Home

Innominate mGuard - Innominate Security Technologies AG

image

Contents

1. root admin user Root Password Factory default setting root If you wish to change the root password enter the current password in the Old Password field and then the desired new password in the two corresponding fields below Administrator Password Account admin Factory default setting mGuard fixed user name admin Disable the VPN until the user is authenticated via HTTP Yes No The factory default setting for this switch is No In the case of Yes VPN connections and various other services can only be used after a user logged into the mGuard entered the user password via HTTP All HTTP traffic will be redirected to the mGuards user login page when the user is required to login The change of this option becomes active after the next reboot User Password There is no factory setting for the user password To set one enter the desired password twice once in each of the two fields 6 5 2 User Authentication gt Firewall Users Firewall Users User To eliminate private surfing on the Internet every outgoing connection is blocked VPN is not affected by means of outgoing filter rules via Network security gt Packet filters Under Network security gt User firewall certain user firewalls can be assigned different firewall rules definitions for example permitting any outgoing connection This user firewall rule goes into effect as soon as any respective firewall user to whom this firewall rule ap
2. Your e mail client uses the POP3 protocol for incoming e mail The virus filter can only check unencrypted data for viruses Consequently you should not activate encryption options such as STLS or SSL Encrypted authentication using AUTH is however usable since the e mail itself is not encrypted Anti virus protection for POP3 E mail pickup Yes No In the case of Yes files received are scanned for viruses by mGuard if they arrive via POP3 connections contained in the list of POP3 servers below Tip When using a POP3 connection most e mail clients will pick up all of the e mails during a single connection In this case the new settings will first take effect after the last e mail is collected from the server during the current connection Consequently to change the settings when an e mail transfer is in process first cancel the transfer POP3 maximum filesize for scanning in bytes With this parameter you can set the maximum size of the files to be checked If this limit is exceeded the system will depending on the setting Action for mails exceeding the maximum message size block the e mail and send an error message back to the e mail client or it will automatically switch to Let the message pass unscanned mode If the mGuard does not have enough memory to save a file completely or to decompress it a corresponding error message will be sent to the user s e mail client and an entry will be writt
3. 1 Select the page with the desired configuration options from the menu see Page 43 2 Make the desired settings on the associated page 3 Once you have confirmed the changes by clicking on OK the new settings will be activated on the device The system will display a confirming message If the changes are not shown when you open the page again because the browser has loaded the page from a cache reload the page to refresh the display To do so click on the appropriate icon in the browser toolbar gt Depending on how you configure the mGuard you may also need to modify the network interface settings of the locally connected system or network accordingly 5 4 Remote Configuration Prerequisite Remote configuration The mGuard must be configured to permit remote configuration gt For reasons of security remote configuration is disabled by default For information on how to enable remote configuration see section Management gt Web Settings on page 50 To configure the mGuard from a remote computer first establish a connection between it and the local mGuard Proceed as follows 1 Start a Web browser e g Firefox MS Internet Explorer or Safari the Web browser must support SSL i e https 2 As the address enter https followed by the IP address or hostname under which the mGuard can be reached 41 of 152 Example If this mGuard can be found in the Internet at the address 123 456
4. 8 Automatic configuration backup is enabled disabled R Automatic reconfiguriation if blade replacement is enabled disabled Rack ID The ID of the rack into which the mGuard is mounted This values can be set on the control unit for all blades inside the rack Power Supply P1 P2 State of the power supplies P1 and P2 e OK e Absent e Defect e Fatal Error Blade Number of the slot in which the mGuard is installed Device Device type e g blade or blade XL State Online The device in the slot is ready Present The device is present but not ready yet e g it is still booting Absent No device was found in the slot 68 of 152 WAN Status of the Ethernet WAN port LAN Status of the Ethernet LAN port Serial The mGuard s serial number Version Software version of the mGuard B Automatic configuration backup on the controller is activated deactivated for this slot R Automatic configuration restore from the controller is activated deactivated for this slot 6 3 2 Blade control gt Blade 01 to 12 Blade in slot __ Overview Blade Control Blade 01 Blade in slot 01 Configuration Overview Device type ID bus controller ID Serial number Flash ID Software version MAC addresses Status LAN link status WAN link status Temperature Device type Device type e g blade or blade XL ID bus Controller ID ID of this slot on the bladeBases control bus Serial The
5. or not by setting Log to No factory setting Log entries for unknown connection attempts If this is set to Yes all attempts to establish a connection which were not covered by the rules defined above will be logged Outgoing Rules Network Security Packet Filter Incoming Rules Outgoing Rules Outgoing Lag D fr auigaing W Dds 109 DDE 1 bec BcD8 DDDcbe D1 DIS2 PX FE tall z Jo 0 0 0 0 Jany fo 0 0 0 0 Tan Accept default rule n No 2 These rules specify which traffic from the inside is allowed to pass to the outside Please note Port settings are only meaningful for TCP and UDP Log entries for unknown connection attempts No Lists the firewall rules that have been set These rules apply for outgoing connections i e ones which were initiated internally to communicate with a remote site The default factory setting is a rule that allows all outgoing connections If no rule is set all outgoing connections are forbidden except VPN Inserting moving and deleting rows is explained under Working with tables on page 43 You have the following options for the entries Protocol All means TCP UDP ICMP and other IP protocols 90 of 152 IP address 0 0 0 0 0 means all addresses To enter an address space use the CIDR notation see CIDR Classless InterDomain Routing on page 135 Port This is only evaluated by the TCP and UDP protocols any means each and
6. The password must be the same on both mGuards It will be transmitted in clear text and should not be identical with other security relevant passwords Stealth Mode Virtual Router ID Routermode External Virtual Router ID An ID between 1 and 255 which must be the same on both mGuards and iden tifies the virtual router Stealth Mode Management IP of the 2nd device Routermode External IP of the 2nd device In stealth mode the management IP of the other mGuard in router mode the external IP of the other mGuard Router Mode 128 of 152 The following values need to be set if the mGuards are operated in router mode Internal Virtual Router ID An ID between 1 and 255 which must be the same on both mGuards and iden tifies the virtual router on the internal interface ICMP Checks Internal IP of the 2nd device The internal IP of the other mGuard External virtual IP IP of the virtual router on the external interface WAN Internal virtual IP IP of the virtual router on the internal interface LAN Clients inside the in ternal network should use this IP as their default gateway Management Redundancy ICMP Checks ICMP Checks Enable ICMP checks Hosts to check via ICMP in the external network Hosts to check via ICMP in the internal network ICMP checks provide an additional way to monitor the network connections between mGuards working as a virtual router If one of the two direct Ethernet connections
7. Contact The signal contact is a relais which is used by the EAGLE mGuard to signal error conditions See Signal contact on page 22 46 of 152 Mode Signal contact The signal contact can be controlled by the mGuard through automatic Ope ration supervision or Manual setting Operation supervision Contact Displays the state of the the signal contact Either Open Error oder Closed Ok Redundant power supply If set to Ignore the power supply doesn t influence the signal contact If set to Supervise the signal contact will be opened if one of the power supplies fails or during permanent malfunction inside the mGuard internal voltage of 3 3 VDC power supply lt 9 6V Link supervision Supervision of the ethernet interfaces link state Possible settings are e Ignore e Supervise only internal port trusted e Supervise only external port unntrusted e Supervise both ports Manual settings Contact If the signal contact is set to Manual setting this option sets the contact to Closed or Open Alarm Time and Date Management System Settings Time and Date Time and Date Current system time UTC Current system time local Local system time 2000 01 01 00 04 22 Timezone in POSIX 1 notation Time stamp in filesystem 2h granularity NTP Server Enable NTP time synchronization NTP State Server Time and Date Current system time UTC Displays the current system tim
8. Editing a defined user firewall template Click the Edit button next to the list entry Deleting a defined user firewall template Click the Delete button next to the list entry Defining a new user firewall template 1 Click the New button Result the list of user firewall templates displayed will be supplemented with a new entry 2 Next to the list entry click the Edit button 99 of 152 User Firewall gt After clicking on the Edit button the following page will appear Define Template General Network Security User Firewall marketing Options A descriptive name for the template marketing Timeout 28800 Timeout type sai AA Options A descriptive name for the template You can name or rename the user firewall template as desired Active Yes No For Yes the user firewall template becomes active as soon as external users log onto the mGuard who are listed on the Template User register card see below and who have been assigned firewall rules It doesn t matter from which computer and under which IP address the user logs in The assignment of user firewall rules is based on the authentication data that the user enters during the login user name password Comments Optional explanatory text Timeout Default 28800 Indicates the time in seconds at which point the firewall rules will be deacti vated If the user session lasts longer than the timeout time defined here the user will have to rep
9. IP Masquerading i e traffic is NATed to the external virtual IP e ltol NAT e Port forwarding use the external virtual IP as Incoming on IP e MAC Filter 127 of 152 Redundancy General Management Redundancy Redundancy General Redundancy State Enable Redundancy Redundancy Start State Priority Authentication passphrase Stealth Mode Virtual Router ID 5 Router Mode External Virtual Router ID Stealth Mode Management IP of the 2nd device Router Mode External IP of the 2nd device Disabled Router Mode Internal Virtual Router ID Internal IP of the 2nd device External virtual IP EENG of ofi N en ola plo Sis el H Internal virtual IP 192 168 1 100 Redundancy State Shows the current redundancy state of this mGuard Enable Redundancy Enable Disable the redundancy feature Redundancy Start State The state of this mGuard during activation of redundancy master or backup Priority Defines which mGuard will operate as the master In case the priorities are different the mGuard with the higher priority will operate as the master as long as it does not fail If both mGuards have the same priority and the backup becomes the master in case of a failure it will continue to work as the master even when the other mGuard becomes available again Values between 1 and 254 are possible Authentication passphrase This password is to protect against misconfiguration among different virtual routers
10. Log entries for unknown connection attempts No Outgoing SaR Ne Protocol NC AT tore CT ET TE tog E Log entries for unknown connection attempts 19 D fve vpn vDDD_DDD in A 0 2e49ed10 e930 1610 9227 DDDcbeD1DIS2 La E Ne Protocol E TO Torr ET MES __ Comment too E 1 Fan z 0 0 0 0 0 any 0 0 0 0 0 Jany Accept z default rule plez No z Lag D fw wpn wDDD_DDD aul A10 2e49e410 e970 1610 9227 DDDcbe D1052 1 Fan z Jo 0 0 0 0 Jany 0 0 0 0 0 Jany Accept z default rule plez No y Firewall incoming Firewall outgoing While the settings made in the Firewall menu only affect non VPN connections see above under Incoming Rules on page 89 these settings affect just the VPN connection defined here This means If you have defined multiple VPN connections you can restrict the outgoing or incoming access individually for each connection You can have any attempts made to bypass these restrictions logged gt The VPN Firewall factory settings allow all connections via this VPN connection However the settings for Network Security gt DoS Protection on page 98 do apply independently for each individual VPN connection BO Tf multiple firewall rules are set they will be searched in the order in which they are listed from top to bottom until a suitable rule is found This rule will then be applied If further down in the list there are other rules which would also fit they will be ign
11. with 12 bits containing the VLAN ID The VLAN IDs 0 and 4095 are reser ved and can t be used for VLAN identification VPN Virtual Private A Virtual Private Network VPN connects several separate private networks Network subnets together via a public network e g the Internet to form a single joint network A cryptographic protocol is used to ensure confidentiality and authenticity A VPN thus offers an economical alternative to using dedicated lines to build a nationwide corporate network 149 of 152 9 Technical data General Intel IXP 42x mit 266 MHz or 533 MHz EAGLE und enterprise CPU XL Memory 16 MB Flash 64 MB SDRAM mGuard delta 128 MB LAN and WAN Interfaces Ethernet IEEE 802 10 100 Mbps RJ45 Serial RS 232 Operating System Innominate Embedded Linux Monitoring Indicators Watchdog and LEDs Relative humidity Temperature blade smart PCI max 90 none condensing delta 5 95 none condensing smart blade delta 0 40 C PCI 0 70 C EAGLE mGuard Network size Operating voltage Potential difference between input voltage and housing Length of a 10BASE T 100BASE TX twisted pair segment 100 m approx NEC Class 2 power source 12 VDC or 24 VDC 25 33 safety extra low voltage SELV PELV redundant inputs decoupled 5 A maximum Buffer time min 10 ms at 24 VDC Potential difference to input voltage 24 VDC 32 VDC Potential difference
12. 192 168 1 0 24 and you may need to adjust the configuration of your computer to access it 36 of 152 If you are using Windows XP click on Start Control Panel Network Connections e Right click on the icon of the LAN adapter and then e click on Properties in the pop up menu e In the dialog Internet Protocol Properties on the General tab select Internet Protocol TCP IP under This connection uses the following items and then e click on the Properties button to open the following dialog Internet Protocol TCP IP Properties General You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically 2 Use the following IP address IP address 192 168 1 2 Subnet mask 255 255 255 0 Default gateway 192 168 1 2 Use the following DNS server addresses Preferred DNS server Altemate DNS server Activate Use the following IP and then enter the following address IP address 192 168 1 2 Subnetwork mask 255 255 255 0 Default gateway 192 168 1 1 B gt Depending on how you configure the mGuard you may also need to modify the network interface settings of the locally connected system or network accordingly 5 2 3 mGuard PCI Install the mGuard PCI Card Install the mGuard PCI Driver Configure the Network Interface If you haven
13. 9 1 IPsec VPN Global ud A A ss 113 Machine Certifica lis 113 DynDNS MontOTNOS ici din 114 6 9 2 IPsec VPN gt Connections ae 114 COMME Sci tddi aii da 114 6 9 3 Define a VPN Comme ction sirsie ese e aan aa salinos ideas site 115 Generalitat iia oidos 115 Authentic ii 119 Etrewallictiva domo excels tout va Mla anes ds latas iaa 121 IKE OPtODS units rial TE a cotidiana 123 6 9 4 IPsec VPN gt L2TP oyver I Pset vinindustrien 125 A A ANN 125 6 9 5 lt IPsec VPN gt IP sec Statu Sne ne e as ek eee 125 6 10 Menu redundancy cnt Meade eaten aaa aes erates 127 6 10 1 Firewall Redundancy 4 casei caine oan is 127 Redundancy 2 22 esieeniien Bian einai niin nein hin deed 128 ICMP Checks ornen nane E on Rae 129 6 10 2 Ring Network Coupling ooocconnccnoconocnnonononoconononnnanonn nc noconccnn nono conan E AEE E aR Ee 129 Ring Network Coupling nestis e ee a SEE ERE ae 129 OLL Menu ogame ista ti tdo 130 GAL Los US ro 130 Remote Lose maca ata lala ceca 130 6 11 2 Logging gt Browse local logs ti io 131 6 12 Menu S pp rt ua aaa 134 As A seeds case E aaa aaeoa wedi en kne 134 Hard WI ee Rhee he ES 134 SHAPSHOb seveersedss O a Rea 134 6 13 CIDR Classless InterDomain Routing 2 0 0 ee ceseesseceeeceeaeeceeeeceeeeaeceeaeneaeceeaeeeeeees 135 6 14 Network Examples iis cieler tienne ieiet tica 136 7 The Rescue Button restart recovery procedure and to flash the firmware 000 137
14. Found New Hardware Wizard Ha Innominate mGuardPCl Windows has finished installing the software for this device To close this wizard click Finish lt Back Cancel The Linux driver is available as a source archive and must be compiled before usage To do this e Build and install the kernel 2 4 26 in usr src linux e Unpack the driver into usr src pci driver e Issue the following commands in the shell e cd usr sre pci driver 31 of 152 e make LINUXDIR usr src linux install m0644 mguard o lib modules 2 4 26 kernel drivers net e depmod a e To load the driver run the following command e modprobe mguard 32 of 152 33 of 152 5 Configuration preparation 5 1 Connecting the mGuard mGuard blade mGuard delta EAGLE mGuard mGuard smart mGuard PCI The mGuard blade must be installed inside the mGuard bladeBase and at least one of the bladeBases power supplies must be on In a local configuration The system that you use for performing the configuration must either be connected to the LAN jack of the mGuard blade or connected to it via the local network In the case of a remote configuration The mGuard must be configured to permit remote configuration The mGuard must be connected i e the required connections must function The mGuard must be connected to its power supply In a local configuration The system that you use for performing the configura
15. Hostname host example com If a VPN connection is to be setup at least the IP address of one of the partners must be known so that the other can setup a connection to it This condition is not satisfied if both sites stations are assigned their IP addresses dynamically by their respective Internet Service Providers In this case a DynDNS Service such as DynDNS org or DNS4BIZ com can be of assistance The currently valid IP address of a site station is registered under a fixed name at a DynDNS service If you have registered with one of the DynDNS services supported by mGuard you can enter the corresponding information in this screen Register this mGuard at a DynDNS Service Yes No Select Yes if you have registered with a DynDNS provider and the mGuard should utilize this service In this case the mGuard will report its current IP address the one assigned for its own Internet access by 1ts Internet Service Provider to the DynDNS Service Refresh Interval sec Standard 420 seconds 6 4 3 Internal External DHCP Whenever the IP address of its own Internet access is changed the mGuard will inform the DynDNS Service of its new IP address For additional reliability the device will also report its IP address at the interval set here This setting is ignored for some DynDNS providers like DynDNS org where too many updates will cause the account to be closed DynDNS Provider The providers in the list support the s
16. In Stealth mode Reject is not supported Comment An informational comment for this rule Log You can specify for each individual firewall rule whether the use of the rule e should be logged by setting Log to Yes e or should not be logged by setting Log to No factory setting 6 2 3 Management gt Licensing Overview Management Licensing Overview mGuard Flash ID 000b000a40ffc77b 0142 AntiVirus License AntiVirus license installed VE Expiry data poor os oTses35 920 Feature License License with priority 1148898187 E licence_id 0 licence_date 2006 05 29T10 23 07 flash_id 000b000a40ffc77b serial_number 16529003 hardware_revision 00000dee licence_order 264 product_code 51033 vpn_channels 1 I2tp_server snmp remote_syslog mau_management AntiVirus License Anti Virus license installed Here you can examine the validity of the installed AVP license Expiry date Shows the expiry date of your anti virus license Feature License Shows which functions are included with the mGuard license you have purcha sed e g the number of possible VPN tunnels Install Management Licensing Automatic License Installation Voucher Serial umber Voweherkey YA Manual License Installation Order License Edit License Request Form Filename Browse Install license file With the following functions you can install new licenses on your mGuard Automatic license installation Vouch
17. Local IP Mode Via DHCP If the address data for the access to the PPTP server is supplied by the Internet Service Provider via DHCP select Via DHCP In this case you need not make an entry in the Local IP field Static from field below If the address required to access the PPTP server is not supplied by the Internet Service Provider via DHCP you must enter the IP address of the remote PPTP server and possibly that of the mGuard in the following two fields Local IP The IP address under which the mGuard can be accessed by the PPTP server Modem IP This is the address of the Internet Service Provider s PPTP server Internal Networks Internal IPs The Internal IP is the IP address under which the mGuard can be accessed from the locally connected LAN 77 of 152 Ethernet 78 of 152 In Router PPPoE PPTP mode the default settings are IP address 192 168 1 1 Local Netmask 255 255 255 0 You can also specify other addresses under which the mGuard can be accessed by devices on the locally connected network This can be useful for example if the locally connected network is divided into subnetworks In this case multiple units on different subnetworks can access the mGuard under different addresses IP IP Adresse under which the mGuard shall be accessible on the internal inter face LAN Netmask A netmask for the internal interface LAN Use VLAN If this IP address is to be inside a VLAN this option
18. Programs Accessories Command Prompt enter the following command ipconfig all Network Interfaces Network Status External IP address Network Mode Status Active Defaultroute Network Mode Network Mode External Networks Obtain external configuration via DHCP y ETRE o IP Netmask Use YLAN LAN ID un o 10 1 0 152 255 255 255 0 o fa Additional External Routes Network Gateway IP of default gateway Internal Networks foe Le IP Netmask Use LAN LAN ID rusted po 192 168 1 1 255 255 255 0 fno I Additional Internal Routes Network Gateway External Networks Network Mode Router These are the addresses under which the mGuard can be accessed by devices in the external networks connected to the mGuard s Ethernet connector If this unit is serving as a gateway to the Internet the IP addresses will be assigned by the Internet Service Provider ISP Obtain external configuration via DHCP Yes No Tf the mGuard obtains the configuration data via DHCP Dynamic Host Configuration Protocol from a DHCP server enter Yes In that case all other entries made on this page will be ignored Tf the mGuard does not obtain the configuration data via DHCP Dynamic Host Configuration Protocol from a DHCP server enter No and make the following additional entries 75 of 152 External IPs untrusted port IP Netmask IP and netmask for the external interface WAN Use VLAN I
19. Read Write Community Read Only Community Enter the required login data in these two fields 60 of 152 Allowed Networks Lists the firewall rules that have been set These apply for the incoming data packets of an SNMP access Inserting moving and deleting rows is explained under Working with tables on page 43 From IP Enter the address es of the system s that is are allowed access for the purpose of SNMP monitoring in this field You have the following options for the entries e An IP address e To enter an address space use the CIDR notation see CIDR Classless InterDomain Routing on page 135 e 0 0 0 0 0 means all addresses Interface External OR Internal Specifies whether the rule applies to the external interface WAN port or the internal interface LAN port The default behaviour when no rules are specified is to drop all connections on the external interface and to accept all connections on the internal inter face Action Possible settings e Accept e Reject e Drop Accept means that the data packets should be passed through Reject means that the data packets should be rejected so that the sender is informed that the data packets have been rejected In Stealth mode Reject has the same effect as Drop Drop means that the data packets should not be passed through The data packets will be discarded so that the sender will not be informed as to what happened to them In Stealth m
20. Shell Access Enable SSH remote access Port for incoming SSH connections remote administration only Allowed Networks PE rromi O interface f action comment to These rules allow to enable SSH remote access Important Make sure to set secure passwords before enabling remote access Note In Stealth mode incoming traffic on the given port is no longer forwarded to the client Note In router mode with NAT or portforwarding the port set here has priority over portforwarding Note The SSH access from the internal side is enabled by default and can be restricted by firewall rules Shell Access When SSH Remote Access is enabled the mGuard can be configured from a remote system using the command line interface This option is disabled by default IMPORTANT If you enable remote access make certain that you have secure root and administrator passwords To enable SSH Remote Access proceed as follows Enable SSH remote access Yes No If you want to allow SSH connections set this switch to Yes In this case make certain that the firewall rules on this page permit the mGuard be accessed from a remote site Port for incoming SSH connections remote administration only Standard 22 You can select a different port Example If this mGuard can be found in the Internet at the address 123 456 789 21 and the Port Number 22 has been set as the port for remote access you do not need to enter this port number in the
21. Tel Rerforming a Resta da ducati At 137 T2 Performing a RECOVery 2 ssi lt i isis chistes cc dstvidh ites a a a Ea S e aee eiae pera Se 137 73 gt Blashine the firm Ware teser aeaaee leds eaae aeaa eiat ites 138 Required before the firmware can be flashed DHCP and TFTP servers 140 7 3 1 Installing DHCP and TFTP servers under Windows or Linux s es 141 Under W INO WS tna E OE inci 141 Under LIMA A ee RES 142 BGI OSSARY OE AA AE AEE ESEO EESE EA TEE 143 Asymmetrical Encryption enio n a a E e a 143 DES IDE Sir OE O E ind A yeast 143 AES morenen aa A a E E Elia scetebbons 143 Chent Server iia illa a aea ae ieee eaei 143 Dita iii io aia 143 Default routes tddi aa tati ls 144 DynDNS provider eiaa e cadens eatin sae os bolas darias 144 IP addres S iieri a rieel tito iaa tddi 145 IPSCO e iere oa aia ao 146 NAT Network Address Translati0N oocoonnnoconnnoooccnooonconoonnccnoonncnnnnncnnnnonoccnnnnoss 146 NS AAA RR 146 PPPOE eaae e ies elena etna a eee DA ec eee 147 PIPER arta 147 X 509 Certiti cate a is 147 4 of 152 Table of Contents Table of Contents Protocol communication protocol oooncononcnnccnnncnocononcconannnnnanano nono nonnncnnncnna conc con nono 147 NO INN 147 Service Providers at A ee 148 Spoofing ANUSPOOHD mid di 148 Symmetrical encryption ceiissttieieet a adan tened iii 148 TCP IP Transmission Control Protocol Internet Protocol ooooooocccinncccninonnoss 148
22. The proxy servers IP or hostname Port The port corresponding to the IP or hostname of the proxy server Login The login in case the proxy server requires authentication Password The password corresponding to the login 6 2 5 Management gt Configuration Profiles Configuration Management Configuration Profiles Profiles Configuration Profiles Configuration Profiles 2 Factory Default O At Home OA office Save Current Configuration to Profile Upload Configuration to Profile Save the current configuration on ACA Here you can save the configuration settings as a configuration profile under any name on the mGuard It is possible to create and save multiple configuration 57 of 152 profiles You may then activate the configuration profile appropriate at the time if you use the mGuard in different operating environments Furthermore you can also save configuration profiles as files on the configuration system Naturally these configuration files can then be read back onto the mGuard and activated Furthermore you can restore the mGuard to the factory settings at any time B gt Passwords and user names are not saved in the configuration profiles Configuration profiles The top of the Configuration profile page has a list of configuration profiles that are stored on the mGuard for example the Factory Default configuration profile If any configuration profiles have been saved by the user see below they
23. User Authentication Local Users Passwords root Root Password Account root admin Administrator Password Account admin user Disable VPN until the user is authentified via o HTTP User Password The mGuard supports 3 levels of user authorization To login at a specific level of authorization the user must enter the corresponding password for the level Authorization level Root This level password grants full rights to all parameters of the mGuard Note This is the only authorization level that allows you to setup a SSH connection to the device and to then change all of the parameters so that nothing will work anymore If this happens all you can do is flash the firmware to restore it to the factory settings see Flashing the firmware on page 138 Default root password root Administrator If you login at this level password you will be granted all the rights required for the configuration options that are accessible via the Web based Administrator interface Default user name admin Default password mGuard The user name admin cannot be changed User If a user password has been defined and activated the user must after every restart of the mGuard enter this password to enable a VPN connection when he or she first attempts to access any HTTP URL If you wish to use this option enter the desired user password once in each of the corresponding entry fields
24. been changed to or away from Stealth mode the device will reboot automatically BO If you change the address of the mGuard e g by changing the Network Mode from Stealth to Router the device will only be accessible at the new address When the change is done from the local interface you will get a message telling you the new address before the change becomes active When the change is done from the external interface you will not receive feedback from the mGuard BO If you set the Network Mode to Router PPPoE or PPTP and then change the internal IP address and or the local netmask make very certain that you enter the correct values Otherwise the mGuard may no longer be accessible External IP Address Address under which the mGuard is accessible for external network devices If the mGuard has been allocated an IP address dynamically you will see here the IP address that is currently valid In Stealth mode the mGuard assumes the address of the computer which is connected locally as its external IP Network Mode Status Displays the status of the selected network mode Active Default Route Here the IP address is displayed via which the mGuard tries to reach networks that are unknown to it The display will read none if the mGuard is run ning in Stealth mode or if the IP address which has been defined in the con figuration for the connected computer as the default gateway is not correct 73 of 152 Network Mode gt S
25. clients within the VPN Local IP for L2TP connections With the setting shown in the screenshot above the mGuard will inform the remote site that the mGuard s address is 10 106 106 1 Remote IPs for L2TP connections range With the settings shown in the screenshot above the mGuard will assigned IP addresses between 10 106 106 2 and 10 106 106 254 to the remote peers Status Shows information about the L2TP status when this type of connection has been selected See Connections on page 114 If this type of connection has not been selected the screen shown above will be displayed 6 9 5 IPsec VPN gt IPsec Status IPsec VPN IPsec Status Connection Connection ISAKMP Name State 10 0 0 152 any 192 168 1 1 32 192 168 8 1 32 C DE ST Berlin L Berlin O Innominate C DE ST Berlin L Berlin O Innominate Security Technologies AG OU Support Security Technologies AG OU Support CN test2 E mhopf innominate com CN test3 E mhopf innominate com 10 0 0 152 any r 192 168 1 1 32 192 168 254 1 32 C DE ST Berlin L Berlin O Innominate C DE ST Berlin L Berlin O Innominate Security Technologies AG OU Support Security Technologies AG OU Support CN test2 E mhopf innominate com CN test1 E mhopf innominate com Shows the status of the Psec connections 125 of 152 126 of 152 The names of the VPN connections are listed on the left On the right you will find the current status of each connection GATEW
