HP X Unified Security Platform Series Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Vernetzung HP X Unified Security Platform Series herunter. HP X Unified Security Platform Series User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 333
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - User’s Guide

http://www.3com.com/Part Number TECHD-176 Rev B01Published April 20073Com® X Family Local Security Manager User’s GuideX5 (25-user license) – 3CRTPX5-

Seite 2 - Marlborough, MA 01752

Contentsx X Family LSM User’s Guide V 2.5.1

Seite 3

Chapter 4 Firewall84 X Family LSM User’s Guide V 2.5.1Configuring Virtual ServersFor device maximum configurable values, see “Appendix D‚ “Devi

Seite 4 - Chapter 4. Firewall 63

Web FilteringX Family LSM User’s Guide V 2.5.1 85Configure a Virtual Server and Provide One-to-One NATSTEP 1 From the LSM menu, select Firewall >

Seite 5

Chapter 4 Firewall86 X Family LSM User’s Guide V 2.5.1used to determine whether a Web site may be accessed or not. You must specify all rules t

Seite 6 - Chapter 6. Network 129

Web FilteringX Family LSM User’s Guide V 2.5.1 87STEP 5If there is no pattern match in the URL Block List, the device checks to see if the Web Filter

Seite 7 - Chapter 8. System 217

Chapter 4 Firewall88 X Family LSM User’s Guide V 2.5.1If you create a Custom Filter, can select the Create default firewall rule option to auto

Seite 8

Web FilteringX Family LSM User’s Guide V 2.5.1 89For details, see the following topics:• “Web Filter General Configuration Parameters” on page 89• “C

Seite 9 - Index 315

Chapter 4 Firewall90 X Family LSM User’s Guide V 2.5.1STEP 3In the Filtering Action table, configure the behavior for web filter events. This c

Seite 10 - Contents

Web FilteringX Family LSM User’s Guide V 2.5.1 91in a variety of languages (65 languages) from over 200 countries.Web sites are classified into two m

Seite 11 - About This Guide

Chapter 4 Firewall92 X Family LSM User’s Guide V 2.5.1STEP AClear the check box next to a category name to allow access. To block access, check

Seite 12 - Conventions

Web FilteringX Family LSM User’s Guide V 2.5.1 93You can complete the following tasks from the Custom Filter List page:• Enable/disable Manual URL fi

Seite 13 - Messages

X Family LSM User’s Guide V 2.5.1 xiAbout This GuideExplains who this guide is intended for, how the information is organized, where information updat

Seite 14 - Customer Support

Chapter 4 Firewall94 X Family LSM User’s Guide V 2.5.1STEP 3Create and add the URL patterns to the Permit/Block lists:STEP AIn the Add URL Patt

Seite 15 - Contact Information

Web FilteringX Family LSM User’s Guide V 2.5.1 95Regular expression pattern matching enables you to enter regular expressions into the Permit/Block l

Seite 16

Chapter 4 Firewall96 X Family LSM User’s Guide V 2.5.1URL TestUse the URL Test dialog to determine if a URL is covered by one of Web Filter Ser

Seite 17 - System Overview

5X Family LSM User’s Guide V 2.5.1 97Events: Logs, Traffic Streams, ReportsThe Events section describes the logs, views and reports available to monit

Seite 18 - Core Functionality

Chapter 5 Events: Logs, Traffic Streams, Reports98 X Family LSM User’s Guide V 2.5.1OverviewThe Events menu pages of the LSM allow you to monit

Seite 19 - X Family Environment

LogsX Family LSM User’s Guide V 2.5.1 99Log MaintenanceThe X family device maintains two files for each log: a historical log file and a current log

Seite 20 - SMS Configuration

Chapter 5 Events: Logs, Traffic Streams, Reports100 X Family LSM User’s Guide V 2.5.1Audit LogThe audit log tracks user activity that may have

Seite 21 - LSM Navigation

LogsX Family LSM User’s Guide V 2.5.1 101IPS Block LogThe IPS Block log contains information about packets that have triggered an IPS filter configur

Seite 22 - Logging In

Chapter 5 Events: Logs, Traffic Streams, Reports102 X Family LSM User’s Guide V 2.5.1Firewall Block LogThe Firewall Block Log captures informat

