Home

User Manual: Mako 7550

image

Contents

1. Mako Networks Mako 7550 E Product Handbook v 1 1 Page 39 Mako For your business Configure gt Firewall gt Inbound gt Advanced Home Firewall Selection Inbound Reports Advanced Configure gt The default rules allow no incoming traffic to ensure maximum network security Management We recommend caution when modifying these settings Please consult the Operations Manual before proceeding with Help Docs ies ERY Feedback Logout V ae Trace firewall connections Existing Inbound Rules Lan 1 192 168 1 0 24 Source Target IP Internal IP External Service Internal Service Comments Option No inbound rules found for this network Existing Inbound Rules Lan 2 192 168 2 0 24 Source Target IP Internal IP External Service internal Comments Option Service Sending and any 210 54 118 0 192 168 2 3 e eceiving Email SMTP Q_ 210 54 118 198 32 210 54 118 6 192 168 2 45 TCP 51443 TCP 51443 O A t Existing Inbound Rules Lan 3 192 168 3 0 24 Source Target IP Internal IP External Service Internal Service Comments Option No inbound rules found for this network Existing Inbound Rules Lan 4 192 168 4 0 24 Source Target IP Internal IP External Service Internal Service Comments Option No inbound rules found for this network Advanced Inbound Firewall Rules Note that the option of declaring IP addresses as any has been selected to allow any Internet based host to open communications with the
2. For period 2006 01 20 to 2006 02 19 Last Cycle Usage 400 350 300 250 Megabytes Mb 8 910111213141516171819 2021 2223 24 25 26 27 28 293031 lees EOL F Day Bin Bout Report Information Total Megabyte Usage in 3727 42 MB Total Megabyte Usage out 2183 16 MB Total Megabyte Used 5910 58 MB Daily Average for this period 190 66 MB Close Window Mako Report Last Cycle Usage Mako Networks Mako 7550 E Product Handbook v 1 1 Page 15 Mako For your business im oP Mako Networks Usage report for period 2006 01 20 to 2006 02 19 Cumulative Usage 2021 2223 2425262728 2930311 2345 6 7 8 910111213141516171819 Day Your Usage E Plan Free Usage M Warning Threshold M Absolute Threshold Report Information Total Usage in 3727 42 MB Total Usage out 2183 16 MB Total Used 5910 58 MB Daily Average for this period 190 66 ISP Plan JetStream 5000 ISP Plan free usage 5000 MB WARNING Free usage exceeded Overlimit by 910 58 MB Note Your absolute threshold of 7500 MB is only displayed when your cumulative usage exceeds either your ISP plans usage or your warning threshold Close Window Mako Report Last Billing Cycle PC Usage The PC Usage Reports focus on the composition of your traffic volume The entry screen to this section is shown below Mako For vour business Reports gt Usage gt PC Usage Home Mako MailGuard Licences Selection Mako Usage Remote Access M
3. Head Office Events Displaying 20 A events Date Event Type 2006 04 15 15 14 21 Ethernet Configuration changed 2006 04 15 14 47 56 QoS changed 2006 04 15 12 37 23 Internet Configuration changed 2006 04 15 12 37 08 Internet Configuration changed 2006 04 15 12 36 59 Internet Configuration changed 2006 04 15 07 46 24 WPN Modified 2006 04 15 07 10 01 Content Filter Lists changed 2006 04 15 07 07 38 Content Filter Lists changed 2006 04 15 07 04 28 WPN Addition 2006 04 15 06 57 09 Firewall rule added 2006 04 13 04 04 34 VPN Deletion 2006 04 12 18 32 20 Content Filter Lists changed 2006 04 12 18 31 10 Content Filter Lists changed Reports Status Reports Mako MailGuard This tab is one way to access your Mako MailGuard console If you do not subscribe to this service then this tab will not appear on your screen Instructions on how to use the Mako MailGuard console appears in separate documentation Reports Licence Information The Licence Information screen allows you to keep track of your current Mako licences as well as add them when required Mako Networks Mako 7550 E Product Handbook v 1 1 Page 26 Configure The configure section provides comprehensive options to update nearly every aspect of the Mako device The default settings as shipped should be correct for your network However over time new capabilities are often required Your reseller can advise on the changes that are appropriate as your requirements change Please
4. a public IP address You may also change the Subnet Mask address Please note that each network should be given a unique address schema if VPN communications are to be configured Mako Networks Mako 7550 E Product Handbook v 1 1 Page 31 Lan 2 3 and 4 Mako For your business Configure gt Network gt Lan 2 Home Internet_ Network Selection Lan 1 Lan 2 DHCP Leases Reports METAS PTI ERS We recommend caution when modifying these settings Please consult the Operations Manual before Configure proceeding with any changes Management Lan 2 Network Configuration Help Docs p Lan 2 Name Lan2 Feedback Allow Ping Allow Deny Logout z Ed Mako Ethernet IP Address 192 168 2 25 Subnet Mask 255 255 255 0 NAT On O Off DHCP y On Off DHCP Lease Pool Start IP Inclusive DHCP Lease Pool End IP Inclusive WINS Server IP Optional 4 Primary Internal DNS Server Secondary Internal DNS Server Save Network Lan 2 Configuration You may rename your network from Lan 2 or 3 or 4 to a more meaningful name such as DMZ if desired The Mako device must be given a fixed IP address on your network You may also change the Subnet Mask address The configuration is the same as for LAN 1 with the exception of being able to turn off Network Address Translation NAT if you have been issued with a public IP network by your ISP and you wish to use this
5. SharkNet IDS IDS stands for Intrusion Detection Service SharkNet IDS shows you what traffic has been blocked by the Firewall in your Mako device Mako For your business A Uv Repo rts gt Usage gt SharkNet IDS Home Usage Mako MailGuard Sd Selection Mako Usage Mako Guardian Usage SharkNet IDS Configure These reports are pulled from a live database and are built in real time Please be patient as some of these Management reports will not appear instantly Help Logout Blocked Instrusions Today Services Sources Countries Yesterday Services Sources Countries Last five days Services Sources Countries Last fourteen days Services Sources Countries Current Billing Cycle Services Sources Countries 2006 03 20 Today Last Billing Cycle Services Sources Countries 2006 02 20 2006 03 19 e From D to 47 SharkNet IDS SharkNet IDS lets you analyse what type of traffic is being blocked from entering your network where is is coming from and how dangerous it is Ma ko For your business r Mako Networks Usage Report For period 2006 03 13 to 2006 03 13 Yesterdays Blocked Intrusions Drops a R a la la La C1234 5 6 7 B 9 1011 121314 15 16 17 Hour 18 19 20 21 22 23 E Microsoft Domain Service TCP MuUDP1026 PM Others Virtual Private Network TCP 139 E Reserved F ICMP8 TCP
6. User their password if they have forgotten it Reset the Password which will generate a new password and email it to the User or Suspend the User which makes them unable to log into the system This is useful for contractors or occasional Users If you wish to change the Username the User has to log into the system you may also action this from this page Event Log The Event Log is a history of all recent changes that have been made to the selected User a EIA A MnEPanIIiSs Configure Status report for Bob Smith Events Displaying 20 events Date Event Type Help User Event Log Mako Networks Mako 7550 E Product Handbook v 1 1 Page 64 New User From here you can add a new User to your Company and grant them access to all or some of your Company s Makos Ma ko For your business Management gt User gt New User Home User Selection Search r Manage Bob Smith Reports Configure Click add to save the user User Information s nep Title mr E Logout First Name Last Name Username Email Type of User Select P G Customer XYZ and its Makos Control over dh One or more Makos for Customer XYZ User Address Address Suburb City State Postal Code Country New Zealand W Phone Number Fax Number n New User Fill in at least the fields marked with a red asterisk It is important that you correctly enter the Users
7. another person on the Internet Known as Email SSH Secure shell A special program providing a secure communications channel between SSH client and SSH server processes Switch An ethernet connectivity device similar to but more advanced than a Hub which partitions traffic between connected computers to lessen congestion Telnet A service which provides remote terminal login to a multi user host VPN Virtual Private Network A method of establishing one or more secure encrypted channels between selected Internet subscribers Web or World Wide Web The client server application which makes web sites available to Browsers Mako Networks Mako 7550 E Product Handbook v 1 1 Page 70
8. com A Dynamic DNS service allows you to have a fixed address on the Internet without the need for a static IP address Once you have an account with either of our two support Dynamic DNS providers they will give you a domain name The Mako will then update the provider with its current public IP address so the domain name references the correct address This way the domain name remains static and has the IP address it references updated automatically by the Mako System To sign up to one of these services follow the instructions and documentation on the providers website You will receive a Username and Password from your Dynamic DNS provider Enter this information in the appropriate section on the Mako Networks Dynamic DNS screen Once entered each time your Mako changes public IP address it will update your Dynamic DNS provider Mako For your business Configure gt Services gt Dynamic DNS Home i Selection Mako MailGuard Dynamic DNS Reports Dynamic DNS providers allow you to have a domain that will always point to your Mako regardless of what IP it was assigned to by your ISP This is particulary useful for users Makos with Dynamic IP addresses who wish to run a server inside their network but don t want to continually check the website for the latest IP address Help You must have an account with a Dynamic DNS provider before configuring the below settings Management Logout Create Pr
9. email address as the randomly generated password will be sent to that email address You can choose the type of user to create and whether you want to grant access to all your Company s Makos or just some When you have completed this information click the Add button at the bottom of the page Mako Networks Mako 7550 E Product Handbook v 1 1 Page 65 Help Help Contacts This screen contains the technical contact details for your company and its IT Provider s Mako For your business Help gt Help Contacts Home Help Contacts Selection Reports Below are contact details you can use if you require assistance Quick Start Guides and User Manuals are also Configure available in the Documentation tab Management Support Information for Customer XYZ Help gt Customer XYZ Telephone 0818 1234567 Reseller ABC No contact information available Logout 2 Help Contacts Help Documentation This section contains downloadable PDF documentation on nearly every aspect of the Mako System as well as product literature Mako For your business Help gt Documentation E Home Help Contacts Documentation Selection The latest documentation is available for download in PDF format Reports Configure General Documentation Management Terms amp Conditions 15 KB Last updated 24 January 2005 1030 ISE Product Handbook 2 9 MB Last updated 15 March 2006
10. handle Pre Shared Key PSK assignment 3DES IPSec encryption and MDS CL s authentication ogout Once you have created the device you can then setup the VPN on the Mako to Mako VPN page Third Party Device Location Public 1P Address Metwork Address f Reset Add Add and Create VPN Add Third Party Device Type in the location of your non Mako router enter its public IP Address and provide the network details of the LAN behind it Then click Add and Create VPN This will take you back to the Mako to Mako VPN page The third party device will appear at the bottom of the right hand Mako list Select that device and you will see a screen like the one over page Mako Networks Mako 7550 E Product Handbook v 1 1 Page 50 Mako For your business gt TET Configure gt VPN gt Mako to Mako gt Manage Access Home Firewall Selection Mako to Mako Reports Manage Access Invitation Add Third Party Device Management yA Third Party Device successfully created Help Please enter the VPN details below Logout If you have more than one Mako you can create a secure connection over the Internet between them a Virtual Private Network VP s allow your various networks to see one another Mako to Mako VPNs Mako Network Traffic Direction Mako Network Option Head Office Lan 1 gt gt London Office Lan 1 gt Add VPN Mako Network PP a o gt Mako Network Head Office Lan 1 A O mm O Branch
11. may steal Internet access at the office s expense The firewall is not a substitute for effective virus protection which should be installed on all computers with Outbound access to the Internet and which must be kept up to date at no less than weekly intervals Intranet Mako 7550s have quad LAN ports and the Intranet firewall controls enable you to restrict or allow access between the four networks The default setting is to not allow any communication between the four networks VPN In addition to having control over inbound and outbound traffic your Mako enables you to have firewall control over your Mako to Mako VPNs To find out more about Mako to Mako VPNs please see the VPN section of this document Mako Networks Mako 7550 E Product Handbook v 1 1 Page 35 Once your Mako to Mako VPN is in place with Mako VPN Firewall controls you can control the flow of traffic from one securely connected remote network to another Considerations If you plan to change the default security setting of your firewall there are some things it is useful to be clear about in preparation for the changes Whether you are changing Inbound or Outbound firewall rules Associated with this is whether you are Denying or Allowing access The Service you wish to change access permissions for A Service such as email or web browsing is defined as a specific Protocol such as SMTP for email or HTTP for unsecured web browsing Each Protocol is uniquely di