26. connection to a local system which is registered with the DynamicDNS provider the remote system can use the host name of the local system as its address This will setup a connection to the responsible DNS Domain Name Server to lookup the IP address that is currently registered for this hostname The corresponding IP address will be IP address sent back from the DNS to the remote system which can then use this as the destination address The remote system can now directly address the desired local computer In principle all Internet addresses are based on this procedure First a connection will be established to a DNS to lookup the IP address assigned for the domain name Once that has been accomplished this looked up IP address will be used to setup a connection to the desired remote site which could be any site in the Internet Every host or router in the Internet or an Intranet has a unambiguous IP address IP Internet Protocol The IP address is 32 bits 4 bytes long and is written as 4 three digit numbers each in the range from 0 to 255 which are separated by a dot An IP address consists of 2 parts the network address and the host address Network Address Host Address Each host or workstation in a network has the same network address but a different host address Depending on the size of the respective network networks are categorized as Class A B or C networks which are each differen
27. define firewall rules for each individual VPN connection in the VPN gt Connections menu BO The anti virus function see Web security gt HTTP on page 113 Web security gt FTP on page 115 E mail security gt POP3 on page 119 E mail security gt SMTP on page 122 has priority over the firewall rules defined here and can partially override them This behaviour can be overridden in the Network security gt Packet filters Extended settings menu by setting the switch to Connections scanned for viruses are subject to firewall rules see Extended settings Anti virus scanner on page 103 Bo If multiple firewall rules are set they will be searched in the order in which they are listed from top to bottom until a suitable rule is found This rule will then be applied If further down in the list there are other rules which would also fit they will be ignored Incoming Rules Network Security Packet Filter Incoming Rules Outgoing Rules Incoming Lag D Iw incaming N0 2e4Ged14 e91D 1610 9227 DDDebe D1 D152 RaR Ne Protocol __Fromip__ __Fromport Torr ET action TE tog F L 1 TCP E 0 0 0 0 0 any 0 0 0 0 0 any Accept z No These rules specify which traffic from the outside is allowed to pass to the inside Please note Port settings are only meaningful for TCP and UDP Incoming Lists the firewall rules that have been set These rules apply for incoming data connections 1 e o
28. ee 4 Click on the TFTP Server or DHCP Server tab and then click on the Settings button to open the dialog shown below Then set the parameters as shown Tftpd32 Settings E xj Tftpd32 by Ph Jounin OI x r Base Directory 4 Current Directory Em Browse JE my Browse 3 2 Browse Server interface 192 168 10 1 Show Dir r Global Settings Syslog server IV TFTP Server Syslog Server f Save syslog message T tp Server DHCP server TFTP Client I DHCP Server File A IP pool starting address 192 168 10 200 Size of pool 30 r TFTP Security TFTP configuration gt Boot Fil 5 lice i E i oot File j a Standard ii io 3 WINS DNS Server 0 0 0 0 v i Max Retransmit 6 e C High T tp port 5 Default router 0 0 0 0 C Read Only Mask 255 255 255 0 Advanced TFTP Options Domain Name Y Option negotiation Tl Hide Window at startup JV Show Progress bar IT Create dir txt files Translate Unix file names T Beep for long tranfer JV Use Tftpd32 only on this interface EFAIET TS Use anticipation window of fp Bytes Allow As virtual root Default Help Cancel 141 of 152 Under Linux 142 of 152 All current Linux distributions include DHCP and TFTP servers Install the corresponding packages as described in the instructions for the respective distribution Configure the DHCP server by making the following settings in the etc dhep file subnet 1
29. is 3600 seconds 1 hour The allowed maximum is 86400 seconds 24 hours IPsec SA Lifetime The lifetime of the IPsec SA keys in seconds The factory default is 28800 seconds 8 hours The allowed maximum is 86400 seconds 24 hours Rekeymargin Minimal time interval before the old key expires during which a new key shall be negotiated The factory default is 540 seconds 9 minutes Rekeyfuzz Maximum in percent by which Rekeymargin shall be randomly increased This is to lower the load during key exchanges on machines with many VPN connections by serializing them The factory default is 100 percent Keying tries Number of attempts to negotiate new keys with the remote peer The special value 0 means unlimited attempts in case the connection is to be initiated by the mGuard otherwise it means 5 Rekey When set to Yes the mGuard will try to renegotiate keys when they expire Dead Peer Detection When the remote peer supports the Dead Peer Detection DPD protocol both peers can detect whether the connection is still valid or must be renegotiated Without DPD the connection must be either restarted manually or is unusable until the initiating site s SAs expire Action Hold Restart Delete The switch determines the action that is to be carried out when DPD has recognised a disruption in the IPsec connection In the case of Hold default an attempt to re build the IPsec connection is made if it has been declared dead but on
30. is in PPPoE PPTP mode NAT must be activated to enable access to the Internet If NAT is not activated the device will only allow VPN connections When using more than one IP address for an interface always the first IP address of the list will be used for IP Masquerading BO These rules don t apply to the stealth mode Factory setting NAT is not active Inserting moving and deleting rows is explained under Working with tables on page 43 You have the following options for the entries From IP 0 0 0 0 0 means all addresses i e all internal IP addresses will be translated using NAT To enter an address space use the CIDR notation see CIDR Classless InterDomain Routing on page 135 Lists the rules set for 1 1 NAT Network Address Translation which mirrors addresses from the internal network into the external network In the following example the mGuard is inside the net 192 168 0 0 24 with its internal interface and inside the net 10 0 0 0 24 with its external interface By using 1 1 NAT the computer with the IP 192 168 0 8 can be reached under the IP 10 0 0 8 in the external network O 192 168 0 8 192 168 0 0 24 10 0 0 0 24 BO These rules don t apply to the stealth mode Factory setting NAT is not active Inserting moving and deleting rows is explained under Working with tables on page 43 You have the following options for the entries Local network The network address
31. key WAN Red See The Rescue Button restart recovery procedure and to LAN Green flash the firmware on page 137 12 of 152 3 2 mGuard delta 6 Innominate 5 a mGuard Power Status LAN SWITCH Power Status reserved Ethernet WAN Ethernet LAN LEDs State Meaning Power on The power supply is active Status on The mGuard is booting heartbeat The mGuard is ready flash flash pause 1 2 Reserved 3 WAN on Link detected flashing Data transfer 4 7 LAN on Link detected flashing Data transfer 13 of 152 3 3 EAGLE mGuard Link Status Data 1 LAN Link Status Data 2 WAN STATUS FAULT Serial V 24 Rescue Key Ethernet LAN USB Ethernet WAN Serial V 24 Ground Connection LEDs State Meaning pl p2 green The power supply 1 or 2 is active STATUS green flashing The mGuard is booting green The mGuard is ready yellow The mGuard is ready and Redundancy Master yellow green flashing The mGuard is ready and Redundancy Slave FAULT red The signal contact is open in case of an error LS DA 1 2 green Link detected V 24 yellow flashing Data transfer 14 of 152 3 4 mGuard smart LEDs Recovery Key Located in the opening Usea LED1 LED2 LED3 e g straightened paper clip to operate it Colour State Meaning Red Green red green flashing Bo
32. mGuard s serial number Flash ID Serial number of the mGuard s flash chip Software version Software version of the mGuard MAC addresses All MAC addresses used by the mGuard Status Status of the mGuard WAN link status Status of the Ethernet WAN port LAN link status Status of the Ethernet LAN port 69 of 152 Configuration Blade Control Blade 01 Blade in slot 01 Configuration Out of date Configuration backup Blade 01 gt Controller ack UP Restore Reconfiguration if Blade 01 is replaced Delete configuration backup of Blade 01 Upload configuration from client Upload from client Download configuration to client Download to client Configuration 70 of 152 Configuration backup Blade __ gt Controller Automatic Shortly after a configuration change on the mGuard the new configuration will be stored automatically on the controller Manual With the Backup button the configuration can be stored on the controller and with the Restore button it can be restored from the controller onto the mGuard Reconfiguration if Blade __ is replaced After replacing an mGuard in this slot the configuration stored on the controller will be automatically applied to the new mGuard Delete configuration backup of Blade __ Deletes the configuration stored on the controller for this slot Upload configuration from client Upload a configuration profile for this slot to the controller
33. made in the Firewall gt Incoming menu BO These rules don t apply to the stealth mode Inserting moving and deleting rows is explained under Working with tables on page 43 Protocol Specify the protocol which the rule should govern From IP The source IP for which forwarding shall be performed From Port The source port for which forwarding shall be performed any specifies any port Ports may be either port numbers or services names like pop3 for port 110 or http for port 80 Incoming on IP Enter the external IP address or one of the external IP addresses of the mGuard here OR If the destination IP address of the mGuard is assigned dynamically this cannot be specified In this case use the following variable extern gt The variable extern always corresponds to the first IP address of the address list when using more than one external IP address Incoming on Port The original destination port of the incoming data packets must be entered in this field 95 of 152 Connection Tracking Redirect to IP In this field enter the internal IP address to which the data packets should be forwarded The original destination address will be overwritten with the address entered in this field Redirect to Port In this field enter the port to which the data packets should be forwarded The original entry for the destination port will be overwritten with the port specified in this field Comment
34. modules of the mGuard Can be used for support purposes as applicable Update Management Update AntiVirus Pattern Local Update Filename Install Packages The filename of the package set has the extension tar g2 The format of the filename you have to enter is update a b c d eftar g2 Online Update Package 3etnamo FE Install Package Set Automatic Update Install the latest patch release x y 2 Install latest patches Install the latest minor release x Y z for Installilatestiminonnelease the currently installed major version Note It might be possible that there is no direct update from the currently installed version to the latest published minor release available Therefore after updating the system to a new minor release press this button again until you receive the message that there is no newer update available Install the next major release X y z tallo sica Note It might be possible that there is no direct update from the currently installed version to the next major release available Therefore execute the minor release update first and repeat this step until you receive the message that there is no newer minor release available Then install the next major release Update Servers PES rrotocol server O toon OOO Password E https 7 z update innominate com J J There are two possibilities for conducting a software update You have the update package set file on your computer the fil
35. not be informed as to what happened to them In Stealth mode Reject is not supported Comment An informational comment for this rule Log You can specify for each individual firewall rule whether the use of the rule e should be logged by setting Log to Yes e or should not be logged by setting Log to No factory setting 6 2 2 Management gt Web Settings General Management Web Settings General General Scope of the Apply button Per Page xj General Language If Automatic is selected from the list of languages the device will use the language setting of the system s browser Session Timeout seconds Specifies the time interval of inactivity in seconds after which the user will be logged out automatically Possible values are between 15 and 86400 24 hours seconds 50 of 152 Access Scope of the Apply button If set to per Page configuration changes need to be applied per page for being stored Otherwise per Session the configuration may be changed on several pages before being applied Management Web Settings HTTPS Web Access Enable HTTPS remote access Remote HTTPS TCP Port Allowed Networks Eme interface action comment oo These rules allow to enable HTTPS remote access Important Make sure to set secure passwords before enabling remote access Note In Stealth mode incoming traffic on the given port is no longer forwarded to the client Note In ro
36. on how to request and install a license can be found under the section Management gt Update on page 54 e Access to an update server with the current versions of the virus signatures see section Management gt Update on page 54 109 of 152 Virus Protection 110 of 152 Email Security SMTP Virus Protection Options Enable content scanning for SMTP Outgoing yes v oa SMTP maximum filesize for scanning in 5MB OY Action for mails exceeding maximum Let message pass unscanned gt message size Servers PS server servervort comment Enable Scan E o 0 0 07 0 25 Sure out to any Scan x Note Both global content scanning for SMTP must be enabled and firewall rules defining the IP address range to be scanned must be set The SMTP protocol is used by e mail clients or mail transfer agents MTA to send e mails The virus filter can only check unencrypted data for viruses Consequently you should not activate encryption options such as TLS If a virus is detected or an error occurs an e mail with an error code will be sent to the sender and an entry will be made in the anti virus log The intended recipient will receive neither the infected mail nor a message Options Anti virus protection for SMTP E mail transmission Yes No In the case of Yes files to be sent are scanned for viruses by mGuard if they are to be transmitted via SMTP connections that are specified in the list of SMT
37. on the local interface LAN External network The network address on the external interface WAN Port Forwarding Network Security NAT Masquerading Port Forwarding Netmask The network mask as a value between 1 and 32 for the local and external network address See also CIDR Classless InterDomain Routing on page 135 Lists the rules set for port forwarding Connection Tracking Lag D Iw parllarmwarding 4 0 DEB4a c2 DDBs 1bec EcD8 DDDcbeD1DIS2 X META A ATEN Incoming on Port Redirect to IP_ Redirect to Port Comment TT E a TCP 10 0 0 070 any extern http 192 168 2 2 http J No These rules let you forward traffic targeted to the mGuard to another machine without modifing the source address The column Incoming on IP accepts the special value extern as the mGuard s first external IP Please note These rules won t apply to the Stealth mode Port forwarding performs the following The headers of data packets incoming from the external network which are addressed to the mGuard s external IP address or one of its external IP addresses and to one of the ports on the mGuard will be rewritten to forward them to a specific port on a specific system in the internal network In other words both the IP address and the port number in the header of the incoming data packets will be changed This method is also called Destination NAT BO The rules set here have priority over the settings
38. passed on after it has been loaded completely and checked Consequently user software may react less quickly when downloading larger files or whenever the download speeds are slow To check the anti virus protection for FTP you can download the safe Eicar test virus which is available for test purposes at http www eicar org anti_virus_test_file htm The mGuard can only be used to secure the FTP client Options Anti virus protection for FTP Yes No In the case of Yes files received are scanned for viruses by mGuard if they arrive via FTP connections contained in the list of FTP servers below Scanning up to a pre set volume of 5 MB The maximum size of the files to be checked is specified here Files that are larger are not scanned Depending on the When size limit is exceeded setting an error message is sent to the client in the event of a file exceeding the size limit or the system automatically switches to throughput mode If the mGuard does not have enough memory to save a file completely or to decompress it a corresponding error message will be sent to the user s client software and an entry will be written to the anti virus log In this case you have the following options e You can try again later to download upload the file e You can temporarily deactivate the virus filter for the corresponding server e You can set the parameter to Let the data pass unscanned Action for infected content Notify
39. power signal relay activate traps Yes No enterprise oid genericTrap specific trap additional Description enterprise oid genericTrap specific trap additional Description mGuardTrapIndustrial enterpriseSpecific mGuardTrapIndustrialPowerStatus 2 mGuardTrapIndustrialPowerStatus This trap is sent when power supply failure was detected mGuardTrapIndustrial enterpriseSpecific mGuardTrapSignalRelais 3 mGuardTResSignalRelaisState mGuardTResSignalRelaisReason mGuardTResSignalRelaisReasonIdx Current state of the signal relais changed O off 1 0n e Agent ACA temperature activate traps Yes No enterprise oid genericTrap specific trap additional Description enterprise oid genericTrap specific trap additional Description mGuardTrapIndustrial enterpriseSpecific mGuardTrapIndustrialTemperature 1 mGuardSystemTemperature mGuardTrapIndustrialTempHiLimit mGuardTrapIndustrialLowLimit Trap reporting temperature exceeding the given limits mGuardTrapIndustrial enterpriseSpecific mGuardTrapAutoConfigAdapterState 4 mGuardTrapA utoConfigAdapterChange This trap is sent when the ACA was accessed Blade Controller Traps only blade Blade status change replug failure and power supply activate traps Yes No enterprise oid generic trap specific trap additional Description mGuardTrapBladeCTRL enterpriseS pecific mGuardTrapBla
40. rail insert a screwdriver horizontally under the housing into the locking slide pull it without tipping the screwdriver downwards and lift the EAGLE mGuard upwards 23 of 152 4 4 Connect the mGuard smart Ethernet plug to connect the unit AAA directly to the system or network to be protected local system or network __ USB connector to connect the unit to a computer s USB interface Only used to supply power Jack for connecting an external A network e g WAN Internet Connections to remote devices or networks are established via this network Use a UTP cable CAT 5 If your system is already connected to a network simply insert the mGuard between the system s network interface and the network before C B Ka after BO No additional driver needs to be installed B gt For reasons of security we recommend that you change the default Root and Administrator passwords during the first configuration 24 of 152 4 5 Connect the mGuard PCI 4 5 1 Choice between Driver mode or Power over PCI mode Driver Mode There are two operating modes Driver mode or Power over PCI mode The mGuard is switched to operate in the desired mode via a jumper Driver mode The mGuard PCI can be used like a regular network card enabling this network card to also provide the mGuard functions In this case the included driver must be installed Power over PCI mode
41. s current address you must use the Rescue key to restore it to factory default see Performing a Recovery on page 137 If even after repeated attempts the Web browser still reports that the page cannot be displayed try the following e Check whether the default gateway has been initialized on the connected configuration system See Local Configuration At startup on page 34 e Try disabling any existing firewall e Make certain that the browser does not use a proxy server In MS Internet Explorer Version 6 0 you can prevent this with the following setting In the Extras menu select Internet Options and click on the Connections tab Under LAN Settings click on the Properties button and in the Local Area Network LAN Settings dialog check to make certain that Use a proxy server for your LAN under Proxy server is not activated e If any other LAN connection is active on the system deactivate it until the configuration has been completed Under the Windows Start menu Settings Control Panel Network Connections or Network and Dial up Connections right click on the associated icon and select Disable in the pop up menu After the connection has been successfully set up the following security notice will be displayed MS Internet Explorer Security Alert Information you exchange with this site cannot be viewed or changed by others However there is a problem with the site s security certificate The sec
42. supervise the functions of the EAGLE mGuard and thereby facilitates remote diagnosis An interruption of the potential free signal contact relay contact closed current circuit indicates the following e The failure of at least one of the two supply voltages e A permanent fault on the EAGLE mGuard internal 3 3 V DC voltage supply voltage 1 or 2 lt 9 6 V e The faulty link status of at least one port The indication of the link state on the EAGLE mGuard can be masked on a port by port basis using the management software State of delivery there is no link test e Self test error Bo In case of a non redundant voltage supply the EAGLE mGuard will indicate the failure of the supply voltage You can correct this by connecting the supply voltage to both inputs Ground connection The EAGLE mGuard is grounded with a separate screw connection Assembly The equipment is delivered in a ready to operate condition The following procedure is appropriate for assembly e Pull the terminal block off the EAGLE mGuard and wire up the supply voltage and signal contact lines e Fit the EAGLE mGuard on a 35 mm standard bar to DIN EN 50 022 e Attach the upper snap on slide bar of the EAGLE mGuard to the standard bar 22 of 152 Startup procedure Network connection Dismantling and press it down until it locks into position e Connect the device to the local network or the local PC which is to be protected LAN e Connect the s
43. switch to from daylight saving time enter CET 1CEST M3 5 0 M10 5 0 3 Time stamp in filesystem 2h granularity Yes No If this option is set to Yes the mGuard will save the current system time to its memory every two hours Afterwards If the mGuard is switched off and back on a time from this two hour period of time will be displayed when the mGuard is switched on and not the factory setting a time on 1 January 2000 Enable NTP time synchronisation Yes No Once the NTP is enabled the mGuard queries the time from the Internet and displays this as 1ts current system time The synchronisation can take several seconds If this option is set to Yes and at least one time server is specified under NTP servers to synchronize to see below the current system time will be retrieved over the internet NTP State Displays the current NTP state NTP server Enter one or more time servers from which the mGuard should obtain the current time If you enter multiple time servers the mGuard will automatically connect with all of them to determine the current time Tf you enter a hostname e g pool ntp org instead of an IP address a DNS server must also be specified see Network gt DNS on page 81 If the mGuard is operating in Router PPPoE or PPTP mode it will also make the NTP time available to the locally connected systems Shell Access Management System Settings Hest Time and Date 08 shell Access
44. t already installed the mGuard PCI card in your computer please follow the steps as described in Hardware installation on page 27 If you ve configured the mGuard to run in Driver Mode make sure that you ve installed the drivers as described in Driver installation on page 28 If you e operate mGuard in the driver mode and the LAN interface computer s network interface has not yet been configured OR e operate mGuard in the Power over PCI mode and the computer s network interface which is connected to mGuard s LAN interface has not yet been configured this network interface must be configured before you can configure mGuard If you are using Windows XP 37 of 152 The Default Gateway 38 of 152 Click on Start Control Panel Network Connections Right click on the icon of the LAN adapter Click on Properties in the pop up menu In the dialog Internet Protocol Properties on the General tab select Internet Protocol TCP IP under This connection uses the following items Click on the Properties button to open the dialog you see to the right Internet Protocol TCP IP Properties General You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically Use the following IP address IP address 192 168 1 2 Subn
45. the following steps 1 Click on Browse so select the certificate file 2 Click on Import Download Test By clicking on Test Download you can test without actually saving the modified parameters or activating the profile if the parameters are correct The result of the test will be displayed in the right column E You should make sure that the profile on the server does not contain unwanted variables beginning with GAI_PULL_ which overwrite the pull configuration on the mGuard 67 of 152 6 2 8 Management gt Restart Management Restart Restart Restart Note please give the mGuard approximately 40 seconds to reboot A new Start reboot is necessary in the event that a fault occurs It may also be necessary after a software update You can also reboot the device by switching it off and back on again 6 3 Menu Entry Blade Control control unit only This menu is only available on the control unit 6 3 1 Blade control gt Overview Blade Control Overview Overview SS SCN A TT C blade XL Do a DA 21500134 4 0 0 pre18 defa 02 blade 4 0 0 pre16 beta 03 blade XL 4 0 0 pre18 defa 04 blade 3 1 0 sophia 05 blade 3 1 0 sophia 06 blade 3 1 0 pre05 07 blade EGE Don Doa 21500072 4 0 0 pre13 defa 08 blade XL e Down Down 27500139 4 0 0 pre15 beta 09 Unknown 10 blade Down Down 27500054 4 0 0 pre07 defa 11 blade Dama DORA 21500003 3 1 1 pre05 defa 12 Unknown
46. to 1 1 1 1 requires ARP resolution of the default gateway Restricting ARP traffic to the default gateway may lead to management access problems Outgoing trusted port PX Source MAC Destination MAC Ethernet Protocol Actin Comment Ethernet Protocol may be any IPv4 ARP Length or a hexadecimal value Please note These rules only apply to the Stealth mode Please note Management access to 1 1 1 1 requires ARP resolution of the default gateway Restricting ARP traffic to the default gateway may lead to management access problems Beside the IP firewall OSI Layer 3 4 which filters ICMP messages and TCP UDP connections the mGuard when operating in stealth mode can additionally filter for MAC addresses and ethernet protocols OSI Layer 2 In contrast to the IP firewall the MAC filter is stateless This means an additional rule must be created for some rules in the opposite direction where necessary When no rules are defined all ARP and IP frames are allowed BO Please note the annotations on the screen when you define MAC filtering ru 91 of 152 Advanced 92 of 152 Advanced les BO Rules defined here supersede the IP firewall rules Source MAC Definition of the source MAC address XX XX XX XX XX xXx is a wildcard for all MAC addresses Destination MAC Definition of the destination MAC address XX XX XX XX XX XX is a wildcard for all MAC addresses The values ff ff ff ff ff ff is the broadcast MA
47. to input voltage ground 32 VDC Power consumption max 7 2 W at 24 VDC 24 6 Btu IT h Overload current protection at input non changeable fuse Dimensions W x H x D 46 mm x 131 mm x 111 mm 1 8 in x 5 2 in x 4 4 in Weight Ambient temperature 340 g 0 8 Ib Surrounding air 0 C to 55 C 32 F to 131 F Storage temperature Surrounding air 40 C to 80 C 40 F to 176 F Humidity 10 to 95 non condensing Atmospheric pressure Suitable for operation up to 2000 m 6561 ft 795 hPa Pollution Degree 2 150 of 152 Interference proof Discharge of static electricity Contact discharge EN 61000 4 2 Test level 3 Air discharge EN 61000 4 2 Test level 3 Electromagnetic fields EN 61000 4 3 Test level 3 Fast transients EN 61000 4 4 Test level 3 Surge voltage symmetrical EN 61000 4 5 Test level 2 Surge voltage asymmetrical EN 61000 4 5 Test level 3 Cable based RF faults EN 61000 4 6 Test level 3 EMC emitted immunity FCC 47 CFR Part 15 Class A EMC emitted immunity EN 55022 Class A Germanischer Lloyd Rules for Classification and Construction VI 7 3 Part 1 Ed 2003 Vibration IEC 60068 2 6 Test FC testing level in line with IEC 61131 2 and Germanischer Lloyd Guidelines for the Performance of Type Tests Part 1 Shock IEC 60068 2 27 Test Ea testing level in line with IEC 61131 2 Certifications cUL 508 CSA 22 2 No 142 co
48. to replace the earlier DES standard AES specifies three different key sizes 128 192 and 256 bits In 1997 NIST started the AES initiative and announced its conditions for the algorithm From the many proposed encryption algorithms NIST selected a total of five algorithms for closer examination the MARS RC6 Rijndael Serpent and Twofish algorithms In October 2000 the Rijndael algorithm was adopted as the standard s encryption algorithm In a client server environment a server is a program or computer which accepts and answers queries from client programs or computers In data communication a computer which establishes a connection to a server or host is also called a client In other words the client is the calling computer and the server or host is the computer called In the IP protocol data is sent in the form of data packets which are known as IP datagrams An IP datagram has the following structure IP Header TCP UDP ESP etc Header Data Payload The IP header contains 143 of 152 Default route DynDNS provider 144 of 152 the IP address of the sender source IP address the IP address of the receiver destination IP address the protocol number of the protocol of the next higher protocol layer in accord with OSI seven layer model the IP header checksum used to check the integrity of the received header The TCP UDP header contains the following informati
49. under Hostname mode the entry in this field will be ignored Domain search path This entry makes it easier for the user to specify a domain name If the user enters the domain name in an abbreviated form the mGuard will extend the entry by appending the domain suffix which is defined here in the Domain search path SNMP Information Systemname An informational name for the mGuard eg Hermes Pluto sysName under SNMP Location The physical location of this mGuard sysLocation under SNMP Contact The name of the contact person for this mGuard together with information on how to contact this person sysContact under SNMP HiDiscovery HiDiscovery is a protocol which supports the initial startup of new network de vices and is available in the mGuard s Stealth mode on the mGuard s LAN port Local HiDiscovery Support Activated The HiDiscovery protocol is activated Read only The HiDiscovery protocol is activated but the mGuard cannot be configured through it Deactivated The HiDiscovery protocol is deactivated HiDiscovery Frame Forwarding If this option is activated then HiDiscovery frames are forwarded from the in ternal LAN interface externally WAN Signal contact only Management System Settings EAG LE mGuard Signal Contact Mode Signal contact Operation supervision v Operation supervision Contact Redundant power supply Supervise xl Link supervision Ignore Manual settings
50. up by a remote site with any IP address enter any In this case the local mGuard can be called by a remote site which has been dynamically assigned its IP address by the internet service provider which has an IP address that changes In this scenario you may only enter an IP address when this is the fixed and known IP address of the remote calling site B gt any can only be used along with the authentication mode using X 509 certificates gt In case the remote peer is located behind a NAT gateway any must be used Otherwise the renegotiation of new connection keys will fail after the connection is established Connection startup There are 2 options e Initiate the connection to the remote site e Wait for the remote site to initiate the connection Initiate In this case the local mGuard sets up the connection to the remote site The fixed IP address or domain name of the remote site must be entered in the Address of the remote sites VPN gateway see above field Wait In this case the local mGuard is ready to accept a connection which a remote site actively initiates and sets up to the local mGuard The entry in the Address of the remote site s VPN gateway see above field may be Zany If the mGuard should only accept a connection initiated by a specific remote site which has a fixed IP address you can enter its IP address or hostname just to be on the safe side If the mGuard is running in
51. was developed in cooperati on with the Industrial Security Alliance partner Hirschmann Automation und Control GmbH The device is designed for top hat rail mounting according to DIN EN 50 022 and is therefore especi ally suited for use in industrial environ ments The optional configuration connection and the option to establish a telephone dial up connection via the V 24 interface provide for additional ap plications options mGuard delta This device model is a compact LAN switch Ethernet Fast Ethernet desi gned for connecting up to 4 LAN seg ments Thus the device is especially suited for logically segmented network environments where the locally connected computers networks share the mGuard functions An additional serial interface enables configuration using a telephone dial up connection or a terminal With its robust metal housing mGuard delta is not only suitable as a desktop device but also for placement in wiring closets 8 of 152 2 Typical application scenarios Stealth Mode Network Router DMZ Some of the more common application scenarios may be found below Firewall AntiVirus VPN In Stealth Mode factory default the mGuard can be installed between an indivi dual computer and the rest of the network The settings for Firewall AntiVirus and VPN can be made with a webbrowser at the URL https 1 1 1 1 On the computer itself no configuration changes are required Intranet DSL Mode