Seite 23 - Figure 2–1: LSM Logon Page

LogsX Family LSM User’s Guide V 2.5.1 103Firewall Session LogFor firewall and web filter permit rules with logging enabled, this log captures informa

Seite 24 - LSM Screen Layout

About This Guidexii X Family LSM User’s Guide V 2.5.1ConventionsThis guide follows several procedural and typographical conventions to better provide

Seite 25 - Main Menu Bar

Chapter 5 Events: Logs, Traffic Streams, Reports104 X Family LSM User’s Guide V 2.5.1VPN LogThe VPN log captures diagnostic messages relating t

Seite 26 - Navigation

LogsX Family LSM User’s Guide V 2.5.1 105System LogThe System Log contains information about the software processes that control the X family device,

Seite 27 - Content and Functionality

Chapter 5 Events: Logs, Traffic Streams, Reports106 X Family LSM User’s Guide V 2.5.1For details on configuring the Syslog Server contact for t

Seite 28 - System Summary

LogsX Family LSM User’s Guide V 2.5.1 107For additional details, refer to the following topics:• “Viewing Logs” on page 107• “Downloading a Log” on p

Seite 29 - Log Summary

Chapter 5 Events: Logs, Traffic Streams, Reports108 X Family LSM User’s Guide V 2.5.1Download a LogSTEP 1 On the log page in the Log Functions

Seite 30 - Product Specifications

LogsX Family LSM User’s Guide V 2.5.1 109Searching a LogSome logs provide a search function to help locate specific entries. This feature is availabl

Seite 31 - IPS Filtering

Chapter 5 Events: Logs, Traffic Streams, Reports110 X Family LSM User’s Guide V 2.5.1Managed StreamsThe Managed Streams menu pages provide opti

Seite 32 - Using the IPS

Managed StreamsX Family LSM User’s Guide V 2.5.1 111The Blocked Log Entries table displays up to 50 entries. Entries are added when the block event o

Seite 33 - Security Profiles

Chapter 5 Events: Logs, Traffic Streams, Reports112 X Family LSM User’s Guide V 2.5.1Rate Limited StreamsWhen traffic triggers an IPS filter co

Seite 34 - Chapter 3 IPS Filtering

Managed StreamsX Family LSM User’s Guide V 2.5.1 113Search rate-limited streamsSTEP 1 From the LSM menu, select Events > Managed Streams > Rate

Seite 35 - Managing Security Profiles

ConventionsX Family LSM User’s Guide V 2.5.1 xiiiMenu NavigationThe LSM provides drop-down menu lists to navigate and choose items in the user interf

Seite 36 - Security Profile Details

Chapter 5 Events: Logs, Traffic Streams, Reports114 X Family LSM User’s Guide V 2.5.1From the Quarantined Addresses page, you can:• View and se

Seite 37 - Security Profiles

Managed StreamsX Family LSM User’s Guide V 2.5.1 115STEP 3Click Search. The Quarantined Addresses table updates with addresses matching the search cr

Seite 38

Chapter 5 Events: Logs, Traffic Streams, Reports116 X Family LSM User’s Guide V 2.5.1HealthThe Health menu pages show the current status and ne

Seite 39

HealthX Family LSM User’s Guide V 2.5.1 117To access the Monitor page, select Events > Health > Monitor, or click Health on the System Summary

Seite 40 - Filter Components

Chapter 5 Events: Logs, Traffic Streams, Reports118 X Family LSM User’s Guide V 2.5.1require notification, but this difference only comes into

Seite 41 - Configuring DV Filters

HealthX Family LSM User’s Guide V 2.5.1 119Module State A description of the current operation state of the module. Possible values: • Active — The m

Seite 42 - View DV Filters

Chapter 5 Events: Logs, Traffic Streams, Reports120 X Family LSM User’s Guide V 2.5.1Performance/ThroughputTo view the current throughput perfo

Seite 43 - Filters List (All Filters)

ReportsX Family LSM User’s Guide V 2.5.1 121ReportsThe Reports menu provides access to detailed information about the LSM system alert and traffic ac

