HP X Unified Security Platform Series Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Mise en réseau HP X Unified Security Platform Series. HP X Unified Security Platform Series User's Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 333
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - User’s Guide

http://www.3com.com/Part Number TECHD-176 Rev B01Published April 20073Com® X Family Local Security Manager User’s GuideX5 (25-user license) – 3CRTPX5-

Page 2 - Marlborough, MA 01752

Contentsx X Family LSM User’s Guide V 2.5.1

Page 3

Chapter 4 Firewall84 X Family LSM User’s Guide V 2.5.1Configuring Virtual ServersFor device maximum configurable values, see “Appendix D‚ “Devi

Page 4 - Chapter 4. Firewall 63

Web FilteringX Family LSM User’s Guide V 2.5.1 85Configure a Virtual Server and Provide One-to-One NATSTEP 1 From the LSM menu, select Firewall >

Page 5

Chapter 4 Firewall86 X Family LSM User’s Guide V 2.5.1used to determine whether a Web site may be accessed or not. You must specify all rules t

Page 6 - Chapter 6. Network 129

Web FilteringX Family LSM User’s Guide V 2.5.1 87STEP 5If there is no pattern match in the URL Block List, the device checks to see if the Web Filter

Page 7 - Chapter 8. System 217

Chapter 4 Firewall88 X Family LSM User’s Guide V 2.5.1If you create a Custom Filter, can select the Create default firewall rule option to auto

Page 8

Web FilteringX Family LSM User’s Guide V 2.5.1 89For details, see the following topics:• “Web Filter General Configuration Parameters” on page 89• “C

Page 9 - Index 315

Chapter 4 Firewall90 X Family LSM User’s Guide V 2.5.1STEP 3In the Filtering Action table, configure the behavior for web filter events. This c

Page 10 - Contents

Web FilteringX Family LSM User’s Guide V 2.5.1 91in a variety of languages (65 languages) from over 200 countries.Web sites are classified into two m

Page 11 - About This Guide

Chapter 4 Firewall92 X Family LSM User’s Guide V 2.5.1STEP AClear the check box next to a category name to allow access. To block access, check

Page 12 - Conventions

Web FilteringX Family LSM User’s Guide V 2.5.1 93You can complete the following tasks from the Custom Filter List page:• Enable/disable Manual URL fi

Page 13 - Messages

X Family LSM User’s Guide V 2.5.1 xiAbout This GuideExplains who this guide is intended for, how the information is organized, where information updat

Page 14 - Customer Support

Chapter 4 Firewall94 X Family LSM User’s Guide V 2.5.1STEP 3Create and add the URL patterns to the Permit/Block lists:STEP AIn the Add URL Patt

Page 15 - Contact Information

Web FilteringX Family LSM User’s Guide V 2.5.1 95Regular expression pattern matching enables you to enter regular expressions into the Permit/Block l

Page 16

Chapter 4 Firewall96 X Family LSM User’s Guide V 2.5.1URL TestUse the URL Test dialog to determine if a URL is covered by one of Web Filter Ser

Page 17 - System Overview

5X Family LSM User’s Guide V 2.5.1 97Events: Logs, Traffic Streams, ReportsThe Events section describes the logs, views and reports available to monit

Page 18 - Core Functionality

Chapter 5 Events: Logs, Traffic Streams, Reports98 X Family LSM User’s Guide V 2.5.1OverviewThe Events menu pages of the LSM allow you to monit

Page 19 - X Family Environment

LogsX Family LSM User’s Guide V 2.5.1 99Log MaintenanceThe X family device maintains two files for each log: a historical log file and a current log

Page 20 - SMS Configuration

Chapter 5 Events: Logs, Traffic Streams, Reports100 X Family LSM User’s Guide V 2.5.1Audit LogThe audit log tracks user activity that may have

Page 21 - LSM Navigation

LogsX Family LSM User’s Guide V 2.5.1 101IPS Block LogThe IPS Block log contains information about packets that have triggered an IPS filter configur

Page 22 - Logging In

Chapter 5 Events: Logs, Traffic Streams, Reports102 X Family LSM User’s Guide V 2.5.1Firewall Block LogThe Firewall Block Log captures informat

Page 23 - Figure 2–1: LSM Logon Page

LogsX Family LSM User’s Guide V 2.5.1 103Firewall Session LogFor firewall and web filter permit rules with logging enabled, this log captures informa

Page 24 - LSM Screen Layout

About This Guidexii X Family LSM User’s Guide V 2.5.1ConventionsThis guide follows several procedural and typographical conventions to better provide

Page 25 - Main Menu Bar

Chapter 5 Events: Logs, Traffic Streams, Reports104 X Family LSM User’s Guide V 2.5.1VPN LogThe VPN log captures diagnostic messages relating t

Page 26 - Navigation

LogsX Family LSM User’s Guide V 2.5.1 105System LogThe System Log contains information about the software processes that control the X family device,

Page 27 - Content and Functionality

Chapter 5 Events: Logs, Traffic Streams, Reports106 X Family LSM User’s Guide V 2.5.1For details on configuring the Syslog Server contact for t

Page 28 - System Summary

LogsX Family LSM User’s Guide V 2.5.1 107For additional details, refer to the following topics:• “Viewing Logs” on page 107• “Downloading a Log” on p

Page 29 - Log Summary

Chapter 5 Events: Logs, Traffic Streams, Reports108 X Family LSM User’s Guide V 2.5.1Download a LogSTEP 1 On the log page in the Log Functions

Page 30 - Product Specifications

LogsX Family LSM User’s Guide V 2.5.1 109Searching a LogSome logs provide a search function to help locate specific entries. This feature is availabl

Page 31 - IPS Filtering

Chapter 5 Events: Logs, Traffic Streams, Reports110 X Family LSM User’s Guide V 2.5.1Managed StreamsThe Managed Streams menu pages provide opti

Page 32 - Using the IPS

Managed StreamsX Family LSM User’s Guide V 2.5.1 111The Blocked Log Entries table displays up to 50 entries. Entries are added when the block event o

Page 33 - Security Profiles

Chapter 5 Events: Logs, Traffic Streams, Reports112 X Family LSM User’s Guide V 2.5.1Rate Limited StreamsWhen traffic triggers an IPS filter co

Page 34 - Chapter 3 IPS Filtering

Managed StreamsX Family LSM User’s Guide V 2.5.1 113Search rate-limited streamsSTEP 1 From the LSM menu, select Events > Managed Streams > Rate

Page 35 - Managing Security Profiles

ConventionsX Family LSM User’s Guide V 2.5.1 xiiiMenu NavigationThe LSM provides drop-down menu lists to navigate and choose items in the user interf

Page 36 - Security Profile Details

Chapter 5 Events: Logs, Traffic Streams, Reports114 X Family LSM User’s Guide V 2.5.1From the Quarantined Addresses page, you can:• View and se

Page 37 - Security Profiles

Managed StreamsX Family LSM User’s Guide V 2.5.1 115STEP 3Click Search. The Quarantined Addresses table updates with addresses matching the search cr