12. outbound firewall controls First you must select your Mako to Mako VPN from the drop down list of Available VPNs Once you select which VPN you are wanting to Firewall the screen changes to give you control as depicted below The method for adding rules is the same as for Inbound and Outbound except that the Default rule for VPN remains at the bottom to remind you the basic setup of the tunnel Configure gt Firewall gt VPN gt Basic Home Network _ Firewall Selection VPN Reports Basic a QuE Left blank the Default rules will be selected Management Default rule is defined by the VPN direction during VPN creation Helo D User created rules are implemented before default VPN rule epa Rules are implemented from top to bottom by the Firewall Feedback Logout O Allow this traffic Deny this traffic A a Trace firewall connections Select a VPN to manage Available VPNs Lan 1 to Customer XYZ Branch Office Lan 1 5 Default rule for VPN Head Office DD Branch Office Existing Inbound Rules Source Destination Service Comments Action Option No user Inbound rules defined 192 168 5 0 24 192 168 1 0 24 Everything Policy default e Existing Outbound Rules Source Destination Service Comments Action Option No user Outbound rules defined 192 168 1 0 24 192 168 5 0 24 Everything Policy default 2 Add VPN Rule Source IP Address or select a network q 3 Destination IP A
13. site as they are sometimes off the air for various reasons of their own If web browsing services work then Internet access is functional and all other services should be available Possible problems and their symptoms Aproblem on the Internet circuit If you believe that the line is at fault please contact your Internet Service Provider Help Desk for status information on the circuit They will work in conjunction with the network service provider to resolve the problem e A faulty profile if the configuration profile of your unit has recently been changed Another possibility is that the network Gateway configuration of your office computers has been changed If you believe the problem is with the Mako then please contact your reseller who will be able to check the status of the unit and verify the profile Some computers on your office network can access the Internet others cannot Or perhaps some services work but others do not Both of these indicate a faulty configuration of the network and or computers in your office If you believe the problem is with the configuration of the network and or computers in your office then please contact your site support organisation Mako Networks Mako 7550 E Product Handbook v 1 1 Page 9 Login Open your Web browser and type http www makonetworks com into the Address or Location box depending on your browser software Click on Customer Login Mako For your business ef Mako
14. to the network service providers termination point or an Ethernet terminated Modem NTU Connect LAN Cables to your networks hub or switch DO NOT TURN YOUR MAKO ON AT THIS STAGE If this is the first time you are using your Mako place the supplied USB Key in any USB port at the front of your Mako If your Mako was not supplied with a USB Key you do not need one in your location and can skip this step Mako Networks Mako 7550 E Product Handbook v 1 1 Page 7 What will be needed There are a few special circumstances to be aware of HUB OR SWITCH PORT Your office network needs to have an RJ 45 connection Port available for the Mako If your network hardware does not have a spare 10 100 Ethernet Port available you will need to either upgrade your existing hardware to increase the available Ports or install an additional hub or switch DIRECT CONNECTION TO A COMPUTER Normally the Mako is connected between the WAN port and a hub or switch device on your office network If you are connecting directly to a computer you will not need to obtain an Ethernet crossover cable or equivalent device Your Mako 7550 E incorporates Auto Cross LAN Ethernet Ports POWER SUPPLY The Mako has an adaptive power supply which sets itself to match the supply voltage provided at your site Connecting to your Internet service Network Service Provider Internet services are provided by a variety of network service providers in each country In many cases
15. 1023 MTcrios0 MTcP135 MTcrisiis8 MTCP 1433 Close Window Blocked Intrusions for today This report shows how many drops the Firewall made over the day so far broken down by hour A key to the colours shows what type of traffic was dropped Mako Networks Mako 7550 E Product Handbook v 1 1 Page 23 Mako For your business Mako Networks Firewall Usage Report For period 2006 03 13 to 2006 03 13 Yesterdays Firewall Drops by Service Others TCP 445 TCP 445 M Others View the source of the blocked intrusions Port Type Exploit Rating Drops Microsoft Domain Service UDP 741 139 TCP 56 afICMP 45 Virtual Private Network 45 1433 TCP 38 1026 UBP 34 NetBIOS Session Service UDP 31 Firewall Drops by Service This report show the same days IDS Report but this time by service This depicts what type of traffic was dropped for the day so far Below the pie chart the services are listed in order of most dropped to least Some of the services have a number of skull and crossbones icons indicating the Exploit Rating of the service The more skull and crossbones icons the more dangerous the service that was dropped Mako Networks Mako 7550 E Product Handbook v 1 1 Page 24 Mako For your business Mako Networks Firewall Usage Report For period 2006 03 13 to 2006 03 13 Yesterdays Blocked Intrusions by Country United States Others Germany NA Russian Feder
16. 4 Source Destination Service Comments Action Option No rules found for Lan 3 Existing Rules Lan 4 192 168 4 0 24 Source Destination Service Comments Action Option No rules found for Lan 4 Add Intranet Rule Source IP Address Mask a Destination IP Address Mask a Service Type File Transfer Protocol FTP 21 B a Action Allow Deny Trace Logging Q Enable trace logging Comments Add Firewall Advanced Intranet Mako Networks Mako 7550 E Product Handbook v 1 1 Page 44 VPN VPN Firewalling enables you to control the flow of data across Mako to Mako VPNs and Third Party VPNs Normally once a VPN is created the traffic flows freely from network to network If you want to restrict access to the VPN to specified computers or to a certain type of traffic VPN Firewalling is the answer Mako For your business Configure gt Firewall gt VPN gt Basic Home Firewall Selection VPN Reports Basic Configure Left blank the Default rules will be selected Management Default rule is defined by the VPN direction during VPN creation User created rules are implemented before default VPN rule Help Docs Rules are implemented from top to bottom by the Firewall Feedback Logout e Allow this traffic e Deny this traffic L Trace firewall connections Select a VPN to manage Available VPNs VPN Firewall Control of the traffic uses a similar interface to inbound and
17. 6086 ADSL Product Handbook 4 4 MB Last updated 15 March 2006 e 6086 Ethernet Product Handbook 4 9 MB Last updated 15 March 2006 Makos Guardian Handbook 0 7 MB Last updated 29 July 2005 e Mako MailGuard User Manual 1 5 MB Last updated 15 March 2006 Mako MailGuard Quick Start Guide 220 KB Last updated 15 March 2006 Obtaining Computer MAC Address Quick Guide 370 KB Last updated 15 March 2006 Logout Remote VPN Documentation a PPTP WPN o Windows XP Client Guide PDF User Guide 800 KB Last updated amp February 2005 o Mac OS X Client Guide Mac OS 8 77 KB Last updated E February 2005 a IPSec VPN o GreenBow PDF User Guide 300 KB Last updated 15 March 2006 o SoftRemoteLT PDF User Guide 1 MB Last updated 29 July 2005 o IPSecuritas PDF User Guide 450 KB Last updated 15 March 2006 Documentation Mako Networks Mako 7550 E Product Handbook v 1 1 Page 66 Help Known Issues This area contains known issues and ways to resolve them Mako For your business Home Selection Reports Configure Management heip De Logout Known Issues e Help gt Known Issues Help Contacts Documentation Known Issues VPN Client Issues Problems have been encountered when multiple VPN software clients are installed on the same machine If you encounter errors when using software VPN clients make sure you only have one software VPN client installe
18. 8 186 Configure DNS Q Primary DNS Server 194 74 65 69 Secondary DNS Server 194 72 9 38 Billing cycle and Traffic Threshold levels optional More Alerts gt Billing Cycle Start Date 1 3 Save and Setup Alerts Save Internet Configuration IP Mako Networks Mako 7550 E Product Handbook v 1 1 Page 27 Mako For your business Configure gt Internet gt ISP Setup Home Internet Selection ISP Setup IP Range Reports Management Help Docs Feedback Logout Configure your Internet connection O IP PPP Internet Service Provider BT Openworld Plan BT2000 business plan lic chap 3 Q Show bandwidth settings amp User Name makonetworks __ btclick com Password sesssses Confirm Password seseesess Configure DNS p Primary DNS Server 194 72 0 98 Secondary DNS Server 194 74 65 68 Billing cycle and Traffic Threshold levels optiona More Alerts gt Billing Cycle Start Date 1 Save and Setup Alerts Save Please enter your licence key once you have finished configuring your Mako Internet Configuration PPP If your ISP charges for traffic over and above a predetermined plan you can set the Traffic Warning Threshold to a value of your choice using the drop down menu You will be alerted when this percentage of your freely available traffic according to your Connection Plan has been reached Set the Billing Cycle Start Date to tha
19. Branch Office but those at Branch Office cannot see the ones at Head Office Considerations It is important to ensure that the local private network IP address scheme behind the Mako devices at each location is different This will occur if you leave the Mako appliances at their default address as supplied from your Reseller For example the London LAN 1 may use the address range 192 168 1 xxx while Head Office LAN 1 would be 192 168 3 xxx where xxx is the range of addresses used at each network The significant element is the highlighted 192 168 1 and 192 168 3 these must be different at the two ends of the VPN link Please contact your Reseller if you have any questions regarding the best choice of private IP addressing schemas for your offices The corresponding changes to the secure profile of the Mako unit at the other end of the VPN link will be made automatically It is not necessary to update both configurations This makes it straight forward to set up a temporary secure link between your Mako devices and then remove it when the requirement ceases The update will take about 2 minutes to propagate out to the Mako devices or they can be power cycled for the update to be initiated straight away Mako Networks Mako 7550 E Product Handbook v 1 1 Page 47 Invitation If you wish to have a Mako to Mako VPN between your Mako and a Mako that belongs to another company you can do so with Mako VPN Invitations Inv
20. For your business Reports gt Usage gt Mako Usage Home Mako MailGuard Selection Mako Usage Mako Guardian Usage SharkNet IDS Configure These reports are pulled from a live database and are built in real ime Please be patient as some of Management these reports will not appear instanby Help Usage Reports Logout Todays Usage Yesterdays Usage Last five days e Last fourteen days e Last thirty days Current usage cycle e Last usage cycle e From 1 to l D F Cumulative usage reports Current billing cycle 2006 03 20 Today Current billing cycle with projection 2006 03 20 2006 04 19 e Last billing cycle 2006 02 20 2006 03 19 Long Term Reporting Long term reporting will be available shortly after the first billing cycle has completed Reports Mako Usage Examples of typical reports are shown on the following pages Considerations Mako Usage refers to the total traffic which has passed through the Mako device These reports therefore give you the sum total of your networks Internet usage broken down into the listed time periods You can drill down by day hour or PC by clicking on the appropriate parts of the graphs Usage cycle time periods commence at the Billing Cycle Start Date set in the Internet configuration section Mako Networks Mako 7550 E Product Handbook v 1 1 Page 14 Usage Reports are displayed as a column graph in a pop up window The
21. For your business GET A MAKO Y Optimise the performance of valuable bu Understand how your internet ntrol the cost balsas your IT comm s being used and Passwor d email a LS o rp activ ee ote Ser take actio Te np e service you Get speed y Get security D Get control aj Get savings B Username Secured by Otha wte ick to verify 2006 03 05 Mako makes management easy Mako Networks Home Page amp Login Screens Login To administer your Mako appliance s enter your user name and password Then click Login Remote VPN To log in to the web site to start a remote secure IPSec VPN session enter your user name and password then click Login The process is detailed in the Operations Guide section VPN Remote Access Considerations The Mako Networks web site has been tested against several versions of the popular browser software products ltis likely that different browser products versions and settings will format screen displays slightly differently Please note that you must accept Cookies to access the Mako Networks web site and that you must have JavaScript enabled These properties are set in your browser preferences While accessing the Mako Networks web site your browser will be switched into a secure mode known as SSL in which traffic between the browser and the Central Command Servers is encrypted Mako Networks Mako 7550 E Product Handbook v 1 1 Page 10 Home Once your Login is success
22. ON A E o PRE EE O A eereoreit etn deme arte 5 Unpacking ana Connect e dl e edo T TUNDO OM dico T 9 WAKOSCODE LOED id ai 9 Eaei a E E E en 10 3 A A 11 REPORS USAG ica coacalco 14 FRE DONS Sta US its 26 Reports Mako MailGuaro oocccocccocccocccocncocncocnconncocnonnnonnncnnnonnncnnonononancnnncnnnnnnnnos 26 Reports Licence Io malossi oca 26 o E ene ce eee ee eee 21 Gontiqure Interna sist att edsta 27 GOntgure INC WO sra aA E a 31 Congue re Walla o e en bano 35 OS OPIS O Ceeagrgie os vase aoee eee aaa aruleeeaarane et eaeeseouaeer 46 COMNMOUIC SONICO Sera lite 55 Contiguie LOCA dsd 58 CONGU ACCESS aida 59 Management HOMO otura diia 60 Management COMPANY Gure alt 60 Management SG AAA weaker asi eseaveatencesancueeabeacandediasnicesd 61 Mel HED CONAC nura Aaaa R R cnLoEl 66 ICID 2 DOcUMENMaUO enni O 66 HED NOW ISSUES talud 67 OU ESA IN edo dead 68 Gloss arroces bericht et neice terete atau cto uieitaee toe 69 Mako Networks Mako 7550 E Product Handbook v 1 1 Page 3 Limited Warranty a Standard Limited Warranty If the products purchased hereunder are resold by a distributor or reseller to an end user customer pursuant to the terms hereof in their original unmodified unused condition Purchaser shall pass on to its customers or keep as applicable for internal use the MAKO NETWORKS LTD standard limited warranty for the products as summarized in documentation supplied with the product and including prov