Seite 44 - Filter List Details

Chapter 5 Events: Logs, Traffic Streams, Reports122 X Family LSM User’s Guide V 2.5.1STEP 3To update the report data, use the Refresh option. O

Seite 45

ReportsX Family LSM User’s Guide V 2.5.1 123Rate Limit ReportsIn the LSM, you can configure a rate limit action set to define the maximum amount of b

Seite 46

About This Guidexiv X Family LSM User’s Guide V 2.5.1NoteNotes tell you about information that might not be obvious or that does not relate directly

Seite 47

Chapter 5 Events: Logs, Traffic Streams, Reports124 X Family LSM User’s Guide V 2.5.1The following figure shows the Traffic Profile Reports pag

Seite 48

ReportsX Family LSM User’s Guide V 2.5.1 125Traffic Threshold ReportIn the LSM, traffic threshold filters track statistical changes in network traffi

Seite 49

Chapter 5 Events: Logs, Traffic Streams, Reports126 X Family LSM User’s Guide V 2.5.1The Configure Adaptive Filter Events report page provides

Seite 50 - Address

ReportsX Family LSM User’s Guide V 2.5.1 127whichever is more recent. Data is added when the firewall session is closed; therefore, a large file tran

Seite 51 - Port Scan/Host Sweep Filters

Chapter 5 Events: Logs, Traffic Streams, Reports128 X Family LSM User’s Guide V 2.5.1

Seite 52 - Filter Tuning

6X Family LSM User’s Guide V 2.5.1 129NetworkThe Network section describes IP interfaces, security zones, DHCP functionality, routing, and IP address

Seite 53

Chapter 6 Network130 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “Configuration Overview” on page 1

Seite 54 - Traffic Threshold Filters

Deployment ModesX Family LSM User’s Guide V 2.5.1 131For additional information, see the following topics:• “Deployment Modes” on page 131• “Network

Seite 55 - Traffic Threshold Details

Chapter 6 Network132 X Family LSM User’s Guide V 2.5.1IP addresses, respectively. The LAN security zone is in one broadcast domain while the DM

Seite 56 - Column Definition

Network Port ConfigurationX Family LSM User’s Guide V 2.5.1 133The following figure shows the Port Configuration page:The Port Configuration page pro

Seite 57 - Traffic Threshold Filters

Customer SupportX Family LSM User’s Guide V 2.5.1 xvplease take a moment to gather some basic information from your records and from your system befo

Seite 58

Chapter 6 Network134 X Family LSM User’s Guide V 2.5.1Edit Port ConfigurationSTEP 1 From the LSM menu, select Network > Configuration > N

Seite 59

Security Zone ConfigurationX Family LSM User’s Guide V 2.5.1 135Security Zone ConfigurationA security zone is a section of the network which is assoc

Seite 60 - Action Sets

Chapter 6 Network136 X Family LSM User’s Guide V 2.5.1The Security Zones page provides the following information about each zone:For additional

Seite 61 - Action Set Configurations

Security Zone ConfigurationX Family LSM User’s Guide V 2.5.1 137You can create and edit Security Zones from the Create/Edit Security Zone page. The f

Seite 62 - Default Action Sets

Chapter 6 Network138 X Family LSM User’s Guide V 2.5.1Create or Edit a Security ZoneSTEP 1 From the LSM menu, select Network > Security Zone

Seite 63 - Managing Actions

Security Zone ConfigurationX Family LSM User’s Guide V 2.5.1 139Configure a Security ZoneSTEP 1 From the LSM menu, select Network > Security Zones

Seite 64

Chapter 6 Network140 X Family LSM User’s Guide V 2.5.1IP InterfacesConfiguration OverviewIP interfaces provide the X family device with the int

Seite 65 - Quarantine Action Set

IP InterfacesX Family LSM User’s Guide V 2.5.1 141For additional information, see the following topics:• “Managing IP Interfaces” on page 141• “IP Ad

Seite 66

Chapter 6 Network142 X Family LSM User’s Guide V 2.5.1Manage IP InterfacesSTEP 1 From the LSM menu, select Network > Configuration > Inte

Seite 67 - Action Sets

IP InterfacesX Family LSM User’s Guide V 2.5.1 143For details on configuring the IP address for each type of interface, see the following topics:• “I