Page 38

Chapter 5 Events: Logs, Traffic Streams, Reports116 X Family LSM User’s Guide V 2.5.1HealthThe Health menu pages show the current status and ne

Page 39

HealthX Family LSM User’s Guide V 2.5.1 117To access the Monitor page, select Events > Health > Monitor, or click Health on the System Summary

Page 40 - Filter Components

Chapter 5 Events: Logs, Traffic Streams, Reports118 X Family LSM User’s Guide V 2.5.1require notification, but this difference only comes into

Page 41 - Configuring DV Filters

HealthX Family LSM User’s Guide V 2.5.1 119Module State A description of the current operation state of the module. Possible values: • Active — The m

Page 42 - View DV Filters

Chapter 5 Events: Logs, Traffic Streams, Reports120 X Family LSM User’s Guide V 2.5.1Performance/ThroughputTo view the current throughput perfo

Page 43 - Filters List (All Filters)

ReportsX Family LSM User’s Guide V 2.5.1 121ReportsThe Reports menu provides access to detailed information about the LSM system alert and traffic ac

Page 44 - Filter List Details

Chapter 5 Events: Logs, Traffic Streams, Reports122 X Family LSM User’s Guide V 2.5.1STEP 3To update the report data, use the Refresh option. O

Page 45

ReportsX Family LSM User’s Guide V 2.5.1 123Rate Limit ReportsIn the LSM, you can configure a rate limit action set to define the maximum amount of b

Page 46

About This Guidexiv X Family LSM User’s Guide V 2.5.1NoteNotes tell you about information that might not be obvious or that does not relate directly

Page 47

Chapter 5 Events: Logs, Traffic Streams, Reports124 X Family LSM User’s Guide V 2.5.1The following figure shows the Traffic Profile Reports pag

Page 48

ReportsX Family LSM User’s Guide V 2.5.1 125Traffic Threshold ReportIn the LSM, traffic threshold filters track statistical changes in network traffi

Page 49

Chapter 5 Events: Logs, Traffic Streams, Reports126 X Family LSM User’s Guide V 2.5.1The Configure Adaptive Filter Events report page provides

Page 50 - Address

ReportsX Family LSM User’s Guide V 2.5.1 127whichever is more recent. Data is added when the firewall session is closed; therefore, a large file tran

Page 51 - Port Scan/Host Sweep Filters

Chapter 5 Events: Logs, Traffic Streams, Reports128 X Family LSM User’s Guide V 2.5.1

Page 52 - Filter Tuning

6X Family LSM User’s Guide V 2.5.1 129NetworkThe Network section describes IP interfaces, security zones, DHCP functionality, routing, and IP address

Page 53

Chapter 6 Network130 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “Configuration Overview” on page 1

Page 54 - Traffic Threshold Filters

Deployment ModesX Family LSM User’s Guide V 2.5.1 131For additional information, see the following topics:• “Deployment Modes” on page 131• “Network

Page 55 - Traffic Threshold Details

Chapter 6 Network132 X Family LSM User’s Guide V 2.5.1IP addresses, respectively. The LAN security zone is in one broadcast domain while the DM

Page 56 - Column Definition

Network Port ConfigurationX Family LSM User’s Guide V 2.5.1 133The following figure shows the Port Configuration page:The Port Configuration page pro

Page 57 - Traffic Threshold Filters

Customer SupportX Family LSM User’s Guide V 2.5.1 xvplease take a moment to gather some basic information from your records and from your system befo

Page 58

Chapter 6 Network134 X Family LSM User’s Guide V 2.5.1Edit Port ConfigurationSTEP 1 From the LSM menu, select Network > Configuration > N

Page 59

Security Zone ConfigurationX Family LSM User’s Guide V 2.5.1 135Security Zone ConfigurationA security zone is a section of the network which is assoc

Page 60 - Action Sets

Chapter 6 Network136 X Family LSM User’s Guide V 2.5.1The Security Zones page provides the following information about each zone:For additional

Page 61 - Action Set Configurations

Security Zone ConfigurationX Family LSM User’s Guide V 2.5.1 137You can create and edit Security Zones from the Create/Edit Security Zone page. The f

Page 62 - Default Action Sets

Chapter 6 Network138 X Family LSM User’s Guide V 2.5.1Create or Edit a Security ZoneSTEP 1 From the LSM menu, select Network > Security Zone

Page 63 - Managing Actions

Security Zone ConfigurationX Family LSM User’s Guide V 2.5.1 139Configure a Security ZoneSTEP 1 From the LSM menu, select Network > Security Zones

Page 64

Chapter 6 Network140 X Family LSM User’s Guide V 2.5.1IP InterfacesConfiguration OverviewIP interfaces provide the X family device with the int

Page 65 - Quarantine Action Set

IP InterfacesX Family LSM User’s Guide V 2.5.1 141For additional information, see the following topics:• “Managing IP Interfaces” on page 141• “IP Ad

Page 66

Chapter 6 Network142 X Family LSM User’s Guide V 2.5.1Manage IP InterfacesSTEP 1 From the LSM menu, select Network > Configuration > Inte

Page 67 - Action Sets

IP InterfacesX Family LSM User’s Guide V 2.5.1 143For details on configuring the IP address for each type of interface, see the following topics:• “I

Page 68 - Notification Contacts

About This Guidexvi X Family LSM User’s Guide V 2.5.1

Page 69 - Notification Contacts

Chapter 6 Network144 X Family LSM User’s Guide V 2.5.1After you have configured the basic options for the internal IP interface, you can manage

Page 70

IP InterfacesX Family LSM User’s Guide V 2.5.1 145After you have configured the basic options for the internal IP interface, you can manage the secur

Page 71 - IPS Services

Chapter 6 Network146 X Family LSM User’s Guide V 2.5.1Configure PPTP client on the External IP interfaceSTEP 1 From the LSM menu, select Networ

Page 72 - IPS Services Page Details

IP InterfacesX Family LSM User’s Guide V 2.5.1 147Configure L2TP client on the External IP interfaceSTEP 1 From the LSM menu, select Network > Con

Page 73

Chapter 6 Network148 X Family LSM User’s Guide V 2.5.1Configure PPPoE client on the External IP interfaceSTEP 1 From the LSM menu, select Netwo

Page 74

IP InterfacesX Family LSM User’s Guide V 2.5.1 149Configure a GRE Tunnel to a Remote DeviceSTEP 1 From the LSM menu, select Network > Configuratio

Page 75 - Preferences

Chapter 6 Network150 X Family LSM User’s Guide V 2.5.1STEP 4From the Security Zone drop-down list, select the zone you want to add to the IP in

Page 76 - Adaptive Filter Configuration

IP InterfacesX Family LSM User’s Guide V 2.5.1 151Using RIP, the device determines the route for network packets based on the fewest number of hops b

Page 77 - Click Apply

Chapter 6 Network152 X Family LSM User’s Guide V 2.5.1STEP 7Select one of the following from the Receive mode drop-down list:• Do not receive u

Page 78

IP Address GroupsX Family LSM User’s Guide V 2.5.1 153The device supports two multicast protocols. You can configure an IP interface with either or b

