148 Product User Manual Appendix L7 Networks Inc 149 Product User Manual Appendix A Appendix A Command Line Interface You can use Management Client to setup your product Besides you can also use console ssh
115. n to his MSN account to chat Then we can Functions gt Recoder gt IM see that all John s chat Peke DUE messages are logged into the woh 200207 Dare 30030719 p 02 o 20000725 WF 22 9 OU AE as shown in Fig 5 ues NAAA watea wpe M ar F unaye l v Sl Ey al gg Joni mzntzL C1 3423 cm 3 113774530 etu ed ow 7 on I4 Users b gt me textes wos melu tes IM n MA H se no_GEESGhztmrilcom iHn M se zi Fig 5 L7 Networks Inc 116 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On L7 Networks Inc 117 User Manual Chapter 12 Web Manager Chapter 12 Web Manager This chapter introduces how to use Web Manager to manage your employee s HTTP traffic 12 1 Scenario The downloaded web page will be filtered with Active X Java Java Script Cookies components P WebServer3 140 112 1 4 is Internet PC1_1 y 192 168 168 1 192 168 168 2 LAN 1 22 108 108 2 20b FIGURE 12 1 Prevent employees from accessing illegal websites 1 As described in FIGURE 12 1 the user PC1 1 is browsing the website located at the WebServer3 The content of the website contains cookies Java applets and ActiveX objects These contents may contain malicious code that may steal the private information of the user So the administrator decides to disallow users to download the objects to PC1 1 L7 Networks Inc 118 User Manual Chapter 12 Web Manager The we
116. ne or more users or groups to whom you want to delegate control Fig 4 show Selected users and groups Remove Hert gt Cancel Delegation of Control Wizard E Users or Groups Select ane or more users or groups to whom you want ta delegate control Select Users Computers or Groups Select this object type Users Groups or Built in securite principals Object Types From this location test com Locations Enter the object names to select examples Johri Check Mames Advanced Cancel 2 Back ext gt Cancel Fig 4 L7 Networks Inc 90 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On Delegation of Control Wizard Here John is added into the list for delegation of control Users or Groups Select one or mare users or groups to whom you want to delegate control Selected users and groups E Jahn Johniitest com Next we choose to allow Delegation of Control Wizard John to have the permission to Create delete and Tasks to Delegate manage inetOrgPerson You can select common tasks or customize your own accounts Click the Next button to proceed as Fig 6 shows Delegate the following common tasks C Create delete and manage user accounts O Reset user passwords and force password change at next logon C Read all user information ie Create delete and manage inetU
117. new object Fig 2 L7 Networks Inc 87 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On There will be a new wizard New Object User We create a new name called John and set the password as Never expired as shown C Create in test com Users in Fig 3 and Fig 4 Click the Next button to proceed to finish the creation of the user First name John Initials Last name Full name John User logon name l oh test com pr User logon name pre windows zL rJ TESTS ohr x Back Cancel Fig 3 Mew Object User C Create in test comUsers Password eseesees Confirm password eee ee eee User must change password at next logon User cannot change password vw Password never expires Account is disabled Back Lancel Fig 4 L7 Networks Inc 88 User Manual Step 2 Delegate Control Right click on the test com and select the Delegate control as Fig 1 shows There will be a Delegation of Control Wizard running as Fig 2 shows L7 Networks Inc E Active Directory Users and Computers amp File Action view Help m amp mox E B BIS mimm vt Active Directory Users and Computer ers E objects i Li Saved Queries Mew Help All Tasks Vie New Window From Here Refresh Export List Properties ff Domain Admins Security Group ff Domain Com Security Group Fig Domain Cont
118. now system will reboot and restore to factory default Chapter 15 oystem Maintainence Restore to Factory Default in CLI InstantScan gt en InstantScan sys resetconf now Config Modules reset to default Config reset done System will reboot now Press ctrl e in 5 secs to start with emergency kernel Booting Checking Initial Kev of this device InstantScan login 15 6 5 Step 1 Enter boot loader If your firmware accidentally encounters critical damage and cannot enter normal CLI your can enter emergency mode to restore the firmware back to factory default You must press ctrl e during the boot up countdown 5 seconds 15 6 6 SNMP Control Step 1 Enable SNMP Control Check the SNMP Control in the menu Step 2 Setup SNMP Control After you setup SNMP parameters you can monitor system and network status from the remote L7 Networks Inc Restore to Factory Default in CLI Emergency Mode Press ctrl e in 5 secs to start with emergency kernel Enter emergency mode Emergency Mode login as admin no password EMERGENCY login admin EMERGENCY 1 gt en EMERGENCY disable Turn off privileged mode command exit Exit command shell m Configure Display IP related settings Configure system parameters EMERGENCY 1 sys resetconf now Config reset to default System will reboot now Tools gt SNMP Control Tools Help 5 Account Manager 289 Change Password E gt Language
119. olicy This chapter introduces how to conFigure the App Policy functions 8 1 Introduction to App Policy Employees often use Outlook to receive emails Internet Explorer to browse websites Instant Messengers IM such as MSN Skype to chat with friends and P2P software such as BT eDonkey Xunlei KaZaA Kuro ezPeer to download ilegal data Among them Email and IM are the channel for information leakage or virus intrusion while P2Ps are the bandwidth killers and may contain many spyware What is worse IM wastes employee s productivity by friends interrupt during the office hours However IM can save communication cost and even make communications more efficient so that many enterprises are willing to allow IM Enterprises that emphasize network security may have deployed Email Web auditing management systems In comparison IM and P2P lack the auditing recording behavior management content management bandwidth management because IM P2P software are optimized to tunnel through Firewalls MSN Yahoo ICQ AOL Skype Google Talk can tunnel themselves to behave like Web Email to cheat Firewalls tunnel through proxy servers or even encrypt themselves Network administrators cannot manage them completely 8 2 Scenario CEO and CTO of the company should have full permission to access the Internet resources Except for MSN no other instant messenger software packages are allowed to use during office hours Besides Skype there must b