52. will be listed here Active configuration profile The configuration profile that is currently in effect is shown with the green light next to the entry You can do the following with configuration profiles that are stored on the mGuard e Activate them e Save them to a file on the connected configuration computer e Delete them e Display them Displaying the configuration profile Click the name of the configuration profile in the list Applying the factory setting or a configuration profile setting that has been stored by the user Click the Restore button located to the right of the name of the relevant con figuration profile Result The corresponding configuration profile is activated Bo If the restoration involves a switch between the stealth mode and another net work mode then mGuard is restarted Saving the configuration profile as a file to the configuration computer 1 Click the Download button to the right of the name of the respective confi guration profile 2 Specify the file name and folder in which the configuration profile is to be saved as a file in the displayed dialogue box You can give the file any name Deleting a configuration profile Click the Delete button to the right of the name of the respective configuration profile The Factory Default profile can t be deleted Saving the current configuration as a configuration profile on the mGuard 1 Enter the desired profile name in the field behind
53. 0 OC BE 02 21 2C 10 1 47 9 WAN port mguard mdickopp LLDP Link Layer Discovery Protocol IEEE 802 1AB supports the automatic detection of the ethernet network topology LLDP capable devices periodically send ethernet multicasts layer 2 with net work information about themselves which will be collected by other LLDP ca pable devices and made available via SNMP Mode Enabling and disabling of the LLDP service Internal LAN interface and External WAN interface Chassis ID An entity which identifies a remote device uniquely typically one of its MAC addresses IP address The IP address to manage the remote device via SNMP Port description A textual description of the remote device s interface System name Hostname of the remote device 6 2 7 Management gt Central Management Configuration Pull Management Central Management Configuration Pull Configuration Pull config example com Server Filename when empty 14008005 atv will be used Server Certificate Browse Download Test Test Download The mGuard can retrieve new configuration profiles from a HTTPS server in configurable time intervals When a new configuration differs from the current 66 of 152 configuration it will be activated automatically Configuration Pull Pull Schedule Interval at which new configurations will be searched on the server Server IP or Hostname of the server which provides the configurati
54. 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 CIDR 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 BP NM W B amp B UI Oy 1 0 o 135 of 152 6 14 Network Example IP external 192 168 11 2 gt IP external 192 168 15 1 gt IP internal 192 168 15 254 EEIEIIE Netmask 255 255 255 0 IP internal 192 168 27 254 Ee Netmask 255 255 255 0 The following sketch illustrates how the IP addresses can be distributed in a local network with subnets which network addresses result and how the details regarding additional internal routes might look Internet Address from external network e g 123 456 789 21 assigned by Internet Service Provider mGuard in Router network mode mGuard Internal address of the mGuard 192 168 11 1 r oo Network A Network address 192 168 11 0 24 Netmask 255 255 255 0 Router Network B Network address 192 168 15 0 24 Netmask 255 255 255 0 Router Network C Network address 192 168 27 0 24 Netmask 255 255 255 0 additional internal routes Network A System Al A2 A3 A4 A5 IP address 192 168 11 3 192 168 11 4 192 168 11 5 192 168 11 6 192 168 11 7 Netmask 255 255 255 0 255 255 255 0 255 255 255 0 255 255 255 0 255 255 255 0 Network B Additi
55. 2 Connect the mGuard delta gt Console 7 6 5 4 3 2 1 DC 5V 3A Serial Console Ethernet LAN Ethernet WAN reserved Power e Connect the power supply 5V DC 3A to the mGuard s power jack e Connect the local computer or network to one of the Ethernet LAN jacks 4 to 7 with an UTP CATS ethernet cable 21 of 152 4 3 Connect the EAGLE mGuard Terminal block The supply voltage and the signal contact are connected via a 6 pin terminal block with screw locking mechanism Signal Contact 24V P1 OV OV 24V P2 ie ae ae NO IS IAS AD Warning The EAGLE mGuard is designed for operation with a safe extra low voltage Thus its power supply and signal contact connectors may only be connected with PELV circuits or alternatively SELV circuits with voltage restrictions in accordance with IEC EN 60950 Operating voltage NEC Class 2 power source 12VDC or 24 VDC 25 33 safe extra low voltage SELV PELV redundant inputs decoupled 5 A maximum Buffer time min 10 ms at 24 VDC Redundant power supply Redundant power supplies are supported Both inputs are decoupled There is no load distribution With a redundant supply only the power pack with the higher output voltage supplies the EAGLE mGuard The supply voltage is electrically isolated from the housing a Signal contact The signal contact is used to
56. 55 255 254 252 248 240 224 192 128 oo0oo0oo0oo0o0o0o0 oo0oo0oo0oo0oo0o0o0 space The following table presents the IP netmask on the left and the corresponding CIDR notation on the right 255 254 252 248 240 224 192 128 oo0oo0oo0oo0oo0o0o0 binary 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111110 11111100 11111000 11110000 11100000 11000000 10000000 00000000 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111110 11111100 11111000 11110000 11100000 11000000 10000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111110 11111100 11111000 11110000 11100000 11000000 10000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 11111111 11111110 11111100 11111000 11110000 11100000 11000000 10000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
57. 573 sshd 32021 Accepted publickey for root from 192 168 1 96 port 56115 ssh2 27118 sshd 2874 Accepted publickey for root from 10 1 0 253 port 56109 ssh 70151 sshd 3249 Accepted publickey for root from 10 1 0 253 port 56110 ssh2 30133 sshd 3559 Accepted publickey for root from 10 1 0 253 port 56111 ssh2 09067 sshd 3867 Accepted publickey for root from 10 1 0 253 port 56112 sshZ 78038 sshd 18537 Accepted publickey for root from 10 1 0 253 port 56669 sshz 17812 sshd 18547 Accepted publickey for root from 10 1 0 253 port 56670 ssh2 20517 sshd 18557 Accepted publickey for root from 10 1 0 253 port 56671 ssh2 63630 sshd 18589 Accepted publickey for root from 10 1 0 253 port 56672 sshZ 15047 gai WWW_LANGUAGE changed to en 54645 gai HTTPS_ACCESS_UUID changed to Ze49ed19 e930 161b 9227 000cbe010f 52 54903 gai HTTPS_REMOTE_ACCESS_RULES O LOG changed to yes 49668 kernel fw https access 1 Ze49ed19 e930 161b 9227 000cbe010f52 act ACCEPT IN eth w Common M SNMP LLDP V Network Security V IPsec VPN IV Reload logs Jump to firewall rule Depending on which mGuard functions were active the corresponding checkbo xes for filtering entries according to category are displayed below the log entries Enable the checkbox es for the desired category ies and click the Reload logs button to display one or more categories All log entries which are not related to the other categories appear here Network Security When loggi
58. 789 21 and the Port Number 443 has been set as the port for remote access you must enter the following address in the Web browser s address field on the remote system https 123 456 789 21 If a different Port Number is used this must be appended to the IP address e g https 123 456 789 21 442 42 of 152 6 Configuration 6 1 Operation Screen Layout 1 Via the left hand menu click on the page with the desired setting possibili ties e g Administration gt Licensing The page will then be displayed in the main window in the form of a register card on which you can define the settings If necessary the page will be organized into several register cards You may browse through these cards using the tabs at the top 2 On the relevant page or register card make the desired settings To do so see also the subsection What happens if inadmissible values are entered on page 43 3 In order to adopt the settings click on the Apply button After the settings have been saved by the system you will see a confirmation message This indicates that the new settings have taken effect They will also remain valid after a restart reset What happens if inadmissible values are entered After inadmissible values are entered for example an inadmissible number in an IP address and after subsequently clicking Apply the letters of the relevant tab card titles will be displayed in red This helps you in tracking down t
59. 92 168 134 0 netmask 255 255 255 0 range 192 168 134 100 192 168 134 119 option routers 192 168 134 1 option subnet mask 255 255 255 0 option broadcast address 192 168 134 255 This sample configuration makes 20 IP addresses 100 to 119 available It is assumed that the DHCP server has the address 192 168 134 1 settings for ISC DHCP 2 0 The required TFTP server is configured in the following file etc inetd conf In this file insert the appropriate lines or set the necessary parameter for the TFTP service The directory for the data is tftpboot tftp dgram udp wait root usr sbin in tftpd s tftpboot Then restart the inetd process to activate the modified configuration If you use a different mechanism e g xinetd please read the corresponding documentation 8 Glossary Asymmetrical encryption DES 3DES AES Client Server Datagram In the case of asymmetrical encryption data is encrypted with one key and decrypted with a second key Either key may be used for encryption or decryption One of the keys is kept secret by its owner Private Key the other is made available to the public Public Key i e possible communication partners A message encrypted with the public key can only be decrypted and read by the owner of the associated private key A message encrypted with the private key can only be decrypted and read by a receiver who has the associated public key The fact that the message was encr
60. AY shows the IP addresses of the communicating VPN gateways TRAFFIC identifies the systems or networks which communicate via the VPN gateways ID identifies the Distinguished Name DN of an X 509 certificate ISAKMP State ISAKMP State Internet security association and key management protocol is given as established if the two VPN gateways involved have established a channel to exchange keys In this case they have been able to contact each other and all of the settings made on the configuration page up to and including ISAKMP SA were correct IPsec State IPsec State is given as established if IPsec encryption is activated when communicating In this case the entries made under IPsec SA and Tunnel Settings were also correct In the event of problems we recommend that you examine the VPN logs of the system to which the connection was setup The basis for this recommendation is that for reasons of security exhaustive error messages are not returned to the initiating system If the display shows ISAKMP SA established IPsec State WAITING This indicates that the authentication was successful but the other parameters are not correct Do the connection types Tunnel Transport match If Tunnel has been selected do the network address areas match at both ends If the display shows IPsec State IPsec SA established This indicates that the VPN connection has been successfully setup and can be used I
61. An informational comment for this rule Log You can specify for each individual port forwarding rule whether the use of the rule should be logged by setting Log to Yes or not by setting Log to No factory setting Network Security NAT Masquerading Port Forwarding Connection Tracking Connection Tracking Maximum table size 4096 Timeout for established TCP connections 432000 Yes y Yes Connection Tracking 96 of 152 Maximum table size This entry specifies an upper limit for maximum number of connections being tracked The default setting is selected in such a way that it is never reached under normal conditions During attacks it may be easily reached so that this limit provides an additional protection If special requirements should be present in your operating environment then you can increase this value Timeout for established TCP connections When a TCP connection was not used during the interval specified here its connection information will be deleted A connection which was rewritten by NAT not 1 1 NAT must be reestablished after it was deleted The factory default are 432000 seconds 5 days FTP If an outgoing FTP protocol connection is setup to download data there are two alternatives as to how the data will be transmitted When using active FTP the server called will call the calling system back to establish a connection for the transfer of data When using passive FTP th
62. C address to which for example all ARP requests are being sent Ethernet Protocol any is a wildcard for all ethernet protocols Protocols can be specified by name or hexadecimal value for example IPv4 or 0800 e ARP or 0806 Action Accept means that frames can pass Drop means to drop frames Comment An informational comment for this rule The MAC filter does not support logging Network Security Packet Filter Incoming Rules Outgoing Rules Advanced Router Modes Router PPTP PPPoE ICMP from extern to the mGuard I Drop a Please note Enabling SNMP access automatically accepts incoming ICMP packets AntiVirus Scanning Connections scanned for viruses are subject to firewall rules Stealth Mode Allow forwarding of GVRP frames Allow forwarding of STP frames Allow forwarding of DHCP frames The following settings influence the basic behavior of the firewall Enable TCP UDP ICMP consistency checks When set to Yes the mGuard performs various checks for wrong checksums packet sizes etc and drops packets failing the check The factory default for this option is Yes Router Modes Router PPTP PPPoE ICMP from extern to the mGuard With this option you can control which ICMP messages from the external network are accepted by the mGuard You have the following options Drop All ICMP messages sent to the mGuard from the external network will be dropped Allow ping requests Only ping requests ICMP messa
63. Download configuration to client Download the configuration profile stored on the controller for this slot 6 4 Menu Network 6 4 1 Network gt Interfaces General Network Interfaces General Network Status External IP address Network Mode Status Active Defaultroute Network Mode Network Mode et ANA Network Status External IP address WAN port address Display only The addresses through which mGuard can be accessed by de vices from the external network They form the interface to other parts of the LAN or to the Internet If the transition to the Internet takes place here the IP addresses are usually designated by the Internet Service Provider ISP If mGuard is assigned an IP address dynamically you can look up the currently valid IP address here In stealth mode mGuard adopts the address of the connected local computer as its external IP Network mode status Displays the status of the selected network mode Active default route The IP address that mGuard uses to try to reach networks unknown to it is dis played here If mGuard is in stealth mode or if the IP address that is specified as the standard gateway in the connected computer s configuration is not cor rect none is shown here Network mode The mGuard has to be set to the network mode that corresponds to its local com puter or network connection respectively See Typical application scenarios on page 11 Depending to which network m
64. EAGLE mGuard max 90 EAGLE mGuard 95 non condensing humidity e To avoid overheating do not leave it in direct sunlight or expose it to any other source of heat Do not bend the cables sharply Only use network cables to connect to a network Steps for starting To startup the device perform the following steps in the order listed up the device Step Objectives Page 1 Check the package contents and read the Release Included in the package on page 17 Notes 2 Connect the Device Connect the mGuard blade on page 19 Connect the mGuard delta on page 21 Connect the EAGLE mGuard on page 22 Connect the mGuard smart on page 24 Connect the mGuard PCT on page 25 3 Configure the device to the extent necessary Local Configuration At startup on To accomplish this select from the various page 34 options offered in the mGuard s configuration menus For more information regarding which options and settings are required or desirable for your operating environment please read the rele vant sections in this manual Included in the Before beginning to setup the device check that the package is complete package e an mGuard blade delta smart PCI or EAGLE mGuard e a manual in the Portable Document Format PDF on the CD ROM e a Quick Installation Guide The mGuard bladePack also contains e the 19 mguardBlade base e an mGuard blade as controller e 2 power supplies e 2 power
65. GuardInfo linkUp linkDown 0 This trap is send in case the connection to an ethernet port is interrupted linkDown or reestablished linkUp e Coldstart activate traps Yes No enterprise oid generic trap specific trap Description mGuardInfo coldStart 0 This trap is send after a cold start or a warm start e Admin access SSH HTTPS new DHCP Client activate traps Yes No enterprise oid generic trap specific trap additional Description enterprise oid generic trap specific trap additional mGuardb enterpriseSpecific mGuardHTTPSLoginTrap 1 mGuardHTTPSLastAccessIP This trap is sent when someone is trying to open a HTTPS session using the wrong password mGuardHTTPSLastAccessIP contains the IP address of the last unsuccessfull login request mGuard enterpriseSpecific mGuardShellLoginTrap 2 mGuardShellLastAccessIP Description enterprise oid generic trap specific trap additional Description This trap is sent when someone opens the shell through SSH or serial console mGuardShellAccessLastIP contains the IP address of the login request The value of mGuardShellAccessLastIP is 0 0 0 0 if the request was sent via serial console mGuard enterpriseSpecific mGuardDHCPNewClientTrap 3 mGuardDHCPLastAccessMAC This trap is sent when a DHCP request was received from an unknown client Hardware related traps only EAGLE mGuard e Chassis
66. IN EE W OTK FEALUTES ios lt cai od Una VIVOS estes 6 Eras hates ies hobs bad eed AE 6 Anus VATUS PEATUTES 05 co sciesccas ese deseceduciede vivian dana dee desea dence Ei 6 VPN features ta aves 6 Additional features A e a N RN a a a aS 7 Support Aa 7 Tlie DEVICE VETO Storia ind aa e A A a e O E En E TE Ee EE 7 MACHU AL Matias hora 7 mGuard PERN merse adidas T MiGUard o EKE lE EEE A E EE E E AEB 7 BAGEE mG ands cose tt it AAA E ee Ea E A A is 8 MACHU ALT delta ninia Tota a Soe lante aS oo oases eas 8 2 Vypicalap plication SCOMAarioS siccsscsciscoaicssescssessoncsionssesssesdecssnsessseeiscascosncdinstosacedduetiussecnsacsdsgsesssaesns 9 Stealth Mode AEE TE E E debe es ETE E alada nacida vna vaciadas 9 Network Roll cd 9 DA O A A 9 VPN Gateway ii cal nie Sit e a ae 10 WIGAN OVER WEN tna e a a N irae enti 10 Solving Network Conflicts iii rial ida 11 3 Control AMA LEDs yssccssevessczcvssesecescsedecssseccosscedensssenccostecsesssenseessesseusseseosseteseesceseswesdessssexessoncesencess 12 ZE mGuard blade court aria iento lira 12 3 2 pair Ward delta aii datar 13 3 3 EAGLE MG ard iii A A ERS 14 E AAA A RN 15 Soe il O AAA E ses e en Mee oa nace ean de EE A EE A 16 E O S E ssosedued Sessedsnsesseceesseess 17 Included imthe packaDe nentorren eenen oen ere Enei eantaire sat 17 4 1 Connect the mGuard blade nseni a a a N EN E Te 19 Installing mGuard bladeBase oooonconnccnocinicconnnacnnaccnononononnono nono nonnc cono cnncnnn cnn c
67. If the mGuard s network card functionality isn t needed or won t be used then the mGuard PCI can be connected behind an existing network card of the same computer or of another one essentially acting as an mGuard standalone device In this operating mode in fact the mGuard PCI is only plugged into the computer s PCI slot to be supplied with power and given a housing This mGuard operating mode is called Power over PCI mode No driver needs to be installed Decide in which mode you want the mGuard PCI to operate before installing it in your PC In this mode a driver for the PCI interface of the mGuard PCI available for Windows XP 2000 and Linux needs to be installed later on the computer In Driver Mode another network card is not required in the computer Stealth Mode with Driver Mode Factory default ID D D D D The LAN ethernet jack is de ra activated in Driver Mode gaS The LAN interface is provided S by the driver for the computers A Operating system WAN In this configuration the mGuard acts as normal network interface card NIC with additional security features and requires a driver for the host operating system The IP address can be configured using the network utilities of the operating system As soon as an external router is available the mGuard can be configured using a webbrowser at the URL https 1 1 1 1 Bo In Stealth Mode it is not possible to use PPPoE or PPTP 25 of 152 Ro
68. Innominate mGuard User s Manual Software Release 4 2 0 Innominate Security Technologies AG Albert Einstein Str 14 12489 Berlin Germany Tel 49 0 800 366 4666 info innominate com www innominate com Innominate Security Technologies AG December 2006 Innominate and mGuard are registered trade names of Innominate Security Technologies AG The mGuard technology is protected by Patent No 10138865 and 10305413 which were granted by the German Patent Office Additional patents are pending This document may not be copied or transferred in whole or in part without prior written approval Innominate AG reserves the right to modify this document at any time without notice Innominate provides no warranty for the contents of this document This disclaimer shall also apply to any implicit warranty of marketability or suitability for a specific purpose Furthermore Innominate assumes no liability for errors in this manual or for accidental or consequential damages in connection with the delivery performance or utilization of this document This manual may not be photocopied duplicated or translated into another language in whole or in part without the prior written approval of Innominate Security Technologies AG Innominate Document Number 574119 215 Table of Contents Table of Contents A decsectcedsscsaccssnsdssinssoscsevseeceens cudecseedosssneseuetesdesdandcentecesosengusesoneesoseceeccosesessesesess 6
69. Media Type Media type of the interface Link State The state of the ethernet link which can be either Up or Down Automatic Configuration Yes the interface will be configured automatically No the setting from the column Manual Configuration will be used gt Both ports of the mGuard are configured to be connected to a computer If you connect the ports to a hub please note that if Automatic Configuration is disabled then the Auto MDIX function will also be deactivated i e the port of the mGuard has to be connected either to the uplink port of the hub or a cross link cable has to be used Manual Configuration The configuration for the interface to be used when Automatic Configuration is set to No Current Mode The current configuration of the interface Port on only EAGLE mGuard and mGuard smart Enables disables the ethernet port 6 4 2 Network gt DNS DNS Server DNS Server DNS Servers to query User defined servers listed below User defined name servers f f i 10 1 0 253 In Stealth Mode only User defined and DNS Root Servers are supported Other settings will be ignored When the mGuard has to initiate a connection on its own to a remote system e g a VPN gateway or a NTP server and it is defined in form of a host name i e in the form of www example com then the mGuard has to query a domain name server DNS for the IP address belonging to the host name If the mGuard is not in stealth
70. Mode Stealth 74 of 152 An additional IP address can be specified here to administrate the mGuard If Stealth configuration is set to the option multiple clients or e the client doesn t answer ARP requests or e there is no client at all then the remote administration via HTTPS SNMP and SSH is only possible using the management IP address IP address The additional IP address to contact the mGuard The IP address 0 0 0 0 disables the Management IP Address Netmask The netmask for the IP address above Default Gateway The default gateway of the network the mGuard is located in Use Management VLAN If this IP address is to be inside a VLAN this option must be set to Yes This option is only effective when the option Stealth configuration is set to multiple clients Management VLAN ID A VLAN ID between 1 and 4095 An explanation of the term VLAN can be found under VLAN on page 148 Static Stealth Configuration Stealth Configuration static Network Mode gt Router factory setting mGuard delta and blade controller Stealth Static Stealth Configuration Client s IP address Client s MAC address ooo PA Client s IP address The IP address of the client Client s MAC address This is the physical address of the local computer s network adapter to which the mGuard is connected B gt The MAC address can be determined in the following manner On the DOS level Start
71. N lt P Om ba baal 3 Internet A Internet Netzwerkadresse Netzwerkadresse f r ge f r 1 zu 1 NAT gen berliegendes 1 zu 1 NAT Local network With this entry you specify the address of the network or computer which is connected to the local interface of the mGuard Enable 1 to 1 NAT of the local network to an internal network only Router Mode Rewrite the local network as defined in Local network to an actually existing local network The default setting is No Internal network address for local 1 to 1 NAT only when Yes was chosen above The actually existing local network address from which local systems address the VPN tunnel The network mask is taken from the field Local network Remote network With this entry you specify the address of the network or computer which is available behind the remote VPN gateway The network 0 0 0 0 0 specifies a default route over the VPN This means that all traffic for which there is no other VPN tunnel or route will be routed through this VPN tunnel A default route over VPN should only be specified for a single tunnel and is not available in Stealth mode Enable 1 to 1 NAT of the remote network to a different network only 118 of 152 Authentication Router Mode Rewrite a remote network which is addressed by the systems in the local net work to the network address as defined in Remote network The default setting is No Network address for remote 1 to 1 NAT only when
72. P servers below Scanning up to a pre set volume of 5 MB The maximum size of the files to be checked is specified here Files that are larger are not scanned Depending on the When size limit is exceeded setting an error message is sent to the SMTP client and the e mail 1s not delivered in the event of a file exceeding the size limit or the system automatically switches to throughput mode If the mGuard does not have enough memory to save a file completely or to decompress it a corresponding error message will be sent to the user s e mail client and an entry will be written to the anti virus log In this case you have the following options e You can try again later to send the message e You can temporarily deactivate the virus filter for the corresponding server e You can set the parameter to Let the message pass unscanned Please note that depending on the coding scheme used the size of the attachment may be larger than the original file Action for mails exceeding the maximum message size Let the message pass unscanned When this option is selected the virus filter will allow the messages which exceed the filesize set to pass through unscanned E In this case the message is not checked for viruses Block message When this option is selected an error code will be returned to the e mail client and the e mail will be blocked List of SMTP servers Indicate which server connections should be scanned for viruses By e
73. PRAP sy cedecs Gaeden A e AAA AA 148 MEAN taa reido eo e Lat ee aleta AEA EEE 148 VPN Virtual Private Network ooooonnoccccnooocccnooonccnnononocnnnnnnonon anno cono EEE Ea 149 NN IE AAA 150 Generali alas lil 150 EAGLE MG arA ut da 150 5 of 152 1 Introduction The mGuard protects IP data connections The device supports the following functions e Network Card mGuard PCI Switch mGuard delta e VPN router VPN Virtual Private Network for the secure transfer of data via public networks hardware based DES 3DES and AES encryption IPsec protocol e Configurable firewall to provide protection against unauthorized access The dynamic packet filter inspects the source and destination addresses of data packets and blocks undesired traffic e Virus protection with support for the protocols HTTP FTP SMTP and POP3 The device can be conveniently configured using a Web browser Network features e Stealth Auto Static Multi Router Static DHCP Client PPPoE for DSL and PPTP for DSL connectivity VLAN DHCP server relay on the external and internal network interfaces DNS cache on the internal network interface e Administration using HTTPS and SSH Firewall features e Stateful packet inspection e Anti spoofing e IP Filtering e L2 Filtering only stealth mode e NAT with FTP IRC and PPIP pass through only router modes e 1 1 NAT only router modes e Port forwarding only router modes e Firewall throughpu
74. S Secure HyperText Transfer Protocol SMTP Simple Mail Transfer Protocol POP3 Post Office Protocol Version 3 and DNS Domain Name Service ICMP is based on IP and adds control messages SMTP is an e mail protocol that is based on TCP IKE is an IPsec protocol that is based on UDP ESP is an IPsec protocol that is based on IP On a Windows PC the WINSOCK DLL or WSOCK32 DLL handles both protocols gt Datagram The SNMP protocol Simple Network Management Protocol is used in addition to the other protocols especially in large networks This UDP based protocol is used for the central administration of network devices For example you can use the GET command to request a configuration or employ the SET command to change the configuration of a device provided that the addressed network device is SNMP compliant An SNMP compliant device can also send SNMP messages independently in case for example an extraordinary event should occur Messages like this are called SNMP traps A VLAN Virtual Local Area Network divides a physical network into several independent logical networks Devices within a VLAN can only access devices within their own VLAN The membership to a LAN is defined by the physiacl network topology and the VLAN ID 1 4094 All devices with the same VLAN ID belong to the same VLAN and can therefore communicate with each other For a VLAN based on IEEE 802 10 the ethernet frame is extended by 4 bytes
75. Save current configura tion as profile 2 Click the Save button Result The configuration profile is saved on the mGuard and the name of the profile is displayed in the list of profiles saved on the mGuard 58 of 152 Profiles on the ACA Configuration profiles can be stored EAGLE mGuard only Uploading a configuration profile that has been saved to the configuration computer Prerequisite You have saved a configuration profile on the configuration computer as a file according to the procedure described above 1 Enter the desired new profile name in the field behind Upload a configu ration as profile 2 Click the Browse button and select the respective file in the displayed dialogue box and open it 3 Click the Upload button Result The configuration profile is loaded into mGuard and the name assigned in Step 1 will be displayed in the list of the profiles stored on the mGuard also on an external autoconfiguration adapter ACA which is connected to the mGuard s V 24 ACA11 or USB ACA21 port Store a profile on the ACA e When the password of the mGuard on which you will later import the profile has a root password unequal root you must enter that password under The root pasword to save on ACA e Press the button Save Current Configuration to ACA to write the current configuration to the ACA The LED STATUS and also the V 24 LED in case of ACA11 will blink until the store procedure is fini
76. Servers RADIUS timeout RADIUS retries gt lt IE O Port ES cL 1812 Radius Server Status 88 of 152 Radius Timeout Specifies in seconds how long the mGuard will wait for the answer from the radius server Default 3 seconds Radius retries Specifies how often requests will be repeated to the radius server after a radius timeout has occurred Default 3 Server Name of the server or IP address Port The port number used by the radius server Secret Server password User Authentication Remote Users Status Status User Firewall not enabled If the user firewall is activated its status will be displayed here 6 6 Menu Network Security 6 6 1 Network Security gt Packet Filter The mGuard has an integrated Stateful Packet Inspection Firewall The connection data for each active connection is collected in a database connection tracking Therefore 1t is only necessary to define rules for one direction data from a connection s other direction and only this will be automatically passed through A side effect is that when reconfiguring existing connections will not be dropped even if a corresponding new connection may not be setup Factory settings for the packet filter e All incoming connections will be rejected except VPN e The data packets of all outgoing connections will be passed through VPN connections are not subject to the firewall rules defined in this menu You can