Page 79 - Firewall

1X Family LSM User’s Guide V 2.5.1 1System OverviewThe X family device is a high-speed, comprehensive security system with a browser-based manager ca

Page 80 - Chapter 4 Firewall

Chapter 6 Network154 X Family LSM User’s Guide V 2.5.1IP Address Groups can be used when configuring the following features:• Firewall rules• D

Page 81

DNSX Family LSM User’s Guide V 2.5.1 155The IP Address Groups page provides the following information about existing groups:Create or Edit IP Address

Page 82

Chapter 6 Network156 X Family LSM User’s Guide V 2.5.1Obtain DNS Configuration from WAN ConnectionSTEP 1 From the LSM menu, select Network >

Page 83 - Default Firewall Rules

RoutingX Family LSM User’s Guide V 2.5.1 157RoutingOverviewThe device provides static and dynamic routing which can be managed and configured from th

Page 84 - Managing Firewall Rules

Chapter 6 Network158 X Family LSM User’s Guide V 2.5.1The following figure shows the Routing Table page:The Network - Routing Table provides th

Page 85 - Firewall Rules List Details

RoutingX Family LSM User’s Guide V 2.5.1 159Static RoutesA Static Route defines the gateway to use for a particular network. The device supports the

Page 86

Chapter 6 Network160 X Family LSM User’s Guide V 2.5.1The Static Routes page provides the following information:Create a Static RouteSTEP 1 Fro

Page 87 - Configuring Firewall Rules

RoutingX Family LSM User’s Guide V 2.5.1 161number of hops between the source and the destination. RIP regularly broadcasts routing information to ot

Page 88 - Configuration Notes

Chapter 6 Network162 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “Enable RIP Globally” on page 162•

Page 89

Multicast (IGMP and PIM-DM)X Family LSM User’s Guide V 2.5.1 163For more information on configuring interfaces, see “Enable Bridge Mode on an IP Inte

Page 90

Chapter 1 System Overview2 X Family LSM User’s Guide V 2.5.1The X family firewall functionality provides service-level, stateful inspection of

Page 91 - Firewall Services

Chapter 6 Network164 X Family LSM User’s Guide V 2.5.1This following figure shows the IGMP Setup page:On the IGMP Setup page, the IP Interfaces

Page 92

Multicast (IGMP and PIM-DM)X Family LSM User’s Guide V 2.5.1 165For additional information, see the following topics:• “Enable IGMP Globally” on page

Page 93

Chapter 6 Network166 X Family LSM User’s Guide V 2.5.1This following figure shows the PIM-DM Setup page:Enable PIM-DM globallySTEP 1 Check Enab

Page 94 - Configuring Service Groups

Default GatewayX Family LSM User’s Guide V 2.5.1 167Default GatewayThe default gateway is the route to which the device will forward any packet whose

Page 95 - Schedules

Chapter 6 Network168 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “DHCP Server Page” on page 168• “D

Page 96

DHCP ServerX Family LSM User’s Guide V 2.5.1 169For additional information, see the following topics: • “Release a DHCP Lease” on page 169• “Configur

Page 97 - Managing Schedules

Chapter 6 Network170 X Family LSM User’s Guide V 2.5.1Enable and Configure the DHCP ServerSTEP 1 From the LSM menu, select Network > DHCP Se

Page 98 - Virtual Servers

DHCP ServerX Family LSM User’s Guide V 2.5.1 171DHCP RelayDHCP Relay allows DHCP to operate between a DHCP client on one security zone and a DHCP ser

Page 99 - Virtual Servers page

Chapter 6 Network172 X Family LSM User’s Guide V 2.5.1Configuring DHCP RelayYou can configure DHCP Relays from the DHCP Relay page (Network >

Page 100 - Configuring Virtual Servers

DHCP ServerX Family LSM User’s Guide V 2.5.1 173Configure DHCP Relay as a Central DHCP Relay in the Main OfficeSTEP 1 From the LSM menu, select Netwo

Page 101 - Web Filtering

X Family DeviceX Family LSM User’s Guide V 2.5.1 3usage policy by prohibiting the download of non-work related web sites and offensive or illegal Web

Page 102 - How Web Filtering Works

Chapter 6 Network174 X Family LSM User’s Guide V 2.5.1Configure the DHCP Relay Mode as Remote VPN Relay AgentSTEP 1 From the LSM menu, select N

Page 103 - Setting Up Web Filtering

DHCP ServerX Family LSM User’s Guide V 2.5.1 175The following figure shows the DHCP Static Reservations page:The Current Reservations table provides

Page 104 - Web Filtering Page

Chapter 6 Network176 X Family LSM User’s Guide V 2.5.1Network ToolsThe LSM provides the following network tools:• DNS Lookup — a network tool t

Page 105 - Parameter Description

Network ToolsX Family LSM User’s Guide V 2.5.1 177DNS LookupUse the DNS Lookup tool to find the IP address for a given DNS name. DNS lookup can be us

Page 106 - Web Filter Service

Chapter 6 Network178 X Family LSM User’s Guide V 2.5.1From the Traffic Capture page, you can:• View and manage existing packet capture files.To

Page 107

Network ToolsX Family LSM User’s Guide V 2.5.1 179STEP 4If required, configure any of the following options:• Inter Packet Interval —the number of se

Page 108 - Custom Filter List

Chapter 6 Network180 X Family LSM User’s Guide V 2.5.1STEP 4Configure any of the following options:• First Hop — you can choose which is the fi

Page 109 - Parameter/Function

7X Family LSM User’s Guide V 2.5.1 181VPNThe VPN section provides an overview of Virtual Private Networks and describes how they are implemented.Overv

Page 110 - Configure URL Patterns

Chapter 7 VPN182 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “About VPN” on page 182• “IPSec Config

Page 111 - Value Description

About VPNX Family LSM User’s Guide V 2.5.1 183• Authentication establishes the identity of a remote user or device to verify that they have permissio

Page 112 - URL Test

3Com Corporation 350 Campus Drive Marlborough, MA 01752-3064Copyright © 2005–2007, 3Com Corporation and its subsidiaries. All rights reserved. No par

Page 113 - Streams, Reports

Chapter 1 System Overview4 X Family LSM User’s Guide V 2.5.1When the X family device is installed and configured, it protects your network zone

Page 114 - Overview

Chapter 7 VPN184 X Family LSM User’s Guide V 2.5.1STEP 3For client-to-site VPNs, determine whether you will use the PPTP, L2TP, or L2TP over IP

Page 115 - Alert Log

IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 185The following figure shows the IPSec Status page:From this page, you can complete the followi

Page 116 - Audit Log

Chapter 7 VPN186 X Family LSM User’s Guide V 2.5.1Status The current status of the connection:Phase 1: Idle — Phase 1 negotiation has not start

Page 117 - IPS Block Log

IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 187IPSec ConfigurationUse the IPSec Configuration page (VPN > IPSec Status, IPSec Configurati

Page 118 - Firewall Block Log

Chapter 7 VPN188 X Family LSM User’s Guide V 2.5.1IPSec Configuration Parameters and IP Security Association DetailsThe following table describ