23. Office lant BC Add Preshared Secret random Third Party VPN setup You can now either enter a Pre Shared Key or create one automatically by clicking the random link Then click Add The Mako will then be awaiting the third party device to form the connection Mako Network Traffic Direction Third Party Network Action Head Office Lan 1 Ca gt Branch Office Lan 1 O Es Third Party VPN Established You can modify any of the settings of an established Third Party VPN by clicking on the Spanner icon Preshared Key Update Key 9ZxGa6cXmWr2ccQeY GSULNU3ENh2whcpRkAy8HA6 BNZZ8ZhwgpwrEAFRD3 ehrC random Mako Networks Branch Office Network Details Location Branch Office Public IP Address 210 56 78 91 Network Address 192 168 45 0 255 255 255 0 Third Party VPN Modification Screen Mako Networks Mako 7550 E Product Handbook v 1 1 Page 51 Remote Access Mako Networks offers two types of Remote VPN connection IPSec and PPTP IPSec is more complicated to setup and generally requires additional software on the client but is very secure PPTP is easier to setup and most Operating Systems support PPTP natively but it is less secure than an IPSec VPN Please see separate Documentation on client setup for each type of Remote Access VPN In the interests of security you must create VPN Only usersname and password combinations in the Add Users section in order to access Remote VPNs Usernames and Passwords that are already
24. ako Guardian Usage SharkNet IDS Configure These reports are pulled from a live database and are built in real time Please be patient as some of these Management reports will not appear instantly Help PC Traffic Reports Logout Todays Usage Yesterdays Usage e Last five days Usage e Current Billing Cycle 2006 03 20 Today Last Billing Cycle 2006 02 20 2006 03 19 Fom Ot Mako Traffic Reports e Todays Usage Yesterdays Usage Last five days Usage Current Billing Cycle 2006 03 20 Today Last Billing Cycle 2006 02 20 2006 03 19 e From gt to 7 4 Reports PC Usage Mako Networks Mako 7550 E Product Handbook v 1 1 Page 16 MAC Address amp Naming PCs Each PC on your network is assigned an IP Address to identify its communications In many networks the network configuration allows the IP address to change from time to time The IP address is thus not useful as a unique and unambiguous identifier over time for any particular PC Since reports show traffic over time Mako uses the PC s MAC Address as a unique identifier The MAC Address is rather cryptic so to make reports more intelligible you can assign a name to each machine This name will henceforth be displayed in your reports in place of the MAC Address If you click on edit in a report a small pop up window will be displayed Enter the desired name in the box next to Machine Name and click o
25. ako to Mako Invitation Accept Invitation Simply copy the key and click continue If the Require Reconfirmation box was checked by the invitation initiator then the initiator will need to complete this process If the Require Reconfirmation box was unchecked then the VPN will be established Once the VPN is established it will appear in the Mako to Mako VPN Manage Access list Either party may delete the VPN at any time Mako Networks Mako 7550 E Product Handbook v 1 1 Page 49 Third Party VPN lf you use a non Mako router to connect to the Internet at a remote site you can create a VPN connection between your Mako and the third party device The third party device must support IPSec VPN s 3DES IPSec Encryption Algorhythm MD5 Authentication Algorhythm Diffie Hillman 1024 Public Key Algorhythm Support for Pre Shared Keys In addition both the Mako and the third party device should have static public IP Addresses in order that the VPN be kept alive for any length of time To configure the Mako to be able to connect to a third party device click on the Add Third Party Device sub menu Mako For your business 0 Configure gt VPN gt Mako to Mako gt Add Third Party Device Home Firewall Selection Mako to Mako Add Third Party Device Reports Management Use this page to create a Third Party Device capable of establishing a VPN with your Mako A Third Party Help Device must be able to
26. ality of Service Basic The VoIP Enhanced setting guarantees VolP traffic approximately 33 of your upstream bandwidth Use this setting if you require enhanced VoIP quality and reliability Mako Networks Mako 7550 E Product Handbook v 1 1 Page 55 QoS Advanced The QoS Advanced section is recommended for experienced users only Please consult your IT Provider if you have any uncertainty about these settings The upstream bandwidth is broken into 6 Bins Bin 1 has higher priority than Bin 2 and Bin 2 has higher priority than Bin 3 and so on You can group various Internet Services into different Bins All services that belong to a particular bin share its bandwidth Important or high priority services should be placed in a bin with no more than 2 other services to ensure the bandwidth for the bin is not shared between too many services All the services in a Bin share that Bins allocation of bandwidth The services are guaranteed that Bins percentage of bandwidth as a minimum If some upstream bandwidth is unused it can be temporarily borrowed from other bins until the bin needs the bandwidth Services that are not allocated to a bin use the last bin by default Mako For your business Configure gt Services gt QoS gt Advanced E Home ice Selection Reports Advanced Management We recommend caution when modifying these settings Please consult the Operations Manual before Help pro
27. ample of a Mako Traffic report which is displayed in the pop up window A large number of services are permitted through this Mako device each one of which is monitored Uploaded outbound and Downloaded inbound traffic volumes are shown by each of the services available under Identification If you click on a service the pop up window shows the PCs which contributed to that service s traffic volume Remote Access Remote access reporting gives you visibility over the PPTP Remote VPN users who connect to your Mako Ma ko For vour business Reports gt Usage gt Remote Access Home Mako MailGuard Selection Mako Usage PC Usage Remote Access Mako Guardian Usage SharkNet IDS Remote Access Reports Configure Management e Todays Usage Help Yesterdays Usage e Last five days Logout Last fourteen days Last thirty days Current usage cycle e Last usage cycle e From gt T to pr de gt Remote Access Reports Click on a period for which you would like to view details about PPTP connections A popup window will display like the one below Mako Networks Mako 7550 E Product Handbook v 1 1 Page 20 Ma ko For your business Mako Networks Remote Access Report For period 2006 03 10 to 2006 03 14 PPTP Usage sam vpn A sam vpni Username Connect Time Duration Total Source IP sam vpn 14 03 2006 15 51 36 12h 10m 0s 0 99 Mb 213 43 39 11 t Close Window Remote Ac
28. and leaving your networks is analysed comprehensively to ensure network integrity Firewall Central to the security of your networks is the type of firewall you use The Mako 7550 E utilises a stateful inspection firewall A stateful inspection firewall does not just examine packets of information instead it makes decisions based upon information derived from all communication layers and from other applications This type of firewall provides true enterprise level protection Working with the Mako Networks Central Management System you have full control over all traffic entering and leaving your networks Four Networks The Mako 7550 E protects up to four separate networks This allows you to segregate your networks as you see fit Ethernet Router An Ethernet Router is incorporated in to your Mako 7550 E connecting your networks to the Internet at high speed You have the option to connect directly to an Ethernet connection to the Internet or via any other connection medium that supports Ethernet forwarding VPN Virtual Private Networks allow you to assign secure remote access to your networks over the Internet You can link two Mako protected networks together using the Mako Networks Central Management System in seconds with just three mouse clicks Linking three or more Mako protected networks is just as easy The Mako Networks Central Management System allows this to happen without static IP addresses In the same way you can also allow spe
29. andbook v 1 1 Page 54 Configure Services Mako 7550 devices can have many optional services added Please check www makonetworks com for the latest available services Documentation for Services that carry an additional cost can be downloaded in PDF format from the Documentation section of the Mako Networks website If you would like this documentation emailed to you please send an email to support makonetworks com QoS QoS stands for Quality of Service QoS comes standard with 7550 series Makos This feature allows you to prioritise different types of Internet traffic and specify minimum outbound bandwidth allocations QoS can be used to improve the quality of such services as Voice over IP traffic by ensuring there is always bandwidth reserved for it On the Internet QoS is the idea that transmission rates error rates and other characteristics can be measured improved and to some extent guaranteed in advance QoS Basic The Mako default setting is recommended for most users This setting allocates bandwidth reservations to the most common Internet applications and traffic types Mako For your business a Home Selection Qos Mako MailGuard Dynamic DNS Reports Basic We recommend caution when modifying these settings Please consult the Operations Manual before proceeding with Management any changes Help Logout QoS Profile 2 Mako Default VoIP Enhanced Custom Ok Qu
30. ary for the mail server to receive incoming connections from mail hosts on the Internet and this requires an access path through the firewall to be set up Configure gt Firewall gt Inbound gt Basic Home Firewall Selection Inbound Reports Basic The default rules allow no incoming traffic to ensure maximum network security Management Helo D We recommend caution when modifying these settings Please consult the Operations Manual before proceeding with wal a any changes Feedback Logout Rules are implemented from top to bottom by the Firewall L Trace firewall connections A This rule has been created in the Advanced rules page Go to the Advanced page to see the full rule Existing Inbound Rules Lan 1 192 168 1 0 24 Target IP Internal IP Service Comments Option No inbound rules found for this network Existing Inbound Rules Lan 2 192 168 2 0 24 Target IP Internal IP Service Comments Option No inbound rules found for this network Existing Inbound Rules Lan 3 192 168 3 0 24 Target IP Internal IP Service Comments Option No inbound rules found for this network Existing Inbound Rules Lan 4 192 168 4 0 24 Target IP Internal IP Service Comments Option No inbound rules found for this network Add Inbound Rule Target IP Address 210 54 118 0 Internal IP Address a Service Type File Transfer Protocol 21 ma Comments Cada Firewall Basic Inbound The access p
31. ath is referred to as a Pinhole through the firewall A Pinhole is an access path which is as restricted as possible In this case it specifies the mail server as the sole target and the email protocol as the sole communications protocol Since any mail server may have email for the office it is not possible to specify the IP address of the host which initiates the communication The Basic screen above provides the simplest approach to creating a Pinhole The Add Pinhole table permits the selection of a specified protocol from the drop down menu to be connected to a specified local internal IP address If you are unsure of what local IP address you should use you can click on the lookup link which will show you all PCs the Mako is aware of behind it Once you have added a rule you can edit it by clicking on the Spanner icon Mako Networks Mako 7550 E Product Handbook v 1 1 Page 37 Mako For your business Configure gt Firewall gt Inbound gt Basic Home Network Firewall Selection Inbound Reports Basic congue gt Management y7 Rule saved Help Docs Feedback Logout The default rules allow no incoming traffic to ensure maximum network security We recommend caution when modifying these settings Please consult the Operations Manual before proceeding with any changes Rules are implemented from top to bottom by the Firewall ge Trace firewall connections A This rule has been cr
32. ation China United Kingdom Cc United States rT Germany E N A China United Kingdom Russian Federation E Others View the types of the blocked intrusions Country Drops United States 219 14 29 Germany 212 13 83 N A 147 9 59 China F 128 8 35 United Kingdom 107 6 98 Russian Federation 104 6 78 Spain Gaal 95 6 2 Manm el ER fA 21004 Blocked Intrusions by Country This report shows where the intrusions that were blocked came from You can click on areas of most of the IDS report graphs and charts to drill down to find further information Mako Networks Mako 7550 E Product Handbook v 1 1 Page 25 Reports Status This screen lets you check the status of the selected Mako device It also shows the last user selectable number of events and the date of license expiry Mako For your business Reports gt Status E Home atu Mako MailGuard Selection Status report for Customer XYZ Head Office Status one Configure online Last contact time less than one minute ago Management Current IP Address 210 86 109 1 Help Licence Expiry Date 11th April 2011 Logout More status information is available in the information window by clicking on the icon at the top right hand corner of the page Events for Customer XYZ
33. be aware that some of these functions can disable critical operations in your Mako device care should be taken to ensure that configuration changes do not compromise your office network security or its access to the Internet Configure Internet Internet This screen allows you to review your Internet Service Provider access details and your traffic plan if you have one The information on this screen will be set by your reseller and in most cases will never need to be changed This screen could differ depending upon your ISP With a Mako 7550 E you can configure it using IP DHCP or PPP bridged Ethernet Configure gt Internet gt ISP Setup Home Selection ISP Setup Management al usb Key configuration Help Docs Feedback Logout Configure your Internet connection a IP O PPP Internet Service Provider BT Broadband 4H Plan Business 1000 14 Show bandwidth settings Plan Bandwidth auto kbps down auto kbps up Auto Detect Plan Bandwidth lets the Mako ensure that services using QoS are provided with adequate bandwidth This section is particularly important for external Ethernet connections where the true line speed is not available Leave the fields blank or enter auto to let the Mako automatically detect the bandwidth Most ADSL users should do this Use DHCP Q DHCP Client Hostname DEFAULT Mako WAN IP 210 54 118 187 Network Mask 255 255 255 252 Default Gateway 210 54 11