77. Stealth mode this setting has no effect In other words it will be ignored and the connection will be initiated automatically whenever the mGuard notices that the connection should 116 of 152 be used Tunnel Settings Connection type You can choose from Tunnel Net work gt Net work Transport Host gt Host Transport L2TP Microsoft Windows Transport L2TP SSH Sentinel Tunnel Net work gt Net work This type of connection is not only suitable in every case but also the most secure In this mode the IP datagrams are completely encrypted before they are sent with a new header to the remote site s VPN gateway the tunnel end There the transferred datagrams are decrypted to restore the original datagrams These are then passed on to the destination system Transport Host gt Host In this type of connection the device only encrypts the data of the IP packets The IP header information remains unencrypted Transport L2TP Microsoft Windows If this type of connection is activated the mGuard will use a transport connection which is compatible with the IPsec L2TP client available in older Microsoft Windows systems If you select this option you should also set Perfect Forward Secrecy PFS to No and enable the L2TP server Transport L2TP SSH Sentinel If this type of connection is activated the mGuard will use a transport connection which is compatible with the IPsec L2TP client availa
78. Web browser must support SSL i e https 2 Make certain that the browser does not automatically dialup a connection when it is started because this could make it more difficult to establish a connection to the mGuard In MS Internet Explorer you can prevent this with the following setting In the Extras menu select Internet Options and click on the Connections tab Make certain that Never dial a connection is selected under Dial up and Virtual Private Network settings Enter the complete address of the mGuard into the browser s address field In Stealth mode factory setting except mGuard delta and blade controller this address always is The mGuard s default P address in Stealth mode https 1 1 1 1 and not in Stealth mode https 192 168 1 1 ner ps Od and in Router factory setting on mGuard delta and blade controller PPPoE or PPTP mode the factory setting for the mGuard s address is https 192 168 1 1 39 of 152 BO If you have forgotten the configured address BO If the Administrator Web page is not displayed After a connection has been successfully setup 40 of 152 Afterwards The mGuard s Administrator Web page will be displayed The security notice shown under After a connection has been successfully setup on page 40 will displayed If the address of the mGuard in Router PPPoE or PPTP mode has been changed to a different value and you do not know the device
79. Yes was chosen above The remote network address which is actually addressed by the local systems The network mask is taken from the field Remote network B gt In case the Remote network or the Network address for remote 1 to 1 NAT are within one of the networks directly connected to the mGuards LAN port then the mGuard will additionally answer ARP requests for such IP addresses This enabled access to a remote VPN using local IP addresses without actually changing the routing configuration of locally connected clients The virtual IP which will be used by the client in stealth mode Virtual Local Network IPsec Tunnel ee tea ae Se Client s virtual IP lt i ZN Client s real IP Si Internet Remote Remote VPN Gateway Network In Stealth mode the VPN s local network is simulated by the mGuard Inside this virtual network the client will be known under a virtual IP BO This entry is only required in Stealth mode Activate 1 to 1 NAT in another internal network in Router mode Yes No Transcribe the local network defined in the VPN tunnel to a local network available for the local LAN Ethernet port An explanation for 1 to 1 NAT can be found under Network Address Trans lation IP Masquerading on page 93 Internal network for 1 to 1 NAT The network address for the local LAN Ethernet port The net mask is taken over from the local network field Authentication method There are 2 options X 509 Ce
80. a cbt ea EENES ARESE REESE 70 6 4 Menu NetWork id ea aah AEST ME Te 71 NG e A ES 71 General tices a EAA A en tial radia a 71 Network Mode gt Stealth factory setting except mGuard delta and blade controller 74 Network Mode gt Router factory setting mGuard delta and blade controller 75 Network Mode gt PPBOE coo iria e E elon E AE E 76 Network Mode gt PPTP cuco 77 Network Mode gt Router PPPoE or PPTP ooonccccnnnincccnnnncinnonacinannnccnnnncccnnnnac nnn T11 Bthernet iii aaa a 78 Serial Port only mGuard blade delta and EAGLE MGuard ecoooonnccnnncccnoccccnnncnnnnnnn 79 Hardwarea E AE cat N AE cadwies indeed 81 6 4 2 Network DNS unn da ate add AN E T A vw 81 DINA TN 81 DyN Sintra eae AH SL IE 82 643 Network DHCP marido dada caco 83 Internal External DIC aa 83 6 35 Menu User Authentication sereins eei aE S ETARE ENARA EE EEEE EEA ea EESE 86 6 5 1 User Authentication gt Local Users ooooonconincnnnnnnononononononnnonnnonnncnnnnnncnnncon coca ncnnnonos 86 PASS WOTAS ien hre Stade A ductors tert A A A E 86 6 5 2 User Authentication gt Firewall Users oooonnonnnnninnnncnnnnnnncnconccononanonanonnncnnnonanonnnonos 87 Bre Wall Uli i 87 Raditis Server ETT 88 SAUS A AS AS AAA A E I A AN AA TA 88 6 6 Menu Network Security viciado 89 6 6 1 Network Security gt Packet Filter aaa 89 Incoming Rules i22 20 Saye a aera tee nue eee cai 89 Qutgome Rules 02 sss ce ane dis 90 MAC Fier
81. a different Port Number is used this must be appended to the IP address e g as follows https 123 456 789 21 442 Allowed Networks Lists the firewall rules that have been set These apply for the incoming data packets of an HTTPS access Inserting moving and deleting rows is explained under Working with tables on page 43 51 of 152 52 of 152 From IP Enter the address es of the system s that is are allowed remote access in this field You have the following options for the entries e IP address 0 0 0 0 0 means all addresses To enter an address space use the CIDR notation see CIDR Classless InterDomain Routing on page 135 Interface External OR Internal Specifies whether the rule applies to the external interface WAN port or the internal interface LAN port The default behaviour when no rules are specified is to drop all connections on the external interface and to accept all connections on the internal inter face Action Possible settings e Accept e Reject e Drop Accept means that the data packets should be passed through Reject means that the data packets should be rejected so that the sender is informed that the data packets have been rejected In Stealth mode Reject has the same effect as Drop see below Drop means that the data packets should not be passed through The data packets will be discarded so that the sender will not be informed as to what happened to them
82. address field on the remote system s SSH client If a different port number has been set e g 22222 this must be specified to the SSH client e g ssh p 22222 123 456 789 21 Allowed Networks Lists the firewall rules that have been set These apply for the incoming data packets of an SSH remote access Inserting moving and deleting rows is explained under Working with tables on page 43 49 of 152 From IP Enter the address es of the system s that is are allowed remote access in this field You have the following options for the entries IP address 0 0 0 0 0 means all addresses To enter an address space use the CIDR notation see CIDR Classless InterDomain Routing on page 135 Interface External OR Internal Specifies whether the rule applies to the external interface WAN port or the internal interface LAN port The default behaviour when no rules are specified is to drop all connections on the external interface and to accept all connections on the internal inter face Action Possible settings e Accept e Reject e Drop Accept means that the data packets should be passed through Reject means that the data packets should be rejected so that the sender is informed that the data packets have been rejected In Stealth mode Reject has the same effect as Drop Drop means that the data packets should not be passed through The data packets will be discarded so that the sender will
83. al Configuration At startup oo eee ceeceeseeeeecnseceseeseeseceeseecaaecaeceseceeesaeeeaeeaeenaeeneeeeaes 34 5 2 1 mGuard blade EAGLE mGuard und mGuard smart ccccccccncnnnicinininnnninananananananos 35 With a configured network interface eee esceceseeseesseecceeeceseeeseeeaeceaeeneeseeeeaes 35 Without a configured network interface cee ceeeeeeeeeecnseeeeceseceseeeseecseseaeenseeeaee 35 522 mGuard deltas zi ier inets NS 36 SS MGU PCM AA NO 37 Install the mGuard PCT Cardis ccinoticocicon cie dees Sees Hees s e e aa 37 Install the mGuard PCI Driver 0 ee eee tsai iigtin ieee iiaei tieses 37 Configure the Network Interface eee cecseeeeeeeeneecnseeseceseeeaeesaeceseceseeeneseaeenaees 37 The Default Gate way viii ii oils A A Ne Le 38 5 3 Setting Up a Local Configuration Connection 00 cece eee eeseeseceeeeseeeaeceeeeeeeeeeesaecneenseeeees 39 Web based Administrator interface cc ceccecsseceesseeeeeceeeececeeeeceeaaeeeaaeceeaeeeeeeeees 39 After a connection has been successfully Setup oooonocononcnoconocononcnonanonanananananononnc ns 40 Configuring the devices saninin idee end ie gli ee 41 540 Remote Configuration iaa ae abe a ea Me ieee eee 41 Prerequisiles coo dete iso tetas tetas Soins eae a ss debian a i ceiba Ae AE Eens 41 Remote Combi curation aceite cialis alli le bss tirate lla Esc ctas 41 6 CONTIGUA iss ssssescesscesdssssdisennsceseoseccsvssacscesecssesesecstasseceescesseedsnntesscossdessnsscedennsdosc
84. ame protocol as the mGuard Select the name of the provider with which you are registered e g DynDNS org DynDNS Server The name of the server of the DynDNS provider selected above e g dyndns org DynDNS Login DynDNS Password Enter the user name and password that you have been assigned by the DynDNS provider here DynDNS Hostname The name selected at the DynDNS Service for this mGuard if you use a DynDNS Service and have entered the corresponding data above Network gt DHCP Mode The Dynamic Host Configuration Protocol DHCP automatically assigns appropriate network parameters like IP address or subnet mask to the clients connected to the mGuard Under DHCP Intern you can configure the settings for the internal interface LAN port and under DHCP Extern the settings for the external interface WAN port The DHCP server relay is also operational in stealth mode BO IP configuration on Windows clients To do so if you are using Windows XP click on Start Control Panel Network Connections Right click on the icon of the LAN adapter and then click on Properties in the pop up menu In the Internet Protocol Properties dialog on the General tab select Internet Protocol TCP IP under This connection uses the following items and then click on the Properties button In the Internet Protocol Properties TCP IP dialog make the appropriate entries or settings Network DHCP External DHCP Mode pa c
85. ansmission Control Protocol Internet Protocol Trap VLAN 148 of 152 and distribute them to the said employees This reduces the outgoing traffic which in turn cuts down on costs Service providers are companies or institutions which offer users access to the Internet or an online service In Internet terminology spoofing means supplying a false address With the false Internet address the user can create the illusion of being an authorized user Anti Spoofing is term for mechanisms which detect or prevent spoofing In the case of symmetrical encryption the same key is used to encrypt and decrypt the data Two examples of symmetrical encryption algorithms are DES and AES They are fast but as the number of users increases the administration becomes rather involved This is a family of network protocols It is used to connect two computers in the Internet IP is the base protocol UDP is based on IP and sends individual packets The packets may arrive at the recipient in an order different from that in which they were sent or they may even be lost TCP secures the connection and ensures for example that data packets are passed on the application in the right order UDP and TCP add the Port Numbers 1 to 65535 to the IP Addresses The various services offered by the protocols may be distinguished by these Port Numbers A number of additional protocols are based on UDP and TCP e g HTTP HyperText Transfer Protocol HTTP
86. ase the Rescue Button quickly enough the mGuard will restart again The mGuard will now start the recovery system It tries to receive an IP address from a DHCP server over the LAN port e Status display e blade PCI the red LAN LED flashes e delta the Status LED flashes EAGLE the LEDs 1 2 and V 24 light orange e smart the middle LED heartbeat flashes The file install p7s will be loaded from the TFTP server which contains the installation procedure for the flashing Only files digitally signed by Innominate will be accepted Afterwards the flash memory will the be erased e Status display e blade PCI the two green and the red LAN LED form a bouncing ball display in which the light shifts from one LED to the next e delta the Status LED will flash fast EAGLE the LEDs 1 2 and V 24 form a bouncing ball display in which the light shifts from one LED to the next e smart the 3 green LEDs form a bouncing ball display in which the light shifts from one LED to the next The file jffs2 img p7s which contains the mGuard software will be loaded from the TFTP server and written onto the flash Only files digitally signed by Innominate will be accepted This process will take about 3 to 5 minutes e Status display e blade PCI the green and the red LEDs will flash continuously e delta the Status LED will light continuously e EAGLE the LEDs 1 2 and V 24 are off the LEDs p1 p2 and Status will light continuously e smart the mi
87. atic electricity discharge Unplug the power cord from the back of the computer Remove the computer s cover please consult the manual of your computer Select a free PCI slot 3 3V or 5V for the mGuard PCI Remove the selected slot bracket by unscrewing the holding screw and slide it out Save this screw for securing the mGuard PCI card after it s installed To install the PCI card carefully align the board s bus connector with the selected expansion slot on the motherboard Push the board down firmly but gently until it is well seated Replace the slot bracket s holding screw to secure the board to the rear slot panel Put back the computer s cover 10 Reconnect the power cord and turn on your computer Driver installation e Please complete the steps described in section Hardware installation on page 27 first BO The installation of the driver is only necessary and will only work as described in Driver Mode see Driver Mode on page 25 gt The following screen shots show the german version of Windows XP To install the driver switch your computer on login with Administrator rights and wait for the following window to show up Assistent fiir das Suchen neuer Hardware Willkommen Mit diesem Assistenten k nnen Sie Software fiir die folgende Hardwarekomponente installieren Ethemet Controller 3 Falls die Hardwarekomponente mit einer CD A oder Disk
88. ble in recent Microsoft Windows systems and the SSH Sentinel VPN client If you select this option you should also set Perfect Forward Secrecy PFS to No see below and enable the L2TP server As soon as the IPsec L2TP connection is started under Windows a dialog will appear to prompt you to enter your user name and login You can make any entry that you want in this dialog Since the X 509 certificate has already provided your authentication the mGuard will ignore these entries Tunnel Settings with Connection Type Tunnel Net lt gt Net When the Connection Type is setto Tunnel the following entries appear on the page Tunnel Settings Connection type Tunnel Net lt gt Net y Local network 192 168 1 1 32 Remote network 192 168 254 1 32 The virtual IP which will be used by the client in Stealth mode Enable 1 to 1 NAT to a different internal network in router mode 117 of 152 The parameters Local network address and Remote network address define the networks on both sides of the tunnel which must also match the remote VPN gateway s tunnel configuration y a a a Local Internet Remote Remote Network VPN Gateway Network With 1 to 1 NAT it is furthermore possible to change the effectively used network addresses independently from the tunnel settings as agreed on with the remote VPN gateway Lokales Netz Gegen berliegendes Netz a oe oN a A A N 3 L
89. ble to use PPPoE or PPTP Router Mode with Power over PCI Mode NIC 192 168 1 2 AM PR E E A A y L If 192 168 1 1 T mGuard PCI external IP In router mode it is possible to use PPPoE and PPTP The mGuard and the network interface card NIC connected to the LAN jack use a separate subnet E g the NIC could use the IP 192 168 1 1 and the mGuard s LAN jack could use the IP 192 168 1 2 A third IP will be used on the WAN jack to communicate with a router or a PPPoE PPTP capable DSL modem Hardware installation 1 Rescue push button 2 Jumper to enable disable Driver Mode 3 Ethernet jack to connect the unit directly to the system or net work to be protected local sys tem or network when Driver Mode is disabled 4 Jack for connecting an external network e g WAN Internet Connections to remote devices or networks are established via this network Use an UTP cable CAT 5 1 Configure the mGuard for either Driver or Power over PCI mode See Choice between Driver mode or Power over PCI mode on page 25 27 of 152 4 5 3 Windows XP 28 of 152 Nn amp WwW 9 To enable the Driver Mode set the jumper 2 to the following position 3 2 ol To enable the Power over PCI Mode set jumper 2 to the following position t3 BR Turn off the power to your computer and any other connected peripheral devices Follow the precautions for st
90. blish a PPP Point to Point Protocol dial up connection to the mGuard On a Windows PC in order to be able to access mGuard s web configuration user interface using the PC s web browser via TCP IP you must set up a dial up network connection to the mGuard Serial Port Modem Baudrate The speed of the serial port MODEM PPP When set to Off the serial interface can be used with a terminal client When set to On the serial interface can be used with PPP 79 of 152 Hardware handshake RTS CTS Use the RTS and CTS signals for the PPP connection PPP dialin options Local IP IP of the mGuard for the PPP connection Remote IP IP of the remote peer for the PPP connection PPP Login name Login to be send by the remote PPP peer PPP Password Password to be send by the remote PPP peer Firewall Incoming PPP Firewall rules for connection from the PPP to the internal ethernet interface LAN Inserting moving and deleting rows is explained under Working with tables on page 43 You have the following options for the entries Protocol All means TCP UDP ICMP and other IP protocols IP address 0 0 0 0 0 means all addresses To enter an address space use the CIDR notation see CIDR Classless InterDomain Routing on page 135 Port This is only evaluated by the TCP and UDP protocols any means each and every port startport endport e g 110 120 defines a range of ports You can spec
91. cables 17 of 152 e 12 place holders e 12 handle plates M1 to M12 e screws to install the bladeBase The mGuard delta also contains e the 5V DC power supply e two UTP ethernet cables e aRS232 serial cable 18 of 152 4 1 Connect the mGuard blade mGuard bladeBase mGuard blade Power Supply Switches P1 amp P2 Handle Plate Screws mGuard blade 1 to 12 Jacks for Power Supply P1 amp P2 Pow e Sub los El E Installing mGuard e Install the mGuard bladeBase into the rack e g close to the patch panel bladeBase e Provide the two power supplies and the control unit at their front from the left to the right with the handle plates P1 P2 and Ctrl e Connect both power supplies on the back of the mGuard bladeBase with 100V or 220 240V e Switch both power supplies on e The LEDs at the front of the power supplies flash now green Bo It is necessary that a sufficient air circulation through the bladePack is guaranteed B gt When stacking several bladePacks one or more 19 rack mount fan trays must be installed to exhaust the accumulated warm air Installing mGuard e Loosen the upper and lower screws of the place holder or mGuard blade you blade want to replace e Remove the place holder or pull the old mGuard blade out of the bladeBase e Insert the new mGuard blade with its circuit board into the bladeBase s plastic guidance and push until 1t is completely inside e Secure the mGuard blade by lig
92. cescesdensteasesssees 43 olo Operation aen baton ee het Bete read do lts 43 6 2 Men Management A vedens sedis ladstes iadetes E Ea E e SEEE G E S Sea 45 6 2 1 Management gt System Settings a tas 45 a AAEE 45 Signal contact only EAGLE mGuatd ococonoccnoconocononcnnnonnnonnnonnconncnnncnnncnnnonnnconccn nano 46 A AA NO 47 Shell ACCESS inne ea inset ciel ht in alae a at ian 49 072 2 Management gt Web Settings A ene ERNS 50 Generale aii A NT 50 ACTOS it ARS Mate a heute ARA REA fehl da 51 6 2 3 Management Licensing AA 53 QQVETVIS E E E EEE 53 Installs sist E E E OSS 53 6 2 4 Management gt Update is 54 OYEryIEW ar area e e a e E a e e aR CE 54 Update noir Aa 55 AntiVirus A AT 56 6 2 5 Management gt Configuration Profiles a ai aa 57 Configuration Profiles tati iss inte ee 57 Profiles on the ACA EAGLE MCU Oido siii 59 6 2 6 Management X SNMP ico 60 QU EE T E A A tt eds 60 E IAN 62 LED Picas rst tl beds 66 6 2 7 Management gt Central Management ais idiccpsiacsubsascvapsitatecvuncsapitetermensea ica 66 Configuration Pull cuina id 66 6 2 8 Management gt Res aa 68 6 3 Menu Entry Blade Control control unit only oooonconcnnnccnnnnnononoccnannannnnn non nonnncnnncnnc cnn conan 68 631 Blade control Overview in dede 68 6 3 2 Blade control gt Blade 01 to 12 nda 69 2 of 152 Table of Contents Table of Contents Bladen slot Ruina oxees saauedveasasevaine 69 Cs A andes asthe AEE soteaetded
93. ch are usually blocked by the firewall rules defined under Network Security gt Packet Filter and Network Security gt User Firewall Please see Connections scanned for viruses are subject to firewall rules Yes No on page 93 to adjust this behaviour You have the following options for the entries Server 0 0 0 0 0 means all addresses i e the system will filter the traffic of all POP3 servers To enter an address space use the CIDR notation see CIDR Classless InterDomain Routing on page 135 Bo Since an attempt to setup a connection is first handled by the proxy if a nonexistent server is requested e g a bad IP address the user software will act as though the connection to the server had been established but no data was sent If the list contains the exact server addresses this behavior can be prevented since the proxy will then only take requests addressed to the servers given in the list Server Port Enter the number of the port for the POP3 protocol in this field The default setting for the POP3 port is 110 Comment An informational comment for this rule Scan Scan The virus filter is activated for the servers specified in this rule No Scan The virus filter is deactivated for the server specified in this rule 6 8 2 Email Security gt SMTP Requirements The following requirements must be fulfilled for the use of the virus filter e Anti virus license has been installed Instructions
94. ched in the event of an attack the limits provide additional security If your operational environment has special requirements you can increase these values 6 6 4 Network Security gt User Firewall User Firewall Templates The user firewall is operative exclusively for firewall users i e users that regi stered as firewall users see User Authentication gt Firewall Users on page 87 A set of firewall rules a so called template can be assigned to each fi rewall user B gt The anti virus function see Menu Web Security not on blade control unit on page 102 and Menu Email Security not on blade control unit on page 107 has priority over the firewall rules defined here and can partially override them This behaviour can be overridden in the Network Security gt Packet Filters Extended Settings menu by setting the switch to Connections scanned for viruses are subject to firewall rules see Network Security gt User Firewall Advanced Connections scanned for viruses are subject to firewall rules Yes No on page 93 Network Security User Firewall User Firewall Templates CUIT IN Yes x marketing Yes xj research All defined user firewall templates are listed here A template can consist of several firewall rules A template can be assigned to several users Enabling Disabling a defined user firewall template Set Parameters active to Yes or No respectively
95. ck on Browse to select the file Enter the password with which the PKCS 12 file s private key is protected in the Password field Click on Import Then click on OK After the import is completed the new certificate will be shown under Certificate IPsec VPN Global DynDNS Monitoring DynDNS Monitoring Watch hostnames of remote VPN Gateways Refresh Interval sec For an explanation of DynDNS see below Services gt DynDNS Registration Watch hostnames of remote VPN Gateways Yes No If the mGuard has been given the address of the remote VPN gateway as a hostname see Connections on page 114 and this hostname has been registered with a DynDNS Service the mGuard can check against the DynDNS at regular intervals whether any changes have occurred If yes the VPN connection will be setup to the new IP address Refresh Interval sec Standard 300 seconds 6 9 2 IPsec VPN gt Connections Prerequisites for a VPN connection The main prerequisite for a VPN connection is that the IP addresses of the VPN partners are known and reachable Connections 114 of 152 In order for an IPsec connection to be setup successfully the VPN s remote site must support IPsec with the following configuration Authentication via Pre Shared Key PSK or X 509 certificate ESP Diffie Hellman Groups 2 and 5 DES 3DES or AES encryption MDS or SHA 1 hash algorithms Tunnel or Transport mo
96. com 1 1 Device versions mGuard smart mGuard PCI mGuard blade mGuard is available in the following device versions which have largely identi cal functions All devices can be utilized regardless of the processor technology and operating system the connected computers use Smallest device model Can for exam ple simply be plugged between the computer or local network on mGuard s LAN port and an available router on mGuard s WAN port with out having to change existing system configurations or driver installations Designed for instant use in the office or when on the go This card which can be plugged into a PCI slot provides the computer it is in stalled in with all mGuard functions in driver mode and can additionally be uti lised as a normal network card A net work card already on hand in the computer or another local computer lo cal network can be connected in the power over PCI mode The mGuard blade Pack includes the mGuard bladeBase which can be easily installed into standard 3 U racks 19 inches and accommodate up to 12 mGuard blades Thus this version is ide ally suited for use in an industrial envi ronment where it can protect several 7 of 152 server systems individually and independently of one another An additional se rial interface enables remote configuration using a telephone dial up connection or a terminal EAGLE mGuard EAGLE mGuard previously mGuard industrial
97. coo anos 19 Installing mGuard blade cateo ins 19 Control UMt CTRES IO szcistsecesbeedecathadeesbscacestladecabincaash h ia iii 19 Connecting mGuard blade secre aaa pai 20 4 22 Connect the mGuard delta irnir concaciearcocee secede cesvseesedoessdetedevovevaeededevarcranes 21 4 3 Connect the EAGLE mGuatrd seitse aasre E A ESE ieaS a raas 22 Terminal Block decenie aiino eea EEE E EEEE EEE a E ESS 22 Assembly E E EE N 22 Startup Procedure osen araeir lid 23 NEAR aaa a ae ae ee a ee a aeeie 23 Dismantling A iii ii i i 23 4 4 Connect the MGuard SMart en A a A ee a Raen 24 4 5 Connect the mGuad PCD e a 25 4 5 1 Choice between Driver mode or Power over PCI mode ooccccccccccnnnncnonocicininininanns 25 Diver Mode sitiado sate the ie ansiada 25 Powerover PCT Mode ninia a a aee eari aai 26 4 5 2 Hardware installation seseeessesesesssssssecsessssseceessssseressssestecssssssosesessssscrecsessseeeeseses 27 4 3 3 DeiveranstallaliOn tail rl R A EE EOE 28 Wand LANAO G E TEE E EEE E T 28 Windows 2000p siesena piiniera E NEE EE AE EEA io dle 29 EA 31 5 Configuration PreParatiOn vsisescscisrsccescosssedsesccesessssnaseonsesseacsesvessdesssacsvevescsonessedsesiacsvetesseassboosssses 34 orl Connecting the mGuard cion o ett td ate 34 1 of 152 Table of Contents MGu ard A A 34 mGuard delta evi advised eats aise eos labia een laiuls 34 EAGLE DG Ai A iaa 34 MUA Midi A A A tate 34 mGuard Pluna diet AE AA estes 34 5 2 Loc
98. d can be restricted by firewall rules SNMP Simple Network Management Protocol is mainly used in more complex networks to monitor the status and operation of devices SNMP is available in several releases SNMPv1 SNMPv2 and SNMPv3 The older versions SNMPv1 SNMPv2 do not use encryption and are not considered to be secure We therefore recommend that you do not use SNMPv1 SNMPy2 As far as security is concerned SNMPy3 is considerably better but not all management consoles support it Bo It can take more than one second to process SNMP get or walk requests However the factory settings for the timeout of many Network Management Applications is set to one second In case you experience timeout problems please set the time out of your Management Application to values between 3 and 5 seconds Settings Enable SNMPv3 access Yes No If you wish to allow monitoring of the mGuard via SNMPv3 set this switch to Yes The access via SNMPv3 requires an authentication with a login and a password The factory settings for these entries are Login admin Password SnmpAdmin MDS is supported for the authentication DES is supported for encryption The login parameters for SNMPv3 can be changed only by using SNMPv3 Enable SNMPv1 v2 access Yes No If you wish to allow monitoring of the mGuard via SNMPv1 v2 set this switch to Yes Port for incoming SNMP connections external interface only Standard 161 SNMPv1 v2 Community
99. ddle LED heartbeat will light continuously The new software will be unpacked and configured This process will take about 5 minutes As soon as the procedure has been completed e blade PCI the mGuard restarts itself e delta the Status LED will flash once per second continuously EAGLE the LEDs 1 2 and V 24 will flash green continuously e smart all 3 LEDs will flash green continuously 3 Restart the mGuard not required on blade and PCI To do so press the Rescue Button briefly OR Disconnect the power supply smart by disconnecting the USB cable which is only used to supply power or in case of the mGuard PCI restart the computer The mGuard will be now restored to its factory settings Configure it once again 139 of 152 Required before the firmware can be flashed DHCP and TFTP servers 140 of 152 see Local Configuration At startup on page 34 Before the firmware can be flashed DHCP and TFTP servers must be installed on the locally connected system or a network system DHCP Dynamic Host Configuration Protocol TFTP Trivial File Transfer Protocol Install the DHCP and TFTP server if necessary see below BO If you install a second DHCP server in a network this can affect the configuration of the entire network 7 3 1 Installing DHCP and TFTP servers under Windows or Linux Under Windows Install the program found on the CD ROM To accomplish this proceed as follows 1 If the Windo
100. de Quick Mode Main Mode SA Lifetime 1 second to 24 hours If the system at the remote site is running Windows 2000 the Microsoft Windows 2000 High Encryption Pack or at least Service Pack 2 must be installed If the remote site is behind a NAT router it must support NAT T Or the NAT router must support the IPsec protocol IPsec VPN Passthrough In either case for technical reasons only IPsec Tunnel connections are supported IPsec VPN Connections Connections ves zj Jnausicaa new Lists the VPN connections that have been set up You can activate Enable Yes or deactivate Enable No each individual connection VPN connections deleting Click on the Delete button next to the entry Then click on OK Configuring a new VPN connection Click on New Enter a name for the connection and then click on Edit Make the necessary or desired settings see below Then click on OK VPN connections editing Click on the Edit button next to the entry Make the necessary or desired settings see below Then click on OK The following URL can be used to start stop VPN connections indepently from their Enabled setting https server nph vpn cgi name connection amp cmd up down Example wget https admin mGuard 192 168 1 1 nph vpn cgi name pa ris amp cmd up 6 93 Define a VPN connection After pressing the Edit button the following page appears General IPsec VPN Conn
101. de termines the required package set name Install the latest patch release x y Z Patch releases regulate errors in previous versions and have a version number which only changes in the third digit position e g 4 0 1 is a patch release for version 4 0 0 Install the latest minor release for the currently installed major ver sion x Y z Install the next major release X y z Minor and major releases supplement the mGuard with new features or con tain modifications of the mGuard s behavior Their version number change in the first and second digit position E g 4 1 0 is a major minor release for the versions 3 1 0 4 0 1 Update Servers AntiVirus Pattern 56 of 152 Here you can specify the servers from which the mGuard shall retrieve its updates BO The list of the servers is processed top down until an available server is found Protocol The update files can be downloaded using either HTTP or HTTPS Server In this field enter the FQDN or IP address of the server from which the update files shall be downloaded eg 123 456 789 21 or update example com Login In this field enter the user name to be used for connecting to the server Password In this field enter the password to be used when logging in Management Update Schedule Update Schedule never AAA Update Servers for AYP gt x Update Location Hostname L downloads avp innomir Proxy Settings L po C a The virus signa