Page 119 - Firewall Session Log

IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 189Enable and Configure IPSec Global SettingsSTEP 1 From the LSM menu, select VPN > IPSec Sta

Page 120 - Configuration

Chapter 7 VPN190 X Family LSM User’s Guide V 2.5.1STEP 1 IPSec Security Association Setup — configure the Peer ID address, terminated security

Page 121 - System Log

IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 191Terminated Security Zone Select the remote security zone on which to terminate the VPN from t

Page 122 - Managing Logs

Chapter 7 VPN192 X Family LSM User’s Guide V 2.5.1Manual Setup: These configuration parameters are available if Manual is selected as the Keyin

Page 123 - Downloading a Log

IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 193Tunnel SetupLocal Networks Select one of the following methods to determine what local traffi

Page 124 - Resetting a log

2X Family LSM User’s Guide V 2.5.1 5LSM NavigationLSM Navigation describes the LSM interface, how to log in, and the general sections of the applicati

Page 125 - Searching a Log

Chapter 7 VPN194 X Family LSM User’s Guide V 2.5.1For details on configuring IPSec Security Associations, see the following topics:• “IPSec Sec

Page 126 - Managed Streams

IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 195STEP 7Click Save to save the configuration.Click Cancel to return to the IPSec Configuration

Page 127 - Field Description

Chapter 7 VPN196 X Family LSM User’s Guide V 2.5.1The same pre-shared key must be configured on the remote device establishing a VPN tunnel wit

Page 128 - Rate Limited Streams

IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 197STEP AIn the Tunnel Setup, check Enable IPSec Tunnel connections.STEP BIn the Local Networks

Page 129 - Quarantined Addresses

Chapter 7 VPN198 X Family LSM User’s Guide V 2.5.1Click Cancel to return to the IPSec Configuration page without saving the changes.IKE Proposa

Page 130 - Column Description

IKE ProposalX Family LSM User’s Guide V 2.5.1 199The following figure shows the IKE Proposals summary page.From this page you can complete the follow

Page 131

Chapter 7 VPN200 X Family LSM User’s Guide V 2.5.1Configuring IKE ProposalsIKE proposals provide the authentication and encryption methods that

Page 132 - • Performance/Throughput

IKE ProposalX Family LSM User’s Guide V 2.5.1 201The following figure shows the Create/Edit IKE Proposal page:For additional information, see the fol

Page 133 - Device Health

Chapter 7 VPN202 X Family LSM User’s Guide V 2.5.1IKE Proposal Configuration Parameters: Phase 1 and 2The following table describe the IKE Phas

Page 134 - Module Health

IKE ProposalX Family LSM User’s Guide V 2.5.1 203Lifetime Specify the length of time the security association remains valid before new authentication

Page 135 - Table 5–13: Module Health

Chapter 2 LSM Navigation6 X Family LSM User’s Guide V 2.5.1In addition, you can configure the LSM to communicate using either an HTTP or an HTT

Page 136 - Port Health

Chapter 7 VPN204 X Family LSM User’s Guide V 2.5.1Options: Enable Aggressive ModeTo enable Aggressive mode, check Enable Aggressive Mode. Aggre

Page 137 - Reports

IKE ProposalX Family LSM User’s Guide V 2.5.1 205Delete Phase 2 SA when Phase 1 SA terminatesCheck this option to delete all Phase 2 security associa

Page 138 - Attack Reports

Chapter 7 VPN206 X Family LSM User’s Guide V 2.5.1Configure Phase 1 Setup Parameters for an IKE ProposalThe values specified for Phase 1 IKE ne

Page 139 - Traffic Reports

IKE ProposalX Family LSM User’s Guide V 2.5.1 207STEP 9If you are using Pre-Shared Key with Aggressive Mode:•From the Local ID Type drop-down list, s

Page 140 - Update report data

Chapter 7 VPN208 X Family LSM User’s Guide V 2.5.1STEP 3To provide enhanced security, check Enable Perfect Forward Secrecy, and then select the

Page 141 - Quarantine Report

L2TP ConfigurationX Family LSM User’s Guide V 2.5.1 209The following figure shows the L2TP Status page:From this page, you can complete the following

Page 142 - Firewall Reports

Chapter 7 VPN210 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “L2TP Server Configuration” on page 21

Page 143

L2TP ConfigurationX Family LSM User’s Guide V 2.5.1 211L2TP ConfigurationEnable L2TP Server and Configure L2TP Client and AddressesEnable L2TP Server

Page 144

Chapter 7 VPN212 X Family LSM User’s Guide V 2.5.1STEP 7To configure your DNS Servers, either:•Select Device Acts as DNS Relay if you want the

Page 145

PPTP ConfigurationX Family LSM User’s Guide V 2.5.1 213From this page, you can complete the following tasks:• View current PPTP connections on the de

Page 146 - Configuration Overview

Logging InX Family LSM User’s Guide V 2.5.1 7STEP 2Enter your Username.STEP 3Enter your PasswordSTEP 4 Click Log On.The LSM validates your account in

Page 147 - Deployment Modes

Chapter 7 VPN214 X Family LSM User’s Guide V 2.5.1The following figure shows the PPTP Server Configuration page:PPTP Server Configuration Param

Page 148 - Network Port Configuration

PPTP ConfigurationX Family LSM User’s Guide V 2.5.1 215Enable PPTP Server and Configure PPTP Client and AddressesSTEP 1 If you are not using RADIUS t

Page 149 - Port Configuration Tasks

Chapter 7 VPN216 X Family LSM User’s Guide V 2.5.1

Page 150 - Chapter 6 Network

8X Family LSM User’s Guide V 2.5.1 217SystemThe System menu provides options to update and manage TOS and Digital Vaccine packages, configure timekeep

Page 151 - Security Zone Configuration

Chapter 8 System218 X Family LSM User’s Guide V 2.5.1For details, see the following sections:• “Update TOS and Digital Vaccine Software” on pag

Page 152 - Preconfigured Zones Ports

Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 219The following figure shows the Update page.For additional information, se

Page 153 - Security Zone Configuration

Chapter 8 System220 X Family LSM User’s Guide V 2.5.1Rolling Back to a Previous TOS VersionA rollback operation reverts the currently running s

Page 154

Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 221Perform a Software RollbackSTEP 1 On the Update page in the Current Insta

Page 155

Chapter 8 System222 X Family LSM User’s Guide V 2.5.1For additional information, see the following:• “Updating the Digital Vaccine (Filters)” o

Page 156 - IP Interfaces

Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 223When you select the check box, the scheduling fields appear so you can es

Page 157 - Managing IP Interfaces

Chapter 2 LSM Navigation8 X Family LSM User’s Guide V 2.5.1LSM Screen LayoutThe LSM provides features in two main areas of the browser window:•

Page 158

Chapter 8 System224 X Family LSM User’s Guide V 2.5.1MB. If the update package that you downloaded is smaller than <number>, proceed to S

Page 159 - IP Interfaces

Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 225During a graceful shutdown, as during an update or reboot (in the LSM or