34. ceeding with any changes Logout Service IP Address Bin Remove Bandwidth Remove Service Bin Reserved Any 1 tx Encapsulated Security Protocol Any 1 N A Reserved Any 1 Sending Email SMTP Any 2 tx Incoming POP Mail Any 2 gt 16 Y M A Incoming IMAP Mail Any 2 No services allocated 3 16 N A No services allocated 4 16 N A No services allocated 5 16 N A File Transfer Protocol Any 6 tx 17 All other services Any 6 Add Service Service File Transfer Protocol FTP 21 He a Bin 3 16 ay Bin 1 has highest priority Bin 6 has lowest priority Source IP o lookup Leave blank for everything Add Quality of Service Basic By placing a tick in the Show advanced bandwidth settings box you can allocate upstream bandwidth percentages across the Bins M Show advanced bandwidth settings QoS Bandwidth Allocation 1 2 3 4 5 6 All other services 149 146 146 146 146 17 Save Advanced QoS Bandwidth Settings Mako Networks Mako 7550 E Product Handbook v 1 1 Page 56 Dynamic DNS All Mako devices support Dynamic DNS Dynamic DNS requires a free subscription to one of two third party Dynamic DNS providers DynDNS org or no ip com Mako Networks neither endorses or in any way guarantees the services provided by either of these parties The Dynamic DNS service provided by Mako Networks is provided as a convenience to the users of its products and Mako Networks has no control over any aspect of DynDNS org or no ip
35. cess Report The Remote Access Report above shows which user s connected to your Mako protected network during the selected period It also shows when they connected for how long how much data they transferred and where they came from Mako Guardian Usage Mako Guardian Usage is only visible if you subscribe to the Mako Guardian service The Mako Guardian Usage reports display traffic volume by website visited Ma ko For your business Reports gt Usage gt Mako Guardian Usage Home Mako MailGuard Selection Mako Usage PC Usage Mako Guardian Usage SharkNet IDS Mako Guardian Reports Configure Management Todays Usage Help e Yesterdays Usage e Last five days Usage Logout e Last fourteen days Usage Current Billing Cycle 2006 03 20 Today e Last Billing Cycle 2006 02 20 2006 03 19 e From T to de gt Mako Guardian Usage Screen By clicking on a period to view you will be shown the websites visited by computers on your network displayed by volume of traffic each site has contributed to your overall data throughput for the period Mako Networks Mako 7550 E Product Handbook v 1 1 Page 21 Depicted in the example below are the websites visited by all the computers on a network over a five day period The site download adobe com generated the most traffic and was visited four times The Allowed column shows if any aspects of the site were blocked for inappropriate content in this
36. ching the access permissions If the local PC or server is not itself secure then other computers in the office network can be exposed to unauthorised access It is therefore sensible to exercise caution when enabling Inbound access It is also necessary to ensure that target computers on the local network have all security related updates applied to their software Outbound This relates to the firewall rules which permit communications to be initiated from computers in your office network to remote host systems on the Internet It is sensible to appreciate that though the firewall will ensure that communications are only initiated by PCs on the local network once established these communications are two way Internet based attackers have developed a wide variety of malicious software programs which can be downloaded onto a PC without the PC user s knowledge These programs are generically known as Viruses though other terms such as Trojan and Worm are in use The actions of virus programs can be very dangerous to your office computer systems Early examples tended to perform obvious destructive acts such as the deletion of crucial system files More recently information has been extracted by the virus to damage reputations by sending malicious emails under the name of the PC owner Other varieties of virus may instigate industrial espionage with confidential information may use office PCs in an Internet borne attack on a third party or
37. cified users remote access to your Mako protected networks with the Remote VPN feature This is very useful for accessing your networks from home or while traveling Logging Reporting Whilst all traffic from your Mako 7550 E goes directly out onto the Internet your Mako sends traffic information securely to the Mako Networks Central Management System This gives you the ability to monitor and control your Internet usage from anywhere in the world with Internet access Simply log onto the Mako Networks website to view your usage see how your broadband internet connection is being used monitor where PCs on your network have been going and much more And with MakoScope VGA feedback you can easily see what your Mako is doing in real time Third Party software may be required Mako Networks Mako 7550 E Product Handbook v 1 1 Page 5 24 Hour Remote Control Because your Mako utilises the Mako Networks Central Management System you or your designated IT Professional have 24 hour secure remote control over your connection to the Internet Via the Mako Networks website you can modify firewall rules create and disable VPNs check usage patterns and even change your networks IP addressing Automatic Updates Because the Mako 7550 E is a centrally managed device its software is kept up to date automatically The Mako Networks Central Management System looks after all software updates security patches and system updates for you You can b
38. columns show incoming and outgoing traffic for each day in the selected time period Cumulative usage reports are displayed as a line graph in a pop up window A line shows the sum of the accumulated incoming and outgoing traffic over the selected cycle In regions where traffic is billed on a usage plan basis there are options available to set various thresholds In the event that these are set up up to three horizontal threshold limit lines can be displayed The first shows the Traffic Warning Threshold value where you and your reseller will be emailed on the limit being reached A second line shows the total amount of free traffic your ISP Connection Plan provides The third shows the optional absolute threshold value where your firewall will disallow all incoming and outgoing traffic other than access to the Mako Networks Web Site where it can be re allocated Please contact your reseller or ISP if you have any queries regarding your ISP charging structure Mako For your business Y be Mako Networks Usage Report For period 2006 03 09 to 2006 03 13 Last 5 Days Usage ny Ww uy A A Ww nd O YN O lt lt O O O O O O O o o Megabytes Mb 11 Bin Bout Report Information Total Megabyte Usage in 864 67 MB Total Megabyte Usage out 410 11 MB Total Megabyte Used 1274 79 MB Daily Average for this period 254 96 MB Close Window Mako Report Last Five Days Mako For your business Y be Mako Networks Usage Report
39. d Simply de activating the software is not enough Remote Dial Up VPN When creating a Remote Dial Up VPN from a computer directly connected to the Internet e g via dial up modem ensure that the user is not using a proxy server as this can provide the wrong IP Address to our system Inbound Connections over PPPoE Inbound pinholes may not work correctly behind a connection using PPPoE due to the way MTU works Servers behind a PPPoE connection must configure their MTU to be the same as the MTU for PPPoE A MTU of 1472 will work for most connections Mako Networks Mako 7550 E Product Handbook v 1 1 Page 67 Troubleshooting The website provides you with detailed help on obtaining reports on your traffic updating the configuration of your Mako and updating your customer details Your Secure Customer Login Web Site http www makonetworks com UserName Password What to do if YOU LOSE YOUR SECURE CUSTOMER PASSWORD It is vital that you take great care of your password If you lose the password you are unable to obtain help from the web site obtain traffic reports or update your Firewall configuration Ifthe password is exposed to a third party your computer network immediately becomes insecure and is at risk from an attack You must contact your Reseller to have a new password issued to you The Reseller is not able to provide your existing password Your Reseller will verify your customer identity Because th
40. d is the software package they must use to provide a secure wrapping for their communications while connected to the office network Connection Method See the documentation section of the Mako Networks website for details on how to Remote VPN using specific IPSec or PPTP VPN Client software Mako Networks Mako 7550 E Product Handbook v 1 1 Page 52 Add Users This screen allows you to record details of a user for administrative purposes The User Name field gives you a convenient nickname for quick identification Ma ko For your business Configure gt VPN gt Remote Access a Add VPN User E Home Network Selection Mako to Mako Remote Access E Reports Add VPN User PPTP Settings Management Secure access to the network behind your Mako can be granted to users directly connected to the Internet E Help This service is useful to people wanting access to the office network from home or overseas on an ad hoc basis The remote computers require additional VPN software Please consult the Operations Manual for setup Logout instructions User Information Title Mr HH First Name Last Name Username Won Email Add Remote VPN Add User As each user is recorded click on Add to save the information Usernames will automatically have the vpn extension appended to identify then as a VPN user and not an administration user Once a user is recorded their access can be individua
41. ddress or select a network 4 Service Type File Transfer Protocol 21 123 a Action Allow Deny Comments nad If the service you require is not listed please e mail us at mariow makonetworks com Firewalling a VPN Mako Networks Mako 7550 E Product Handbook v 1 1 Page 45 Configure VPN Mako devices have two types of VPNs available Mako to Mako and Remote Access Mako to Mako If you have two or more Mako units this screen allows you to set up secure virtual private network communications between each pair of Mako protected networks Mako For your business Configure gt VPN gt Mako to Mako gt Manage Access Home Firewall_ VPN Selection _ Mako to Mako Reports Manage Access Add Third Party Device Configure If you have more than one Mako you can create a secure connection over the Internet between them a Virtual Management Private Network VPN s allow your various networks to see one another Help Docs s p Mako to Mako VPNs Feedback Mako Network Traffic Direction Mako Network Option Logout No Mako to Mako VPN connections found for this Mako Add VPN Mako Network Ge x DD Mako Network Head Office tani Y O o O Branch Office iani i Cada Copyright Yellowtuna Holdings Limited 2001 2008 Mako to Mako VPN Screen There are two steps to set up a VPN link 1 First use the drop down menu as shown to select the other Mako appliance you wish to configure as th
42. e assured that your Mako 7550 E will continue to be current as long as it has an up to date service licence Optional Feature Enhancements The Mako 7550 E gives you the option to incorporate optional feature enhancements such as Advanced Content Filtering Email Sanitisation and Spam protection as well as virus protection New features and options are being added all the time Make sure you keep up to date by regularly logging into www makonetworks com Mako Networks Mako 7550 E Product Handbook v 1 1 Page 6 Unpacking and Connection Opening the carton you should find the following items 1x Mako Device 1x Power Cord 2x Cat 5 Ethernet Cables Documentation CD Rack mounting kit USB Key may not be supplied depending upon your location What Goes Where Place the Mako device in a convenient spot adjacent to your LAN hub s or switch es and the incoming Ethernet connection or Ethernet Terminated Modem NTU For preference the location should be off the floor out of direct sunlight and well ventilated with a computer compatible power socket available Mako 7550 E Rear Panel KEY 1 Ethernet WAN Port 2 Power Socket 3 Power Switch Mako 7550 E Front Panel KEY LCD Screen LCD Keypad Diagnostic Port authorised use only USB Ports LAN 1 Port LAN 2 Port LAN 3 Port LAN 4 Port A o a Connect cables to their corresponding sockets on the Mako Connect the Power Cable to the mains supply Connect the WAN Port
43. e operation of another rule rules are applied in sequence This establishes a hierarchy in the application of rules Once you have added a rule you can edit it by clicking on the Spanner icon Mako Networks Mako 7550 E Product Handbook v 1 1 Page 41 Outbound Advanced As with Inbound Security the Advanced screen permits more complex permissions to be set up Please review the discussion at the beginning of the Firewall section for background information on the issues involved Configure gt Firewall gt Outbound gt Advanced Home Firewall Selection Inbound Outbound Reports Advanced Left blank the default rules will be selected Management Default rules allow all traffic to leave your network Rules are implemented from top to bottom by the Firewall Help Docs Feedback B Allow this traffic Logout Deny this traffic L Trace firewall connections Existing Rules Lan 1 192 168 1 0 24 Source Destination Service Comments Action Option No rules found for Lan 1 Deny all traffic not expressly allowed N Existing Rules Lan 2 192 168 2 0 24 Source Destination Service Comments Action Option To External Lan 2 any SNMP TCP OD 904 Lan 2 any UPnP d y A 0 Lan 2 any NETBIOS TCP gt AI Lan 2 any NETBIOS UDP y z A 2 Deny all traffic not expressly allowed N Existing Rules Lan 3 192 168 3 0 24 Source Destination Service Comments Action Option No rules found for Lan 3 De