120. on 2nd level Action when exceeding qu Rule Name Sre Service Session Upload Download Quota Session Upload Download Default rule g any o 1000 Mbps 1000 Mbps 1000 Mbps Ac Per Pu lic X Add Per IP app policy Edit policy Delete policy L7 Networks Inc 44 User Manual Chapter 6 Per IP Manager Step 7 Edit the new rule Management Per IP Limit Manager Policy Select the UnlimitedGroup and enter 100 Mbps e for the download limit 100 Mbps for the upload Edit your Per IP policy limit In this way those IP in the UnlimitedGroup will have a max 100Mbps bidirectionally Rule name sales r Per IP Internal IP E Sales y Session limit 200 Upload limit 1 Download limit f Mote Zero means no limit Quota C Use Quota Quota policy j Reduced Policy Session limit Upload limit Download limit Cancel Step 8 Add a per app rule Management gt Per IP Limit Manager gt Policy Right click the UnlimitedGroup rule and select States AR Quota Prarie the add per app policy You can setup extra limits Description for the applications Select the UnlimitedGroup Note Packets are top down matched with the policy Only the last matched policy takes effects and enter 100 Mbps for the download limit 100 Note Bandwidth policy priority Per IP gt L gt L4 Block policy priority L4 Per IP gt
121. on Update gt Option gt General Enter the IP or FQDN of the update center You can click the default to restore to the default update center If your company has proxies click af aaa Manual Proxy Configuration and enter the Me parameters such as IP port username password General Update Center ne D poste IMAN DIO Nes df Ceememjuedeeircomiw Advanced Update Option Connection e Direct Connect to Internet O Manual Proxy Configuration Proxy 192 168 17 255 Port 3128 User name yUserName Password posses Step 3 Enable Auto Update Update gt Option gt Advanced Check the Enable auto update and the functions you want to auto update Click the Schedule button to setup the periodical time to upgrade af Advanced Update Option General Auto update enable auto update Pattern IM engine Virus DB URL DB a scheduling update L7 Networks Inc 140 User Manual Chapter 15 oystem Maintainence Step 4 Setup Update Schedule Update gt Option gt Advanced gt Schedule Select Weekly and choose the time you want to Schedule Dialog update the patterns Click the the OK to finish the paity settings C Daly set update time Hour 5 gt Min Weekly set update time Hour Min 15 6 2 Manually Upgrade Application Patterns Step 1 Upgrade pattern from UI Update Update pattern Click the Update pattern Update Tools Help y Upload configuration Pig raii s ERTS ES s
122. onitor Server Status Check the Edit button to start editing related settings Check the Enable Disable Send Syslog By E mail and input your email address in the field Drag the mouse to the level you want know There are five levels 1 Alert 2 Critical 3 Warning 4 Notification 5 Information If you want to receive alerts only in the Alert level you can drag the bar to the Alert However if you want to receive all the system logs you must position the bar to the Information Click the Test button to test the email address Click Save to save all the settings Step 9 Version Monitor Server Status Here you can refer many version information Step 10 Clear Store system logs Monitor Server Status Right clicking the status area makes you store the records to the disk L7 Networks Inc 134 User Manual Chapter 14 Mangement Server Maintainence L7 Networks Inc 135 User Manual Chapter 15 oystem Maintainence Chapter 15 System Maintainence This chapter describes how to upgrade firmware and backup restore configurations 15 1 Scenario 1 The device allows you to upgrade firmware and pattern URL database This chapter introduces you how to upgrade the firmware through the TFTP server 2 When the configuration is damaged you can reset the system back to factory defaults at the CLI interface When you forget the password you are only allowed to enter the emergency mode to reset the configuration 3
123. or you to select the date Advanced search function that can customize the search criteria Setup the refresh period Settings for report export FIGURE 4 1 Description of all icons L7 Networks Inc 31 User Manual Chapter 4 Internal Data Processing Flow 4 5 Toolbar Wem Subitem Description Device Group Manager Create new devices or groups New Project Create a new project url virus database you must register first Enter the trial or deal license here By default several functions are Update in trial mode and will disfunction after 5 days After that the device goes into bypass mode to only forward the traffic You must reboot it make it function in another 5 days You can request a longer trial License license from your reseller Input the license here to make it effective Once you have purchase the product your reseller will offer you a permanent deal license that will make the device function permanently without reboot Note that you must register first before you can enter any license here Settings for the update center Support list The application patterns that is supported in the current device Account Manager Setup for the permission of each login account to the system Open Project Open a new project Display the version information 4 6 Versions otep 1 Lookup the version of mgt server Help About The firmware of the product must match the File Update Tools Help
124. ory to limit all P2P List rar w Protocot v Apply Schedule v secu Tal E aan to listed traffic in the traffic pipe Low Status Condition Action Schedule Rule Name Protocol a Middle ity Profile Pipe E Always UNLEI Rule 1 E P2P Xunlei Xunlei FlashGet D S Lite E Low 7j Jk amp log l High E Always BITTORRENT R jp P2P BittorrentBittorrent Bitcomet uTorrent Bits Block amp log el High i Always eo Y P2P eDonkey eDonkey Chwernet eMule agaa Block amp log l High Always WINNY Rule 1 8f 2 m P2P Winny O Block amp log l High 19 Always EZPEERPLUS_ amp P2P ezPeerPlus Block amp log l High FASTTRACK_R zr P2P F asttrack Kazaa Grokster iMesh O Block amp log l High GNUTELLA_Rul E P2P Gnutella F oxy ezPeerBearshare Gnucleus OG Block amp log KURO Rule 1 ici P2P Kuro Block amp log DIRECTCONNE a P2P DirrectConnect DirectConnectDC Block amp log OPENFT Rule 1 Lj P2P OpenF T Crazaa Kceasy Block amp log ARES If P2P Ares O Block amp log El High SOULSEEK Rul Y P2P SoulSeek O Block amp log l High GOBOOGY Rul a P2P GoBoogy O Block amp log a High KUGOO_Rule_1 GE P2P Kugoo O Block amp log ER High PIGO Rule 1 IQ P2P Pigo Pigo 100Ba0 Block amp log El High POCO_Rule_1 a P2P Poco Poco PP Point Block amp log l High Maso Always