102. deCtrlPowerStatus 2 mGuardTrapBladeRackID mGuardTrapBladeSlotNr mGuardTrapBladeCtrlPowerStatus The BladePack s power supplies status has changed 63 of 152 64 of 152 enterprise oid generic trap specific trap additional Description mGuardTrapBladeCTRL enterpriseSpecific mGuardTrapBladeCtrlRunStatus 3 mGuardTrapBladeRackID mGuardTrapBladeSlotNr mGuardTrapBladeCtrlRunStatus The blade s run status has changed Blade reconfiguration backup restore activate traps Yes No enterprise oid generic trap specific trap additional Description enterprise oid generic trap specific trap additional Description Antivirus SNMP Traps mGuardBladeCtrlCfg enterpriseS pecific mGuardTrapBladeCtrlCfgBackup 1 mGuardTrapBladeRackID mGuardTrapBladeSlotNr mGuardTrapBladeCtrICfgBackup A configuration backup to the Blade Controler is triggered mGuardBladeCtrlCfg enterpriseSpecific mGuardTrapBladeCtrlCfgRestored 2 mGuardTrapBladeRackID mGuardTrapBladeSlotNr mGuardTrapBladeCtrlCfgRestored Configuration restore from Blade CTRL is triggered Successful update for AV pattern activate traps Yes No enterprise oid generic trap specific trap additional Description mGuardTrapA V enterpriseS pecific mGuardTrapA vUpdateDone 1 mGuardTResA vUpdateDone AV Update was performed successfully AV update or scanning problems activate
103. dundancyState mGuardTResRedundancyReason Current HA cluster state changed mGuardTrapRouterRedundancy enterpriseSpecific mGuardTrapRouterRedundancyBackupDown 2 mGuardTResRedundancyBackupDown Backup device is not reachable by Master device This trap is only sent when ICMP checks are activated mGuardTrapUserFirewall enterpriseSpecific mGuardTrapUserFirewallLogin 1 mGuardTResUserFirewallUsername mGuardTResUserFirewallSrcIP mGuardTResUserFirewallAuthenticationMethod Remote User logged in mGuardTrapUserFirewall enterpriseSpecific mGuardTrapUserFirewallLogout 2 mGuardTResUserFirewallUsername mGuardTResUserFirewallSrcIP mGuardTResUserFirewallLogoutReason Remote User logged out mGuardTrapUserFirewall enterpriseS pecific mGuardTrapUserFirewallAuthenticationError 3 mGuardTResUserFirewallUsername mGuardTResUserFirewallSrcIP mGuardTResUserFirewallAuthenticationMethod Authentication error occured Traps can be send to one or more targets Destination IP IP to which the trap shall be sent 65 of 152 Destination Name An optional descriptive name for the destination which has no influence on the generated traps Destination Community Name of the traps SNMP community LLDP Management SNMP LLDP Mode Enabled gt Internal LAN interface Chassis ID IP address Port description Systemname External WAN interface MAC 0
104. e System Power supply 1 2 Uptime Temperature C System DNS Hostname Hostname mode User defined from field below xl Hostname Domain search path example local SNMP Information System Name Location Contact HiDiscovery Local HiDiscovery Support Enabled y iil HiDiscovery Frame Forwarding No x System only EAGLE mGuard Power supply 1 2 The state of both power supplies Uptime The system uptime since the last reboot Temperature C If the temperature exceeds the specified range a SNMP trap is sent System DNS Hostname Hostname mode Using the Hostname mode and Hostname fields you can assign a name to the mGuard This will then be displayed e g when logging in via SSH The administration of multiple mGuards is simplified if you assign hostnames to them User defined see below Default The name entered in the Hostname field is assigned to the mGuard Tf the mGuard is running in Stealth mode the option User defined must be selected under Hostname mode Provider defined e g via DHCP If the selected network mode permits the external setting of the hostname e g via DHCP the name received from the provider will be assigned to the mGuard 45 of 152 Hostname If the option User defined is selected under Hostname mode enter the name which should be assigned to the mGuard here Otherwise i e if the option Provider defined e g via DHCP is selected
105. e Browse button select the file and open it so that the path or the file name is displayed in the File Name field Then click the Install License File button 6 2 4 Management gt Update Overview Management Update System Information Version Base Updates AntiVirus Information AntiVirus Engine Status Last AntiVirus Update AntiVirus Update Status Package Versions ee Packa Number version Flavour bootloader 1 3 2 default bridge utils 0 9 5 default busybox 1 1 6 default bzip2 0 0 2 default clamav 0 88 50 default djbdns 1 5 1 default ebtables 0 3 0 default You can examine the successful unblocking of the virus filter feature For the information about the expiration date of your anti virus license please see Management gt Licensing on page 53 System Information Version The current software version of the mGuard Base The software version that was originally used to flash this mGuard Updates List of updates that have been installed on the base 54 of 152 AntiVirus Information Anti Virus Engine Status Displays the state of the scan engine If you have activated the anti virus protection for at least one protocol the status will be displayed as up Last Anti Virus Update Diplays the current release date of the anti virus database Anti Virus Update Status Shows if the anti virus update is activated or currently downloading Package Versions Lists the individual software
106. e MAU management for the ethernet interfaces will be switched on and HTTPS will be allowed on the local ethernet interface LAN The passwords and the settings configured for VPN connections and the firewall are retained Possible reasons for starting the Recovery procedure The mGuard is in Router or PPPoE mode and the mGuard s IP address has been changed from the default setting and you don t know the device s current IP address 137 of 152 Action 1 Press the Rescue Button slowly 6 times once per second 2 2 After about two seconds the mGuard will respond e blade PCI e On success the LAN LED lights green e On failure the WAN LED lights red e delta e On success the Status LED lights green e On failure the Status LED stays off e EAGLE e On success the STATUS LED lights yellow e On failure the FAULT LED lights red e smart e On success the middle LED lights green e On failure the middle LED lights red 3 Press the Rescue Button slowly 6 times again 4 On success the device will perform a restart and switch to Stealth mode It can then once again be accessed at the following address https 1 1 1 1 The mGuard delta and the mGuard blade Control Unit will be switched to Router Mode and will be accessible at 192 168 1 1 at the internal interface 7 3 Flashing the firmware Objectives To reload the mGuard s complete firmware BO All of the configured settings will be deleted The mGuard will b
107. e calling system will establish this additional connection for the data transfer To let the data of this additional connection pass through the firewall Enable FTP NAT Connection Tracking support must be set to Yes factory setting IRC This is similar to FTP When the IRC protocol is used for chatting in the Internet incoming connections must also be permitted after the connection has been established actively In this case Enable IRC NAT Connection Tracking support must be set to Yes so that the firewall will permit these connections factory setting PPTP This need only be set to Yes under the following condition if a local system should establish a VPN connection via PPTP to an external system without help from the mGuard The factory setting is No 97 of 152 6 6 3 Flood Protection 98 of 152 Network Security gt DoS Protection TCP ICMP Network Security DoS Protection Flood Protection TCP Maximum number of new outgoing TCP connections SYN per second Maximum number of new incoming TCP connections SYN per second ICMP Maximum number of outgoing ping frames ICMP Echo Request per second Maximum number of incoming ping frames ICMP Echo Request per second Stealth Mode Maximum number of outgoing ARP requests or ARP replies per second in each case Maximum number of incoming ARP requests or ARP replies per second in each case Maximum number of new ou
108. e in Universal Time Coordinates UTC If the Enable NTP time synchronisation is not yet activated see below and Time stamp in filesystem is deactivated the clock will start with January 1st 2000 Current system time local If the possibly differing current local time should be displayed you must make the corresponding entry under Timezone in POSIX 1 notation see below 47 of 152 Local system time Here you can set the mGuard s system time in case no NTP server has been specified or the NTP server isn t reachable The date and time are specified in the format Y Y YY MM DD hh mm YYYY Year MM Month DD Day hh Hour mm Minute Timezone in POSIX 1 notation If the Current system time above should display your current local time instead of the current time if it is different to the Greenwich Mean Time you must enter the number of hours plus or minus that your local time differs from Greenwich Mean Time Examples In Germany the time is one hour earlier than in Greenwich Therefore enter CET 1 In New York the clock is behind by five hours relative to Greenwich Mean Time So you enter GMT 5 The only important thing is the value 1 2 or 1 etc because only this will be evaluated the preceding letters won t be They can be substituted with CET or any other designation such as UTC If you wish to display Central European Time for example for Germany and have it automatically
109. e name ends with tar gz and you conduct a local update OR You can download the package set file via the Internet from the update server and then install the packages gt Depending on the size of the update this may take several minutes B gt If a reboot is necessary after a system update a message to this effect will be displayed E gt Do not interrupt the power supply during the update procedure Otherwise the device could be damaged and may be left inoperable and will require your device to be sent to the manufacturer Local Update Filename To install the packages proceed as follows 1 Click on Browse select and open the file so that its path or filename is shown in the field Filename The format of the filename is update a b c d e f tar gz 2 Click on Install Packages to transfer them to the device Online Update To perform an online update proceed as follows 1 Be sure that at least one valid entry exists under Update Server You should 55 of 152 have received the necessary details from your licensor 2 Enter the update s name in the entry field e g update 4 0 x 4 1 0 default 3 Click on Install Package Set to transfer them to the device Depending on the size of the update this may take several minutes If a reboot is necessary after a system update a message to this effect will be displayed Automatic Update This is a variation of the online update in which the mGuard independently
110. e restored to the factory default settings Possible reasons for flashing the firmware e The Administrator and Root password have been lost Action Proceed as follows E gt Do not interrupt the power supply during the flashing procedure Otherwise the device could be damaged and may be left inoperable and will require your device to be send to the manufacturer Prerequisites e First copy the mGuard software from the mGuard CD ROM or retrieve it from Innominate Support and save it on the configuration system A DHCP and a TFTP server both installed on a single system which provide the mGuard image files see Required before the firmware can be flashed DHCP and TFTP servers on page 140 e mGuard PCI When the mGuard is in Power over PCI mode the DHCP TFTP server must be connected to the mGuards LAN jack When the mGuard is in Driver Mode the DHCP TFTP server must listen on the mGuards network interface 1 Hold the Rescue Button pressed until the recovery status is entered as follows The mGuard will be restarted after approx 1 5 seconds and after another approx 1 5 seconds the mGuard will enter the recovery mode 138 of 152 e blade PCI the green and the red LAN will light e delta the Status LED will slowly fade off EAGLE the LEDs 1 2 and V 24 will light e smart all LEDs will light green 2 No more than 1 second after the recovery mode was entered release the Rescue Button If you do not rele
111. e the Anti Virus gt Database Update menu e Invalid virus filter license e Damaged or faulty update of the virus signature file Update running There is currently no anti virus database installed and the download of the current database has been started You can follow the progress of the download in the anti virus update log 133 of 152 DHCP Server Relay Messages from services defined under Network gt DHCP Anti Virus Update The update log contains notifications regarding the start and progress of the up date process for the virus signature files SNMP LLDP Messages from services defined under Management gt SNMP IPsec VPN Lists all VPN events The format corresponds to the standard Linux format It offers special evaluation programs that present information from the logged data in a more readable format 6 12 Menu Support 6 12 1 Support gt Advanced Hardware Snapshot 134 of 152 Support Advanced Hardware Hardware Information Hardware CPU CPU Family CPU Stepping CPU Clock Speed System Uptime User Space Memory MAC 1 MAC 2 Product Name OEM Name OEM Serial Number Serial Number Flash ID Hardware Version Version Parameterset This page lists the hardware properties of the mGuard Support Advanced Snapshot Support Snapshot This will create a snapshot of the mGuard for support purposes This function is intended to provide the support with
112. e the virus filter for HTTP or FTP over HTTP connections over a proxy insert a new row and change the default port 80 to the proxy s port Common proxy ports are 3128 and 8080 B gt The set of rules will be processed from the top down therefore the order of the rules is also decisive for the results BO The virus filter can only handle a limited number of simultaneous connections to mail HTTP and FTP servers Exceeding this number will cause further 103 of 152 connection attempts to be refused B gt Scanning for viruses may allow outgoing connections which are usually blocked by the firewall rules defined under Network Security gt Packet Filter and Network Security gt User Firewall Please see Connections scanned for viruses are subject to firewall rules Yes No on page 93 to adjust this behaviour You have the following options for the entries Server 0 0 0 0 0 means all addresses i e the system will filter the traffic of all HTTP servers To enter an address space use the CIDR notation see CIDR Classless InterDomain Routing on page 135 B Since an attempt to setup a connection is first handled by the proxy if a nonexistent server is requested e g a bad IP address the user software will act as though the connection to the server had been established but no data was sent If the list contains the exact server addresses this behavior can be prevented since the proxy will then on
113. e will not be displayed in the browser If a download manager is used to download a file via HTTP the error message will be displayed by the download manager Action for web content exceeding the maximum content size Let data pass unscanned When this option is selected the virus filter will allow the files which exceed the filesize set to pass through unscanned Tn this case the data is not checked for viruses Block data If this option is selected the system will terminate the download and send an error message to the client software whenever the content exceeds the maximum size List of HTTP Servers You can select the servers whose traffic should be filtered and specify for each IP address whether or not the anti virus protection should be activated It is also possible to enter trusted servers Examples Global activation of the anti virus protection for HTTP x Server Port Comment Enable Scan A F E 0 0 0 fo TTP out to any Scan x Scan a subnet and exclude a trusted HTTP server x Server Port Comment Enable Scan A E f92 168 2 5 fo frusted HTTP No Scan v a 192 168 2 0 24 fo fintrusted HTTP Scan vf Scan a single untrusted HTTP server in a subnet x Server Port Comment Enable Scan A f fis2 168 25 po untrusted HTTP Scan fz F E 192 168 2 0 24 fo frusted HTTP No Scan vf Inserting moving and deleting rows is explained under Working with tables on page 43 B gt To activat
114. eat the login process Timeout type static dynamic With static timeout users are logged out automatically as soon as the specified timeout elapsed With dynamic timeout users are logged out automatically after all connections were closed by the user or did expire on the mGuard and afterwards the timeout elapsed On the mGuard a connection expires when no data was sent for a certain period depending on the protocol being used Protocol Expiration after non usage TCP 5 days This value is configurable plesase see Timeout for established TCP connections on page 96 Plus 120 additional seconds after the connection expired This also includes connections closed by the user UDP 30s after traffic in one direction 180s after traffic in both directions ICMP 30s Other 10min 100 of 152 Template User Users Firewall Rules Network Security User Firewall marketing User Name Enter the names of users here The names must correspond to those that have been defined in User Authentication gt External Users for more informati on see User Authentication gt Firewall Users on page 87 Network Security User Firewall HTTP Template users Firewall rules Firewall rules Source IP J authorized_ip Lag D ufw ulwDDDDD 4 0 2e49e415 297D 1610 9227 DDDcbe D1 DIS2 Ne Protocol From Port Torr E ToPort Comment Log iE ater E Jany 0 0 0 0 0 http No z Fir
115. ections nausicaa General Options A descriptive name for the connection Inausicaa Enabled Yes gt Address of the remote site s VPN gateway 9 any either an IP address a hostname or any Connection startup Wait gt will be ignored in Stealth Mode Tunnel Settings Connection type Tunnel Net lt gt Net Local network 192 168 1 1 32 Remote network 192 168 254 1 32 The virtual IP which will be used by the client in Stealth mode Enable 1 to 1 NAT to a different internal network in router mode Internal network for 1 to 1 NAT 192 168 2 1 115 of 152 Options A descriptive name for the connection You can assign the connection any name you desire Enabled Specify whether the connection should be enabled Yes or not No Address of the remote site s VPN gateway najm Remote Internet VPN Gateway The address of the gateway to the private network in which the remote communication partner can be found If you wish to have the mGuard actively initiate and set up the connection to the remote site or 1f the device is in Stealth mode enter the IP address or the hostname of the remote site here If the remote site s VPN gateway does not have a fixed and known IP address you can use the DynDNS Service to simulate a fixed and known address See DynDNS on page 82 If you want the mGuard to be ready to accept a connection actively initiated and set
116. en to the anti virus log In this case you have the following options e You can try again later to download the file e You can temporarily deactivate the virus filter for the corresponding server 107 of 152 108 of 152 e You can set the parameter to Let the message pass unscanned Please note that depending on the coding scheme used the size of the attachment may be larger than the original file Action for infected mails Notify recipient by e mail If the virus filter detects a virus the recipient will be informed by e mail Notify e mail client by error message If the virus filter detects a virus the recipient will be informed by an error message sent to the e mail client If the parameter Delete received messages from server has been set in the e mail client software and the Action for infected mails has been set to Notify recipient by e mail the infected e mail will be deleted on the server since the e mail client will assume that the e mail has been successfully transferred If you do not wish to have the infected mail deleted e g if you wish to download the infected e mail in some other manner only use the option Notify e mail client by error message Action for mails exceeding the maximum message size Let the message pass unscanned When this option is selected the virus filter will allow the messages which exceed the filesize set to pass through unscanned In th
117. er Serial Number Voucher Key Enter here the serial number that is printed on the voucher as well as the ac companying license key and then click Online License Request Result mGuard now establishes a connection via the Internet and installs the respec tive license on the mGuard if the voucher is valid Restoring licenses Use this function if the license installed in mGuard has disappeared for some reason such as flashing the firmware To do so click the Online license re load button The license s that had been issued for this mGuard previously will be retrieved from the internet and installed 53 of 152 Manual license installation After clicking the License Request Form button an online form will be provi ded which can be used to order the desired license In the request form enter the following information Voucher Serial Number the serial number that is printed on your voucher Voucher Key the license key on your voucher Flash Id is automatically filled in Email Address the email address to which the license file will be sent After you have completed the form the license file will be sent to the email address indicated Under Filename you can apply the license file Install License Once the license has been purchased the license file will be sent to you as an email attachment In order to apply the license first save the license file as a separate file on your computer and continue as follows Click th
118. er provider example net PPPoE Password Internal Networks Internal IPs IP Netmask Use LAN LAN ID trusted port 192 168 1 1 255 255 255 0 fo ll T Additional Internal Routes Network Gateway PPPoE Network Mode PPPoE PPPoE Login In this field enter the user name Login which is expected by your Internet Service Provider ISP when you setup a connection to the Internet 76 of 152 Network Mode gt PPTP PPPoE Password In this field enter the password which is expected by your Internet Service Provider when you setup a connection to the Internet Network Interfaces Serial Port Hardware General Network Status External IP address Network Mode Status Active Defaultroute Network Mode Network Mode PPTP PPTP Login user provider example net PPTP Password Local IP Mode Static from field below Local IP 10 0 0 140 Modem IP 10 0 0 138 Internal Networks ed ee IP Netmask Use LAN LAN ID ru po 192 168 1 1 255 255 255 0 md fi Additional Internal Routes Network Gateway PPTP Network Mode PPTP Network Mode gt Router PPPoE or PPTP PPTP Login In this field enter the user name Login which is expected by your Internet Service Provider when you setup a connection to the Internet PPTP Password In this field enter the password which is expected by your Internet Service Provider when you setup a connection to the Internet
119. ernet connector when using the Power over PCI mode In the case of a remote configuration The mGuard must be configured to permit remote configuration The mGuard must be connected i e the required connections must function 5 2 Local Configuration At startup 34 of 152 The mGuard is configured using a Web browser which is running on the configuration system e g Firefox MS Internet Explorer or Safari gt The Web browser must support SSL in other words https By default factory settings the mGuard is accessible at the following address Factory setting Stealth Mode https 1 1 1 1 default setting except mGuard delta and blade controller Router Mode https 192 168 1 1 default setting on mGuard delta and blade controller 5 2 1 mGuard blade EAGLE mGuard und mGuard smart With a configured network interface Without a configured network interface In order for the mGuard to be accessed via the address https 1 1 1 1 it must of course first be connected to a configured network interface This is the case if you insert it into an existing network connection see the illustration in the section e Connect the mGuard blade on page 19 e Connect the EAGLE mGuard on page 22 e Connect the mGuard smart on page 24 In this case the Web browser can access the mGuard s configuration interface at the address https 1 1 1 1 see Setting Up a Local Configuration Connection
120. et mask 255 255 255 0 Default gateway 92 168 1 2 Use the following DNS server addresses Preferred DNS server Altemate DNS server After you ve configured the network interface you should be able to access the mGuard s configuration interface with a Web browser at the URL https 1 1 1 1 In case this isn t possible then your computer s default gateway might not be available and you must initialize the default gateway by assigning it a dummy value To accomplish this proceed as follows Initializing the default gateway 1 Determine the currently valid default gateway address If you are using Windows XP follow the steps described above under Configure the Network Interface to open the Internet Protocol TCP IP Properties dialog box If no IP address has been entered for the default gateway in this dialog box e g because Obtain an IP address automatically has been activated enter the IP address manually To do so first activate Use the following IP and then enter as an example the following addresses IP address 192 168 1 2 gt Do not under any circumstance Subnetwork mask 255 255 255 0 assign the configuration system Default gateway 192 168 1 1 an address like 1 1 1 2 2 On the DOS level Start Programs Accessories Command Prompt enter arp s lt IP of the default gateway gt aa aa aa aa aa aa Example You have determined that the address of the default gateway 1s or
121. ette geliefert wurde legen Sie diese S jetzt ein Wie m chten Sie vorgehen Klicken Sie auf Weiter um den Vorgang fortzusetzen lt Zuruck Abbrechen 1 After inserting the mGuard CD choose From a list or specified location Advanced and click on Next Assistent fiir das Suchen neuer Hardware Wahlen Sie die Such und Installationsoptionen ee Verwenden Sie die Kontrollk stchen um die Standardsuche zu erweitern oder einzuschr nken Lokale Pfade und Wechselmedien sind in der Standardsuche mit einbegriffen Der zutreffendste Treiber wird installiert IV Wechselmedien durchsuchen Diskette CD F Folgende Quelle ebenfalls durchsuchen KaADriversiPrintiwin_2kXP y Durchsuchen Nicht suchen sondem den zu installierenden Treiber selbst w hlen Verwenden Sie diese Option um einen Geratetreiber aus einer Liste zu w hlen Es wird nicht garantiert dass der von Ihnen gew hlte Treiber der Hardware am besten entspricht lt Zuriick Abbrechen 2 Click on Next Hardwareinstallation A Die Software die f r diese Hardware installiert wird Innominate mGuardPCI hat den Windows Logo Test nicht bestanden der die Kompatibilit t mit Windows XP berpr ft Warum ist dieser Test wichtig Das Fortsetzen der Installation dieser Software kann die korrekte Funktion des Systems direkt oder in Zukunft beeintr chtigen Microsoft empfiehlt strengstens die Installation jetzt abzubrechen u
122. etwork Interfaces Serial Port Modem Baudrate Modem PPP Hardware handshake RTS CTS PPP dialin options Local IP 192 168 2 1 Remote IP 192 168 2 2 PPP Password Poole Incoming Rules PPP Lag D fw zetisl incaming A 0 DODDDDDD DDDD DDDD DDDD DDDODOODDDDD AS no Protocol From Port To IP To Port Comment Log a Log entries for unknown connection attempts Outgoing Rules PPP Lag D fw erisl aulgaing A 0 DDDDDDDD DDDD DODD DDDD DDDDDODDDDDD PS TU rrotocot From From port Torr Toport action comment Log Log entries for unknown connection attempts In addition to HTTPS SSH and SNMP management access the above rules regulate access to Incoming and from Outgoing the internal network via the PPP connection Please note On some platforms the serial port is not accessible Some mGuards like the mGuard blade delta or EAGLE offer a serial interface which is accessible from the outside The mGuard s configuration can also take place via this interface The following possibilities are available e Connecting mGuard s serial interface to the serial interface of a PC Establish the connection to the mGuard on a PC by using a terminal programme and carry out the configuration via SSH Connect a modem which is connected to the telephone fixed line or GSM network to the mGuard s serial interface This enables a remote PC also connected to the telephone network by means of a modem to esta
123. etworks and has both an external and an internal IP address External Interface The external interface WAN of the mGuard is connected to the Internet or other parts of the LAN e mGuard smart the ethernet jack Internal Interface A network or a single system is connected to its internal interface LAN e mGuard smart the Ethernet plug e mGuard PCI The internal interface is in Driver Mode the network interface of the Operating System or in Power over PCI mode the LAN Ethernet jack of the mGuard PCI As in the other cases the mGuard supports the Firewall and VPN security functions in this mode of operation as well If the mGuard is operated in Router mode you must set it as the standard gateway in the locally connected client computers In other words the address entered for the standard gateway must be the internal IP address of the mGuard See Initializing the default gateway on page 35 If the mGuard is operated in Router mode and is used to establish the connection to the Internet you should activate NAT to allow access to the Internet from the local network see Network Address Translation IP Masquerading on page 93 If NAT is not activated the device may only allow VPN connections PPPoE PPPoE mode corresponds to the Router mode with DHCP with one difference The PPPoE protocol which is used by many DSL modems for DSL Internet access in germany will be used for connecting to the external ne
124. every port startport endport e g 110 120 defines a range of ports You can specify individual ports by giving either their port number or the corresponding service name e g 110 for pop3 or pop3 for 110 Action Accept means that the data packets are passed through Reject means that the data packets are rejected so that the sender is informed that the data packets have been rejected In Stealth mode Reject has the same effect as Drop see below Drop means that the data packets are not passed through The data packets will be discarded so that the sender will not be informed as to what happened to them B gt In Stealth mode Reject is not supported Comment An informational comment for this rule Log You can specify for each individual firewall rule whether the use of the rule should be logged by setting Log to Yes E or not by setting Log to No factory setting Log entries for unknown connection attempts If this is set to Yes all attempts to establish a connection which were not covered by the rules defined above will be logged MAC Filtering Network Security Packet Filter Incoming Rules Outgoing Rules MAC Filtering Incoming untrusted port gt x Source MAC Destination MAC Ethernet Protocol y E MEREEN RE O OOO cany Accept Bi Ethernet Protocol may be any IPv4 ARP Length or a hexadecimal value Please note These rules only apply to the Stealth mode Please note Management access
125. ewall Rules Source IP The IP address from which the user connected to the mGuard authorized_ip is a placeholder for the address BO If several firewall rules have been defined and activated for a single user the se will be queried in sequence from top to bottom until the appropriate rule has been located This rule will then be applied If further rules are defined in the rule list that would also be suitable these are ignored You are offered the following options for entries Protocol All encompasses TCP UDP ICMP and other IP protocols From Port To Port is only evaluated for the TCP and UDP protocols Any designates any port Startport Endport e g 110 120 designates a port range Individual ports can be entered either using the port number or the correspon ding service names e g http for 80 or pop3 for 110 To IP 0 0 0 0 0 means all IP addresses In order to specify an IP address range use CIDR notation see e CIDR Classless InterDomain Routing on page 135 Comment A comment can be entered as desired for this rule Log For each individual firewall rule you may define whether once the rule is ac tivated e the event should be logged set Log to Yes e or not set Log to No default setting 101 of 152 6 7 Menu Web Security not on blade control unit 6 7 1 Web Security gt HTTP Virus Protection 102 of 152 Options Requirements The following requirements must be ful
126. f this IP address is to be inside a VLAN this option must be set to Yes VLAN ID A VLAN ID between 1 and 4095 An explanation of the term VLAN can be found under VLAN on page 148 Inserting moving and deleting rows is explained under Working with tables on page 43 The first row in the list can t be removed Additional External Routes In addition to the Default Route see below you can define additional external routes Inserting moving and deleting rows is explained under Working with tables on page 43 IP of default Gateway The IP address of a device in the local network connected to the LAN port or the IP address of a device in the external network connected to the WAN port can be specified here If mGuard establishes the transition to the Internet this IP address is specified by the Internet Service Provider ISP If mGuard is utilised within the LAN the default gateway s IP address will be specified by the network administrator BO If the local network is not known to the external router e g in the case of configuration by DHCP enter the address of your local network under Firewall gt NAT in other words 0 0 0 0 0 see Network Address Translation IP Masquerading on page 93 Network Interfaces Network Status Network Mode gt PPPoE External IP address Network Mode Status Active Defaultroute Network Mode Network Mode PPPoE PPPoE PPPoE Login us
127. f this is not the case there must be a problem with the remote VPN gateway In this case disable and enable the connection to re establish the connection 6 10 Menu redundancy 6 10 1 Firewall Redundancy It is possible to combine two mGuards to a single virtual router with the help of the redundancy ability Master n_n o EA The second mGuard backup takes over the function of the first mGuard master in the event of an error The redundancy feature allows two mGuards to be configured to operate as a virtual router In case of an error one mGuard the backup will take over the functionality of the other mGuard previously working as the master Additionally the state of the stateful firewall is synchronized between both mGuards so that in case of a takeover current connections will not be interrup ted BO Prerequisite Both mGuards must be configured accordingly The firewall configuration should be identical to avoid problems after a switch over B gt Redundancy can only be used in router mode static stealth mode with management IP or multi stealth mode The mGuards operating as virtual router must not be used as a VPN gateway BO Devices connected to the internal network of the virtual router configuration must be configured to use the mGuard s internal virtual IP as the default gateway The following features are supported by the virtual router configuration e Incoming Outgoing firewall rules e NAT