Page 160

Chapter 8 System226 X Family LSM User’s Guide V 2.5.1STEP 1 If necessary, download a software update package from TMC.STEP 2From the LSM menu,

Page 161

Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 227System SnapshotsFrom the System Snapshots page, you can create, manage, r

Page 162

Chapter 8 System228 X Family LSM User’s Guide V 2.5.1The following figure shows the System Snapshots page:Figure 8–2: System: System Snapshots

Page 163

Time OptionsX Family LSM User’s Guide V 2.5.1 229Import a SnapshotSTEP 1 From the LSM menu, select System > Update. Then, click the System Snapsho

Page 164 - Configuring a GRE Tunnel

Chapter 8 System230 X Family LSM User’s Guide V 2.5.1Use the Time Options page (System > Configuration > Time Options) to configure the t

Page 165

Time OptionsX Family LSM User’s Guide V 2.5.1 231Internal CMOS ClockSet the Internal CMOS Clock TimeSTEP 1 From the LSM, select System > Configura

Page 166 - RIP for IP Interfaces

Chapter 8 System232 X Family LSM User’s Guide V 2.5.1Configure the X family device for NTP ServersSTEP 1 From the LSM menu, select System >

Page 167 - RIPv2 Configuration Settings

SMS/NMSX Family LSM User’s Guide V 2.5.1 233From an NMS, you can remotely monitor the events and system status of the X family device. Configuring an

Page 168

LSM Screen LayoutX Family LSM User’s Guide V 2.5.1 9Main Menu BarThe dark blue bar at the top of the LSM screen provides quick access to basic logon

Page 169 - IP Address Groups

Chapter 8 System234 X Family LSM User’s Guide V 2.5.1The following figure shows the Configure - SMS and NMS page:Figure 8–4: Configure - SMS an

Page 170

High AvailabilityX Family LSM User’s Guide V 2.5.1 235STEP 4 Click Apply.View or Configure NMS InformationSTEP 1 From the LSM menu, select System >

Page 171

Chapter 8 System236 X Family LSM User’s Guide V 2.5.1How High Availability WorksThe following sections describe how high availability works in

Page 172 - Default Gateway

High AvailabilityX Family LSM User’s Guide V 2.5.1 237PollingThe High Availability function provides an optional polling feature that can be configur

Page 173 - Routing Table

Chapter 8 System238 X Family LSM User’s Guide V 2.5.1You can configure and manage High Availability from the High Availability page available f

Page 174

Thresholds to Monitor Memory and Disk UsageX Family LSM User’s Guide V 2.5.1 239STEP AOn the High Availability page in the Communication Channel tab

Page 175 - Static Routes

Chapter 8 System240 X Family LSM User’s Guide V 2.5.1You can specify the following settings for the disk and memory thresholds:• Major Level —

Page 176 - RIP Setup

Email ServerX Family LSM User’s Guide V 2.5.1 241Email ServerThe X family device can be configured to send an email message when an IPS filter is tri

Page 177 - Routing

Chapter 8 System242 X Family LSM User’s Guide V 2.5.1STEP 7Click Apply.STEP 8 Click Test E m a i l to verify your configuration settings.For

Page 178

Setup WizardX Family LSM User’s Guide V 2.5.1 243You can also setup the X family devices from an ssh command line using the CLI setup wizard. The CLI

Page 179 - Multicast (IGMP and PIM-DM)

Chapter 2 LSM Navigation10 X Family LSM User’s Guide V 2.5.1NavigationYou can access the available features of the LSM by selecting an option f

Page 180

Chapter 8 System244 X Family LSM User’s Guide V 2.5.1

Page 181 - PIM-DM Setup

9X Family LSM User’s Guide V 2.5.1 245AuthenticationThe Authentication section describes how to create and manage users accounts and configure the Pri

Page 182

Chapter 9 Authentication246 X Family LSM User’s Guide V 2.5.1OverviewThe LSM Authentication menu pages enable Administrators to create and mana

Page 183 - DHCP Server

User ListX Family LSM User’s Guide V 2.5.1 247TOS and Local User AccountsThe X family device has two types of user accounts:A TOS User account provid

Page 184 - DHCP Server Page

Chapter 9 Authentication248 X Family LSM User’s Guide V 2.5.1Username and Password RequirementsRestrictions on username and password values for

Page 185 - Configure DHCP Server

User ListX Family LSM User’s Guide V 2.5.1 249Managing User Accounts From the User List menu, you can complete the following tasks:• Create an accoun

Page 186

Chapter 9 Authentication250 X Family LSM User’s Guide V 2.5.1Create a New User Account in the TOS Authentication DatabaseSTEP 1 From the LSM me

Page 187 - DHCP Relay

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 251See “Username and Password R

Page 188 - Configuring DHCP Relay

Chapter 9 Authentication252 X Family LSM User’s Guide V 2.5.1STEP 1 A user logs on to the device to gain access to network resources.To access

Page 189

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 253You may choose to use RADIUS

Page 190 - Static Reservations

LSM Screen LayoutX Family LSM User’s Guide V 2.5.1 11Content and FunctionalityThe LSM displays all data in the central area of the browser window. As

Page 191

Chapter 9 Authentication254 X Family LSM User’s Guide V 2.5.1The following figures shows the Privilege Groups page.Privilege Group Parameter De

Page 192 - Network Tools

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 255STEP 3On the Create/Edit Pri

Page 193 - Traffic Capture

Chapter 9 Authentication256 X Family LSM User’s Guide V 2.5.1own CA server or use a third-party organization for creating certificates. The sam

Page 194

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 257CA CertificatesCA Certificat

Page 195 - Traceroute

Chapter 9 Authentication258 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “X.509 Certificates” on pag

Page 196

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 259Certificate Revocation Lists

Page 197

Chapter 9 Authentication260 X Family LSM User’s Guide V 2.5.1Configure CRL Parameters for a CA CertificateSTEP 1 From the LSM menu, select Auth

Page 198 - About VPN

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 261The following figure shows t

Page 199 - VPN Configuration Overview

Chapter 9 Authentication262 X Family LSM User’s Guide V 2.5.1Managing Certificate RequestsYou can perform the following managment functions fro

Page 200 - IPSec Configuration

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 263STEP A In the DN Attribute

Page 201 - IPSec Status Details

Chapter 2 LSM Navigation12 X Family LSM User’s Guide V 2.5.1System Summary The System Summary page automatically displays when you first log on

Page 202 - Chapter 7 VPN

Chapter 9 Authentication264 X Family LSM User’s Guide V 2.5.1The device uses PKCS#12 format for importing Local Certificates with their private

Page 203

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 265For additional information,

Page 204

Chapter 9 Authentication266 X Family LSM User’s Guide V 2.5.1STEP 4Type the Local Certificate File path and filename for the signed local certi

Page 205 - IPSec Configuration

PreferencesX Family LSM User’s Guide V 2.5.1 267The following figure shows the Preferences page used to configure LSM user security settings: Prefere

Page 206

Chapter 9 Authentication268 X Family LSM User’s Guide V 2.5.1TOS User PreferencesSecurity Level Determines the length and complexity requiremen