125. oup name nnamic Groups Name RD rAll Objects 2 Selected Objects amp gejia gejia b aeiia gejis oot root p shaopeng shaopena amp shaopeng shaopeng _ amp zhanguun zhangxun zhangxun i zhancxun Finish Cancel Step 2 Assign Web Login Functions gt Traffic Manager gt L7 Policy gt Policy names in APP rules 15 Stats 84 Foroy We can assign the objects Filter 4H Chat Protocol Apply cliors t selected ules al arce groups in the dymanic objects Keyword Search next Schadue w hrton w Fipa to any App Policy rules For i EL example we don t want the jn Curditon group RD to use MSN we can Schedule ule Mame Protocol assign the group RD in the T avars KSN Rule RD any de Sb3MENOUSITRIT trand am MSN policy rule Upload the configuration We can see that zhangxun belonging to the list Functions gt Reports gt Traffic APP A iiy has been blocked and M Fuaricnal view Mg Policia Mg Personal Um i Evert view ogged RO ceja gejia shaupeno t shaopens 35h 3ngxun t anar TEE 2 Ragors L7 Lt Evante v mee sw EE 1 n 39 Da 2009 08 13 Data 2008 06 13 w pa wo o0 3009 08 13 me 23 59 sa H A User Probral Internal IP Esternsl IP Mracton Al Fridge All v Dale Aoplitaz Description Proc User intemal P ore External IP DEL 200 0212 15 43 51 Fnzn IEBLCCK
126. oups Select schedules from the left column Click E za the gt gt to move the schedule object from the left to the right If you want to remove some schedule objects from the current group All Schedules Selected Schedules select the object in the right column and click 9 WH Morning 4 WH Morning the lt lt button Click the Finish button to finish PEO did the settings Please select schedules Step 12 Display the current policy Functions gt Content Manager gt Object Manager gt Schedule gt Groups After the settings check your objects to see Objects Groups if your inputs are really updated to the screen Schedules 1 WorkingHours Morning WH Afternoon Step 13 Upload config Update gt Upload Configuration Check the Upload Configuration item or click the icon to upload the current configuration to the device A If some object is already used by some policy you must chage or delete the policy before you can delete the object Otherwise you can never erase the object L7 Networks Inc 68 User Manual Chapter 9 Address amp Schedule Objects L7 Networks Inc 69 User Manual Chapter 9 Address amp Schedule Objects Part 5 Content Manager L7 Networks Inc 70 User Manual Chapter 10 Configure APP Content with WebLogin Chapter 10 Configure APP Content with WebLogin This chapter introduces how WebLogin gets users identity for policy enforcement in APP Content 10 1 Scenario Enterprieses o
127. our management server Loop wscript quit L7 Networks Inc 102 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On Step 12 Refresh policy to cx Lommand Prompt Al ES make it effective right away Microsoft Windows Version 5 2 3790 KC Copyright 1985 2003 Microsoft Corp After saving the login vbs enter the command A and Settinas fdminictrat GPUPDATE FORCE in the A A LLL DOS window If you are using User Policy Refresh has completed Windows 7 please be sure that Computer Policy Refresh has completed the DOS window must be run To check for errors in policy processing review the event log IGsDocuments and Settings Administrator dsa msc with administrator You should right click on the DOS icon and C Documents and Settings Adminlstrator select Run with administrator 11 3 1 6 Relogin the AD User and Check with sys ad show Step 1 Verify if the newly logged in user is recognized Suppose the AD client has the IP address of 192 168 18 72 Device IP 192 168 18 92 Log out the AD user and re login to the AD domain Use Console SSH Telnet to connect to the CLI and enter the command sys ad show as Fig 1 shows you can see the list of the registered AD clients 11 3 2 Map IP addresses in Reports to AD names 11 3 2 1 Import users names from Object Manager gt Dynamic Objects Step 1 Import all accounts Functions gt Objec
128. plisieli lee cae r9 iso Phe iih hein tn gt Jenn am ed recla Y h ew ke cage a tace odas deers with ha atrou banns m news coma fm 1 MErusarslozs nan hata VAL aaniu a coe d icgh ze ptis deli to se eg vhs I the accom heres M a nsn Cherie i F8 arcoiris 4 amp mimnizhamnr Ado s star b wert Gust itni ot amp togt i tagt b 4 Gros My Moz cum DI sdministranrs ha Jaar Oczernmrs h Lan P bisoers M ismb teo OTN 5e Y nsi s b ns dae moy SP oomen Anne b Toman Comoulors Y rt s RA Daman Guests b Soman Users M Srian sa dine fiu L paert Fig 3 97 User Manual 11 3 1 5 Step 1 Download files for AD server Suppose your AD server s IP address is 192 168 18 200 with login accouting using AD s administrator you will have the permission to open the network directory 192 168 18 200 netlogon Step 2 Copy adclient exe to the network directory Copy and paste the adclient exe to the network directory Please be noted that you must use AD s administrator to login to have this permission to copy the file into that directory Step 3 Configure AD login Group Policy At the AD server please run the dsa msc program The system will launch the Active Directory Users and Computers Right click on your domain eg test com and click the Properties L7 Networks Inc Chapter 11 Configure APP Content with AD Single Sign On Install the
129. pp Policy Functions Content Manager App Policy policy Policy wo Eee T Status Rule Name Sre Step 3 Apply schedules to listed Select the WorkingHours item in the Schedule listbox to apply the selected schedule to all listed policy rules You can also select the item in each policy rule Action Security Profile Allow Schedule i9 Always 3 Always Protocol Pipe l default pipe BITTORRENT R Ez orrent Bitcomet uTorrent Bits Me Allow e default_pipe EDONKEY Rule amp nkey Overnet eMule Vagaa Allow El default pipe e default pipe WUNLEI Rule 1 ifFlashG et D S Lite WINNY_Rule_1 Allow T T puse a 2t P2P ezPeerPlus Allow l default pipe Allow a default_pipe amp default pipe el default_pipe l default_pipe el default pipe amp default pipe el default_pipe amp default pipe a default_pipe l default_pipe a default_pipe l default_pipe e default_pipe Ge P F asttrack Kazaa Grokster ittesh E P2P Gnutella F oxy ezP eer Bearshare Gnucleus FASTTRACK R GNUTELLA Rul Allow KURO Rule 1 ed P2P Kuro Allow DIRECTCONNE a P2P DirrectConnect DirectConnect DC Allow i P2P OpenF T Crazaa Kceasy Y P2P Ares OPENFT Rule 1 ta ARES Allow Allow SOULSEEK_Rul S Allow le Allows Allow Y P2P SoulSeek GOBOOGY_Rul amp KUGOO Rule 1 a