Seite 68 - Notification Contacts

About This Guidexvi X Family LSM User’s Guide V 2.5.1

Seite 69 - Notification Contacts

Chapter 6 Network144 X Family LSM User’s Guide V 2.5.1After you have configured the basic options for the internal IP interface, you can manage

Seite 70

IP InterfacesX Family LSM User’s Guide V 2.5.1 145After you have configured the basic options for the internal IP interface, you can manage the secur

Seite 71 - IPS Services

Chapter 6 Network146 X Family LSM User’s Guide V 2.5.1Configure PPTP client on the External IP interfaceSTEP 1 From the LSM menu, select Networ

Seite 72 - IPS Services Page Details

IP InterfacesX Family LSM User’s Guide V 2.5.1 147Configure L2TP client on the External IP interfaceSTEP 1 From the LSM menu, select Network > Con

Seite 73

Chapter 6 Network148 X Family LSM User’s Guide V 2.5.1Configure PPPoE client on the External IP interfaceSTEP 1 From the LSM menu, select Netwo

Seite 74

IP InterfacesX Family LSM User’s Guide V 2.5.1 149Configure a GRE Tunnel to a Remote DeviceSTEP 1 From the LSM menu, select Network > Configuratio

Seite 75 - Preferences

Chapter 6 Network150 X Family LSM User’s Guide V 2.5.1STEP 4From the Security Zone drop-down list, select the zone you want to add to the IP in

Seite 76 - Adaptive Filter Configuration

IP InterfacesX Family LSM User’s Guide V 2.5.1 151Using RIP, the device determines the route for network packets based on the fewest number of hops b

Seite 77 - Click Apply

Chapter 6 Network152 X Family LSM User’s Guide V 2.5.1STEP 7Select one of the following from the Receive mode drop-down list:• Do not receive u

Seite 78

IP Address GroupsX Family LSM User’s Guide V 2.5.1 153The device supports two multicast protocols. You can configure an IP interface with either or b

Seite 79 - Firewall

1X Family LSM User’s Guide V 2.5.1 1System OverviewThe X family device is a high-speed, comprehensive security system with a browser-based manager ca

Seite 80 - Chapter 4 Firewall

Chapter 6 Network154 X Family LSM User’s Guide V 2.5.1IP Address Groups can be used when configuring the following features:• Firewall rules• D

Seite 81

DNSX Family LSM User’s Guide V 2.5.1 155The IP Address Groups page provides the following information about existing groups:Create or Edit IP Address

Seite 82

Chapter 6 Network156 X Family LSM User’s Guide V 2.5.1Obtain DNS Configuration from WAN ConnectionSTEP 1 From the LSM menu, select Network >

Seite 83 - Default Firewall Rules

RoutingX Family LSM User’s Guide V 2.5.1 157RoutingOverviewThe device provides static and dynamic routing which can be managed and configured from th

Seite 84 - Managing Firewall Rules

Chapter 6 Network158 X Family LSM User’s Guide V 2.5.1The following figure shows the Routing Table page:The Network - Routing Table provides th

Seite 85 - Firewall Rules List Details

RoutingX Family LSM User’s Guide V 2.5.1 159Static RoutesA Static Route defines the gateway to use for a particular network. The device supports the

Seite 86

Chapter 6 Network160 X Family LSM User’s Guide V 2.5.1The Static Routes page provides the following information:Create a Static RouteSTEP 1 Fro

Seite 87 - Configuring Firewall Rules

RoutingX Family LSM User’s Guide V 2.5.1 161number of hops between the source and the destination. RIP regularly broadcasts routing information to ot

Seite 88 - Configuration Notes

Chapter 6 Network162 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “Enable RIP Globally” on page 162•

Seite 89

Multicast (IGMP and PIM-DM)X Family LSM User’s Guide V 2.5.1 163For more information on configuring interfaces, see “Enable Bridge Mode on an IP Inte

Seite 90

Chapter 1 System Overview2 X Family LSM User’s Guide V 2.5.1The X family firewall functionality provides service-level, stateful inspection of

Seite 91 - Firewall Services

Chapter 6 Network164 X Family LSM User’s Guide V 2.5.1This following figure shows the IGMP Setup page:On the IGMP Setup page, the IP Interfaces