Page 207

PreferencesX Family LSM User’s Guide V 2.5.1 269Set User PreferencesSTEP 1 From the LSM menu, select Authentication > Preferences.The Preferences

Page 208

Chapter 9 Authentication270 X Family LSM User’s Guide V 2.5.1

Page 209

A=1AX Family LSM User’s Guide V 2.5.1 271Browser CertificatesDetails creating browser certificates for use in Internet Explorer to ensure notification

Page 210

Appendix A Browser Certificates272 X Family LSM User’s Guide V 2.5.1Client Authentication MessageThe X family device uses the same HTTPS channe

Page 211

Security AlertX Family LSM User’s Guide V 2.5.1 273STEP 1 Open Microsoft Internet Explorer (version 6.0 or later).STEP 2Select Tool s > Internet

Page 212

System SummaryX Family LSM User’s Guide V 2.5.1 13Packet StatsThe Packet Stats section provides basic traffic statistics including the following:• Re

Page 213

Appendix A Browser Certificates274 X Family LSM User’s Guide V 2.5.1Certificate AuthorityThe following dialog warning displays for a certificat

Page 214 - IKE Proposal

Security AlertX Family LSM User’s Guide V 2.5.1 275STEP 3Select the Root Authority. Click View Certificate.STEP 4The Certificate Import Wizard opens.

Page 215 - IKE Proposal Details

Appendix A Browser Certificates276 X Family LSM User’s Guide V 2.5.1The Certificate Store dialog displays.STEP 5Select the Place all certificat

Page 216 - Configuring IKE Proposals

Security AlertX Family LSM User’s Guide V 2.5.1 277STEP 6Click Finish to install the certificate. The Root Certificate Store indicates the status of

Page 217 - IKE Proposal

Appendix A Browser Certificates278 X Family LSM User’s Guide V 2.5.1STEP 1 When the warning displays, click View Certificate. The Certificate d

Page 218

Example - Creating Personal CertificateX Family LSM User’s Guide V 2.5.1 279STEP 5When browsing to the X family device, enter the workstation name in

Page 219

Appendix A Browser Certificates280 X Family LSM User’s Guide V 2.5.1

Page 220

BX Family LSM User’s Guide V 2.5.1 281Web Filter ServiceDetailed information about the Filter Service subscription service used to control access to w

Page 221

Appendix B Web Filter Service282 X Family LSM User’s Guide V 2.5.1Core CategoriesCore Categories are used to classify web sites that contain off

Page 222

X Family LSM User’s Guide V 2.5.1 283a public or private agency that provides educational information on drug use.GamblingThis Core category includes

Page 223

ContentsX Family LSM User’s Guide V 2.5.1 iiiContentsAbout This Guide xiTarget Audience xiKnowledge, Skills, and Abilities xiConventions xiiCross

Page 224 - L2TP Configuration

Chapter 2 LSM Navigation14 X Family LSM User’s Guide V 2.5.1For more detailed information about these logs, select Events > Logs.Product Spe

Page 225 - L2TP Status Page Details

Appendix B Web Filter Service284 X Family LSM User’s Guide V 2.5.1WeaponsThis Core Category includes sites on the following topics:• Instruction

Page 226 - L2TP Server Configuration

X Family LSM User’s Guide V 2.5.1 285Advertisement•Banner Ad Servers • Pop-Up advertisements •Adware Arts & Entertainment• Museums, galleries, art

Page 227 - L2TP Configuration

Appendix B Web Filter Service286 X Family LSM User’s Guide V 2.5.1Finance & Investment• Web sites that provide stock quotes, stock tickers a

Page 228 - PPTP Configuration

X Family LSM User’s Guide V 2.5.1 287Hobbies & Recreation• Recreational pastimes such as collecting, gardening, kit airplanes • Outdoor recreation

Page 229 - PPTP Server Configuration

Appendix B Web Filter Service288 X Family LSM User’s Guide V 2.5.1Photo Searches• Sites that provide resources for photo and image searches • On

Page 230

X Family LSM User’s Guide V 2.5.1 289ShoppingThis Productivity category includes sites on the following topics:• Internet malls and online auctions.•

Page 231 - PPTP Configuration

Appendix B Web Filter Service290 X Family LSM User’s Guide V 2.5.1Each license allows one year of filtering for a specific X family product. Lic

Page 232

CX Family LSM User’s Guide V 2.5.1 291Log Formats and System MessagesDetails the formats of the downloadable logs and system update status messages.Ov

Page 233

Appendix C Log Formats and System Messages292 X Family LSM User’s Guide V 2.5.1Log FormatsIn the LSM, you can view all the logs in the GUI. In a

Page 234 - Chapter 8 System

Log FormatsX Family LSM User’s Guide V 2.5.1 293Comp Software component that generated the message:•ALT = Alert Log•BLK = IPS Block LogMessage (Contai

Page 235

3X Family LSM User’s Guide V 2.5.1 15IPS FilteringLSM Navigation describes the LSM interface, how to log in, and the general sections of the applicati

Page 236 - Persistent Settings

Appendix C Log Formats and System Messages294 X Family LSM User’s Guide V 2.5.1Audit Log FormatAn example of a comma-delimited Audit Log entry f

Page 237

Log FormatsX Family LSM User’s Guide V 2.5.1 295Entry_time Date and time of event. YYYY-MM-DD 24H:MI:SSAccess The access-level of the user performing

Page 238

Appendix C Log Formats and System Messages296 X Family LSM User’s Guide V 2.5.1Firewall Block Log FormatAn example of a comma-delimited Firewall

Page 239

Log FormatsX Family LSM User’s Guide V 2.5.1 297Message(cont.)Destination IP The destination IP address and port for the session. This represents the

Page 240 - Updating the TOS Software

Appendix C Log Formats and System Messages298 X Family LSM User’s Guide V 2.5.1The fields in this table are populated depending on the event bei

Page 241

Log FormatsX Family LSM User’s Guide V 2.5.1 299VPN Log FormatAn example of a comma-delimited VPN Log entry follows:17,2006-10-05 17:12:31,INFO,VPN,&q

Page 242

Appendix C Log Formats and System Messages300 X Family LSM User’s Guide V 2.5.1System Log FormatAn example of a comma-delimited System Log entry

Page 243 - System Snapshots

Remote Syslog Log FormatX Family LSM User’s Guide V 2.5.1 301Remote Syslog Log Format The remote syslog format for the Alert, IPS Block, and the Firew

Page 244

Appendix C Log Formats and System Messages302 X Family LSM User’s Guide V 2.5.1High Availability Log MessagesThe High Availability mechanism log

Page 245 - Time Options

System Update Status MessagesX Family LSM User’s Guide V 2.5.1 303System Update Status MessagesThe LSM provides update status on the progress of the u

Page 246 - Figure 8–3: Time Options Page

Chapter 3 IPS Filtering16 X Family LSM User’s Guide V 2.5.1The default security profile is set to the ANY ==> ANY security zone pair with al

Page 247 - NTP Server

Appendix C Log Formats and System Messages304 X Family LSM User’s Guide V 2.5.1If an error occurs, the information changes. The state displays a