130. r Categories here Step 2Goto Web Web Profiles to add URL keyword groups into some permission level Step 3 Goto ContentPolicy to set some objectto the permission level Noted that keywords are partially matched against URLs For example keyword sex will matched http www sexy com Please setthe keywords with care Search keyword Search next 3 URL Keywords Categories 3 Audio Video i3 mp3 i music 3 song 3 sing 3 movie 3 mp3 i3 ra 3 wma wmv File Import File Export Range Enable URL Keyword Enable the URL keyword blocking Enable Enable blocking Disable If you want to browse some URL which has adventista URL Keywords keywords in the list your browsing will be String ic i E a stopped banner splas FIGURE 12 3 URL keyword filtering L7 Networks Inc 122 User Manual Chapter 12 Web Manager Step 6 Web Objects Functions gt Content Manager gt Web gt Global Policy gt Web Contents Check the Enable Object Blocking and s status t web Pro ies Global Policy select the objects to block in all incoming web amp websites amp Web Contents web Messages 5 Web Alen objects Enable Object Blocking Description Some web objects may be harmful to you ifthey contains malicious code However blocking these objects usually make most web page difficult to read Objects 4 Block ActiveX objects 4 B
131. r Status Check the current status of the CPU amp memory and the on off status of each software modules such as MySQL database apache web server and their installation directory Email Alerts Setup the email server and customized email alert contents FTP Backup Setup the FTP server for the mailer to backup the data to Scheduled Reports Setup the time receiver and format for the scheduled email report System Alerts Setup the severity level of the system alerts V NN ON Detailed configuration descriptions are listed below 14 2 Configuring the Management Server After you have installed the management server and rebooted the server there will be a small icon at the right bottom corder of the management server Please double click the icon Step 1 System Information Monitor gt Server Status 1 Management Console test In this page you can see the E EET CPU memory usagestatus of the management server You can also find the directory of fi Status g4 Alen h software modul Proectiest ro e each software module a A CPU utilization Memory utilization Disk utilization 1 92 GB free 0f19 9 GB O Functions G Monitor D EE ener Status 64 46 GB free of 100 GB H Account amp Levels f Users Service Status tA Emails rip Tool DataBase Server service on at TCP 3306 22 Alert Policy a Report HTTP Server Service on at TCP 80 LE Disk Marr t m Log Server Service on at UDP 514 File
132. r nee ee ene re eee 41 6 2 MGEINOUOIOOY acc eet a ee A 42 6 3 A ERE uuu pub uUi MM 42 Chapter 7 Trafic ule T TITLED 47 7 1 lenem prm PP 47 7 2 Methodology am C RS 48 13 UCI S AE T E hate 49 Sucio ha uolo MEC ee nent acm ne nee een E e EA 51 8 1 WVtrOGUGCTION TO ADO IP ONC LE 51 8 2 veles MUR ONE TE Ee ee eee nee eee eee eee 51 8 3 We ThOGOIOG eec LT 51 8 4 SICDS sens M M HE 51 8 4 1 Setup IM Policy by App Policy RuU ES oooocccccccconcnocccononcnonoconancnnnocnnnncnnonononcnnnnnonanrnnnononanennnnss 52 8 4 2 oetup P2P policy by App Policy Rules occ 56 8 4 3 Setup VoIP policy by App Policy Rules ui De eiae nto gentes e aane cenae deno ue ora cc a exe nUES dace 59 8 4 4 Blocking VoIP Skype File Transfer nennen 61 Chapter 9 Address Schedule ODjectS ooccccoccccoconococononononononocnonononononononnnnnonannnonnrnnnncnononcncnnns 63 9 1 re 121 zione M A EE 63 9 2 MEDI e al 63 9 3 A USPS A A Se ee eee ee ee 63 9 3 1 Address Settings cm xit lesatsa to Sante eio n Rete Ot nsus interes inicia des assaeeededobencnaccoeaase thet 64 9 3 2 Schedule nn 66 Pato GContentManager ooo ceto ttu o A RE dad tutu Ltd Red diede detects 70 Chapter 10 Configure APP Content with WebLogQiN occccoccnccccnnccccnncconononocononanononaconnnannnnon
133. rgPerson accounts L Reset inetUngPerson passwords and force password change at ne Read all inetOrgPerson information C Create a custom task to delegate Back Cancel Fig 6 L7 Networks Inc 91 User Manual Click the Finish button to confirm that John IS authorized to control the computers to be added removed to the domain L7 Networks Inc Chapter 11 Configure APP Content with AD Single Sign On Delegation of Control Wizard 92 Completing the Delegation of Control Wizard You have successtully completed the Delegation of Control wizard ou chose to delegate control of objects In the following Active Directory Folder test com sers The groups users or computers to which you have given control are Jahn Jahncetest com ou chose to delegate the following tasks To close this wizard click Finish Cancel User Manual Chapter 1 1 Configure APP Content with AD Single Sign On 11 3 1 3 Make Windows 2000 XP 2003 Vista Windows7 PCs Login with newly added AD accounts to the AD domain Step 1 Setup network properties Internet HiX ICP IP Bt We use Windows XP as an example to show how to add itself into the new AD domain Other Windows systems are alike Please ao be noted that usually only Professional Server version of Windows have the feature Home versions cannot join the AD Bzh IP Hitt domain We start configuring this by FA FE IP Hiit 5
134. ror code XX XX Antivirus database engine restore has failed error code XX L7 Networks Inc 157 Product User Manual Appendix C mM Keep old license Don t need to update database and then respond the old MA SWID sm CamtcmmectdMaam S sw Cannotcomectiodeve SSS se Unable to lar dto Figaro sr Unmatnes atm versan O sra Software 1 was reetto al version o Sm Can noti actu SAL seme S FIGURE D 1 ID for each system log L7 Networks Inc 158
135. rs on the network and to quantify and analyze the traffic they generate is an essential first step to capacity planning to subscriber demographics and service optimization Without granular visibility into network traffic you are simply working blind Step 1 Monitor the network Function Monitor Realtime Double click the Protocol in the Traffic i summary 8 App View g4 iP view 8 User View f amp Policy View f amp Pipe View Discovery area you can easily track the network connections passing through the device Connections marked in red are non e en en we Ceres le mena ame Coum Foi Bema Pot Pe n oa in Ou m Ou tunnelled traffic That kind of traffic will be W oplications 734 95 3 56 G 4 897 4046 135M 14 57M H Chat 114 22 1121K 2273 198 Ob Ob blocked once you enable the IM Manager d i Enterprise 25 41K102 69 266 1130 0b 0b ki dhcp 300B 300B 1 1 Ob Ob 9 dns 2512K 1086K 265 265 0b 44 snmp 0B 9154K 0 864 0b a es FileTransfer 7041M 3 39G 4 825 3 842 0b Note The stand ports for IM are q AL OLIO eS I MSN 1863 H B Legacy 10 318 83 267 92 1 000 755 536 b cag P2P 73 26 77M160 05 58 021 126 169 1 35M 14 57 M d bittorrent 46 26 74M159 98 57 419 124 577 135M 14 57 M Yahoo 5050 c6 192 168 18 48 Eric 46 26 74M159 98 57 419 124 577 1 35M 14 57 M ME TCP 155087mp 128 39 165 17229688 4 unli 1 258M 267M 27 817 25975 11M82284 AIM ICQ 5190 ir UDP 136552m 31 1