Seite 92

Multicast (IGMP and PIM-DM)X Family LSM User’s Guide V 2.5.1 165For additional information, see the following topics:• “Enable IGMP Globally” on page

Seite 93

Chapter 6 Network166 X Family LSM User’s Guide V 2.5.1This following figure shows the PIM-DM Setup page:Enable PIM-DM globallySTEP 1 Check Enab

Seite 94 - Configuring Service Groups

Default GatewayX Family LSM User’s Guide V 2.5.1 167Default GatewayThe default gateway is the route to which the device will forward any packet whose

Seite 95 - Schedules

Chapter 6 Network168 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “DHCP Server Page” on page 168• “D

Seite 96

DHCP ServerX Family LSM User’s Guide V 2.5.1 169For additional information, see the following topics: • “Release a DHCP Lease” on page 169• “Configur

Seite 97 - Managing Schedules

Chapter 6 Network170 X Family LSM User’s Guide V 2.5.1Enable and Configure the DHCP ServerSTEP 1 From the LSM menu, select Network > DHCP Se

Seite 98 - Virtual Servers

DHCP ServerX Family LSM User’s Guide V 2.5.1 171DHCP RelayDHCP Relay allows DHCP to operate between a DHCP client on one security zone and a DHCP ser

Seite 99 - Virtual Servers page

Chapter 6 Network172 X Family LSM User’s Guide V 2.5.1Configuring DHCP RelayYou can configure DHCP Relays from the DHCP Relay page (Network >

Seite 100 - Configuring Virtual Servers

DHCP ServerX Family LSM User’s Guide V 2.5.1 173Configure DHCP Relay as a Central DHCP Relay in the Main OfficeSTEP 1 From the LSM menu, select Netwo

Seite 101 - Web Filtering

X Family DeviceX Family LSM User’s Guide V 2.5.1 3usage policy by prohibiting the download of non-work related web sites and offensive or illegal Web

Seite 102 - How Web Filtering Works

Chapter 6 Network174 X Family LSM User’s Guide V 2.5.1Configure the DHCP Relay Mode as Remote VPN Relay AgentSTEP 1 From the LSM menu, select N

Seite 103 - Setting Up Web Filtering

DHCP ServerX Family LSM User’s Guide V 2.5.1 175The following figure shows the DHCP Static Reservations page:The Current Reservations table provides

Seite 104 - Web Filtering Page

Chapter 6 Network176 X Family LSM User’s Guide V 2.5.1Network ToolsThe LSM provides the following network tools:• DNS Lookup — a network tool t

Seite 105 - Parameter Description

Network ToolsX Family LSM User’s Guide V 2.5.1 177DNS LookupUse the DNS Lookup tool to find the IP address for a given DNS name. DNS lookup can be us

Seite 106 - Web Filter Service

Chapter 6 Network178 X Family LSM User’s Guide V 2.5.1From the Traffic Capture page, you can:• View and manage existing packet capture files.To

Seite 107

Network ToolsX Family LSM User’s Guide V 2.5.1 179STEP 4If required, configure any of the following options:• Inter Packet Interval —the number of se

Seite 108 - Custom Filter List

Chapter 6 Network180 X Family LSM User’s Guide V 2.5.1STEP 4Configure any of the following options:• First Hop — you can choose which is the fi

Seite 109 - Parameter/Function

7X Family LSM User’s Guide V 2.5.1 181VPNThe VPN section provides an overview of Virtual Private Networks and describes how they are implemented.Overv

Seite 110 - Configure URL Patterns

Chapter 7 VPN182 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “About VPN” on page 182• “IPSec Config

Seite 111 - Value Description

About VPNX Family LSM User’s Guide V 2.5.1 183• Authentication establishes the identity of a remote user or device to verify that they have permissio

Seite 112 - URL Test

3Com Corporation 350 Campus Drive Marlborough, MA 01752-3064Copyright © 2005–2007, 3Com Corporation and its subsidiaries. All rights reserved. No par

Seite 113 - Streams, Reports

Chapter 1 System Overview4 X Family LSM User’s Guide V 2.5.1When the X family device is installed and configured, it protects your network zone