44. e other end of the VPN link If either Mako is a 6086 or 7550 type Mako select which protected network you want to link 2 Now decide access rights over the VPN link You can choose between three visibility options Either the computers locally connected to the Selected Mako can see those at the other Mako device but not the reverse or the other way around or both ends can see the computers on each others network Click on the button under the arrows showing the required direction of visibility Click on Add to save the VPN configuration It will now show up in the table as shown in the example below Mako Networks Mako 7550 E Product Handbook v 1 1 Page 46 Mako For your business Configure gt VPN gt Mako to Mako gt Manage Access Home Firewall VPN Selection Mako to Mako Reports Manage Access Add Third Party Device Management w VPN saved Help Docs Feedback If you have more than one Mako you can create a secure connection over the Internet between them a Virtual Logout Private Network VPN s allow your various networks to see one another Mako to Mako VPNs Mako Network Traffic Direction Mako Network Option Head Office Lan 1 DD Branch Office Lan 1 O Add VPN Mako Network 6 Ep DD Mako Network Head Office tani O O Branch Office f tan I Cada Mako to Mako VPN This shows VPN access set up so that computers on Lan 1 at Head Office can see those on Lan 1 at
45. eated in the Advanced rules page Go to the Advanced page to see the full rule Existing Inbound Rules Lan 1 192 168 1 0 24 Target IP Internal IP Service Comments Option No inbound rules found for this network Existing Inbound Rules Lan 2 192 168 2 0 24 Target IP Internal IP Service Comments Option 210 54 118 0 192 168 2 3 Sending and Receiving Email O A Existing Inbound Rules Lan 3 192 168 3 0 24 Target IP Internal IP Service Comments Option No inbound rules found for this network Existing Inbound Rules Lan 4 192 168 4 0 24 Target IP Internal IP Service Comments Option No inbound rules found for this network Firewall Basic Inbound with Mail Pinhole Enter the target machine s IP address the Service protocol which is allowed to access that machine and click on Add to enable the Pinhole Pinholes can be removed by clicking the corresponding Delete button in the upper table If your ISP provides you with multiple public IP addresses you may specify a public IP address that the inbound pinhole refers to This is useful if you want to have multiple pinholes to the same port on different internal PCs The Comments field is optional and provides you with a space to enter reminder details about the rule pinhole Considerations The Internal IP Address has to be static that is not able to be re assigned by DHCP Please refer to the previous section for details The Service defines exactly which Internet protocol is p
46. ed details Mako Networks Mako 7550 E Product Handbook v 1 1 Page 63 From the Manage User Information screen you can also edit the Users access by clicking on the Access Control button This will take you to the Manage User Access Control submenu You cannot change your own Access level only the Users you have created You may only grant other Users Access equal to or less than your own access Mako For your business Management gt User gt Manage Bob Smith gt ACCESS Contral Home User Selection a Reports Information Access Control Configure y Please press Save once you have finished configuring these settings Help Bob Smith Access for Customer XYZ Type of User VPN Client Customer XYZ and its Makos One or more Makos for Customer XYZ Logout w Control over Actions for Bob Smith Email Password Email Password Reset Password Reset Password Change Password Change Password Suspend Bob Smith Suspend Change Username bobsmith vpn Change Usemame Companies Customer XYZ Add Access Control You can change the Type of User In this example the User Thomas Smith is a Basic Client and only able to view reports You could change him to a Full Client which will enable him to configure Makos The Control over section allows you to either have contol over all of your Company s Makos or just a selected group From this screen you can also Email the
47. ent MAC address By associating the IP address with the MAC address we ensure that DHCP Leases for these machines are pre defined The Mako will always issue the same IP Address to a known MAC address To add a static IP address enter details in the lower table and click on Add The entry will appear in the table above as a static IP address To remove an existing entry click on the corresponding Delete button The comments field allows you to enter an easily identifiable name for the PC This will be carried over into the reports to simplify tracking usage Mako Networks Mako 7550 E Product Handbook v 1 1 Page 33 Static Routes Normally this section will be configured by your reseller and no changes will be necessary It is important that any alteration of the information recorded on this screen is done with care as your communications with the Internet may be disabled if an error is made You may enter routes to other networks that have routers on one of your LANs Mako For your business Configure gt Network gt Static Routes Home Internet_ Network Selection DHCP Leases Static Routes Reports We recommend caution when modifying these settings Please consult the Operations Manual before proceeding with M t i i Managemen Currently installed Static Routes Help Docs Name Network Gateway Option Feedback DB Network 192 168 10 0 24 192 168 1 253 Q A Logout Add Static Route Remote Ne
48. ermitted to communicate through the Pinhole A wide choice of the most frequently found protocols is available from the drop down menu under Service Where an additional protocol is required simply email the address shown and it will be added to the list More complex firewall configurations are covered in the next section An example of the Basic screen when rules have been configured in the Advanced section appears below Mako Networks Mako 7550 E Product Handbook v 1 1 Page 38 Mako For your business Configure gt Firewall gt Inbound gt Basic Home Network Firewall Selection Inbound Reports Basic Configure Do The default rules allow no incoming traffic to ensure maximum network security Management We recommend caution when modifying these settings Please consult the Operations Manual before proceeding with Help Docs any changes Feedback Logout Rules are implemented from top to bottom by the Firewall L Trace firewall connections A This rule has been created in the Advanced rules page Go to the Advanced page to see the full rule Existing Inbound Rules Lan 1 192 168 1 0 24 Target IP Internal IP Service Comments Option No inbound rules found for this network Existing Inbound Rules Lan 2 192 168 2 0 24 Target IP Internal IP Service Comments Option 210 54 118 0 192 168 2 3 Sending and Receiving Email O A 210 54 118 6 192 168 2 45 A 1cp 51443 Qu ft Existing Inbound Rul
49. es Lan 3 192 168 3 0 24 Target IP Internal IP Service Comments Option No inbound rules found for this network Existing Inbound Rules Lan 4 192 168 4 0 24 Target IP Internal IP Service Comments Option No inbound rules found for this network Basic Inbound Firewall Rules Here one of the rules operating on the firewall is shown as having been created on the Advanced rules page Inbound Advanced This section allows more complex access permission rules to be configured than those available on the Basic screen in the previous section Please review the discussion in the previous section for background information on the issues involved Similar principles apply in terms of defining Pinholes which are as restricted as possible Permission rules are defined covering the Source or External IP address the Destination or Internal IP address the External Service and the Internal Service Thus it is possible to specify the Internet address of the machine which is initiating communications and the protocol which that machine may use in its communications as well as those of the machine on the office network To add a new Pinhole enter the IP addresses and their corresponding Services in the lower table and click on Add To remove a Pinhole click on the corresponding Delete button The screen shot below is an example of Advanced rules configuration The screen shows the rule flagged as Advanced on the Basic configuration page earlier
50. es you with more than one The information on this screen will be set by your reseller and in most cases will never need to be changed If your ISP does not provide you with multiple IP Addresses this screen will not be available Mako For your business Configure gt Internet gt IP Range Home Internet Selection ISP Setup IP Range Reports Configure gt If your ISP provides more than a single public IP address enter these details below optional Management Existing IP Ranges IP Range Start Address End Address Help Docs 210 54 118 0 29 210 54 118 0 210 54 118 7 O Feedback Logout Add IP Range Public IP Address 210 54 118 0 f2 oo Single IP Mask The Public IP Address Network Mask can be entered in either subnet mask notation e g 255 255 255 0 or CIDR notation e g 31 Public IP Address 9 ISP Assigned Public IP Range Mako Networks Mako 7550 E Product Handbook v 1 1 Page 30 Configure Network Normally this section will be configured by your reseller and no changes will be necessary It is important that any alteration of the information recorded on this screen is done with care as your communications with the Internet may be disabled if an error is made Lan 1 Mako For your business Configure gt Network gt Lan 1 Home internet _ Network Selection J Lan 1 DHCP Leases Reports We recommend caution when modifying these settings Please consul
51. example no blocks have been made on any of the visible sites Mako Networks Mako Guardian Usage Report For period 2006 04 14 to 2006 04 18 Mako Guardian Usage Report download adobe com i al phobos apple com 2230 Others Mdownloadadobe com Mai phobos apple com M 2230 Others URL Traffic MB Requests Allowed download adobe com 82 9047 4 100 0 ai phobos apple cam 77 6517 517 100 0 a1537 phobos apple com 64 6289 1 100 0 a972 q akamai net 52 9264 1 100 0 audio eqx sjl03 pandora cam 38 1925 11 100 0 audio eqx sjl00 pandora corm 37 5471 7 100 0 www cafzone net 33 3734 6 100 0 media nintendo com 32 6784 1 100 0 swcdn apple corm 31 9945 24 100 0 81 222 146 79 29 95863 368 100 0 apple speedera net 29 5294 2 100 0 download nai com 27 2569 250 100 0 a1229 phobos apple corn 27 1784 1 100 0 81 222 146 78 26 5295 273 100 0 audio eqx sjl02 pandora com 19 2997 4 100 0 Mako Guardian Usage Report By clicking on one of the sites another report will display who has accessed the site during the selected period Mako For your business Yr be Mako Networks Mako Guardian Usage Report For period 2006 04 14 to 2006 04 18 For Domain download adobe com Mako Guardian Usage Report Aaron M Aaron Back User Traffic MB Requests Allowed Aaron 82 9047 4 100 0 Download as CSV File Close Window Mako Guardian Individual Site Usage Report Mako Networks Mako 7550 E Product Handbook v 1 1 Page 22
52. fan M NETWORKS Mako Networks Mako 7550 E Product Handbook v 1 1 Mako Networks Mako 7550 E Product Handbook v 1 1 Page 1 Mako Networks Limited Mako 7550 E Product Handbook Version 1 1 2008 Mako Networks Limited All rights reserved The Mako logo is a registered trademark of Mako Networks Limited Other product and company names mentioned herein can be trademarks and or registered trademarks of their respective companies Information in this document is subject to change without notice and does not represent a commitment on the part of Mako Networks Limited No portion of this document may be reproduced in any form or by any means without prior written permission from Mako Networks Limited This document should be read in conjunction with the Mako Networks Limited Terms and Conditions available from the Mako Networks website http www makonetworks com Mako Networks its parent or associate companies may have patents patent applications trademarks copyrights or other intellectual property rights covering subject matter in this document Except as expressly provided in any written licence agreement from Mako Networks its parent or associate companies the furnishing of this document does not give you any rights or licence to these patents trademarks copyrights or other intellectual property Mako Networks Mako 7550 E Product Handbook v 1 1 Page 2 Table of Contents Limited Walras ce tibio 4 MVOdUCH
53. ful a screen like the one below will be displayed This is the starting point for administration of your Mako devices and Users Ma ko For your business Home Selection Links Selection E View my Makos Management Help Management Links Logout E Add new User A Change Password Home Screen This document will cover Adding a New User in the Management section For now click on View my Makos or click on the Selection menu to go to the Selection screen Alternatively you can click on Change Password to change the password for the account you used to log in to the Mako Networks site Mako Networks Mako 7550 E Product Handbook v 1 1 Page 11 Ma ko For your business Selection gt My Makos E Home My Makos Management 6 Online a 0 Offline 1 Awaiting Connection Help m 1 Absolute Threshold Logout Available Makos Found 7 Flag Status Customer XYZ Auckland O Customer XYZ Australia O Customer XYZ Edinburgh Customer XYZ Glasgow Customer XYZ Head Office Customer XYZ London Office EEE TIAC O Customer XYZ Wellington Show more detail Selection screen This screen shows the Mako units you are registered as using and allows you to select sub menus for Reports Configuration and Help as described below depending upon the agreement between you and your IT professional You can also see what country the Makos are located in and their O
54. have finished configuring these settings Management Help Logout Give Control to Users User Access Global Users Andrew Smith customer Full Client Robert Smith client Basic Client Configure gt Access Allow Access Control Mako Networks Mako 7550 E Product Handbook v 1 1 Page 59 Management Home This is the home of the Management section Wheras the rest of the site is for administering Mako end points the Management section is for administering Users and Company information By default your own User and Company are selected and shown in the top right of the screen under the Shark logo Ma ko For your business Management gt Home Company and User selection Management Company In this area you can administer your Company ies information Add User This button links you through to the Management Users Add User screen described later in this document Information This is where you store Company related contact information This is separate from Mako contact information Ma ko For your business Management gt Company gt Manage Customer XYZ gt Information Home Company Selection _ Manage Customer XYZ Reports Information Configure Company Information Name Customer XYZ Address 123 ABC Street Logout Suburb Alphabeton City Letterton Country United Kingdom Phone Number 0818 1234567 Help Edit Parent Relations Cl