128. filled for the use of the virus filter e Anti virus license has been installed Instructions on how to request and install a license can be found under the section Management gt Update on page 54 e Access to an update server with the current versions of the virus signatures see section Management gt Update on page 54 Web Security HTTP Virus Protection Options Enable content scanning for HTTP HTTP maximum filesize for scanning in bytes Action for infected web content Action for web content exceeding maximum Let data p content size List of HTTP Servers SX server servervart Comment Enable Scan gL o 0 0 07 0 80 Scan 7 Note Both global content scanning for HTTP must be enabled and firewall rules defining the IP address range to be scanned must be set The HTTP protocol is not only used by web browsers to retrieve data from web sites but is also used in many other applications It is also used for example to download files e g software updates or to initialize multimedia streams The transferred file will only passed on after it has been loaded completely and checked Consequently user software may react less quickly when downloading larger files or whenever the download speeds are slow BO To check the anti virus protection for HTTP you can download the safe Eicar test virus which is available for test purposes at http www eicar org anti_virus_test_file htm Anti virus protec
129. ge type 8 from the external network will be accepted Allow all ICMPs All ICMP messages from the external network will be accepted Anti virus scanner Connections scanned for viruses are subject to firewall rules Yes No In the Web security DHTTP Web security gt FTP E mail security gt POP3 E mail security gt SMTP menus a list of server connections can be created on the Anti virus protection tab Files that enter mGuard via these connections are scanned for viruses in the case of SMTP outgoing mGuard files If firewall packet filters are set Network security gt Packet filters and or Net work security gt User firewall which relate to these connections and prevent them these will only be taken into consideration ifthe Connections scanned for viruses are subject to firewall rules switch is set to Yes In the case of No default setting the rules that have been set for the anti virus function have priority Firewall packet filters that contradict them are overridden VPN connections are not affected because the anti virus function is not available for VPN connections Stealth Mode Allow forwarding of GVRP frames The GARP VLAN Registration Protocol GVRP is used by GVRP capable switches to exchange configuration information By setting this switch to Yes GVRP frames are allowed to traverse the mGuard in Stealth Modus Allow forwarding of STP frames The Spawning Tree Protocol STP 802 1d is used by bridges and
130. gram Since the IP header remains unchanged this mode is only suitable for a host to host connection In Tunnel Mode an IPsec header and a new IP header will be added in front of the entire IP datagram As a consequence the original datagram will be encrypted in its entirety and sent as the payload of the new datagram The Tunnel Mode is used in VPN applications The devices at the tunnel ends ensure that the datagrams are encrypted before they pass through the tunnel so the actual datagrams are completely protected while being transferred over the public network Using Network Address Translation NAT which is also often called ZP Masquerading an entire network is hidden behind a single device which is know as a NAT router The internal computers in the local network with their IP addresses will remain hidden if you communicate with the outside via a NAT router The remote system will only see the NAT router with its own IP address If the internal computers are to directly communicate with external systems in the Internet the NAT router must modify the IP datagrams that are passed back and forth between the internal computers and the remote sites If an IP datagram is sent from the internal network to a remote site the NAT router will modify the UDP and TCP headers respectively of the outgoing datagrams It replaces the source IP address and port with its own IP address and thus far unused port It maintains a table in
131. he IP address of the default gatew ay can be Use the following DNS server addresses examined or set here Prefered DNS server Ears Altemate DNS server E If no IP address has been entered for the default gateway in this dialog box e g because Obtain an IP address automatically has been activated enter the IP address manually To do so first activate Use the following IP and then enter as an example the following addresses IP address 192 168 1 2 gt Do not under any circumstance Subnetwork mask 255 255 255 0 assign the configuration system Default gateway 192 168 1 1 an address like 1 1 1 2 2 On the DOS level Start Programs Accessories Command Prompt enter arp s lt IP of the default gateway gt aa aa aa aa aa aa Example You have determined that the address of the default gateway is or you have set it to 192 168 1 1 Then the command should be arp s 192 168 1 1 aa aa aa aa aa aa 3 To proceed with the configuration first establish the necessary connection see Setting Up a Local Configuration Connection on page 39 4 After setting the configuration restore the original setting for the default gateway address To do so either restart the configuration computer or enter the following command at the DOS level in the Command Prompt window arp d 5 2 2 mQGuard delta The mGuard delta s initial IP address on the LAN interfaces 4 to 7 is 192 168 1 1 within the network
132. he error Working with tables Many settings are saved as data records Correspondingly the adjustable parame ters and their values are presented in the form of table rows If settings have been created for several data records e g firewall rules these will be queried or pro cessed based on the sequence of entries from top to bottom Therefore if appli cable it is important to pay attention to the order of the entries By shifting table rows either up or down the order can be changed With tables you can insert rows in order to set up a new data record with settings e g the firewall rules for a specific connection move rows i e shift them to another location and delete rows in order to delete the entire data record Insert row gt 5 Ei lt IE os 11 a eL e s eC os 1 Click on the arrow under which you want to insert a new row F 2 Result The new row is inserted 43 of 152 44 of 152 Move rows lt gt 5 i lt gt 25 IE ea el 1 LI Lt Og gt gl 2 rm 3 OL gt o tH El OL sUL 1 E ME a 1 Mark one or more rows you want to move 2 Click on the arrow under which you want to move the marked rows F 3 Result The rows are moved Delete rows Bf ON IE ORN sU sL Ogro IEA gt E PS INC eel 3 Pr 4 gn L 1 Mark the rows you want to delete 2 Click on the symbol to delete the rows x x 3 Result The rows are de
133. his behaviour You have the following options for the entries Server 0 0 0 0 0 means all addresses i e the system will filter the traffic to all SMTP servers To enter an address space use the CIDR notation see CIDR Classless InterDomain Routing on page 135 Bo Since an attempt to setup a connection is first handled by the proxy if a nonexistent server is requested e g a bad IP address the user software will act as though the connection to the server had been established but no data was sent If the list contains the exact server addresses this behavior can be prevented since the proxy will then only take requests addressed to the servers given in the list Server Port Enter the number of the port for the SMTP protocol in this field The default setting for the SMTP port is 25 Comment An informational comment for this rule 111 of 152 Scan Scan The virus filter is activated for the server specified in this rule No Scan The virus filter is deactivated for the server specified in this rule 112 of 152 6 9 Menu IPsec VPN not blade controller 6 9 1 IPsec VPN gt Global Machine Certificate IPsec VPN Global Machine Certificate DynDNS Monitoring Machine Certificate Certificate PKCS 12 Filename p12 Browse Password Machine Certificate This shows the currently imported X 509 certificate with which the mGuard identifies itself to other VPN gateways The following infor
134. ht tightening of the upper and lower screws e Replace the empty handle plate with the suitable number from the mGuard bladeBase accessories or the old mGuard blade by shoving it in or out latteraly B gt During installation or removal of an mGuard blade the bladeBase does not need to be switched of Control Unit Next to the two current supplies is the CTRL Slot An mGuard blade operated CTRL Slot therein works as a controller for all other mGuard blades During an mGuard blade s first installation into the CTRL slot the blade reconfigures itself into an control unit e The web interface is reconfigured to operate as a control unit e It switches itself into router mode with the local IP address 192 168 1 1 e The firewall Anti Virus and VPN services are reset and deactivated 19 of 152 Connecting mGuard blade 20 of 152 Computer on the Patch Panel Patch Panel Switch mGuard blade before after If your computer is already attached to a network then you just need to patch the mGuard blade between the already existing network connection Please note that the initial configuration can only be done using the LAN connector and that the firewall is rejecting all IP traffic from the WAN to the LAN interface BO No additional driver needs to be installed gt For reasons of security we recommend that you change the default Root and Administrator passwords during the first configuration 4
135. ia the LAN port Main building default gateway IP of the default gateway 192 168 1 253 10 0 0 0 16 10 0 0 0 16 10 0 0 0 16 In the illustration above it is desired that the networks on the right hand side are accessible from the network or the computer on the left hand side For historical or technical reasons however the computer networks overlap on the right hand side With the help of mGuards and their 1 1 NAT feature these networks can be redefined so that the conflict is solved 1 1 NAT can be used in normal routing and in IPsec VPN tunnels 11 of 152 3 Control and LEDs 3 1 mGuard blade WAN red WAN green LAN red LAN green Rescue Key Innominate serial State Meaning WAN Red flashing Booting up After starting or restarting the computer LAN Red WAN Red flashing System error BO Perform a system restart To accomplish this briefly press the Rescue button 1 5 sec If the error occurs again start the Recovery procedure see Performing a Recovery on page 137 or contact Support WAN Green on or flashing Ethernet status Shows the status of the LAN and WAN inter LAN Green face As soon as the device is connected to the network the LEDs will be on continuously to indicate that there is a connec tion The LEDs will flash when data packets are transferred WAN Green various LED codes Recovery mode After pressing the Rescue
136. ify individual ports by giving either their port number or the corresponding service name e g 110 for pop3 or pop3 for 110 Action Accept means that the data packets are passed through Reject means that the data packets are rejected so that the sender is informed that the data packets have been rejected In Stealth mode Reject has the same effect as Drop Drop means that the data packets are not passed through The data packets will be discarded so that the sender will not be informed as to what happened to them Comment An informational comment for this rule Log You can specify for each individual firewall rule whether the use of the rule should be logged by setting Log to Yes or not by setting Log to No factory setting Log entries for unknown connection attempts If this is set to Yes all attempts to establish a connection which were not covered by the rules defined above will be logged Firewall Outgoing PPP Firewall rules for connection from the the internal ethernet interface LAN to 80 of 152 PPP All other settings conform to Firewall Incoming PPP Hardware Network Interfaces Hardware MAU Configuration External WAN 10 100 BASE T RJ45 up Yes 2 100 Mbit s FDX xj 100 Mbit s FDX Internal LAN 10 100 BASE T RJ45 up ves xi 100 Mbit s FDX Y 100 Mbit s FOX Configuration and status display of the ethernet ports MAU Configuration Port Name of the interface the row refers to
137. in ma dende 91 AGV ANCE A eae edo ra ee BA oe been Boos 92 6 6 2 Network Security D NAT o cccccccccccsecsceeecescesecseeseeseessessecseeeeeeeeseecsecsaeeseeseeeeseaes 93 Masquerading cisteciil cnet aig Ave eA Aiea eae hale 93 Port Forwarding uti it Boece eae sateen selec lada sic 95 Connection Trackin 955525 tives fetes eee riera cbs a loti danag E VES 96 6 6 3 Network Security gt DoS Protection ccccecccccssessesseseceseseeseeseesececseeeseeseeseneees 98 Flood Protection ernaar aI E a E AEE 98 6 6 4 Network Security gt User Fr ic 99 User Firewall Templates cocina en cutee tes e ideada ade pa Des 99 User Firewall gt Define Template Ri 100 Genre E E E EEEE E TEI E AAA 100 Template Usted 101 Fre wall RUS ni NA AAA AA A AO A 101 6 7 Menu Web Security not on blade control unit ooonoonnnnccninccnoncccnanoconnncnnna nono nonanccnnncccnncnos 102 A AAA peleevegdeatvoieeencanatebens 102 Virus Protec ds 102 6 7 2 il A cesedid yo e E EE ED i 104 Virus Protec Marisa 104 6 8 Menu Email Security not on blade control unit oooonnccnincccnnccccnnncnonaninncnnnnannncccnncccnncno 107 68 1 EmailSecunly D POP tds 107 Virus ProtectiOn cidad 107 E ci gt SMTP oar eeen eroi eter va Casta ce lain gs Compan iota aaa 109 3 of 152 Table of Contents Virus Protections eria en iaa asias 110 6 9 Menu IPsec VPN not blade controller oooooooccnonocnconocanonanonnnonnnnncnonononcnnnnonononannncnnos 113 6
138. is case the mail will not be checked for viruses Block message When this option is selected an error code will be returned to the e mail client and the e mail will be blocked List of POP3 servers Indicate which servers files should be scanned for viruses By enabling or disabling the anti virus function beside each individual entry or server respectively you can for example set an exception rule for a subsequent comprehensive rule This allows you to define trusted servers see the example illustrated below Examples Global activation of the anti virus protection for POP3 r7 E l 0 0 010 ho Pops out to any Scan zi Scan a subnet and exclude a trusted POP3 server x Server Port Comment Enable Scan A f fis2 168 25 fro frusted POP3 No Scan v p E 192 168 2 0 24 fro juntrusted POP3 Scan v Scan a single untrusted POP3 server in a subnet D x Server Port Comment Enable Scan A E haz 168 2 5 frio untrusted POP3 Scan gj Inserting moving and deleting rows is explained under Working with tables on page 43 BO The virus filter can only handle a limited number of simultaneous connections to mail HTTP and FTP servers Exceeding this number will cause further connection attempts to be refused BO The set of rules will be processed from the top down therefore the order of the rules is also decisive for the results B gt Scanning for viruses may allow outgoing connections whi
139. is the certification authority s digital signature If the certificate s data is altered this HASH value will no longer be correct with the consequence that the certificate will be worthless The HASH value is also known as the fingerprint Since it is encrypted with the certification authority s private key anyone who has the public key can decrypt the bit sequence and thus verify the authenticity of this fingerprint or signature The usage of a certification authority means it is not necessary for each owner of a key to know every other owner It is enough for them to know the certification authority The additional information about the key further simplifies the administration of the key X 509 certificates are used e g for e mail encryption in S MIME or IPsec Devices which communicate with each other must follow the same rules They must speak the same language Such rules and standards are called protocols or communication protocols Some of the more frequently used protocols include for example IP TCP PPP HTTP and SMTP A proxy representative is an intermediary service A web proxy e g Squid is commonly placed upstream of a larger network For example if 100 employees accessed a certain website at the same time and did this via the web proxy then the proxy would load the respective pages from the server only once 147 of 152 Service Provider Spoofing Antispoofing Symmetrical encryption TCP IP Tr
140. issbied m DHCP mode Server The mGuard will work as an independent DHCP server Relay The mGuard will forward DHCP requests to other DHCP servers on its external interface WAN Disabled The mGuard will not answer DHCP requests 83 of 152 84 of 152 DHCP mode gt Server Network DHCP External DHCP Mode DHCP mode DHCP Server Options Enable dynamic IP address pool DHCP lease time DHCP range start DHCP range end Local netmask Broadcast address Default gateway DNS server WINS server Static Mapping Client MAC Address Client IP Address EVEVTEVTEVRTVETVEFTF oflof of of aj o o S SABRE STS af Sli ati ali alo Ni el wm al ao Seta Saf alle EPSP RNASE ye a Sinflo fl f s If the DHCP mode is set to Server the following options are available DHCP Server Options Enable dynamic IP address pool Select Yes if you wish to use the dynamic IP address pool defined by DHCP range start and DHCP range end Select No if you wish to use IP addresses statically assigned by the means of the MAC address see below DHCP lease time Time in seconds for which the network configuration assigned to the client is valid Briefly before expiration of this time the client should renew its configuration Otherwise 1t may be assigned to another computer With enabled dynamic IP address pool When the DHCP server and the dynamic IP address pool has been activated you can enter the ne
141. j Inserting moving and deleting rows is explained under Working with tables on page 43 BO To activate the virus filter for FTP connections over a proxy insert a new row and change the default port 21 to the proxy s port BO The set of rules will be processed from the top down therefore the order of the rules is also decisive for the results BO The virus filter can only handle a limited number of simultaneous connections to mail HTTP and FTP servers Exceeding this number will cause further connection attempts to be refused Scanning for viruses may allow outgoing connections which are usually blocked by the firewall rules defined under Network Security gt Packet Filter and Network Security gt User Firewall Please see Connections scanned for viruses are subject to firewall rules Yes No on page 93 to adjust this behaviour You have the following options for the entries Server 0 0 0 0 0 means all addresses i e the system will filter the traffic of all FTP servers To enter an address space use the CIDR notation see CIDR Classless InterDomain Routing on page 135 Bo Since an attempt to setup a connection is first handled by the proxy if a nonexistent server 1s requested e g a bad IP address the user software will act as though the connection to the server had been established but no data was sent If the list contains the exact server addresses this behavior can be prevented
142. l In case the connection on the LAN port goes down up the WAN port will be set down up also 129 of 152 External In case the connection on the WAN port goes down up the LAN port will be set down up also 6 11 Menu Logging The term logging is understood to mean the recording of event messages e g about settings that have been set about firewall rules taking effect about errors etc Log entries are recorded in different categories and can also be displayed accor ding to categories see Logging gt Browse local logs on page 131 6 11 1 Logging gt Settings Remote Logging Logging Settings Remote Logging Settings Activate remote UDP logging Log Server IP address 192 168 1 254 Log Server port normally 514 514 All log entries are recorded in the mGuard s temporary memory RAM Once the space for log entries has been filled the oldest log entries will be overwritten Furthermore if the mGuard is switched off all log entries are deleted If you wish to keep a copy of the log the log entries can be sent to an external system This is particularly useful if you wish to have centralized administration of the logs Settings Activate remote UDP logging Yes No If all log entries should be sent to an external specified below log server set this option to Yes Log Server IP address Enter the IP address of the log server to which the log entries should be sent via UDP This en
143. leted Further operating remarks The following buttons are located in every page header 25 Las Logout For logging out after configuration access to the mGuard If the user does not conduct a logout procedure the logout is automatically conducted if no more activity takes place and the timeout has expired Renewed access is only granted after the login process has been repeated Reset Optional button Resets data to the previous values If you have entered values on a configuration page and these haven t yet been applied you can restore the previous values on the page by clicking the Reset button This button is only included in the page header if the validity range of the Apply button is set to include all pages see Management gt Web Settings on page 50 Apply Optional button Functions similar to the Apply button see above but is valid for all pages This button is only included in the page header if the validity range of the Apply button is set to include all pages see Management gt Web Settings on page 50 6 2 Menu Management Bo For reasons of security we recommend that you change the default Root and Administrator passwords during the first configuration see Passwords on page 86 As long as the passwords have not been changed you will see a notice at the top of the page 6 2 1 Management gt System Settings Host Management System Settings Host Time and Dat
144. logged by setting Log to Yes or not by setting Log to No factory setting Log entries for unknown connection attempts If this is set to Yes all attempts to establish a connection which were not covered by the rules defined above will be logged IKE Options IPsec VPN Connections nausicaa Firewall ISAKMP SA Key Exchange Encryption Algorithm 3DES faa Hash Algorithm All algorithms gt IPsec SA Data Exchange Encryption Algorithm 3DES v Hash Algorithm All algorithms gt Perfect Forward Secrecy PFS Yes xl The remote site must have the same entry Activation is recommended due to security reasons Lifetimes ISAKMP SA Lifetime seconds IPsec SA Lifetime seconds Rekeymargin seconds E Rekeyfuzz percent o Keying tries 0 means unlimited tries Rekey Dead Peer Detection Action Hold Default y Delay Timeout yr N o ISAKMP SA Key Exchange Encryption algorithm Together with the administrator at the remote site decide on which encryption technique should be used 3DES 168 is the most commonly used algorithm and is therefore the default factory setting Basically the following applies The greater the number of bits used by an encryption algorithm specified by the appended number the more secure itis The relatively new AES 256 protocol is therefore considered the most secure but is not yet widely used The longer
145. ly take requests addressed to the servers given in the list Server Port Enter the number of the port for the HTTP protocol in this field The default setting for the HTTP port is 80 Comment An informational comment for this rule Scan Scan The virus filter is activated for the server specified in this rule No Scan The virus filter is deactivated for the server specified in this rule 6 7 2 Web Security gt FTP Requirements The following requirements must be fulfilled for the use of the virus filter e Anti virus license has been installed Instructions on how to request and install a license can be found under the section Management gt Update on page 54 e Access to an update server with the current versions of the virus signatures see section Management gt Update on page 54 Virus Protection Web Security FTP Virus Protection Options Frise caning ET vo aa FTP maximum filesize for scanning in bytes sump y Action for infected web content Notify with browser error xj Action for web content exceeding maximum Let data pass unscanned Y content size List of FTP Servers lt a Comment Enable Scan E o 0 0 0 0 21 Fe out to any Scan xj Note Both global content scanning for FTP must be enabled and firewall rules defining the IP address range to be scanned must be set The FTP protocol is used for up and download of files 104 of 152 The transferred file will only
146. ly when the locally connected network tries to send data to the receiver In the case of Restart the connection is re built immediately In the case of Clear the connection will be deactivated until IPsec is restarted Delay The length of time in seconds after which DPD Keep Alive queries will be sent to check the availability of the remote peer The factory default is 30 seconds Timeout The length of time in seconds after which the remote peer will be declared dead if the Keep Alive queries are not answered 124 of 152 The factory default is 120 seconds 6 9 4 IPsec VPN gt L2TP over IPsec Together with VPN connections of connection type transport the L2TP server allows remote peers to connection with IPsec L2TP to the mGuard L2TP Server IPsec VPN L2TP over IPsec L2TP Server Settings Start L2TP Server for IPsec L2TP Yes y Local IP for L2TP connections 10 106 106 1 Remote IP range start 10 106 106 2 Remote IP range end 10 106 106 254 Please note These rules won t apply to the Stealth mode Status Maximal number of tunnels 256 Tunnels in use 0 Maximal number of sessions per tunnel 16 Sessions in use 0 L2TP Daemon s Uptime O days and 00 00 03 Settings Start L2TP Server for IPsec L2TP Yes No If you want to enable IPsec L2TP connections set this switch to Yes It is then possible to establish incoming L2TP connections over IPsec which dynamically assign IP addresses to the
147. m Internet or Router Al Firewall HQ The mGuard is able to provide internet connectivity to a group of computers while protecting the company network with its firewall For this purpose one of the following network modes may be used Router if the Internet access is established via a DSL router or dedicated line e PPPoE if for example the Internet access is established via a DSL modem using the PPPoE protocol e g in Germany e PPTP if for example the Internet access is established via a DSL modem using the PPTP protocol e g in Austria The mGuard must be set as the default gateway on the locally connected client system s Intranet Internet Server Firewall A DMZ Demilitarized Zone is a protected network which sits between an in ternal network and an external network For example a company s website may be inside a DMZ granting FTP write access to computers in the intranet and HTTP read only access to both networks The IP addresses within the DMZ can be public or private In the latter case pub 9 of 152 VPN Gateway WLAN over VPN 10 of 152 lic IPs would be mapped by means of portforwarding to the private addresses within the DMZ Branchoffice Internet An encrypted access to the company s network is to be provided to employees at home o
148. mation is displayed subject The holder to whom the certificate was issued issuer The certification authority which signed the certificate C Country ST State L Location city O Organisation OU Organisation Unit CN Common Name hostname MDS SHA1 Fingerprint Fingerprint of the certificate to compare this with another person e g on the telephone Windows displays the fingerprint in SHA1 format here notBefore notAfter Period of time that the certificate is valid This is ignored by the mGuard since it doesn t have an integrated realtime clock In addition to the information given above the imported PKCS 12 file filename extension p12 or pfx also contains a public and a private key The public key will be given in a certificate file filename extension cer or pem to other VPN gateways and is used to verify that this mGuard owns the corresponding private key Depending on the remote site its operator must be supplied with the certificate file in person or via a signed e mail or if a secure means of communication is not available you should conclude by comparing the fingerprint shown by the mGuard via a secure means Only one PKCS 12 file can be imported into the device To import a new certificate proceed as follows 113 of 152 Import a new certificate Prerequisite The PKCS 12 file filename p12 or pfx is generated and saved on the connected system DynDNS Monitoring 1 2 Cli
149. maximum of 4 three digit numbers which are each separated by a dot If the computer accesses its Internet Service Provider ISP via a modem on a phoneline ISDN or ADSL its ISP will assign it a dynamic IP address In other words it will be assigned a different address for every online session If the computer is online 24 hours a day without interruption e g in the case of a flat rate access the IP address will even change during the session If a local computer should be accessible via the Internet it must have an address that is known to the remote system Unless this is true no connection can be established between the remote system and the local computer If the local computer s address is constantly changing no connection can be setup Unless of course the operator of the local computer has an account with a Dynamic DNS provider DNS Domain Name Server In this case the operator can set a host name with this provider under which the system should be reachable e g www example com The Dynamic DNS provider also supplies a small program which must be installed and run on this local computer At each new Internet session this tool will inform the Dynamic DNS provider which IP address the local computer has currently been assigned This Domain Name Server will register the current assignment of Domain Name IP Address and will also inform the other Domain Name Servers in the Internet Now if a remote system wishes to establish a
150. mode locally connected clients can be configured to use the mGuard itself as a DNS server See IP configuration on Windows clients on page 83 81 of 152 DynDNS 82 of 152 DNS DynDNS Servers to query Possible settings DNS Root Servers e Provider defined i e via PPPoE or DHCP e User defined servers listed below DNS Root Servers Queries will be sent to the DNS Root server in Internet found at the IP address which is stored in the mGuard These addresses rarely change Provider defined e g via PPPoE or DHCP With this setting the device will use the Domain Name Server of the Internet Service Provider which is used to access the Internet Only select this setting 1f the mGuard is operated in PPPoE or PPTP mode or in Router mode with DHCP User defined servers listed below If this setting is selected the mGuard will connect to the Domain Name Servers shown in the list of User defined name servers User defined name servers You can enter the IP addresses of domain name servers in this list If one of these should be used by the mGuard select the option User defined servers listed below under Servers to query Inserting moving and deleting rows is explained under Working with tables on page 43 DynDNS DynDNS Register this mGuard at a DynDNS Service Status Refresh Interval sec DynDNS Provider DNS4BIZ y DynDNS Server DynDNS Login DynDNS Password i DynDNS
151. mplies with cUL 1604 CSA 22 2 No 213 pending Germanischer Lloyd complies with Certifications cUL 508 CSA 22 2 No 142 complies with cUL 1604 CSA 22 2 No 213 pending Germanischer Lloyd complies with C Notes on CE identification The devices comply with the regulations of the following European directive 89 336 EEC Council Directive on the harmonization of the legal regulations of member states on electromagnetic compatibility amended by Directives 91 263 EEC 92 31 EEC and 93 68 EEC The EU declaration of conformity is kept available for the responsible authorities in accordance with the above mentioned EU directives at Innominate Security Technologies AG Albert Einstein Str 14 D 12489 Berlin Telephone 49 0 30 6392 3300 The product can be used in the residential sphere residential sphere business and trade sphere and small companies and in the industrial sphere 151 of 152 152 of 152 e Interference proof EN 61000 6 2 2001 e Emitted immunity EN 55022 1998 A1 2000 A2 2003 Class A FCC Note This equipment has been tested and found to comply with the limits for a Class A digital device persuant to part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in acco
152. must be set to Yes VLAN ID A VLAN ID between 1 and 4095 An explanation of the term VLAN can be found under VLAN on page 148 Inserting moving and deleting rows is explained under Working with tables on page 43 The first entry in the list cannot be deleted Additional internal routes If the locally connected network includes subnetworks you can define additional routes Network The network in CIDR notation see CIDR Classless InterDomain Routing on page 135 Gateway The gateway used to reach this network Please see also the Network Example on page 136 Ethernet ARP Timeout ARP Timeout MTU Settings MTU of the internal interface MTU of the internal interface for VLAN MTU of the external interface MTU of the external interface for VLAN MTU of the Management Interface MTU of the Management Interface for VLAN 1500 ARP Timeout ARP Timeout Lifetime of entries in the ARP table MTU Settings Serial Port only mGuard blade delta and EAGLE mGuara MTU of the interface The Maximum Transfer Unit MTU defines the maximal frame size when sending from this interface and is usually 1500 for ethernet interfaces BO VLAN interfaces VLAN frames contain 4 bytes more than frames without VLAN which may cause problems with certain network equipment By reducing the MTU from 1500 to 1496 such problems can be avoided N