136. rule for the AD user John as shown in Fig 2 It is the same for AD groups Fill in the AD group name in the Name field 11 3 2 4 Step 1 Click AD Import At the bottom of the Content Policy there is a AD Book Import Click it to import the AD accounts or AD groups Chapter 11 Configure APP Content with AD Single Sign On Edit user Schedule Always Y Virtual Group Others y Basic Rule name rule 1 The Name field couid be 4D account AD group or Web Login account Name IM MSG Rec Enable Disable File Rec O Enable Yanoo Account Allove v Disable MSN Account AOL Account Allow v ICO Account Allow v i IM Service Platinum Web URL Rec Enable C Disable Web POST Allow Web Service Gold LCcndpneon Pladur Platinur Vitia Guias Defaull User DefacitL ser Platinum Platinum Mhers Import all AD accounts from Dynamic Objects Functions gt Content Manager gt Content Policy gt Policy L7 Networks Inc 106 User Manual Step 3 Select AD accounts The pop up window allows you to select preferred AD accounts or AD groups as shown in Fig 1 After you select the items and click the OK button you can see all selected users and groups are imported as shown in Fig 2 L7 Networks Inc Chapter 11 Configure APP Content with AD Single Sign On a llus fs luly t Acer La malo Frofir Seared Iu 7rcup
137. rules Step 1 Import web login Functions gt Content Manager gt Content Policy gt Policy users We can import previously added web login user account names by clicking the AD Book Import Select those users you want to import and press OK to proceed L7 Networks Inc 76 User Manual L7 Networks Inc Chapter 10 Configure APP Content with WebLogin SEEEEMEXELSSLLLLLLOS SES ES Stulus P Pelie ga Artoa ist vinaal Group Sherer apot Sthadule SZ tihe socounts and neus NO om dos p X B mo Schedule pies wab Prenis Viduel Groups PS Accounts SN 1 ERES RES b eiia ge ls F Avars Si f x Pistrien Omara i amp rovl ruct amp shzoverg shscoeng Piarum amp tharsyun danger Pistrun Aways En Groups Pistrun EB Auges f Status Gb Policy f Actor List vitusi Groupe v f IMProfie w aah Pro e Aoply Schecuia Hal Croup x IK Profle w ad Profila wv bisli mo ias Cordtior actor Sthadule Rule kame Nene iki Profie Web Profe Virtual Groupe pm nie RI F Platinium Piatinury DA Ej Array Deal altar Platinurn Platinury e Cars EX Ermen Yay rmn cs OF aways angan i zair Platinum Platioury Chars 17 User Manual Chapter 11 Configure APP Content with AD Single Sign On Chapter 11 Configure APP Content with AD Single Sign On This chapter introduces how AD single sign on gets users identity for APP Content policy 1
138. s Psslocic Delete pelicy Stans 1 Palce f Actor Descriston Bassoons ara p Over mannan eth the poles Oriythe let max he anliy takas effects Stet s Candition Puls Nome Action Time Cuida roy 13 User Manual Step 3 Input account names At employees PCs when they open a browser and connect to somewhere their browsers will be redfirected to the Web Login page Employees are required to ask for user names and passwords from IT managers to login to the network 10 3 2 10 3 2 1 Step 1 Add Web Login accounts In Dynamie Objects add the accounts that are needed to authenticate such as shaopeng zhangxun gejia root Fig 1 We can also group the above accounts into a group such RD Fig 2 Upload the configuration L7 Networks Inc Chapter 10 Configure APP Content with WebLogin Authentication Login JSe marme zhangxun Match rules using Web Login account names Assign Web Login account names in App Policy rules Functions Dynamic Dynamic Objects Jvnamic Objects F3 Accounts gejia gejia amp root root shaopeng shaopeng amp zhangxun zhangxun A Groups Fig 1 Functions Dynamic Dynamic Groups 74 User Manual Chapter 10 Configure APP Content with WebLogin Dynamic Objects E Dynamic Groups Jescription Dynamic groups consist of dynamic objects Most rules can u Add Dynamic Group This is Group Editor Please enter your Gr
139. sem reno retro Rebootrgthesysiem sees ayaresetconinow Restore setings 1o ory des O resepe oysresetpasswd Chenga me password L7 Networks Inc 152 Product User Manual Appendix A FIGURE A 8 Priviledged mode in Emervency CLI L7 Networks Inc 153 Product User Manual Appendix B Appendix B Troubleshooting 1 Why can t use MSN or Yahoo Messengers after enabling the IM Manager Ans Since enabling the IM Manager will automatically filters non standard IM traffic through non standard ports your IM traffic may not get through the product A Goto Report gt App Policy to check if the logs contain any blocking of MSN B If your organization uses proxies through port 80 you should enable Encapsulation Manager to manage IM traffic over SOCKS HTTP Proxy Otherwise you should manually setup each client PC to not use proxy in their MSN settings C If you don t want to start the Encapsulation Manager neither changing the settings of each client PC you should at least open the outbound port 1863 for MSN or 5050 for Yahoo Messenger or 5190 for AOL ICQ in your firewall settings 2 How to upgrade the firmware Ans Contact your dealers to get the newest firmware Enter the command ip tftp upgrade image filename bin x x x x As for how to setup a tftp server please check the manual 3 Why my management server cannot receive any logs Ans Please follow the steps below to check Step 1 Have you config sys
140. t models is different When you first use the product enter the CLI to check the order of the interfaces In priviledge mode enter ip show to lookup the numbering of the interface and the function of the interface Default mema External MGT HA Managsment ENG FIGURE 1 2 Related System Defaults L7 Networks Inc 5 User Manual Chapter 1 Product Overview Management Client connects to the Device directly FIGURE 1 3 2 Tier Architecture L7 Networks Inc 6 User Manual Chapter 1 Product Overview ADSL Router RSS de t DMZ Management Client MN E connects to the nd Management Server and then connect to the Device Firewall Router FIGURE 1 3 3 Tier Architecture 1 5 Setup IP amp Routes 1 5 1 Users are in the same networks as Firewall LAN If users are in the same network as Firewall LAN interface the situation is the simplest PCs gateway are assigned to the Firewall s LAN interface for example 192 168 1 254 L7 Networks Inc 7 User Manual Chapter 1 Product Overview Gateway 192 168 1 254 24 192 168 1 199 24 dos Switch 192 168 1 X 192 168 1 X 192 168 1 X IA A Client User 192 168 1 10 24 Gateway 192 168 1 254 The device is connected between the core switch and the firewall Label A indicates that the bridge IP should be set in the network of the Firewall Switch segment say 192 168 1 251 Label B in the figure indicates the management IP of the device say 19