55. hould be alerted at and whether you want to be notified if the fan stops spinning The default settings for environmental alerts should only be changed in exceptional circumstances Please consult your Reseller before making any changes to the Environmental Alerts Mako For your business Configure gt Internet gt Alerts Home Internet Selection ISP Setup Alerts IP Range Reports a lt lt e You can configure various alerts and thresholds for the Mako The Warning and Absolute Thresholds are Configure gt configured in the Internet section Management Emails are sent when an alert is triggered or a threshold reached You can configure who receives these Help Docs i i alerts for this Mako in the Mako Email Settings section You can also configure who receives these alerts Feedback across the company in the Company Email Settings section Logout Ed Extraordinary Usage Alerts Alert when over 300 I of average daily usage is used in a single day Worm and Firewall Alerts amp Worm Detection Threshold Aggressive Moderate O Lenient e Portscan Detection Threshold Aggressive Moderate Q Lenient Environmental Alerts Alert when temperature over 65 Celsius Ed Fan speed alert Alert when fan stops spinning Alerts screen Mako Networks Mako 7550 E Product Handbook v 1 1 Page 29 IP Range This screen allows you to review your Public IP Address Settings if your ISP provid
56. ient of Reseller ABC Company Information Mako Networks Mako 7550 E Product Handbook v 1 1 Page 60 Event Log A log of changes that have been made to your Company is available here Ma ko For your business E Management gt Company gt Manage Customer KYZ 7 Event Log Home Company Selection Manage Customer XYZ Reports Add User Event Log Configure Status report for Customer XYZ Events Displaying 20 HA events Help Date Event Type Logout 2006 04 12 17 40 32 Phone changed 2006 04 12 17 40 32 Address changed 2006 04 12 17 10 01 User template changed 2006 04 12 17 00 58 User created 2006 04 12 17 05 25 Mako created Event Log Management User From here you can add modify or delete users within your company When creating or modifying Users you can grant permissions that are equal to or less than your own rights Search This is the default screen when you click on the User tab It lists all the Users for your Company or lets you choose which Company s Users you want to view if you have more than one Company Ma ko For your business Management gt User gt Search Home User Selection Search Manage Bob Smith Reports Configure Company User Search Show Users for Company Customer XYZ a Search Help Search Results Found 3 Logout z Fullname Username Email L Andrew Smith customer mikec makonetworks com O Robert Smith clien
57. is can take some time passwords will never be given out over the telephone it is at least inconvenient and at worst extremely risky to lose the password YOU LOSE YOUR ADSL CONNECTION You may lose your ADSL connection for a number of reasons including telecommunications network provider problems and equipment failure However you can still access the Web Site using any available Internet connection and web browser software The Web Site is specifically designed to work acceptably over ordinary modem connections though of course data transfer will be slower than over your ADSL connection The Web Site has also been checked for compatibility against Microsoft Internet Explorer versions 4 0 and later Netscape Navigator Mozilla versions 3 0 and later and several others Mako Networks Mako 7550 E Product Handbook v 1 1 Page 68 Glossary of Terms Like any specialist area that of secure computer networking has developed a large vocabulary of jargon and technical abbreviations Meanings do change and new terms are always being added The list below aims to help the user to grasp the meaning of some common terms used in this document Please see the web site http whatis techtarget com for more detailed and authoritative explanations ADSL Asymmetric Digital Subscriber Loop A group of technologies used to transmit high speed broadband data across an analogue telephone circuit with the channel capacity towards the subscriber bei
58. isions and limitations set forth below The Manufacturer warrants the Mako appliance for one 1 year The Warranty begins on the date of purchase as shown on your providers invoice Express End user Limited Warranty Each MAKO NETWORKS LTD product purchased hereunder is warranted against defect in material and workmanship and will substantially conform to MAKO NETWORKS LTD product documentation for the period set forth in the documentation supplied with the product following delivery to end user the Warranty Period This warranty extends only to end user and will not extend to nor may it be assigned to any subsequent user Purchaser or user of aMAKO NETWORKS LTD product whether such MAKO NETWORKS LTD product is alone or incorporated into end user s product Exclusions The express warranty set forth above is contingent upon the proper use of a MAKO NETWORKS LTD product in the application for which it was intended and will not apply to any MAKO NETWORKS LTD product that has been i damaged during shipping ii modified or improperly maintained or repaired by a party other than MAKO NETWORKS LTD or its designees or iii subjected to unusual physical or electrical stress This includes operation of the product outside the Operating Specifications of the product Limitation of Remedy In the event a MAKO NETWORKS LTD product fails to perform as warranted MAKO NETWORKS LTD sole and exclusive liability and end user s onl
59. itation Send Invitation To create a VPN between a Mako you can administer and one you cannot you need to know the email address of the administrator of the other Mako The Mako you have currently selected will appear in the bottom left hand side of the Mako Send Invitation page Select which LAN you want to be your part of the VPN select the direction of the VPN in the same manner as Mako to Mako VPNs and enter the email address of the administrator of the Mako you are wanting to connect to Mako For your business r 7 7 y Configure VPN E Mako to Mako Invitation gt Send Invitation Home Firewall Selection Mako to Mako Reports Manage Access Invitation Add Third Party Device Accept Invitation Send Invitation Management Help You can invite another Mako to be part of a VPN with this Mako The invitation is emailed to the address you specify below and is then used to by the invitee to select what Mako they wish to link to the VPN You will then be sent an Logout email asking you to confirm the VPN details after which the VPN will be created Send VPN Invitation Mako Network e ao gt o gt Recipient Email Head Office Lan 1 A on fe O Comments Expiry Date 7 days Require Reconfirmation mi Send VPN Mako to Mako Invitation Send Invitiation The administrator of the other Mako will receive an email with a special key inviting them to accept your invitation and create a Mako to Mako VPN w
60. ith your Mako If you like you can add comments that will be added to the email By default the invitation will be valid for seven days After this time the key will not work and you will have to begin the invitation process again You can change the length of validity of the invitation by changing the Expiry Date The Require Confirmation box will also be checked by default This is to add an extra layer of security to the invitation process With this box checked after your invitation has been accepted you will receive a confirmation email with another key in it that you will need to accept before the VPN is established If you remove the check from Require Reconfirmation this process is skipped and the VPN is established once the invited party accepts Mako Networks Mako 7550 E Product Handbook v 1 1 Page 48 Invitation Accept Invitation Once you have received a Mako to Mako VPN Invitation by email you need to go to the Accept Invitation screen and enter your key Mak For your business j Configure gt VPN gt Mako to Mako gt Invitation gt Accept Invitation Home Selection Mako to Mako Reports Invitation Add Third Party Device Send Invitation Accept Invitation Management Help Enter the invitation code from the invitation email to confirm its details You can send new invitations in the Send Invitation section Logout Accept Invitation Invitation Continue VPN M
61. ko Networks PC Usage for Sean and Service Back Broken down by Destination IP For period 2006 03 10 to 2006 03 14 PC Usage 64 202 121 110 66 102 7 104 Others 69 28 191 166 216 157 144 23 E 664 202 121 110 M66 102 7 104 M69 28 191 166 216 157 144 23 Others Destination IP Downloaded MB Uploaded MB 64 202 121 110 36 7618 0 8117 66 102 7 104 11 5668 1 5563 69 28 191 166 8 7661 0 6824 216 157 144 23 4 9657 4 6807 194 85 34 212 4 9125 0 2678 202 37 170 6 4 5482 0 2038 64 224 99 120 4 5445 0 0773 202 27 187 134 4 2321 0 5369 216 133 243 131 4 155 0 153 PC Usage Service HTTP This breaks down the service by Destination IP address that is the Internet location with which the particular traffic was exchanged In our example the web browser traffic has been listed under all the web sites which were contacted during the selected report period and the amount of traffic associated with each Each IP address in the list can be clicked on to bring up a small pop up window This details everything that the Mako appliance knows about the Destination If you click on the IP address in this small window a new window will be opened to the actual web site concerned Using this functionality you can drill down into the reports to determine exactly which web site a PC user connected to to generate an item of download traffic The reports incorporate hyperlinks to the Destination IP address a convenient way to check on the t
62. lly enabled or disabled at any time as shown in the previous section Mako Networks Mako 7550 E Product Handbook v 1 1 Page 53 PPTP Settings PPTP is not enabled by default This is because enabling PPTP brings with it some risk To enable PPTP click the On radio button Mak For your business Configure gt VPN gt Remote Access gt PPTP Settings Home VPN Selection Mako to Mako Remote Access Reports Manage Access Add VPN User PPTP Settings Configure Management y PPTP configuration updated Help Docs Feedback Logout Manage users PPTP Access in the Manage Access tab PPTP Configuration PPTP Service On QOOff Lan 1 192 168 1 0 24 O Lan 2 192 168 2 0 24 O Lan 3 192 168 3 0 24 O Lan 4 192 168 4 0 24 Network Dynamic IP Range Start 192 168 1 200 Dynamic IP Range End 192 168 1 210 DNS Server Optional WINS Server Optional Save PPTP Settings Choose which LAN network you wish to enable PPTP access to You can only enable PPTP access to one LAN You then must set a range of LAN IP Addresses that will be issued to PPTP VPN users when they connect to the Mako and have the option of issuing an internal DNS Server and WINS Server IP to the PPTP VPN users When you have finished setting this up click the Save button You can now enable each user you wish to have PPTP access from the Manage Access screen Mako Networks Mako 7550 E Product H
63. n Update to save the name Where PCs have been assigned static IP addresses via the Mako DHCP Server a PC name can also be entered via the DHCP screen PC Traffic PC Traffic reports let you analyse the network Internet activity to see the elements of traffic in relation to the individual PCs in the office This is the place to look if you wish to see why a user has an exceptional load pattern for a given period Reports can be obtained for Today Yesterday the Last Five Days the Current Billing Period and the Last Billing Period These reports are broadly similar changing only by the amount of traffic that is analysed Ma ko For your business Mako Networks PC Usage Report For period 2006 03 10 to 2006 03 14 PC Usage 9 Others Dave Server One Laptop Hiean MserverOne MW Laptop Dave F Robert 9 Others Identification Downloaded MB Uploaded MB Sean edit 200 9252 38 469 Server One edit 176 444 3 6217 Laptop edit 108 5555 21 6706 Dave edit 101 7703 184 6304 Robert edit 86 5894 9 0176 David edit 25 2415 3 9951 Harold edit 24 3475 8 0643 Harry edit 21 5317 2 5373 Mark edit 15 198 1 9824 Ple adit 7 AAD 400m PC Usage Last Five Days Mako Networks Mako 7550 E Product Handbook v 1 1 Page 17 The above screen shows an example PC Traffic report Each device on the local network which has contributed to traffic flow in the selected period is listed under Identification Alongside each entry i
64. ng several times greater than that from the subscriber Typical bandwidths are in megabits per second Browser A software application that displays HTML formatted text and facilitates access to web sites Examples are MS Internet Explorer Opera and Netscape Navigator The application provides the web browsing service based on the HTTP protocol DHCP Dynamic Host Configuration Protocol This system allows IP addresses in a network to be assigned automatically on machine power up The IP address may change from one network session to the next DMZ A portion of a network enclosed within a Firewall System DNS Domain Name Service This service resolves host names to IP addresses Email A software application for the construction and transmission of SMTP messages Examples are MS Outlook Eudora and Netscape Communicator Ethernet Ethernet is the most widely installed local area network LAN technology Specified in a standard IEEE 802 3 Ethernet was originally developed by Xerox and then developed further by Xerox DEC and Intel Firewall System A system which prevents unwanted Internet services from coming into or leaving the office network FTP File Transfer Protocol This is a service for bulk data transfer over the Internet HTML Hyper Text Markup Language The data structure which defines a means of formatting text graphics etc on a web page for display on a Browser HTTP Hyper Text Transfer Protocol The service