153. n this case both sides of the VPN authenticate each other with the same PSK To make the agreed upon key available to the mGuard enter the agreed upon character string in the Pre Shared Secret Key PSK entry field To achieve security comparable to that of 3DES the string should consist of about 30 characters selected at random and should include upper and lower case characters and digits The Pre Shared Secret Key cannot be used with dynamic any IP addresses fixed IP addresses or host names are required at both ends Firewall VPN Identifier VPN Identifier E A Local VPN Identifier Via the VPN Identifier the VPN gateways can recognize which configurations belong to the same VPN connection Valid entries are PSK authentication e empty the IP address will be used this is the default e an IP Address e a Hostname prefixed with an 0 character eg Ovpn1138 example com e an email address eg piepiorra example com X 509 authentication e empty the certificates distinguished name DN will be used this is the default e the certificates distinguished name e one of the subject alternative names listed in the certificate when the certificate contains subject alternative names they will be shown under Valid values are and may be IP addresses hostnames prefixed with a O character or email addresses IPsec PN Connections nausicad Incoming
154. nabling or disabling the anti virus function beside each individual entry or server respectively you can for example set an exception rule for a subsequent comprehensive rule This allows you to define trusted servers see the example illustrated below Examples Global activation of the anti virus protection for SMTP Scan a subnet and exclude a SMTP server x Server Port Comment Enable Scan A F E fs21 68 2 5 ps ferver does it s own scan No Scan v Zz 192 168 2 0 24 ps fvuinerable systems Scan Ad Scan traffic to a single SMTP server in a subnet x Server Port Comment Enable Scan A E f92 1 68 2 5 ps vulnerable system Scan E fis2 68 2 0 24 ps lservers do their own scan No Scan vf Inserting moving and deleting rows is explained under Working with tables on page 43 BO The set of rules will be processed from the top down therefore the order of the rules is also decisive for the results BO The virus filter can only handle a limited number of simultaneous connections to mail HTTP and FTP servers Exceeding this number will cause further connection attempts to be refused B gt Scanning for viruses may allow outgoing connections which are usually blocked by the firewall rules defined under Network Security gt Packet Filter and Network Security gt User Firewall Please see Connections scanned for viruses are subject to firewall rules Yes No on page 93 to adjust t
155. nd sich mit dem Hardwarehersteller f r Software die den Windows Logo Test bestanden hat in Verbindung zu setzen Installation fortsetzen 3 3 Click on Continue anyway Assistent fiir das Suchen neuer Hardware Fertigstellen des Assistenten Die Software fiir die folgende Hardware wurde installiert Innominate mGuardPCl Klicken Sie auf Fertig stellen um den Vorgang abzuschlie en F Abbrechen lt Zur ck 4 Click on Finish Windows 2000 e Please complete the steps described in section Hardware installation 29 of 152 on page 27 first BO The installation of the driver is only necessary and will only work as described in Driver Mode see Driver Mode on page 25 To install the driver switch your computer on login with Administrator rights and wait for the following window to show up Found New Hardware Wizard Welcome to the Found New Hardware Wizard This wizard helps you install a device driver for a hardware device To continue click Next lt Back 1 Click on Next Found New Hardware wizard OOOO Install Hardware Device Drivers OS A device driver is a software program that enables a hardware device to work with Y an operating system This wizard will complete the installation for this device En Innominate mGuardPCI A device driver is a software program that makes a hardware device work Windows needs driver files for your ne
156. nes which were initiated by an external system If no rule has been set all incoming connections except VPN will be dropped factory setting Inserting moving and deleting rows is explained under Working with tables on page 43 You have the following options for the entries Protocol All means TCP UDP ICMP and other IP protocols 89 of 152 IP address 0 0 0 0 0 means all addresses To enter an address space use the CIDR notation see CIDR Classless InterDomain Routing on page 135 Port This is only evaluated by the TCP and UDP protocols any means each and every port startport endport e g 110 120 defines a range of ports You can specify individual ports by giving either their port number or the corresponding service name e g 110 for pop3 or pop3 for 110 Action Accept means that the data packets are passed through Reject means that the data packets are rejected so that the sender is informed that the data packets have been rejected In Stealth mode Reject has the same effect as Drop see below Drop means that the data packets are not passed through The data packets will be discarded so that the sender will not be informed as to what happened to them Bo In Stealth mode Reject is not supported Comment An informational comment for this rule Log You can specify for each individual firewall rule whether the use of the rule should be logged by setting Log to Yes E
157. ng of firewall events was chosen during the definition of firewall ru les Log yes then these logged events are shown here Log ID and number for tracing errors Log entries that refer to the firewall rules listed below have a log ID and a num ber Using the log ID and number it is possible to trace the firewall rule that the corresponding log entry refers to and that led to the event in question Firewall rules and their log ID e Packet filters Network security gt Packet filters gt Incoming rules Outgoing rules menu Log ID fw incoming or fw outgoing respectively e Firewall rules for VPN connections IPsec VPN gt Connections gt Firewall incoming outgoing menu Log ID vpn fw in or vpn fw out respectively e Firewall rules for web access through mGuard via HTTPS Administration gt Web settings gt Access menu Log ID fw https access Firewall rules for web access through mGuard via SNMP Administration gt SNMP gt Query menu Log ID fw snmp access e Firewall rules for SSH remote access to the mGuard Administration gt System settings gt Shell access menu Log ID fw ssh access e Firewall rules for the user firewall Network security gt User firewall gt Firewall rules menu Log ID ufw 131 of 152 132 of 152 e Rules for NAT port forwarding Network security gt NAT gt Port forwarding menu Log ID fw port forwarding Searching for firewall rules on the basis of a network security log Blade A
158. ntiVirus If the Network security checkbox is enabled the Lookup search field is display ed below the Reload Logs button so that the relevant log entries can be display ed Proceed as follows if you want to trace the firewall rule that a log entry in the network security category references and that resulted in the relevant event 1 Mark the section that contains the log ID and number in the relevant log entry for example fw https access 2ed9ed19 e930 161b 922 00cbe010f52 ptime Z days 01 10 44 20517 sshd 18557 Accepted publickey for root from 10 1 0 253 port 56671 ssh2 2 days re sshd 18589 Accepted publickey for root from 10 1 0 253 port 56672 ssh2 2 days 03 28 45 15047 gai WWW_LANCGUAGE changed to en iptime Z days 04 23 06 54645 gai HTTPS_ACCESS_UUID changed to Ze49ed19 e930 161b 9227 O000cbe010 52 2 days 04 23 06 54903 gai HTTPS REMOTE ACCESS RULES O LOG changed to yes 2 days 04 23 17 49668 kernel Hina Ja ieee a Oe ee Pelee eae pes act ACCEP Common M SNMP LLDP V Network Secffity V IPsec VPN V Reload logs Jump to firewall rule fw https access 1 2e49ed19 e930 161b 9227 000cbe010f52 2 Copy this section into the Jump to firewall rule field via the clipboard 3 Click the Lookup button Result The configuration page containing the firewall rule that the log entry refers to is displayed In addition to the error messages the following messages are output on the blade controller The areas encl
159. ocket for connection to the external network WAN e g the Internet Via this network the connctions to the remote device or the remote network are realized The front panel of the EAGLE mGuard is grounded via a separate ground connection Do not open the housing The shielding ground of the twisted pair lines which can be connected is electrically connected to the front panel You do start up the EAGLE mGuard by connecting the supply voltage via the 6 pin terminal block Lock the terminal block with the locking screw at the side If your computer is already attached to a network then you just need to patch the mGuard between the already existing network connection Please note that the initial configuration can only be done using the LAN connector and that the firewall is rejecting all IP traffic from the WAN to the LAN interface No additional driver needs to be installed BO For reasons of security we recommend that you change the default Root and Administrator passwords during the first configuration gt Both ports of the mGuard are configured to be connected to a computer If you connect the ports to a hub please note that if Autonegotiation See MAU Configuration on page 81 is disabled then the Auto MDIX will also be deactivated i e the port of the EAGLE mGuard has to be connected either to the uplink port of the hub or a cross link cable has to be used To take the EAGLE mGuard off the ISO DIN
160. ode Reject is not supported Comment An informational comment for this rule Log You can specify for each individual firewall rule whether the use of the rule e should be logged by setting Log to Yes e or should not be logged by setting Log to No factory setting 61 of 152 Trap 62 of 152 Basic traps Management SNMP Basic traps SNMP authentication Link Up Down Coldstart Admin access SSH HTTPS new DHCP Yes 7 client Anti Virus traps Successful update of AV pattern AV update or scanning problem Found virus or skipped scanning Redundancy traps Status change Trap destinations Yes xl Yes vf Yes y Yes Y PX Destination IP Destination Name Destination Community Platform specific configurations are only effective on the platform in question Similarily AV traps are only sent when a licensed anti virus system is active SNMP traps only are sent if SNMP access is enabled On certain events the mGuard can send SNMP traps These traps are compatible with SNMPv1 For each setting the traps being sent are explained below SNMP authentication activate traps Yes No enterprise oid generic trap specific trap Description Link Up Down enterprise oid generic trap specific trap Description mGuardInfo authenticationFailure 0 This trap is send in case a station tries to access the mGuard s SNMP agent without proper authorisation activate traps Yes No m
161. ode the mGuard is set the page will change and only display the configuration parameters which are required for that mode Stealth factory setting except mGuard delta and blade controller Stealth mode is only used when a single computer is locally connected to the device In this mode the device can be simply integrated inserted into an existing network connection of the respective computer In this case simply insert the mGuard into the network line see the illustration in the section Connect the mGuard smart on page 24 The mGuard will analyze the network traffic passing through it and configure its network connection accordingly It will then operate transparently i e without requiring that the client be reconfigured As in the other cases the mGuard supports the Firewall and VPN security functions in this mode of operation as well DHCP data received from outside will be passed through to the connected client 71 of 152 72 of 152 In case a firewall is installed on the client it must be configured to allow ICMP Echo Requests ping Otherwise the mGuard won t be able to use services like VPN DNS NTP etc In Stealth mode the mGuard uses 1 1 1 1 as its internal IP address which is accessible when the client s configured default gateway is also accessible Router factory setting mGuard delta and blade controller If the mGuard is not in Stealth mode it serves as a gateway between different n
162. on the sender s port source port the recipient s port destination port a checksum covering the header and some information from the IP header among others the source and destination IP addresses If a computer is connected to a network the operating system creates a routing table internally It lists the IP addresses that the operating system has identified based on the connected computers and the routes available at that moment Thus the routing table contains the feasible routes destinations for sending IP packets If IP packets are ready for sending the computer s operating system compares the IP addresses stated in the IP packets with the entries in the routing table to determine the right route If a router is connected to the computer and if its internal IP address i e the IP address of the router s LAN port has been relayed to the operating system as the standard gateway in the network card s TCP IP configuration this IP address will be used as the destination if all other IP addresses in the routing table don t match In this case the router s IP address specifies the default route because all IP packets by default the standard whose IP address have no counterpart in the routing table i e can t find a route are directed to this gateway Also Dynamic DNS provider Every computer which is connected to the Internet has an IP address IP Internet Protocol An IP address consists of a
163. on page 39 Continue from this point onwards in this case If the computer s network interface has not yet been configured If the system which will be used to configure the device was not previously connected to a network e g because the computer is new its network interface will generally not be configured yet This means that the system has not yet been informed that network traffic should be handled by this interface In this case you must initialize the default gateway by assigning it a dummy value To accomplish this proceed as follows Initializing the default gateway 1 Determine the currently valid default gateway address If you are using Windows XP click on Start Control Panel Network Connections Right click on the icon of the LAN adapter and then click on Properties in the pop up menu In the dialog Internet Protocol Properties on the General tab select Internet Protocol TCP IP under This connection 35 of 152 uses the following items and then click on the Properties button to open the following dialog Internet Protocol TCP IP Properties General You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically Use the following IP address IP address 192 168 1 2 Subnet mask 255 255 255 0 Default gateway 12 168 1 2 T
164. on profiles Directory The directory on the server in which the configuration profile is located Filename The name of the file in the directory defined above In case no filename is defined here the name of the configuration file the mGuard s serial number with the suffix atv is used Login The login on the HTTPS server Password The Password on the HTTPS server Server Certificate The certificate which authenticates the HTTPS server from which the configuration is fetched It is used to prevent unauthorized configurations from being installed on the mGuard Incase the configuration profiles do contain the machine certificate or PSKs for VPN connections the password should consist of at least 30 random upper and lower case letters and numbers in order to prevent unallowed access to the keys The HTTPS server should further only grant access to a single configuration profile per login and password Otherwise users of other or even compromised mGuards may gain access to other configurations The IP address or the hostname specified under Server must be the same as the certificate s Common Name CN entry Self signed certificates should not use the key usage extension In case the server certificate is self signed that server certificate must be imported here In case the certificate was signed by a certification authority CA the CA s certificate must be imported here To install the certificate perform
165. onal internal System B1 B2 B3 B4 Tules IP address 192 168 15 2 192 168 15 3 192 168 15 4 192 168 15 5 Network 192 168 15 0 24 Netmask 255 255 255 0 255 255 255 0 255 255 255 0 255 255 255 0 Gateway 192 168 11 2 Network C System C1 c2 c3 C4 Network 192 168 27 0 24 IP address 192 168 27 1 192 168 27 2 192 168 27 3 192 168 27 4 Gateway 192 168 11 2 Netmask 255 255 255 0 255 255 255 0 255 255 255 0 255 255 255 0 136 of 152 7 The Rescue Button restart recovery procedure and to flash the firmware The Rescue Button is used to set the device in one of the following states 7 1 Performing a Restart Objectives To restart the device using the configured settings Action Press the Rescue Button for ca 1 5 seconds e blade PCI until both red LEDs light e delta until the Status LED stops blinking EAGLE until the Status LED and the Link LEDs go off e smart until the middle LED lights up in red OR e Disconnect the power briefly e mGuard PCI restart the computer in which the mGuard PCI card is installed 7 2 Performing a Recovery Objectives It is not possible to access the mGuard and the network configurations is to be set to factory defaults All mGuard versions except the mGuard delta and blade controller will be switched to Stealth mode with the IP address 1 1 1 1 The mGuard delta and the mGuard blade controller will be switched to Router mode with the IP address 192 168 1 1 Additionaly th
166. ored Bo In stealth mode the real IP address is to be used for the client or left at 0 0 0 0 0 as only one client can be addressed through the tunnel 121 of 152 122 of 152 Inserting moving and deleting rows is explained under Working with tables on page 43 As in the previous sections you have the following options when making the entries Protocol All means TCP UDP ICMP and other IP protocols From IP To IP 0 0 0 0 0 means all addresses To enter an address space use the CIDR notation see CIDR Classless InterDomain Routing on page 135 From Port To Port This is only evaluated by the TCP and UDP protocols any means each and every port startport endport e g 110 120 defines a range of ports You can specify individual ports by giving either their port number or the corresponding service name e g 110 for pop3 or pop3 for 110 Action Accept means that the data packets should be passed through Reject means that the data packets should be rejected so that the sender is informed that the data packets have been rejected In Stealth mode Reject has the same effect as Drop Drop means that the data packets should not be passed through The data packets will be discarded so that the sender will not be informed as to what happened to them Comment An informational comment for this rule Log You can specify for each individual firewall rule whether the use of the rule should be
167. osed by lt and gt are replaced by the respective data in the log ent ries General messages blade daemon lt version gt starting Blade lt bladenr gt online Blade lt bladenr gt is mute Blade lt bladenr gt not running Reading timestamp from blade lt bladenr gt When activating a configuration profile on a blade Push configuration to blade lt bladenr gt reconfiguration of blade lt bladenr gt returned lt returncode gt blade lt bladenr gt lt text gt When retrieving a configuration profile from blade Pull configuration from blade lt bladenr gt Pull configuration from blade lt bladenr gt returned lt returncode gt The Anti Virus Log contains the following messages from the virus filter e The names of any viruses found together with the following information name of the file and in the case of an e mail the sender date and subject e Warnings sent whenever the system has passed a file through unscanned because it was larger than the maximum file size e Startup and shutdown of the virus filter programs e Error messages from the scan Engine and the virus filter Error Messages Virus Detection A virus has been detected The error message includes the name of the virus the sender of the e mail the date sent and the name of the infected file or the name of the compressed archive file and the infected portion of this archive An example of a virus message mGuard detected a
168. oting up After connecting the device to the power supply After a few seconds the LED will switch to a heartbeat Green flashing Heartbeat The device is correctly connected and functioning Red flashing System error B Perform a system restart To accomplish this briefly press the Rescue key 1 5 sec OR Disconnect the device from its power supply briefly and then reconnect it If the error occurs again start the Recovery procedure see Performing a Recovery on page 137 or contact Support 1 and 3 Green on or flashing Ethernet status LED 1 shows the status of the inter nal interface LAN LED 3 the status of the external interface WAN As soon as the device is connected to the interface the LED will be on continuously to indicate that there is a connection to the network The LEDs will flash when data packets are trans ferred 1 2 3 various LED codes Recovery mode After pressing the Rescue key See The Rescue Button restart recovery procedure and to flash the firmware on page 137 15 of 152 3 5 mGuard PCI p LAN green LAN red p WAN green WAN red WAN LEDs State Meaning WAN Red flashing Booting up After starting or restarting the computer LAN Red WAN Red flashing System error BO Perform a system restart To accomplish this briefly press the Rescue key 1 5 sec OR Restart your comp
169. plies has logged in see Network security gt User firewall on page 110 User Authentication Firewall Users Firewall Users RADIUS Servers Users PX E haa Traoius PA E development Trans E gt List of firewall users their user names and authentication methods Activate User Firewall Yes No Under the menu item User Firewall firewall rules can be defined and assi gned to specific external users By clicking Yes you specify that the firewall rules for the listed users are to be activated as soon as the corresponding user logs in Enable group authentication Yes No If enabled the mGuard will forward login requests for unknown users to the RADIUS server On success the RADIUS server s reply will contain a group 87 of 152 Radius Server name The mGuard will then enable user firewall templates containig this group name as a user name The RADIUS server must be configured to deliver this group name in the Access Accept packet as Filter ID lt groupname gt attribute User Name Name of the user Authentication method Radius Local Local In the column User Password the password must be entered that has been as signed to the user Radius If a user logs in the mGuard transmits the login and password entered to the radius server for verification If the verification is positive the user will gain access User Authentication Remote Users RADIUS Servers RADIUS
170. r in the field The mGuard thereby provides the services of a VPN gateway On the external computers an IPsec capable VPN client must be installed in case the computers operating system does not provide such a service LUS6L Eese 18 Internet vSe c 891 c6l ol Ol cz EL OL CLI YSZ 1891 c6l y LOLZLL GL OL ZZL Auxiliary NM 192 168 2 0 24 WLAN 192 168 1 0 24 Two buildings of a company are to be connected with an IPsec protected WLAN connection From the auxiliary building it shall also be possible to use the main building s internet connection In this example the mGuards were switched into router mode and a separate network with addresses of 172 16 1 x was created for the WLAN Since the internet should be also available via the VPN from the auxiliary building a Default route over VPN must be configured Auxiliary building tunnel configuration Connection type Tunnel Net lt gt Net Local network address 192 168 2 0 24 Remote network address 0 0 0 0 0 In the main building the appropriate counterpart to the connection is to be configured Solving Network Conflicts Main building tunnel configuration Connection type Tunnel Net lt gt Net Local network address 0 0 0 0 0 Remote network address 192 168 2 0 24 The default route of an mGuard is usually directed over its WAN port But in this case the internet is reachable v
171. r up to 65 536 hosts 256 x 256 Obviously such huge network is not practical At this point one can see a need for subnetworks The standard answers this need with the Subnet Mask Like an IP address this mask is 4 bytes long The bytes which represent the network address are each assigned the value 255 The main purpose of the mask is to borrow a portion of the host address which can then be used to address the subnetworks As an example by using the subnet mask 255 255 255 0 in a Class B network 2 bytes for the network address 2 bytes for the host address the third byte which was actually intended for host addressing can now be used for subnet addressing With this configuration the company s network could support 256 subnetworks that each have 256 hosts IP Security IPsec is a standard which uses encryption to verify the authenticity of the sender and to ensure the confidentiality and integrity of the data in IP datagrams gt Datagram The components of IPsec are the Authentication Header AH the Encapsulating Security Payload ESP the Security Association SA and the Internet Key Exchange IKE At the start of the session systems which wish to communicate must determine which technique shall be used and the implications of this choice for the session e g Transport Mode or Tunnel Mode In Transport Mode an IPsec header will be inserted between the IP header and the TCP or UDP header respectively in each IP data
172. rdance with the instruction manual may cause harmful interference to radio communications Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense
173. rows is explained under Working with tables on page 43 You must enter the following data when assigning IP and MAC addresses Client MAC address The MAC address of the client Please enter without spaces or hyphens Client IP address The IP address you wish to assign to the MAC address The statically assigned IP addresses take priority over the dynamic IP address pool Static IP addresses and pool addresses must not overlap Do not assign one IP address to several MAC addresses otherwise several clients will be assigned the same IP address You should only use one DHCP server per subnetwork DHCP mode gt Relay Network DHCP External DHCP Mode DHCP mode DHCP Relay Options DHCP Servers to relay to Append Relay Agent Information Option No i 82 If the DHCP mode is set to Relay the following options are available DHCP Relay Options DHCP servers to relay to A list of DHCP servers to which DHCP requests are to be passed on Append Relay Agent Information Option 82 When this option is set to Yes additional information according to RFC 3046 will be added 85 of 152 6 5 Menu User Authentication 6 5 1 User Authentication gt Local Users Passwords 86 of 152 The term local users refers to users who have the right depending on their access permission level to configure mGuard root and administrator access permis sion or to use it user access permission
174. rtificate Pre Shared Key Depending on which option you have chosen the page will present you different possibilities for adjustments 119 of 152 120 of 152 Authentication method X 509 Certificate IPsec VPN Connections nausicad Authentication Authentication Authentication method X 509 Certificate zi X 509 Certificate Flename cer These methods are supported by most of the newer IPsec implementations In this case the mGuard uses the public key of the remote site filename cer or pem to encrypt the authentication datagram before it sends it to the remote site the tunnel end You must have received this cer or pem file from the operator at the remote site perhaps on a floppy disc or attached to an e mail To make this public key available to the mGuard proceed as follows Prerequisite The cer or pem file must have been saved on the configuration system Click on Browse and select the file 2 Click on Import After the import the contents of the new certificate will be displayed An explanation of the information displayed can be found in the chapter Machine Certificate on page 113 Authentication method Pre Shared Secret Key PSK IPsec VPN Connections nausicaa Authentication Authentication Authentication method Pre Shared Secret Key PSK icomplicated_like_5Dy0qoD_and_ This method is mainly used by older IPsec implementations I
175. shed Restore profile from the ACA Plug the ACA in mGuard s V 24 USB socket Start mGuard while the ACA is plugged in The mGuard s password has to be either root or correspond to the password designated when saving the profile The STATUS LED and also the V 24 LED in case of an ACA11 will flash until the loading process has ended Result The configuration profile loaded from the ACA is loaded into the mGuard and launched It does not appear in the list of configuration profiles stored on the mGuard BO The configuration on the ACA also includes the root admin and user passwords which will also be used when restoring a configuration from the ACA 59 of 152 6 2 6 Management gt SNMP Query Management SNMP 08 Query Settings Enable SNMPv3 access Enable SNMPv1 v2 access Port for incoming SNMP connections external interface only SNMPv1 v2 Community Read Write Community Read Only Community Allowed Networks rem mentar acen comment oo These rules allow to enable SNMP access Important Make sure to set secure passwords for SNMPv3 before enabling remote access Note In Stealth mode incoming traffic on the given port is no longer forwarded to the client Note In router mode with NAT or portforwarding the port set here has priority over portforwarding Note Enabling SNMP access automatically accepts incoming ICMP packets Note The SNMP access from the internal side is allowed by default an
176. since the proxy will then only take requests addressed to the servers given in the list Server Port Enter the number of the port for the FTP protocol in this field The default setting for the FTP port is 21 Comment An informational comment for this rule Scan Scan The virus filter is activated for the server specified in this rule No Scan The virus filter is deactivated for the server specified in this rule 6 8 Menu Email Security not on blade control unit 6 8 1 Email Security gt POP3 Virus Protection Options Requirements The following requirements must be fulfilled for the use of the virus filter e Anti virus license has been installed Instructions on how to request and install a license can be found under the section Management gt Update on page 54 e Access to an update server with the current versions of the virus signatures see section Management gt Update on page 54 Email Security POP3 Virus Protection Options Enable content scanning for POP3 Yes y POP3 maximum filesize for scanning in SMB x Action for infected mails Notify email client by error message xj Action for mails exceeding maximum Let message pass unscanned xj message size Servers EA server O server port comment Enable scan i 0 0 0 0 0 110 Pors out to any Scan xj Note Both global content scanning for POP3 must be enabled and firewall rules defining the IP address range to be scanned must be set
177. switches to detect and avoid loops in the network topology By setting this switch to Yes STP frames are allowed to traverse the mGuard in Stealth Modus Allow forwarding of DHCP frames Allow the client to retrieve an IP address using DHCP independently from the outgoing firewall rules This switch is set to Yes per default 6 6 2 Network Security gt NAT Masquerading Network Security NAT Network Address Translation IP Masquerading X p E 0 0 0 0 0 These rules let you specify which IP addresses normally addresses within the private address space are to be rewritten to the mGuard s IP address Please note These rules won t apply to the Stealth mode 1 1 NAT aN xX Local network External network A p E 0 0 0 0 0 0 0 0 24 Please note These rules won t apply to the Stealth mode Network Address Translation IP Masquerading Lists the rules set for NAT Network Address Translation In the case of outgoing data packets the device can translate the sender s IP address From IP in the internal network to the device s own external address This technique is called NAT Network Address Translation 93 of 152 94 of 152 1 1 NAT This method is used whenever the internal address cannot or should not be routed externally e g since it is in a private address space such as 192 168 x x or because you wish to keep the internal network structure hidden This method is also called P Masquerading BO If the mGuard
178. t in size the two parts of the address differ in length 1 Byte 2 Byte 3 Byte 4 Byte Network Host Address Classe Address Class B Network Address Host Address Network Address Host CSC Address Whether the IP address of device in a network is Class A B or C can be seen in the first byte of the IP address The following has be specified Value of the No of bytes for the No of bytes for the host 1st Byte network address address Class A 1 126 1 3 Class B 128 191 2 2 Class C 192 223 3 1 As you can see there can be a worldwide total of 126 Class A networks and each of these networks can have a maximum of 256 x 256 x 256 hosts 3 bytes of address space There can be 64 x 256 Class B networks and each of these networks can have up to 65 536 hosts 2 bytes address space 256 x 256 There can be 32 x 256 x 256 Class C networks and each of these networks can have up to 256 hosts 1 bytes address space Subnet Mask Normally a company s network with access to the Internet is only officially assigned a single IP address e g 123 456 789 21 Based on the first byte of this sample address one can see that this company network is a Class B network and 145 of 152 IPsec NAT Network Address Translation Port Number 146 of 152 therefore the last 2 bytes are free to be used for host addresses With a Class B network the company network has address space fo