141. telnet to remotely configure or query the device CLI is necessary when you setup network addresses and the 2 3 tier architecture It also helps you to reset back to factory defaults or shutting down the system We arrange all supported CLI commands as follows A 1 CLI Commands Non Priviledged Mode When you connect to the product by console telnet SSH you need to use CLI commands to setup the product The default login user name and password pair is admin admin Non privileged mode Main m 9 uwaMeRm enabie en emi EmbeWeniedgdmod ww O m ERmeQd Ss tens ap ip ping 202 11 22 33 Diagnose the network by ping ip traceroute 202 11 22 33 Diagnose the network by traceroute A version ver Show the firmware pattern urldb version FIGURE A 1 Non Priviledged Mode AN Note If you don t know the parameters of a command you can type anytime after your current command For example type ip will list all possible parameters following the ip command L7 Networks Inc 150 Product User Manual Appendix A Privileged mode DENEN Sending ICMP for network debugging EE Setting up network addresses BEEN Display all network settings ip tftp upgrade image FILENAME Upgrade firmware by the tftp protocol 192 168 168 170 ip traceroute 202 11 22 33 sys date O TA EN AAA AA sys version Display system firmware patter versions Sys resetconf now Resetting the configuration The
142. th During your dragging of the line the exact number of the 5 Root 100 100 Mos ae Se bandwidth will show up in the left fields Ej default pipe 100 0 100 0 MH A High 50 0 50 0 Mb s A Middle 18 0 18 0 Mb s eN Low 32 0 32 0 Mbis L7 Networks Inc 49 User Manual Step 3 Setup inbound traffic Input 100 at the Inbound Traffic field and then drag and drop the mouse for the bandwidth partitioning line You can drag it to allow High to occupy 5096 of the total bandwidth Middle to occupy 18 of the total bandwidth and Low to occupy 3296 of the total bandwidth During your dragging of the line the exact number of the bandwidth will show up in the left fields Step 4 Enable App Policy Please check if the App Policy is enabled as in FigureFIGURE 7 1 and FIGURE 7 2 After that change the traffic profile of the FTP service to Middle and Allow in the security profile Step 5 Upload config Check the Upload Configuration item or click the icon to upload the current configuration to the device L7 Networks Inc Chapter 7 Traffic Manager Functions Traffic Manager QoS Policy Step1 Define the default link sharing tree E Step2 Create scheduled pipe policies from the default tree Description Right clicking the tree node allows you to create children Children can be setto borrow bandwidth from its parent node Note Any existing Pipe Policy will disallow you to edit the default tree h
143. the account name and its password and then press the Add button the account will then be added into the system Upload the configuration You can also use remote authentication with POP3 s IMAP s RADIUS LDAP servers Below are parameters for each authentication method Chapter 10 Configure APP Content with WebLogin Add Web Login user names and password Functions Object Manager Web Login Action Local r Stalus Policy F3 Action f Auth Server f Custom Pages 5 Remote E Local Description ifthe vweb login user rame does nol exists in ibe remole suthierticston server the system will lookup local Account shaopeng ront admin zhancxcur gejis Pop3 s server IP address 1 1 Pop3 s port number Usually POP3 is 110 and POPSS is 995 110 SSL is a stand encryption protocol POP3 s SSL version is call POP3S Disable yP IMAP s SSL version is called IMAPS IMAP s server IP address Pop3 s port number Usually POP3 is 143 and POP3S is 993 993 Eras SSL is a stand encryption protocol POP3 s SSL version is call POP3S yP IMAP s SSL version is called IMAPS Radius Fields LDAP server IP address 10 1 1 11 L7 Networks Inc User Manual 10 3 1 3 Step 1 Add Static Object BOSS Since the BOSS is not required to authenticate we first setup his her IP address in the static object Right click on any icon in this page and select Add a new host Fill in his h
144. tion Language pack installation Ta display language characters correctly you need to install the following lanquage pack Chinese Traditional Never install any language packs Install Cancel FIGURE 3 1 Language pack installation screen v Hard disk space at least 80GB available space but we strongly suggest to have 120GB available space v CPU at least Pentium 4 v Memory at least 256MB but we strongly suggest to at least have 512MB v f your operating system is Windows XP service pack 2 with built in Firewall enabled you must follow the steps below to open the ports UDP 514 TCP 1080 and TCP 3306 In this way all packets from or to the management server will not be blocked 5 Goto Start gt Settings gt Network Connection 6 Right click the Local Area Network and select Content 7 Goto Advance gt Settings gt Exception and click the Connection Ports 8 Enter the name and the port number to allow the following network ports Database Server 3306 TCP HTTP Server 80 TCP FIGURE 3 1 Firewall settings of management server 3 2 2 Procedures Install the Management Server Install the AD Log Server Upgraing the Management Server 9 Browsing the CD 10 Uninstall Management Server 11 Uninstall AD Log Server 12 Exitthe Installation pe ow 2 L7 Networks Inc 15 User Manual Chapter 3 3 tier Architecture Management Server Installation 2 2 T Setup Management Server Aetworks m SOCO Ar
145. tmarks IS Leer lt c ee r93 p c Upgrade Browse CD Uninstall All InstantScan Uninstall AD Log Server Exit Figure 3 2 Management server software installation user interface AN Note 1 When you reinstall or upgrade your management server please remember to reboot your computer Only after you reboot the system can the system work properly Detailed installation guide are shown in the QIG or User Manual 2 Ifyou have already installed any version of MySQL or Apache you must uninstall MySQL and Apache before you start to install the management server Please check Appendix for more details 3 2 3 Installing Java Runtime After you have installed the management server and plug in the wire you can use web browser to connect to the management server by inputting htip lt management server IP address gt When you first connect to the device the software will check if your browser is able to run Java programs If not a Java Plug in will pop up to remind you to install the Java runtime virtual machine onto your client system A Note When you first time connect to the management server due to the size of the java runtime the client must wait to download and install the Java Plug In program Please be patient 3 3 Configuring Product Before you start to manage the product please use the RS 232 console to connect your PC to the device You can also use SSH Telnet or other terminal program to change the system