Page 248 - Time Zones

DX Family LSM User’s Guide V 2.5.1 305Device Maximum ValuesDetails the maximum values for X family devices.The following table give the maximum values

Page 249 - SMS/NMS

Appendix B Device Maximum Values306 X Family LSM User’s Guide V 2.5.1NetworkIP Address Groups 25 200Entries per IP Address Group 50 200Virtual I

Page 250

FX Family LSM User’s Guide V 2.5.1 307Glossaryaction setAn integral part of an attack or peer-to-peer filter, action sets determine what the X family

Page 251 - High Availability

Glossary308 X Family LSM User’s Guide V 2.5.1Application ProtectionCategory of filter types that defend against known and unknown exploits that

Page 252 - How High Availability Works

X Family LSM User’s Guide V 2.5.1 309Digital Vaccine FiltersDigital Vaccine Filters block attacks and other malicious traffic from the network. Filt

Page 253

Glossary310 X Family LSM User’s Guide V 2.5.1IKE (Internet Key Exchange)Internet Key Exchange (IKE) is used to negotiate the keying material tha

Page 254

X Family LSM User’s Guide V 2.5.1 311Network Equipment filtersFilters that detect and block the malicious attacks that target equipment accessible th

Page 255

Glossary312 X Family LSM User’s Guide V 2.5.1attack has gathered data by probing your system and scanning your network, it continues with pointe

Page 256

X Family LSM User’s Guide V 2.5.1 313Streaming Media filtersStreaming Media filters detect and control traffic from Streaming Media applications that

Page 257 - Email Server

Security ProfilesX Family LSM User’s Guide V 2.5.1 17Security ProfilesOn the X family device, Security Profiles are used to apply DV filter policies.

Page 258 - Setup Wizard

Glossary314 X Family LSM User’s Guide V 2.5.1

Page 259

X Family LSM User’s Guide V 2.5.1 315Aaccess level, user 247action set 307action sets 44Block 45Block + Notify 45Block + Notify + Trace 45

Page 260

316 X Family LSM User’s Guide V 2.5.1warning xiiirelated documentation xivscreen captures xiiiHhealthAuto Refresh option 267module 118p

Page 261 - Authentication

X Family LSM User’s Guide V 2.5.1 317resetfilters 35packet statistics 13TCP 45RIP, definition of 312role, user 247rollbackstates, messages

Page 262 - User List

Chapter 3 IPS Filtering18 X Family LSM User’s Guide V 2.5.1In Example 2, a packet going from the LAN zone to the WAN zone matches Security Prof

Page 263 - TOS User Security Level

Security ProfilesX Family LSM User’s Guide V 2.5.1 19Managing Security ProfilesUse the Security Profiles page (IPS > Security Profiles) to create

Page 264

Chapter 3 IPS Filtering20 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “Security Profile Details” on

Page 265 - Managing User Accounts

Security ProfilesX Family LSM User’s Guide V 2.5.1 21For additional information, see the following topics:• “Create a Security Profile” on page 21• “

Page 266

Chapter 3 IPS Filtering22 X Family LSM User’s Guide V 2.5.1Settings table, change the global State or Action for a filter Category Group if req

Page 267

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 23IPS Digital Vaccine (DV) FiltersTippingPoint IPS Digital Vaccine (DV) Filters are

Page 268 - Chapter 9 Authentication

Contentsiv X Family LSM User’s Guide V 2.5.1 Tabbed Menu Options 11System Summary 12System Status 12Health 12Packet Stats 13Network DHCP 1

Page 269 - Privilege Groups

Chapter 3 IPS Filtering24 X Family LSM User’s Guide V 2.5.1Filter ComponentsIPS filters have the following components which determine the ident

Page 270

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 25Filter Override SettingsFor the best system performance, we recommend that you us

Page 271 - X.509 Certificates

Chapter 3 IPS Filtering26 X Family LSM User’s Guide V 2.5.1View DV FiltersYou can view and manage filters configured for a Security Profile usi

Page 272

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 27Filter SearchFilter search provides options to view all filters or only those mat

Page 273 - CA Certificates

Chapter 3 IPS Filtering28 X Family LSM User’s Guide V 2.5.1Filter List DetailsThe following table describes the information and functions avail

Page 274

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 29For details on viewing filters on the Filter List page, see the following topics:

Page 275

Chapter 3 IPS Filtering30 X Family LSM User’s Guide V 2.5.1installed on your network. From the LSM, you can modify the filter configuration for

Page 276 - Certificate Requests

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 31The following figure shows the Category Settings table.Click Show Advanced Option

Page 277

Chapter 3 IPS Filtering32 X Family LSM User’s Guide V 2.5.1Edit Individual Filter SettingsSTEP 1 From the LSM menu, click Security Profiles.STE

Page 278 - Managing Certificate Requests

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 33On the View Filter page, you can also add or remove the filter from Security Prof

Page 279 - Local Certificates

ContentsX Family LSM User’s Guide V 2.5.1 vManaging Firewall Rules 68Configuring Firewall Rules 71Firewall Services 75Firewall Services Page Field

Page 280

Chapter 3 IPS Filtering34 X Family LSM User’s Guide V 2.5.1Configure Filter Limits/Exceptions based on IP Address Limits and exceptions allow y

Page 281

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 35STEP 4In the Application Protection Filter Setting Exceptions section, specify th

Page 282 - Preferences

Chapter 3 IPS Filtering36 X Family LSM User’s Guide V 2.5.1The Port Scan/Host Sweep Filters (Filter numbers 7000- 7004) available in the Applic

Page 283 - Preferences Parameter Details

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 37STEP 3Locate the Port Scan/Host Sweep filters:STEP AClick Search Filters. Then,

Page 284

Chapter 3 IPS Filtering38 X Family LSM User’s Guide V 2.5.1Traffic Threshold FiltersTraffic threshold filters alert you and the device when net

Page 285

Traffic Threshold FiltersX Family LSM User’s Guide V 2.5.1 39Managing Traffic Threshold FiltersYou can manage Traffic Threshold filters from the Traf

Page 286

Chapter 3 IPS Filtering40 X Family LSM User’s Guide V 2.5.1Units The number of selected units per second. The unit values include packets, byte

Page 287 - Browser Certificates

Traffic Threshold FiltersX Family LSM User’s Guide V 2.5.1 41Create or Edit a Traffic Threshold FilterUse the Create or Edit Traffic Threshold Filter

Page 288 - Client Authentication Message

Chapter 3 IPS Filtering42 X Family LSM User’s Guide V 2.5.1Traffic Threshold Configuration ParametersThe following table describes the Traffic

Page 289 - Security Alert

Traffic Threshold FiltersX Family LSM User’s Guide V 2.5.1 43Configure a Traffic Threshold FilterSTEP 1 From the LSM menu, select IPS > Traffic Th

Page 290 - Certificate Authority

Contentsvi X Family LSM User’s Guide V 2.5.1 Memory and Disk Usage 117Module Health 118Performance/Throughput 120Port Health 120Reports 121