65. nline Offline Awaiting Connection status If any of your Makos have reached their Absolute Traffic Threshold this will be shown as in the example depicted above for the Head Office Mako First select which of your devices you wish to work with Click on the radio button next to the device you wish to choose in the central box Depending on your browser you may get an immediate response and the screen will refresh or you may need to click on OK Once you have selected a Mako appliance you will see two new menus appear on the left side of the page Reports and Configure From these menus you can obtain Reports review or update the Mako appliance Configuration or add services Mako Networks Mako 7550 E Product Handbook v 1 1 Page 12 Mako Appliance Selected The chosen Mako appliance is now shown in the session status line near the top right of the screen Ma ko For your business Selection gt My Makos Home _ My Makos Reports a 6 Online 0 Offline 1 Awaiting Connection Configure m 1 Absolute Threshold Management Available Makos Found 7 Flag Status Heip Customer XYZ Auckland J K Logout O Customer XYZ Australia a O Customer XYZ Edinburgh J Customer XYZ Glasgow E 0 Customer XYZ Head Office m Customer XYZ London Office J O Customer XYZ Wellington J Show more detail Selected Mako Select your desired operation Reporting Configuration or Help by clicking on the req
66. ny all traffic not expressly allowed N Existing Rules Lan 4 192 168 4 0 24 Source Destination Service Comments Action Option No rules found for Lan 4 Firewall Advanced Outbound The screen shows an example of rules set up to prevent unwanted traffic from being passed out through the firewall Mako Networks Mako 7550 E Product Handbook v 1 1 Page 42 Intranet Basic The Intranet Firewall rules allow you to allow or deny traffic between your four Mako 7550 protected networks It is not normally recommended to change from the default settings as you could reduce the security provided by separating the networks Home Firewall Selection Inbound Intranet VPN Reports Basic Configure gt Firewall gt Intranet gt Basic Left blank the default rules will be selected Management The default rules allow no intranet traffic to ensure maximum network security Rules are implemented from top to bottom by the Firewall Help Docs Feedback e Allow this traffic Logout O Deny this traffic 2 Trace firewall connections A This rule has been created in the Advanced rules page Go to the Advanced page to see the full rule Destination 192 168 2 45 Destination Destination Destination Existing Rules Lan 1 192 168 1 0 24 Service Comments To Lan 2 Sending and Receiving Email Existing Rules Lan 2 192 168 2 0 24 Service Comments No rules found for Lan 2 Existing Rule
67. ofile Provider No ip com Visit No ip com Username Password x Confirm Password Hostname Group Submit Dynamic DNS No ip configuration Mako Networks Mako 7550 E Product Handbook v 1 1 Page 57 Configure Location The Location section allows you to update and view the non technical details of your Mako device Mako Information This screen allows you to review or update information relating to the physical location of your Mako Ma ko For your business Configure gt Location E Home Services ior Selection Mako Information Reports Mako Name Location Head Office Time Zone Dublin Europe Management Edit Help Logout Location By clicking the edit button you can add additional location information Ma ko For your business Edit Mako Information Mako Name Head Office Timezone Dublin Europe Address Suburb City State Postal Code E Country Australia Phone Number Fax Number Cancel Save Add Information Mako Networks Mako 7550 E Product Handbook v 1 1 Page 58 Configure Access From this screen you can view which users have access to this Mako You can change access rights to Resticted Users Mako For your business Home Selection Reports Control User access to this Mako VPN access is configured in the VPN section Y Please press Save once you
68. public network on your LAN 2 3 or 4 networks Mako Networks Mako 7550 E Product Handbook v 1 1 Page 32 DHCP Leases Normally this section will be configured by your reseller and no changes will be necessary It is important that any alteration of the information recorded on this screen is done with care as your communications with the Internet may be disabled if an error is made Mako For your business Configure gt Network gt DHCP Leases Home internet _ Network Selection DHCP Leases Reports We recommend caution when modifying these settings Please consult the Operations Manual before proceeding with Configura amy changes Management Q Delete this DHCP Lease Help Docs A Edit this DHCP Lease Feedback This lease has not been used lately Logout DHCP Leases shown below with Allocated by System as their comments will be removed 2 months from their last use All other DHCP leases will remain static unless deleted DHCP Leases IP Address MAC Address Comments Option 192 168 1 10 00 12 07 E4 98 CA Dave QO A 192 168 1 11 00 12 07 E4 98 AA Sarah O A 192 168 1 12 00 12 07 E4 97 12 Kirsten A Add DHCP Lease IP Address MAC Address Comments Fada DHCP Leases When the Mako s DHCP Server is enabled it will issue IP information to all PCs on the network Each PC computer has an Ethernet card for connection to the network These cards are known as NICs Each NIC has a unique perman
69. s Lan 3 192 168 3 0 24 Service Comments No rules found for Lan 3 Existing Rules Lan 4 192 168 4 0 24 Service Comments No rules found for Lan 4 Add Intranet Rule Source Network 3 Destination IP Address or network Service Type File Transfer Protocol FTP 21 Action Allow Deny Comments If the service you require is not listed please e mail us at mariow makonetworks com Firewall Basic Intranet Mako Networks Mako 7550 E Product Handbook v 1 1 Page 43 Action Option o 94 Action Option Action Option Action Option 39 Add Intranet Advanced As with Outbound Security the Advanced screen permits more complex permissions to be set up Configure gt Firewall gt Intranet gt Advanced Home Firewall Selection Inbound Intranet VPN Reports Basic_ Advanced Left blank the default rules will be selected Management The default rules allow no intranet traffic to ensure maximum network security Rules are implemented from top to bottom by the Firewall Help Docs Feedback e Allow this traffic Logout Deny this traffic L Trace firewall connections Existing Rules Lan 1 192 168 1 0 24 Source Destination Service Comments Action Option To Lan 2 Lan 1 192 168 2 45 SMTP 9 0A Existing Rules Lan 2 192 168 2 0 24 Source Destination Service Comments Action Option No rules found for Lan 2 Existing Rules Lan 3 192 168 3 0 2
70. s the volume of traffic Downloaded from inbound the Internet or Uploaded to outbound the Internet Note the edit tab next to each name to permit the device to be given a more relevant name Where a device has not been named the MAC Address will be shown Clicking on edit will pop up the small window shown which allows the name to be updated Clicking on the device name itself produces a new report shown below This report breaks down the total traffic for a device into the different services which contribute to the total Each service is listed in the first column headed Port Type Services are listed in descending order based on greatest volume first Services Ma ko For your business Mako Networks PC Usage for Sean Back Broken down by Services For period 2006 03 10 to 2006 03 14 PC Usage by Services Sean 1468 Others HTTP TCP HTTF TCP MHTTFS TCP M 0 GRE 1468 Others Port Type Downloaded MB Uploaded MB HTTPFTCP 148 3258 20 4873 HITI PS TCP 23 2022 3 6002 O GRE 10 2736 2 3131 DNS udp UDP 7 4255 4 1269 POP3 TCP 4 916 1 498 HTTP 80580 TCP 2 0162 0 248 5190 TCP 0 6561 0 2505 MSRDPTCP 0 4395 0 2036 MSNP TCP 0 301 0 2441 PC Usage by Services A further analysis can be performed by clicking on one of the service protocols listed In this example we will analyse the HTTP traffic web browsing Mako Networks Mako 7550 E Product Handbook v 1 1 Page 18 Mako For your business im be Ma
71. stinguished on the Internet by assigning it a Port number e g SMTP is Port 25 HTTP is Port 80 Port numbers in the range 0 to 1024 are assigned under international standard while those above 1024 up to 65 535 can be assigned by the Protocol publisher and are known as ephemeral ports The IP address es of the Internet hosts In some cases you may wish to change access for all Internet based hosts rather than specifying individual hosts The IP address es of the local PCs Where particular local machines are to have their Internet access re defined it is necessary to ensure that each ones IP address is constant or static Please refer to the DHCP section for details of this procedure This is not necessary when you are changing access for all PCs on your local network NB Changes made can take up to two minutes to apply to your Mako If you want a change to apply immediately click on the Perform Refresh button at the bottom of the Firewall pages Mako Networks Mako 7550 E Product Handbook v 1 1 Page 36 Inbound Basic Inbound Security is by default set to Deny all access initiated by hosts from the Internet Please review the earlier discussion for background information on the issues involved There are a few occasions when an Internet based host needs to initiate communications with a PC on the office network Acommon example is when a mail server is located in the office network inside the firewall It is frequently necess
72. t mikec makonetworks corn fs Bob Smith bobsmith vpn bobsmith makonetworks com User Search Mako Networks Mako 7550 E Product Handbook v 1 1 Page 61 Once you select a User you will either be taken directly to the Manage User screen or you will be able to click on the Manage User submenu depending upon which browser you are using Mako For your business Management gt User gt Manage Bob Smith gt Information Home User Selection Manage Bob Smith Reports Information Configure Below is the contact information for Bob Smith Configure the users access in the Access Control tab Help General Information for Bob Smith bobsmith vpn First Name Bob Last Name Smith Username bobsmith vpn Logout Email bobsmith makonetworks com Last Login Never i Access Control Edit Manage User From the Manage User screen you can view the contact information for the User and edit it by clicking the Edit button as shown below Mako Networks Mako 7550 E Product Handbook v 1 1 Page 62 Mako For your business Edit Person Information First Name Bob Last Name Smith Username bobsmith vpn Address Suburb City State Postal Code Country Australia a Phone Number Fax Number Email bobsmithiimakonetworks corr i Cancel Ji Save Edit User Once you have edited the Users details click save and the main page will refresh to reflect your newly enter
73. t of your ISP agreement This facility is not available where your ISP Connection Plan does not impose a traffic charging threshold Your Mako appliance automatically detects computers on your network that are infected with worms and stops them from accessing the Internet You can set how aggressive this detection is from this page Considerations If you wish to change your ISP Password you must be sure to make the change at the same time with your ISP preferably on their web site Please be careful to type the password exactly the same at both places Mako Networks and your ISP Click on OK to save your changes Mako Networks Mako 7550 E Product Handbook v 1 1 Page 28 Alerts The Alerts page allows you to set thresholds for alerting for extraordinary usage worm and portscan intrusions and environmental conditions Extraordinary Usage alerts will trigger when traffic volumes reach the level you set These alerts can be very useful in detecting abnormal usage quickly before it impacts your network or users Your Mako appliance automatically detects computers on your network that are infected with worms and stops them from accessing the Internet You can set how aggressive this detection is from this page Similarly your Mako will detect unwanted portscan attempts and block the source IP Address for a ten minute period You can set how aggressive this detection is from this page You can also choose at what CPU temperature you s
74. t the Operations Manual before Configure proceeding with any changes Management Lan 1 Network Configuration Help Docs p Lan 1 Name Lan 1 Feedback Allow Ping Allow Deny Logout r i Mako Ethernet IP Address 192 168 1 254 Subnet Mask 255 255 255 0 DHCP On ooff DHCP Lease Pool Start IP Inclusive DHCP Lease Pool End IP Inclusive WINS Server IP Optional 192 168 1 5 d Primary Internal DNS Server 192 168 1 4 Secondary Internal DNS Server Network Lan 1 Configuration You may rename your network from Lan 1 to a more meaningful name such as Office Network if desired You can choose to allow the Mako to respond to ICMP ping traffic on its LAN 1 interface by selecting the Allow radio button If your office network requires the Mako to provide DHCP functionality the corresponding button should be clicked You can specify a pool of IP Addresses that will be issued by the Makos DHCP Server You have the option of specifying a WINS server if this is required You may also specify any internal DNS Servers These are different from the public DNS Server addresses specified in the Internet configuration section The Mako device must be given a fixed IP address on your network This is set to a default value of 192 168 1 254 for your first network 192 168 2 254 for your second etc lt can be changed to suit the private address architecture used on your networks It must not be set to
75. target local computers This is achieved by leaving the Source IP Address Mask fields empty If your ISP does not provide you with multiple public IP addresses you will not see the Target IP Address drop down You may specify a public IP address that the inbound pinhole refers to This is useful if you want to have multiple pinholes to the same port on different internal PCs You may specify to log debugging information when a connection through an inbound rule is attempted The Trace Logging checkbox when checked records the debugging information which is then made available to your Reseller in the Syslogs Report section of the website The Trace Logging option is also available in the Outbound Advanced and Intranet Advanced sections Mako Networks Mako 7550 E Product Handbook v 1 1 Page 40 Outbound Basic By default Outbound traffic is not filtered Please review the discussion earlier in the Firewall section for background information on the issues involved Configure gt Firewall gt Outbound gt Basic Home Firewall Selection Outbound VPN Reports Basic Left blank the default rules will be selected Management Default rules allow all traffic to leave your network Rules are implemented from top to bottom by the Firewall Feedback a Allow this traffic Help Docs Logout Deny this traffic PL Trace firewall connections A This rule has been created in the Advanced rules page Go