146. to back the data every day at 15 00 L7 Networks Inc 133 User Manual Chapter 14 Mangement Server Maintainence Step 5 Choose Backup Type Monitor Server Status In the Backup Type area choose your preferred style of backup When you want to restore your data please click the Get Bakup List button and select the directory of the FTP server where the backup file is located Click the Restore to start restoring the data Step 6 FTP Server settings Monitor Server Status Check the Edit to start editing related settings Input X5 the IP address account and password of the FTP server Check the PSV if you want to use passive mode FTP Click the Test to test the connectivity of the FTP server Check the Save button to store related options As said in the above you can choose to back the log at 3 00 PM everyday The system will auto backup the log at that time All backup directory will be named by the date Step 7 Reporting system Monitor Server Status Check the Edit button to start editing related settings Select the the period to send the report daily weekly monthly Check the format you want to receive PDF HTML Excel and which devices you want to know Input the email address of the receiver and click the Save button to save all your inputs Note before you setup the report center please make sure that you have chosen the report items Otherwise you may get an empty report Step 8 Syslog record M
147. ts gt Dynamic Objects names Import all accounts names from the AD server to the UI for management Refer to previous sections about how to L7 Networks Inc 103 User Manual fill in the User DN and the Base DN fields After importing all AD accounts will be listed in the Accounts while all AD groups will be listed in the Group as Fig 1 shows 11 3 2 2 Step 1 Assign AD users in L4 Policy Rules Right click on the rule field and select Add to insert a new rule Select the preferred AD user from the Internal IP and the External IP fields Step 2 Assign AD users in L7 Policy Rules Right click on one of the L7 Policy rules select Insert to insert a rule before the chosen rule Select the AD users in the Internal IP and the External IP fields L7 Networks Inc Chapter 11 Configure APP Content with AD Single Sign On _ Sa D ym vc breeds P Umam Gaps 209 4 ilian Mosirules con se p n of mua 5 cod noe enicice He poto Accounts come Tom 1 Ni uais Harz nj fuerte val aminas in Rd ge mr plbilt E b mime im vui ihe imn a hn 2 cero are mdrecte Y he wee gr Sage ate amp e Ace toleline sees with IP he atcouIbeanzs m G wps comz f zm 1 Nis users luz nr eren val mcum inde Lyr m plio iH Fre cem ce sse ite cn bie tu dp na libera 53A nreourts b dmviztranr Ad inzt ato b Suns ol amp J2 ni 0h b ctr ati amp 0 RD 5 Gro pa SP Boru Demo mrlziraore laicas DX HIN
148. u first read the overview in Active Directory Help To continue click Hert Since it is the first domain controller we choose the first option DC for a new domain Click the Next button to proceed Fig 2 Cancel Fig 1 Active Directory Installation Wizard E Domain Controller Type Specify the rale you want this server to have Do you want this server to become a domain controller for a new domain or an additional domain controller For an existing domain Select this option to create a new child domain new domain tree or new forest This server will become the first domain controller in the new domain C Additional domain controller for an existing domain ity Proceeding with this option will delete all local accounts on this server All cryptographic keys will be deleted and should be exported before continuing All encrypted data such as EFS encrypted files or e mail should be decrypted before continuing ar iE will be permanently inaccessible Back Cancel Fig 2 L7 Networks Inc 80 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On Since it is a new domain in a new forest we choose the first option as shown in Fig 3 Create New Domain Select which type of domain to create Active Directory Installation Wizard Create a new Domain in a new forest Ing M Ecc IM Select this option if this i the first domain in your organization or IF yo
149. u want the new domain to be completely independent of your current forest C Child domain in an existing domain tree IF you want the new domain to be a child of an existing domain select this option For example pou could create a new domain named headquarters example microsoft com as a child domain of the domain example microsoft com C Domain tree in an existing forest IF you don t want the new domain to be a child of an existing domain select this option This will create a new domain tree that is separate from any existing trees Back Cancel Fig 3 Next we need to assign a domain For example we assign test com as our New Domain Name domain name Fig 4 Specify a name for the new domain Active Directory Installation Wizard Type the full DNS name for the new domain for example headquarters example microsoft carm Full DAS name for new domain Back Lancel Fig 4 L7 Networks Inc 81 User Manual Chapter 1 1 Configure APP Content with AD Single Sign On Then enter your NetBIOS Po E name for example by default it gives a TEST as shown in NetBIOS Domain Name Fig 5 Please be noted that the Specity a MetBILIS name for the new domain name should never conflict with PC clients in the same m m domain Namely there This is the name that users of earlier versionis of Windows will use to identify the new should never be 3 PC client domain Click Nest to acc
150. ual Chapter 13 Encryption Web Manager 13 4 Steps Step 1 Enable Encryption Web Recorder Functions gt Encryption Recorder gt Web gt Status Check the Enable Encryption Web Recorder to 55m vus Freitas 28 Cinal les enable the SSL decryption over https ATTE F Crate fa Wer ayer stp yen Matye Eoo CU Oo oer unes alee dorngllie ulice lous inne Cesinaioy 1 nde Exempl Sunes mece GF Hosibev w trom the eet ttle enren 1 reud BE HITA Inthe sen filz entres Step 2 Define exempt sources You can define the IP range to apply the web filter function By default the function will apply on all computers You can include specific traffic into this manager or exclude specific traffic from this manager Select Boss in the Exclude to Exclude Boss from web filter enforcement Enable Exempt AME Enable the exempt source function Enable Disable Exclude the selected users to apply the Exclude fromthe web filtering functions All other Enable Disable Enabled Bess web filter enforcement computers are enforced to do web filtering Include the selected users to apply the Include inthe web web filtering functions All other l Enable Disable Disable filter enforcement computers are not enforced to do web filtering FIGURE 13 1 Exempt source fields L7 Networks Inc 125 User Manual Step 3 Define Web Profiles Edit the profile you want to apply to the users I Web Profil i Right click at the row you