Page 291 - Security Alert

Chapter 3 IPS Filtering44 X Family LSM User’s Guide V 2.5.1STEP DFor Below Normal Minor, select the Enabled check box, enter a percentage amou

Page 292

Action SetsX Family LSM User’s Guide V 2.5.1 45in the action set. For example, the user can display a Quarantine web page to notify the user of the p

Page 293 - Invalid Certificate Name

Chapter 3 IPS Filtering46 X Family LSM User’s Guide V 2.5.1Default Action SetsThe X family device is pre-configured with a collection of defaul

Page 294 - Figure A–11: HOSTS File

Action SetsX Family LSM User’s Guide V 2.5.1 47Managing ActionsUse the Action Sets page to review, create and modify Action Sets. The following figur

Page 295

Chapter 3 IPS Filtering48 X Family LSM User’s Guide V 2.5.1Configure an Action SetSTEP 1 From the LSM menu, select IPS > Action Sets. The IP

Page 296

Action SetsX Family LSM User’s Guide V 2.5.1 49STEP 6Choose one or more Contacts by checking the box next to the appropriate Contact Name. If there a

Page 297

Chapter 3 IPS Filtering50 X Family LSM User’s Guide V 2.5.1For additional information on configuring Quarantine Action Sets, see the following

Page 298 - Core Categories

Action SetsX Family LSM User’s Guide V 2.5.1 51Configure a Quarantine Action SetSTEP 1 From the LSM menu, click Action Sets. STEP 2On the Action Sets

Page 299 - Violence

Chapter 3 IPS Filtering52 X Family LSM User’s Guide V 2.5.1STEP AIn the Allow quarantined hosts to access the following IP address(es) table,

Page 300 - Productivity Categories

Notification ContactsX Family LSM User’s Guide V 2.5.1 53minute timer starts. The device sends e-mail notifications until the threshold is reached. A

Page 301 - Education

ContentsX Family LSM User’s Guide V 2.5.1 viiMulticast (IGMP and PIM-DM) 163IGMP Setup 163PIM-DM Setup 165Default Gateway 167 DHCP Server 167Over

Page 302 - Appendix B Web Filter Service

Chapter 3 IPS Filtering54 X Family LSM User’s Guide V 2.5.1Configure the Remote System Log ContactSTEP 1 From the LSM menu, select IPS > Act

Page 303

IPS ServicesX Family LSM User’s Guide V 2.5.1 55You cannot delete a Notification Contact if it is currently configured on an Action Set.STEP 3On the

Page 304

Chapter 3 IPS Filtering56 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “IPS Services Page Details” o

Page 305

PreferencesX Family LSM User’s Guide V 2.5.1 57PreferencesUse the IPS Preferences page (IPS > Preferences) to configure settings related to the Th

Page 306 - Free 14-day Trial Period

Chapter 3 IPS Filtering58 X Family LSM User’s Guide V 2.5.1Configure Threat Suppression Engine (TSE)On the IPS Preferences page, configure glob

Page 307 - Log Formats and System

PreferencesX Family LSM User’s Guide V 2.5.1 59Configure Global Settings for the TSESTEP 1 From the LSM menu, select IPS > Preferences.STEP 2On th

Page 308 - Log Formats

Chapter 3 IPS Filtering60 X Family LSM User’s Guide V 2.5.1Adaptive Filter ConfigurationYou can configure the global settings for the Adaptive

Page 309

PreferencesX Family LSM User’s Guide V 2.5.1 61STEP 3 Select the Log Severity of the system log message that is automatically generated when a filter

Page 310 - Audit Log Format

Chapter 3 IPS Filtering62 X Family LSM User’s Guide V 2.5.1

Page 311 - Field Name Description

4X Family LSM User’s Guide V 2.5.1 63FirewallThe Firewall section describes how to enable, disable, and modify firewall rules and various features usi

Page 312 - Firewall Block Log Format

Contentsviii X Family LSM User’s Guide V 2.5.1 Updating the TOS Software 224System Snapshots 227Time Options 229Internal CMOS Clock 231NTP S

Page 313

Chapter 4 Firewall64 X Family LSM User’s Guide V 2.5.1You can view and manage Firewall Rules and configuration options from the Firewall menu p

Page 314 - Firewall Session Log Format

How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 65STEP 1 The user starts a web browser. The web browser resolves the DNS name fo

Page 315 - VPN Log Format

Chapter 4 Firewall66 X Family LSM User’s Guide V 2.5.1The firewall rule table is searched from the top of the table to the end (if necessary) l

Page 316 - System Log Format

How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 67For additional information on setting up firewall rules, see the following top

Page 317 - Remote Syslog Log Format

Chapter 4 Firewall68 X Family LSM User’s Guide V 2.5.1The default firewall rules configured for the this-device zone use the LAN security zone.

Page 318

How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 69The following figure shows the Firewall Rules page.You can complete the follow

Page 319 - System Update Status Messages

Chapter 4 Firewall70 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “Firewall Rules List Details” on p

Page 320

How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 71Configuring Firewall RulesWhen configuring a firewall rules, you must define t

Page 321 - Device Maximum

Chapter 4 Firewall72 X Family LSM User’s Guide V 2.5.1the device. If a local user has not been authenticated, the rule is ignored and lower pri

Page 322 - Parameter X5 X506

How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 73STEP GTo record sessions matching this firewall rule in the Firewall Session L

Page 323 - Glossary

ContentsX Family LSM User’s Guide V 2.5.1 ixSecurity Alert 273Certificate Authority 274Invalid Certificate Name 277Example - Creating Personal Cert

Page 324

Chapter 4 Firewall74 X Family LSM User’s Guide V 2.5.1To control the rate of traffic flow between zones, configure bandwidth management as foll

Page 325

How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 75STEP 3On the Edit Firewall Rule page in the Firewall Rule Setup table, click t

Page 326

Chapter 4 Firewall76 X Family LSM User’s Guide V 2.5.1Service and Service Groups have been configured, you can assign them to firewall rules or

Page 327

How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 77Firewall Services Page Field DescriptionsThe following table describes the fie

Page 328 - X family device

Chapter 4 Firewall78 X Family LSM User’s Guide V 2.5.1•From the Ty p e drop-down list, select the service type. Protocol types supported a r e

Page 329

SchedulesX Family LSM User’s Guide V 2.5.1 79STEP 4For each service you want to add to the group, select the service from the Service drop-down list.

Page 330

Chapter 4 Firewall80 X Family LSM User’s Guide V 2.5.1You can apply the same schedule to as many firewall rules as required. For device maximum

Page 331

SchedulesX Family LSM User’s Guide V 2.5.1 81For additional information, see the following topics:• “Add or Edit a Schedule” on page 81• “Delete Days

Page 332

Chapter 4 Firewall82 X Family LSM User’s Guide V 2.5.1STEP 5Click Save/Create.Click Cancel to return to the Firewall - Schedules page without s

Page 333

Virtual ServersX Family LSM User’s Guide V 2.5.1 83Virtual Servers pageUse the Virtual Servers page (Firewall > Virtual Servers) to view and confi

Commentaires sur ces manuels

Pas de commentaire