179. t max 99MBit s e Individual firewall rules for different users user firewall Anti Virus features ClamAV virus protection e Supported protocols HTTP FTP POP3 and SMTP sending e The virus filter can decompress the following formats ZIP e RAR e GZIP e BZIP2 e TAR e MS OLE2 e MS Cabinet Dateien CAB e MS CHM Komprimiertes HTML e MS SZDD e UPX FSG e Petite VPN features Protocol IPsec Tunnel and Transport Mode e IPsec DES encryption 56 Bit e IPsec 3DES encryption 168 Bit e IPsec AES encryption 128 192 and 256 Bit e Packet authentication MD5 SHA 1 e Internet Key Exchange IKE with Main and Quick Mode e Authentication Pre Shared Key PSK X 509v3 certificate DynDNS 6 of 152 Additional features Support NATT e Dead Peer Detection DPD e Hardware encryption e up to 250 VPN tunnels please refer to the feature table e VPN throughput max 35MBits s on 266MHz or 7OMBit s on 533MHz models e IPsec firewall and 1 1 NAT e Default route over VPN e MAU management e Remote logging e Router Firewall Redundancy e IPsec L2TP Server e LLDP e Administration by SNMP v1 v3 please refer to the feature table and Inno minate Device Manager IDM In case of problems with the mGuard please contact your local dealer Additional information about the device and relevant changes as well as release notes and software updates can be found on our web site http www innominate
180. tealth factory setting except mGuard delta and blade controller Network Interfaces Network Status External IP address Network Mode Status Active Defaultroute Network Mode Network Mode Stealth configuration autodetect Stealth Management IP Address Here you can specify an additional IP address to administrate the mGuard If you have set Stealth configuration to multiple clients remote access will only be possible using this IP address An IP address of 0 0 0 0 disables this feature IP address Netmask Default gateway Use Management VLAN Management VLAN ID Network Mode Stealth configuration autodetec static multiple clients autodetect Standard The mGuard will analyse the network traffic configure its network interface accordingly and will then function transparently For special cases you can also preset these values e g in the following case The connected computer only accepts incoming connections so that it is not possible for the mGuard to configure automatically static If the mGuard cannot analyse the network traffic passing through e g because the locally connected computer only receives data the Stealth configuration must be set to Static multiple clients Like autodetect but it is possible to use multiple devices and IPs on the mGuard s internal interface LAN For technical reasons VPN can t be used with this mode Stealth Management IP Address Network
181. ted data To enable the user of the public key which will be used to encrypt the data to be sure that the public key that he she has received is really from its issuer and thus from the instance which should later receive the data it is possible to use certification A Certification Authority CA certifies the authenticity of the public key and the associated link between the identity of the issuer and his her key The certification authority will verify authenticity in accordance with its rules which may for example require that the issuer of the public key appear before it in person Once authenticity has be successfully certified the certification authority will add its digital signature to the issuer s public key The result is a Certificate An X 509 v3 Certificate thus includes a public key information about the key owner given as it Distinguished Name DN the authorized usage etc and the signature of the certification authority The signature is created as follows The certification authority creates an individual bit sequence which is known as the HASH value from the bit sequence of the public key the information about its owner and other data This sequence may be up to 160 bits long The certification authority encrypts this with its own private key and then adds it to the certificate The encryption with the certification authority s private key proves the authenticity of the certificate i e the encrypted HASH string
182. tgoing TCP connections SYN per second Default 75 Maximum number of new incoming TCP connections SYN per second Default 25 These two settings define upper limits for the allowed incoming and outgoing TCP connections per second The default values will never be reached in nor mal operation However since they can be easily reached in the event of an attack the limits provide additional security If your operational environment has special requirements you can increase these values Maximum number of outgoing ping frames ICMP Echo Request per second Default 5 Maximum number of incoming ping frames ICMP Echo Request per second Default 3 These two settings define upper limits for the allowed incoming and outgoing ping frames per second The default values will never be reached in normal operation However since they can be easily reached in the event of an attack the limits provide additional security If your operational environment has special requirements you can increase these values Stealth Mode Maximum number of outgoing ARP requests or ARP replies per second in each case Default 500 Maximum number of incoming ARP requests or ARP replies per second in each case Default 500 These two settings define upper limits for the allowed incoming and outgoing ARP requests and ARP replies per second The default values will never be reached in normal operation However since they can be easily rea
183. that exist between the LAN ports of the two mGuards and between their WAN ports fails the backup becomes the master The Virtual Router Redundancy Protocol VRRP utilised by the Guard can t however inform the master of this while it is still operating With ICMP checks ICMP ping the master can check its connections to the bak kup and deactivate itself in case its internal or external connections to the backup failed Enable ICMP Checks The master mGuard will check the connection to the backup mGuard using the ICMP ping protocol In case the backup mGuard can not be reached the Hosts to check via ICMP in the external internal network will be tried If these checks fail as well the master mGuard will deactivate itself Hosts to check via ICMP in the external network Hosts in the external network to be checked The hosts have to be able to ans wer to the ICMP echo requests Hosts to check via ICMP in the internal network Hosts in the internal network to be checked The hosts have to be able to ans wer to the ICMP echo requests 6 10 2 Ring Network Coupling Ring Network Coupling Settings Redundancy Ring Network Coupling Ring Network Coupling Settings Enable Ring Network Coupling Dual Homing Yes No When activated the link status of one ethernet port will be transfered to the other ethernet port whereby interruptions in the network can be traced more easily Redundancy Port Internal External Interna
184. the key the longer the time required by the encryption process This latter point however is of no consequence for the mGuard since it uses a hardware based encryption technique However this aspect may be of significance for the remote site The algorithm designated as Null performs no encryption Hash Algorithm Leave this setting on All algorithms With this setting it is does not matter whether the remote site uses MD5 or SHA 1 IPsec SA Data Exchange In contrast to ISAKMP SA Key Exchange see above this setting determines the method used for the exchange of data This may be different from the Key Exchange but need not be Encryption Algorithm See above Hash Algorithm See above Perfect Forward Secrecy PFS This method is used to increase the security of the data transfer In IPsec the key used for the data exchange is changed at certain intervals In the case of 123 of 152 PFS a new random number is negotiated with the remote site instead of deriving it from a previously agreed on random number Do not set this to Yes unless the remote site also supports PFS If you select the connection type Transport L2TP Microsoft Windows set Perfect Forward Secrecy PFS to No Lifetimes The keys of an IPsec connection will be renegotiated at certain intervals to increase the costs of an attack at the IPsec connection ISAKMP SA Lifetime The lifetime of the ISAKMP SA keys in seconds The factory default
185. the necessary diagnostic information This function prepares a compressed file in tar format containing all of the current configuration settings and log entries which could be relevant to the diagnosis of errors This file does not contain any private information such as the private machine certificate or the passwords To take a snapshot proceed as follows 1 Click on Download 2 Save the file under the name snapshot tar gz Please make the file available to the support if requested 6 13 CIDR Classless InterDomain Routing IP netmasks and CIDR are notations which define an address space containing multiple IP addresses In this case an address space in which the addresses follow one another sequentially is treated as a network To define a range of IP addresses for the mGuard e g when configuring the firewall it may be necessary to use the CIDR notation to specify the address IP Netmask 255 255 255 255 255 255 255 255 255 255 255 255 255 255 255 255 255 255 255 255 255 255 255 255 255 254 252 248 240 224 192 128 0 0 Example 192 168 1 0 255 255 255 0 corresponds to 192 168 1 0 24 in CIDR notation 255 255 255 255 255 255 255 255 255 255 255 255 255 255 255 255 255 254 252 248 240 224 192 128 oo0oo0oo0o0oo0o0o0 oo0oo0oo0oo0o0o0o0 oo0oo0oo0oo0oo0o0o0 o o 255 255 255 255 255 255 255 2
186. tion for HTTP Yes No In the case of Yes files received are scanned for viruses by mGuard if they arrive via HTTP connections contained in the list of HTTP servers defined below Scanning up to a pre set volume of 5 MB The maximum size of the files to be checked is specified here Files that are larger are not scanned Depending on the When size limit is exceeded setting an error message is sent to the browser in the event of a file exceeding the size limit or the system automatically switches to throughput mode If the mGuard does not have enough memory to save a file completely or to decompress it a corresponding error message will be sent to the user s client software browser or download manager and an entry will be written to the anti virus log In this case you have the following options e You can try again later to download the file e You can temporarily deactivate the virus filter for the corresponding server e You can set the parameter to Let the data pass unscanned Action for infected web content Notify with browser error If the virus filter detects a virus in the data transferred from an HTTP server to the HTTP client an error message will be sent to the HTTP client The handling of this error message depends on the respective HTTP client A web browser will display the error message in the form of an HTML page If a file that is downloaded within an HTML page e g a graphic file is infected this fil
187. tion must either be connected to the mGuard s LAN switch ethernet jack 4 to 7 or connected to it via the local network In the case of a remote configuration The mGuard must be configured to permit remote configuration The mGuard must be connected i e the required connections must function The EAGLE mGuard must be connected to an active power supply In a local configuration The system that you use for performing the configuration must either be connected to the LAN jack of the mGuard or connected to it via the local network In the case of a remote configuration The mGuard must be configured to permit remote configuration The mGuard must be connected i e the required connections must function The mGuard must be connected to a power supply In other words its USB cable must be connected to a system or power supply that is ON In a local configuration The system that you use for performing the configuration must either be connected to the mGuard s Ethernet plug or connected to it via the local network In the case of a remote configuration The mGuard must be configured to permit remote configuration The mGuard must be connected i e the required connections must function In a local configuration The system that you use for performing the configuration must either be equipped with the mGuard drivers when using the Driver Mode or connected to it via the LAN Eth
188. traps Yes No enterprise oid generic trap specific trap additional Description enterprise oid generic trap specific trap additional Description mGuardTrapA V enterpriseSpecific mGuardTrapAvUpdateError 2 mGuardTResA vUpdateError Error when performing AV Update mGuardTrapA V enterpriseS pecific mGuardTrapAvFailed 5 mGuardTResA vFailed General AV failure Found virus or skipped scanning activate traps Yes No enterprise oid generic trap specific trap additional Description mGuardTrapA V enterpriseS pecific mGuardTrapAvVirusDetected 3 mGuardTResAvVirusDetected AV found a virus enterprise oid generic trap specific trap additional Description Redundancy Traps mGuardTrapA V enterpriseSpecific mGuardTrapAvFileNotScanned 4 mGuardTResAvFileNotScanned The file was not scanned for viruses e Status change activate traps Yes No enterprise oid genericTrap specific trap additional Description enterprise oid genericTrap specific trap additional Description User firewall traps Yes No enterprise oid generic trap specific trap additional Description enterprise oid generic trap specific trap additional Description enterprise oid generic trap specific trap additional Description SNMP Trap Destinations mGuardTrapRouterRedundancy enterpriseSpecific mGuardTrapRouterRedundancyStatusChange 1 mGuardTResRe
189. try must be an IP address not a hostname This function does not support hostnames since 1f it did 1t would not be possible to log the loss of a DNS server Log Server port Enter the port of the log server to which the log entries should be sent via UDP Standard 514 130 of 152 6 11 2 Logging gt Browse local logs Common Logging Browse local logs 0 TEMPLATE _RULE 1 L0G inserted with value no 98429 gai USERFW_TEMPLATE O TEMPLATE RULE 1 COMMENT inserted with value 98568 gai USERFW_TEMPLATE O TEMPLATE _USERS O USERNAME inserted with value robert o o 98295 gai USERFW_TEMPLATE 5 98717 gai USERFW_TEMPLATE O TEMPLATE_USERS 1 USERNAME inserted with value arthur 98852 gai USERFW_TEMPLATE O TEMPLATE_USERS 2 USERNAME inserted with value william 85222 gai USERFW_ENABLE changed to yes 83877 userfwd userfwd server startup 02466 userfwd mguard userfwd logins info apply rule 32768 robert 192 168 1 96 53112 userfwd mquard userfwd logins info apply rule 32768 robert 10 1 0 154 80407 userfwd mguard userfwd logins info delete login rule 32768 robert 19Z 168 1 80418 userfwd mguard userfwd logins info remove rule 32768 for ip 192 168 1 96 97505 userfwd mguard userfwd logins info delete login rule 32768 robertfl0 1 0 15 lt 97516 userfwd mguard userfwd logins info remove rule 32768 for ip 10 1 0 154 37845 sshd 30085 Accepted publickey for root from 10 1 0 154 port 37058 sshz 98
190. ture files can be updated from a selected update server at intervals defined by the user The update is performed without interrupting the operation of the anti virus filter The mGuard is delivered without any virus signatures installed Therefore after the anti virus protection has been activated with the corresponding license you should also set the update schedule The course of the updates can be examined in the Anti Virus Update log Schedule Update Schedule This parameter is used to set how often the signature files are updated The size of the signature file is about several MByte The system will only download the changed files from the update server Update Servers for AVP You can select the server from which the updated signature files should be downloaded A default server has already been entered If necessary you can enter your own servers BO The list of servers will be processed from the top down until an available server is found Inserting moving and deleting rows is explained under Working with tables on page 43 Proxy Settings When the mGuard is located behind a firewall which restricts HTTP or FTP access to use a proxy server the following rows can be used to specify the required proxy settings For the proxy server to be used the fields HTTP FTP Proxy Server and Port must be set To authenticate with the proxy server the fields Login and Password must be set HTTP FTP Proxy Server
191. twork Internet or WAN The external IP address under which the mGuard can be reached from a remote site is assigned by the Internet Service Provider If the mGuard is operated in PPPoE mode you must set it as the standard gateway in the locally connected client computers In other words the address entered for the standard gateway must be the internal IP address of the mGuard See Initializing the default gateway on page 35 Tf the mGuard is in PPPoE mode NAT must be activated to enable access to the Internet see Network Address Translation IP Masquerading on page 93 If NAT is not activated the device will only allow VPN connections e PPTP This mode is similar to PPPoE mode In Austria for example PPTP is used instead of the PPPoE protocol for DSL connections PPTP is a protocol originally designed by Microsoft for VPN connections If the mGuard is operated in PPTP mode you must set it as the standard gateway in the locally connected client computers In other words the address entered for the standard gateway must be the internal IP address of the mGuard See Initializing the default gateway on page 35 If the mGuard is operated in PPTP mode you should activate NAT to allow access to the Internet from the local network see Network Address Translation IP Masquerading on page 93 If NAT is not activated the device will only allow VPN connections E gt When the Network Mode has
192. twork parameters that should be used by the client s DHCP range start DHCP range end Local Netmask Broadcast IP Default gateway DNS server The start and end of the address range from which the mGuard s DHCP server should assign IP addresses to its locally connected clients The factory setting is 255 255 255 0 The clients broadcast IP This field is used to define which IP address should be used by the client s as the standard gateway Usually this is the internal IP address of the mGuard This field is used to define the Domain Name Service DNS server which the clients can access to find out the IP address that is associated with a specific domain name If you would like to use the DNS service of the mGuard use the internal address of the mGuard for this field WINS server This field is used to define the Windows Internet Naming Service WINS server Static mapping You can find out the MAC address of your client by using the following commands Windows 95 98 ME Click on the Start button and then click on Run Type winipefg in the Open box and then click on OK The MAC address will be shown as Adapter Address NT 2000 XP Select the Start button on the Task Bar Select Run Type cmd exe When the DOS command prompt window opens type ipconfig all The MAC address will be shown as Physical Address Linux Start sbin ifconfig or ip link show in a shell Inserting moving and deleting
193. urity certificate was issued by a company you have not chosen to trust View the certificate to determine whether you want to trust the certifying authority The security certificate has expired or is not yet valid The name on the security certificate is invalid or does not match the name of the site Do you want to proceed Explanation Since administrative tasks can only be performed when a secure encrypted access has been established to the device a signed by the device certificate will be returned Acknowledge the associated security notice by clicking on Yes Afterwards Configuring the device The login window is displayed Username root Password hibited Access Type Administration Choose the Access Type Administration or User Firewall and enter your username and password for this access type Please see Network Security gt User Firewall on page 99 for an explanation of the User Firewall The factory settings for the Administration are Login admin Password mGuard gt Please note these entries are case sensitive To configure the device you can make the required changes on the various pages of the mGuards web interface Please see Configuration on page 43 gt For reasons of security we recommend that you change the default Root and Administrator passwords during the first configuration please see User Authentication gt Local Users on page 86
194. uter If the error occurs again start the Recovery procedure see Performing a Recovery on page 137 or contact Support WAN Green on or flashing Ethernet status Shows the status of the LAN and WAN inter LAN Green face As soon as the device is connected to the network the LEDs will be on continuously to indicate that there is a connec tion The LEDs will flash when data packets are transferred WAN Green various LED codes Recovery mode After pressing the Rescue key WAN Red See The Rescue Button restart recovery procedure and to LAN Green flash the firmware on page 137 16 of 152 4 Startup Safety instructions The Innominate mGuard is intended for protective low voltage operation Only connect the mGuard s network interfaces to LAN installations Some telephone lines also use RJ45 jacks The mGuard must not be operated on a telephone line Warning mGuard PCI Before handling the mGuard PCI touch the bare metal case of your PC to discharge static electricity from your body o Warning This is a Class A device It may cause radio interference in a living area in which case the operator may be requested to take appropriate measures o General notes e mGuard PCI Your PC must provide a free PCI slot 3 3V or 5V regarding usage e Use a soft cloth to clean the case of the device Do not use any aggressive solvents e Environmental conditions 0 to 40 C blade smart delta 70 C PCD 55 C
195. uter Mode with Driver Mode Power over PCl Mode Operating System 192 168 1 2 9 192 168 1 1 lt mGuard PCI external IP In router mode it is possible to use PPPoE and PPTP In this mode the mGuard and the network interface of the mGuard use a separate subnet An example is shown in the illustration above the mGuard s operating systems interface could use the IP 192 168 1 1 and the mGuard could use the IP 192 168 1 2 Represented in the figure above by two black spheres A third IP will be used on the WAN jack to communicate with a router or a PPPoE PPTP capable DSL modem In this mode the software driver is not needed The PCI interface is only used as a power supply and another network interface card installed in the same or another computer must be connected to the ethernet jack 3 instead Stealth Mode with Power over PCI Mode 26 of 152 D D D NIC D 192 168 1 1 1 1 1 1 mGuara Pct PCI 192 Lan 1 1 In Power over PCI Mode the mGuard does not require a driver for the host operating system The PCI bus is only used as a power supply The LAN jack of the mGuard must be connected to another NIC using an ethernet cable At the WAN jack the mGuard automatically uses the IP address of the other network interface card As soon as an external router is available the mGuard can be configured with a webbrowser at the URL https 1 1 1 1 Bo In Stealth Mode it is not possi
196. uter mode with NAT or portforwarding the port set here has priority over portforwarding Note The HTTPS access from the internal side is enabled by default and can be restricted by firewall rules HTTPS Web Access When HTTPS Remote Access is enabled the mGuard can be configured using 1ts Web based Administrator interface from a remote system In other words a browser running on the remote system will be used to configure the local mGuard This option is disabled by default IMPORTANT If you enable remote access make certain that you have secure root and administrator passwords To enable HTTPS remote access proceed as follows Enable HTTPS remote access Yes No If you want to enable a HTTPS connection set this switch to Yes In this case make certain that the firewall rules on this page permit the mGuard be accessed from a remote site Port for incoming HTTPS connections remote administration only Standard 443 You can select a different port If a different port has been selected you must append the port number set here to the IP address of the device in the address provided by the remote site which will have remote access Example If this mGuard can be found in the Internet at the address 123 456 789 21 and the Port Number 443 has been set as the port for remote access you do not need to enter this port number after the address in the Web browser s address field on the remote system If
197. virus The mail could not be delivered found Virus Email Worm Win32 NetSky q From sick example com Date Fri 13 Aug 2004 11 33 53 0200 about_you zip document txt exe 000012a7 00000077 00000000 Message Details From sick example com Subject Private document Date Fri 13 Aug 2004 11 33 53 0200 Exceeded maximum filesize The maximum filesize set for this protocol was exceeded To transfer the file anyway you can deactivate the virus filter either for the corresponding server for the course of the download or globally Alternatively you can set the Action for exceeding the maximum message size parameter to Let the message data pass unscanned for the respective protocol BO In either case the transferred file will not be scanned for viruses Temporary Virus Scanner Failure A temporary error occurred while trying to scan a file It is possible that the problem will be cleared if you repeat the transfer again at a later time or if you update the virus signature file Possible causes e The scan engine cannot process the file The mGuard does not have enough memory available to decompress the file e Internal error in the scan engine Exceptional Virus Scanner Failure A problem has occurred in the communication with the scan engine For more details please see the anti virus log Possible causes e The information entered for the update server is faulty and the signature update has failed se
198. w device To locate driver files and complete the installation click Next What do you want the wizard to do or my device recommende Display a list of the known drivers for this device so that can choose a specific driver EA 2 After inserting the mGuard CD choose Search for a suitable driver for my device and click on Next 30 of 152 Linux Found New Hardware Wizard E Driver Files Search Results SS The wizard has finished searching for driver files for your hardware device wy The wizard found a driver for the following device Innominate mGuardPCl Windows found a driver for this device To install the driver Windows found click Next DB 4 vindows netmgpci int 3 Click on Next Digital Signature Not Found i T xj The Microsoft digital signature affirms that software has been tested with Windows and that the software has not been altered since it was tested The software you are about to install does not contain a Microsoft digital signature Therefore there is no guarantee that this software works correctly with Windows Innominate mGuardPCl If you want to search for Microsoft digitally signed software visit the Windows Update Web site at http windowsupdate microsoft com to see if one is available Do you want to continue the installation reves y No More Info 4 Click on Yes 5 Click on Finish Found New Hardware Wizard Completing the
199. which the original values are listed together with the corresponding new ones When a reply datagram is received the NAT router will recognize that it is actually for an internal computer from the datagram s destination port Using the table the NAT router will replace the destination IP address and port and pass the datagram on via the internal network The UDP and TCP protocols assign a port number to each peer participating in the connection This way it becomes possible to handle more than one UDP or TCP connection between two peers at the same time PPPoE PPTP X 509 Certificate Protocol communication protocol Proxy Fixed port numbers are assigned for certain frequently used application processes These are called a Assigned Numbers E g HTTP connections are usually established to TCP port 80 or POP3 connections to port 110 The acronym for Point to Point Protocol over Ethernet This protocol is based on the PPP and Ethernet standards PPPoE defines how to connect users via Ethernet with the Internet via a jointly used broadband medium such as DSL a Wireless LAN or a cable modem The acronym for Point to Point Tunneling Protocol This protocol was developed in a cooperation between Microsoft U S Robotics and others to securely transfer data between VPN nodes gt VPN via a public network A type of Seal which certifies the authenticity of a public key gt asymmetrical encryption and the associa
200. with browser error If the virus filter detects a virus in the data transferred between the FTP server and the FTP client an error message will be sent to the FTP client The handling of this error message depends on the respective FTP client Action for web content exceeding the maximum content size Let data pass unscanned When this option is selected the virus filter will allow the files which exceed the filesize set to pass through unscanned BO In this case the data is not checked for viruses Block data If this option is selected the system will terminate the download and send an error message to the client software whenever the content exceeds the maximum size List of FTP Servers You can select the servers whose traffic should be filtered and specify for each IP address whether or not the anti virus protection should be activated It is also possible to enter trusted servers Examples Global activation of the anti virus protection for FTP D x Server Port Comment Enable Scan A f p 0 0 00 p1 FTP out to any Scan KM 105 of 152 106 of 152 Scan a subnet and exclude a trusted FTP server x Server Port Comment Enable Scan A E fis2 168 2 5 pt frusted FTP No Scan v E f 92 168 2 0 24 pt juntrusted FTP Scan y Scan a single untrusted FTP server in a subnet x Server Port Comment Enable Scan A E haz 168 2 5 pr intrusted FTP Scan Z F i fis2 168 2 0 24 pt frusted FTP No Scan v
201. ws system is connected to a network disconnect it 2 Copy the software into any empty folder on the Windows system Start the program TFTPD32 EXE 3 The system s IP must be set to 192 168 10 1 This must also be the address of the network adapter Click on the Browse button to switch to the folder in which the mGuard image files have been saved install p7s jffs2 img p7s The image files are also ioixi found on the CD ROM Current Directory Em Browse which was included in Server interface 192 168 10 1 y Show Dir the package T tp Server DHCP server Revd DHCP Discover Msg for IP 0 0 0 0 Mac 00 0C BE 01 00 EB 26 11 09 41 19 694 DHCP proposed address 192 168 10 200 26 11 09 41 19 694 Revd DHCP Rast Msg for IP 0 0 0 0 Mac 00 0C BE 01 00 EB 26 11 09 41 19 704 Previously allocated address acked 26 11 09 41 19 714 Connection received from 192 168 10 200 on port 1024 26 11 09 41 19 774 Read request for file lt install p s gt Mode octet 26 11 09 41 19 774 lt install p s gt sent 4 blks 2048 bytes in 1 s O blk resent 26 11 09 41 20 786 Connection received from 192 168 10 200 on port 1024 26 11 09 43 17 053 Read request for file lt jffs2 img p s gt Mode octet 26 11 09 43 17 053 lt iffts2 img p s gt sent 14614 blks 7482368 bytes in 11 s O blk resent 26 11 09 43 28 008 gt Current Action sifisZ ima p s gt sent 14614 blks 7482368 bytes in 11 s 0 blk resent ton
202. you have set it to 192 168 1 1 Then the command should be arp s 192 168 1 1 aa aa aa aa aa aa 3 You should now be able to access the mGuard s configuration interface at the URL https 1 1 1 1 Please see Setting Up a Local Configuration Connection on page 39 for full details 4 After setting the configuration restore the original setting for the default gateway address To do so either restart the configuration computer or enter the following command at the DOS level in the Command Prompt window arp d B gt Depending on how you configure the mGuard you may also need to modify the network interface settings of the host operating system or locally connected system accordingly 5 3 Setting Up a Local Configuration Connection Web based The mGuard is configured using a Web browser which is running on the Administrator configuration system e g Firefox MS Internet Explorer or Safari interface The Web browser must support SSL in other words https Depending on the mGuard s network mode mode of operation it can be accessed with the factory settings at one of the following addresses Factory setting Stealth Mode https 1 1 1 1 default setting except mGuard delta and blade controller Router Mode https 192 168 1 1 default setting mGuard delta and blade controller Proceed as follows 1 Start a Web browser For example Firefox MS Internet Explorer or Safari the
203. ypted with the private key proves that the owner of the associated public key actually sent the message Therefore the expression digital signature is also often used However asymmetrical encryption techniques such as RSA are both slow and susceptible to certain types of attack and are therefore frequently combined with some form of symmetrical encryption gt symmetrical encryption On the other hand there are concepts which avoid the additional work of administering symmetrical keys This symmetrical encryption algorithm was developed by IBM and checked by the NSA DES gt symmetrical encryption was set in 1977 by the American National Bureau of Standards which was the predecessor of the National Institute of Standards and Technology NIST as the standard for American governmental institutions Since this was the very first standardized encryption algorithm it quickly won acceptance by industry even outside of America DES uses a 56 bit long key which is no longer considered secure as the processing power available has greatly increased since 1977 3DES is a variant of DES It uses keys that are three times as long i e 168 bits long 3DES is still considered to be secure and is also included in the IPsec standard Advanced Encryption Standard This encryption standard was developed by NIST National Institute of Standards and Technology in cooperation with the industry This gt symmetrical encryption standard was developed

Download Pdf Manuals

image

Related Search

Related Contents

Explorer - Sinclair ZX Spectrum - Manual  Gorenje RK6286OA fridge-freezer  MCD100取扱説明書 Vol2.1  Guide pratique des déchets  LECOLOGICO AS810 M0S08538 1O09 8 LINGUE:Layout 1.qxd  FT - Casque Double H Marron_Bleu - MICHALBMMB    1/2  Duracraft DW-627 Owner's Manual    

Copyright © All rights reserved.
Failed to retrieve file