151. up Project information Name Project 1 Selected Devices All Devices Group 1 Device 1 amp Devices Group 1 Device 2 ta Group_1 em Device 1 em Device 2 L7 Networks Inc 23 User Manual Chapter 3 3 tier Architecture Group Mode Step 1 Creat a group mode project File gt New Project Select Group as the project mode This mode is New Project suiFigure for someone who buys several device and puts them in different network edges Enter TOM ERAN pe the project name and select devices from the ON right column Click the lt lt to move the device Enter the name of this project New a group device by right click the objects from right to left lf you want to remove some Select the devices into the project devices from the current project select the device in the left column and click the gt gt button Select Mode Click the OK button to finish the settings o Genera e Grow gt rProject information Name Project 1 rSelected Devices 1 p Devices Group 1 Device 1 L4 Devices iGroup 1 Device 2 E ta Group_1 em Device 1 em Device 2 Step 2 Choose the base device File gt New Project gt Next Step Select a device as your Base Device When you Group Project Setting select the base device all other devices in this group will refer to the configuration of the base Specify Group project settings device Moreover
152. ve setup the rules for the VolP Now we need to adjust the policy Click the VoIP Skype File Transfer and select the SubnetRD option and then select the Block at the security profile field L7 Networks Inc amp Objects W HostCEO W HostCFO B HostCMO m HostCTO W HostChairman W HostPresident W HostviceChairman W HostvicePresident W ServerFTP Bi ServerHTTP W ServerMYSQL M ServerSQL SubnetADM Wi SubnetFINANCE WM SubnetMANUFACTURE SubnetMARKETING W SubnetPGA SubnetRD m Ex Functions Content Manager Object Manager Address Objects Edit IP Address object Functions gt Content Manager gt App Policy Status Policy List 5 VoIP M Protocol y Apply Schedule Security y Traffic M to listed Status Condition Action Schedule Rule Name Dst Protocol Security Profile Pipe Sre Boss any Allow cri Working SKYPEFILE Rul T any E any BS volP Skype EM VolP Skype File Transfer A Working SKYPE_Rule_1 SKYPEQUT_Rul 4 Boss E vorP SkypeDut Allow E Low el Low BIP Rule 1 e bos e any T VoIP SIP MSN Voice Yahoo VoiceMWagaley Te Block amp log amp Low H323 Rule 1 e Boss SP any E VolP H323 NetMeeting Block amp log L i u el Low E 1 MOIPBUSTER_R Boss E any KQ VoIP VoIPBuster O Block log e Low 6
153. w1Icsccultz a poyddzd opn acpi al he dedice vhi 5 I tho acro mbe on w I Jzersamrzdtzcediz te vebio inpaze ciths dz t z Iz 1zl pe ze ce whith the arcoirl eng Y b 2 ps coms tory 1 Xl r oaa ng n ALL hwslim m EE mo til wprirded ugninp el nia vei dte isum nns n Sy eman sanalar Y Soman Guests 4 eman ses Ke pr Anne bb wcup Polo 2 zatzr Oxer he AA 5 ncomngFo zzI Trust 3u hor CON ey akt in Patri Ds wees SA Potomac L29g 56 2 mars Won AAA be Pre and 2007 Czmpztizle acces E ad pa ator MP RE ad E Sewers LX ba demus Cesckp Users b picador Ke oce s Nimm s LA 3er Overs A eno foedum License Leto LA Jem A RA Zn L7 Networks Inc 109 User Manual Step 4 Setup policy rules for office hours Enable the L7 Policy and select Chat gt MSN and select the Worktime in the Schedule field and select the RDGROUP in the Internal IP field Finally select the Block or Block amp Log in the Security Profile field Step 5 Setup policy rules for Non office hours 5 1 Enable IM Manager Select the Enable IM Manager and select the Allow IM over Proxy Servers filter the IM inside the proxy 5 2 Enable keyword Click the Enable keyword filtering and choose your preferred keywords in the default settings You can add your keywords by yourself with right click on the field L7 Networks Inc Chapter 11 Configure APP Content with AD Single Sign On Functions Traffic Manager L7 Poli
154. x will matched http www sexy com Please set the keywords with care Search keyword Search next 5 URL Keywords Categories 5 Audio Video mp3 music song sing movie mp3 ra wma 3 c i ua x a m P Lal a Lal a E E x ua X La AZP File Import p File Export me Range Enable URL Keyword Enable the URL keyword blocking Enable l Enable blocking Disable If you want to browse some URL which has Adv advertise adsrv URL Keywords keywords in the list your browsing will be String neh stopped banner splas FIGURE 13 3 URL keyword filtering L7 Networks Inc 128 User Manual 0 Enable Keyword Blocking Enable URL keyword blocking Enable Disable adv advertise Keywords Input the keyword that may appear in the URL Keyword pattern adsrv banner splash FIGURE 13 4 URL keyword blocking fields L7 Networks Inc 129 User Manual L7 Networks Inc 130 System Maintainence User Manual Chapter 14 Mangement Server Maintainence Chapter 14 Mangement Server Maintainence This chapter introduces how to use mailer to achieve auto system maintainence amp alerts 14 1 Introduction to Management Server Management server is a software to do centralized configuration mangement and log server of many devices lt can be a standalone installation on a Windows based machine or a built in server software module of the gateway product gt Serve
155. y order top down first match r Static Exempt Source Destination 4 Enable Exempt Sources Exclude amp Bypass from App policy Dynamic Exempt Source Destination Enable Exempt Sources Exclude amp P any from App policy r Default Traffic Pipe Put unmatched trafficinto l default pipe Step 2 List the Chat Group Function Management App Policy policy Select the List Chat in the search toolbar to Status Policy list all rules regarding to the rules in Chat Apply Schedule w L Securty w Tratic to listed group Li Condition Action Protocol Security Prafile Pipe 4 web HTTP Allow El High KS Web Http Download zip rar exe isoAvumwv rmwbAwu S Allow l High Web Http Video flv mpd sf Allow e High T T ee E any 2 Web Http Proxwhttps proxify com https Awuw s He Allow l High SMTP_Rule_1 E any IS Email SMTP Allow El High POP3 Rule 4 E any amp SS Email POP3 Allow El High IMAP Rule 1 2 any E 43 Email IMAP Allow l High FTP Rule 1 any any FileTranster FTP 2 Allow eS Middle SKYPE_Rule_1 EZ any E amp voip skype Allow SKYPEFILE_Rul 52 any T VMoIP Skype File Transfer Allow SKYPEOUT_Rul E any C volP StypeDut Allow a SIP_Rule_1 E any VoIP SIP MSN Voice Yahoo Voic
Download Pdf Manuals
Related Search
Related Contents
SP5700 User's Guide.fm GUIA TDT Planning Guidelines - SUNNY TRIPOWER 60 Manual Instalación Wallboard Sanyo Twicell HR-4U User's Manual 最高級品 最高級品 セール期間 2011年2月20日まで 高級品 Samsung 32" HD Flat Smart TV J4303 Series 4 คู่มือการใช้งาน Epson Stylus Photo R800 Operating Instructions - GMC Copyright © All rights reserved.
Failed to retrieve file