76. the network service provider will be your local telephone supplier Network service providers have a variety of procedures for approving customer premises equipment for connection to their network The connection interface in the Mako has been developed to connect to the majority of network service providers If you have any queries your reseller will be happy to confirm whether the Mako is approved by your network service provider for connection to their telecommunications network Service Provider Manual Your Network Provider can provide you with a Manual which covers all aspects of connecting to their Internet service Please refer to this for any additional information you require Firewall and VPN Router Operation Under normal conditions there is nothing which requires your intervention The Mako is designed to detect many forms of internal malfunction and reset itself to correct operation In the worst case this may require it to download a fresh configuration from the Mako Networks Central Command Servers You can force a reload by a simple power off and on of the unit Changes to the configuration of the Mako cannot be made on the unit itself These are performed by securely accessing and using the convenient menus on the Central Management web site https secure makonetworks com Mako Networks Mako 7550 E Product Handbook v 1 1 Page 8 Turning on There are three lights on the front panel only two the Power light and the Sta
77. to the Advanced page to see the full rule Existing Rules Lan 1 192 168 1 0 24 Destination Service Comments Action Option No rules found for Lan 1 Deny all traffic not expressly allowed D Existing Rules Lan 2 192 168 2 0 24 Destination Service Comments Action Option To External any Simple Net Mgmt Protocol TCP m O A L any Universal Plug and Play O A L t any NetBIOS TCP o 93 any NetBIOS UDP O OAZ fT Deny all traffic not expressly allowed N Existing Rules Lan 3 192 168 3 0 24 Destination Service Comments Action Option No rules found for Lan 3 Deny all traffic not expressly allowed N Existing Rules Lan 4 192 168 4 0 24 Destination Service Comments Action Option No rules found for Lan 4 Deny all traffic not expressly allowed NM Firewall Rules Basic Outbound The screen shows how any given rule can be set up to Deny or to Allow the specified traffic In this example three protocols which may pose security issues for an Internet connection are prevented from passing from any internal machine on Lan 2 out through the firewall There is also the option of Denying all traffic not expressly allowed This is a convenient way to set up your rule structure as it means that once the box is checked only required access permissions need be addressed These can be set up as Allowed All others are blocked To ensure that a rule to permit Allowed traffic does not inadvertently open unwanted access by subverting th
78. tus light are utilised at present When turning on for the first time the unit will connect directly to the Central Command Servers to download its configuration The Power light should be on as download of the secure profile takes place Once your profile has been downloaded from the Central Command Servers the Status light will illuminate green and your Internet communications are now established Please allow up to five minutes for the line light to illuminate green and your Mako to be ready for use MakoScope LCD MakoScope LCD is the name for the Mako 7550 LCD Feedback System By interacting with the LCD screen on the front of your Mako you can get real time information of the status of your Mako MakoScope LCD The MakoScope LCD shows the following useful information Internet Status If the Mako is online your public IP Address is shown otherwise Offline will be displayed WAN Interface Information If connected will display your media connection speed otherwise will display Down LAN Interface Listing IP Addresses of your LAN interfaces Mako ID The unique identifier of your Mako Testing You can test whether you have Internet communications established by opening a web browser on one of your office computers and accessing two or three web sites For example a news web site e g www cnn com or a search engine e g www google com If you are having difficulties do try more than one web
79. twork j a Gateway j A Route name Maximum of 32 characters Static Routes Mako Networks Mako 7550 E Product Handbook v 1 1 Page 34 Configure Firewall The default security configuration for a Mako is to permit no communications initiated from the Internet to penetrate your networks At the same time all communications initiated from the office network can access the Internet In telephone terms you can call out but they can t call in This means that users on your Mako protected networks can send and receive their email browse the World Wide Web and access all other Internet based services while the firewall ensures that none of their PCs are visible to the Internet This is a very secure setting of your Mako device and should not be changed except in cases of specific need Changes to permissions which Deny access tend to improve firewall security Changes which Allow access tend to weaken firewall security Changes to permissions should therefore specify the permitted access as narrowly as possible to minimise risk of unauthorised intrusion Inbound This relates to the firewall rules which permit communications to be initiated from the Internet into your local networks by a remote host computer It is important to understand that Inbound access permissions place some responsibility for security of the local network onto the designated target local network PC or server The firewall will pass through all communications mat
80. uired menu from the list on the left hand side The different operations are described on the following pages Quick Information Snapshot There is an information I symbol near the top right of the page which gives you a snapshot of information about your selected Mako Information amp Quick Selection buttons Selection Shortcut Next to the Information symbol is an upside down triangle Clicking on this gives you a list of your recently selected Makos This comes in handy when you are in other areas of the site and want to select another Mako or if you have a large number of Makos to manage Mako Networks Mako 7550 E Product Handbook v 1 1 Page 13 Reports Usage The Reports section provides a comprehensive array of options for displaying analysis of the traffic that has flowed through the Mako device Reports let you review traffic usage As snapshots or cumulative use over different time spans taken for your network as a whole Similar reports this time for traffic related to a particular PC in your office to which you Can assign a name Detailed PC reports which review a PC s traffic in relation to the type of traffic protocol and the remote site destination of the communications You are also able to check on the status of your Mako appliance Mako Usage This section allows you to obtain a selection of reports from the chosen device The options available are shown in the example screen below Ma ko
81. urchaser and dispose of such MAKO NETWORKS LTD product in accordance with Purchaser s instructions on behalf of end user and at Purchaser s cost Mako Networks Mako 7550 E Product Handbook v 1 1 Page 4 Introduction The Mako Networks System combines a web server driven configuration management and reporting user interface with client end hardware to provide users with considerable cost savings as well as functionality and flexibility not currently available in traditional devices used to meet either the same or similar requirements The Mako Networks System is targeted at small to medium sized businesses SME small to medium sized branch office of larger organisations and their use of broadband as a data transfer medium Mako 7550 E Firewall Router VPN Appliance The Mako 7550 E by Mako Networks is a solid state ethernet router with a stateful inspection firewall VPN functionality and four LAN Ethernet ports Designed to work in conjunction with the Mako Networks Central Management System it provides you with enterprise level control over your connection to the Internet Complete Security Your Mako 7550 E is managed by the Mako Networks Central Management System giving you complete peace of mind that your networks are always fully protected All software is updated and patched automatically for you and intrusion attempts are dealt with Your Mako 7550 E incorporates a stateful inspection firewall This means that all traffic entering
82. used to access the Mako Networks website cannot access Remote VPNs Any user recorded in the subsequent Add User section can have their network access enabled and disabled as appropriate For best security it is highly desirable that they are permitted access only while they need to use the office network at other times their access should be disabled Mako For your business Configure gt VPN gt Remote Access gt Manage Access Home Firewall_ VPN Selection Mako to Mako Remote Access _ Reports _ Manage Access Add VPN User PPTP Settings Configure gt y Management VPN Access permitted VPN Access not allowed Help Docs y Warning Message Hover mouse over icon for details Feedback j l Below is the list of VPN users and their access to this Mako Logout You can add another VPN user in the Add User tab Users are configured in the Management section Changes may take up to 10 minutes to take effect Manage Remote Access User Name Network IPSec PPTP Lan 1 A Lan 2 e A andrewsmith vpn Andrew Smith ae o A Lan 4 A VPN Remote Access When the indicator for a particular type of VPN is red that VPN type is disabled for that user To enable click the red indicator and it will change to green Disabling is done in the reverse manner Considerations There are two areas which affect the remote VPN user First is the way in which they connect to the Internet Secon
83. which transfers HTML formatted web pages to a Browser Hub A device which extends the connectivity of an ethernet local area network to provide for additional computer connections Mako Networks Mako 7550 E Product Handbook v 1 1 Page 69 IPsec An industry standard protocol for establishing secure communications at the packet level Often used as an component in a VPN architecture MAC Address Media Access Control The hardware address of a machine s connection to a local area network Each NIC has a unique MAC NIC Network Interface Card The component of a computer which allows connection to a local area network Port The number which identifies a specific channel for communications relating to a specific Service Ports greater than 1023 are called ephemeral ports these are for assignment to proprietary or special purpose applications Router A communications device connected between two different networks which maps routes traffic between the IP addresses on each network Service Services comprise three elements a pair of communicating software applications the definition of the data structures which the applications exchange and the definition of the protocols by which the applications exchange data structures Standardised services include FTP Telnet HTTP SMTP etc There are also proprietary or special purpose services SMTP Simple Mail Transfer Protocol The service for encapsulating and sending messages to
84. y remedies for breach of this warranty shall be at MAKO NETWORKS LTD s option to repair replace or credit an amount not exceeding the Purchaser s purchase price of each product found to be defective provided that 1 End user complies with the rejection and warranty procedures contained in Section 5 below and returns the MAKO NETWORKS LTD product that the end user considers defective for examination and testing 2 MAKO NETWORKS LTD shall not be liable under this warranty if testing and examination by MAKO NETWORKS LTD discloses that the MAKO NETWORKS LTD product has been modified or altered in any manner after it was shipped by MAKO NETWORKS LTD 3 MAKO NETWORKS LTD shall not be liable under this warranty if testing and examination by MAKO NETWORKS LTD discloses that the alleged defect in the MAKO NETWORKS LTD product does not exist or was caused by end user or any third person s misuse neglect improper installation or testing unauthorized attempts to repair or any other cause beyond the range of intended user or by accident fire or other hazard 4 MAKO NETWORKS LTD shall not be liable under any warranty under this Agreement with respect to any MAKO NETWORKS LTD product that is not returned in its original shipping container or a functionally equivalent container 5 If MAKO NETWORKS LTD testing and examination does not disclose a defect warranted under this Agreement MAKO NETWORKS LTD shall so advise P
85. ype of downloaded information by simply opening a window at the web site Detailed data on the amount and type of traffic relating to that web site is shown in the pop up box e Click on the Destination IP address in the main report table to show the pop up box e Click on either the IP Address or the Host Name in the pop up box to open a window to the destination web site Mako Traffic Mako Traffic reports let you see how a specific PC s Internet activity relates to other PCs on your network This is the place to look to get a breakdown of the traffic by service protocol port over a given period Reports can be obtained for Today Yesterday the Last Five Days the Current Billing Period and the Last Billing Period These reports are broadly similar changing only by the amount of traffic that is analysed Mako Networks Mako 7550 E Product Handbook v 1 1 Page 19 Mako For your business Y be Mako Networks Mako Usage Report For period 2006 03 09 to 2006 03 14 Mako Usage by Services HTTP TCP 7880 Others SSH TCP MHTTP TCP MHTTPS TCP MSSH TCP 7880 Others Identification Downloaded MB Uploaded MB HTTP TCP 557 0155 51 4057 HTTPS TCP 89 3555 12 7983 SSH TCP 81 3411 20 8641 46631 TCP 19 6783 0 3929 52983 TCP 15 7031 0 3074 O GRE 14 5109 4 0569 39471 TCP 11 4277 0 2687 20 TCP 11 2439 0 2176 IMAP TCP 10 6558 1 2427 NAC ida IMAN an AMA c cenna PC Traffic Mako Traffic The screen above shows a comprehensive ex

Download Pdf Manuals

image

Related Search

Related Contents

CDJ-2000 - Pioneer  York PAC036 User's Manual  Homelite HG1800 Portable Generator User Manual  Sony Mobile Communications AB  LATEX, un peu, beaucoup  User Manual (English)  JVC GZ-MS130U User's Manual  Untitled - Easyteck  Add-On Computer Peripherals (ACP) Displayport / DVI 5 Pack  pc/MRP User Manual  

Copyright © All rights reserved.
Failed to retrieve file