Seite 114 - Overview

Chapter 7 VPN184 X Family LSM User’s Guide V 2.5.1STEP 3For client-to-site VPNs, determine whether you will use the PPTP, L2TP, or L2TP over IP

Seite 115 - Alert Log

IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 185The following figure shows the IPSec Status page:From this page, you can complete the followi

Seite 116 - Audit Log

Chapter 7 VPN186 X Family LSM User’s Guide V 2.5.1Status The current status of the connection:Phase 1: Idle — Phase 1 negotiation has not start

Seite 117 - IPS Block Log

IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 187IPSec ConfigurationUse the IPSec Configuration page (VPN > IPSec Status, IPSec Configurati

Seite 118 - Firewall Block Log

Chapter 7 VPN188 X Family LSM User’s Guide V 2.5.1IPSec Configuration Parameters and IP Security Association DetailsThe following table describ

Seite 119 - Firewall Session Log

IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 189Enable and Configure IPSec Global SettingsSTEP 1 From the LSM menu, select VPN > IPSec Sta

Seite 120 - Configuration

Chapter 7 VPN190 X Family LSM User’s Guide V 2.5.1STEP 1 IPSec Security Association Setup — configure the Peer ID address, terminated security

Seite 121 - System Log

IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 191Terminated Security Zone Select the remote security zone on which to terminate the VPN from t

Seite 122 - Managing Logs

Chapter 7 VPN192 X Family LSM User’s Guide V 2.5.1Manual Setup: These configuration parameters are available if Manual is selected as the Keyin

Seite 123 - Downloading a Log

IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 193Tunnel SetupLocal Networks Select one of the following methods to determine what local traffi

Seite 124 - Resetting a log

2X Family LSM User’s Guide V 2.5.1 5LSM NavigationLSM Navigation describes the LSM interface, how to log in, and the general sections of the applicati

Seite 125 - Searching a Log

Chapter 7 VPN194 X Family LSM User’s Guide V 2.5.1For details on configuring IPSec Security Associations, see the following topics:• “IPSec Sec

Seite 126 - Managed Streams

IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 195STEP 7Click Save to save the configuration.Click Cancel to return to the IPSec Configuration

Seite 127 - Field Description

Chapter 7 VPN196 X Family LSM User’s Guide V 2.5.1The same pre-shared key must be configured on the remote device establishing a VPN tunnel wit

Seite 128 - Rate Limited Streams

IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 197STEP AIn the Tunnel Setup, check Enable IPSec Tunnel connections.STEP BIn the Local Networks

Seite 129 - Quarantined Addresses

Chapter 7 VPN198 X Family LSM User’s Guide V 2.5.1Click Cancel to return to the IPSec Configuration page without saving the changes.IKE Proposa

Seite 130 - Column Description

IKE ProposalX Family LSM User’s Guide V 2.5.1 199The following figure shows the IKE Proposals summary page.From this page you can complete the follow

Seite 131

Chapter 7 VPN200 X Family LSM User’s Guide V 2.5.1Configuring IKE ProposalsIKE proposals provide the authentication and encryption methods that

Seite 132 - • Performance/Throughput

IKE ProposalX Family LSM User’s Guide V 2.5.1 201The following figure shows the Create/Edit IKE Proposal page:For additional information, see the fol

Seite 133 - Device Health

Chapter 7 VPN202 X Family LSM User’s Guide V 2.5.1IKE Proposal Configuration Parameters: Phase 1 and 2The following table describe the IKE Phas

Seite 134 - Module Health

IKE ProposalX Family LSM User’s Guide V 2.5.1 203Lifetime Specify the length of time the security association remains valid before new authentication

Seite 135 - Table 5–13: Module Health

Chapter 2 LSM Navigation6 X Family LSM User’s Guide V 2.5.1In addition, you can configure the LSM to communicate using either an HTTP or an HTT

Seite 136 - Port Health

Chapter 7 VPN204 X Family LSM User’s Guide V 2.5.1Options: Enable Aggressive ModeTo enable Aggressive mode, check Enable Aggressive Mode. Aggre

Seite 137 - Reports

IKE ProposalX Family LSM User’s Guide V 2.5.1 205Delete Phase 2 SA when Phase 1 SA terminatesCheck this option to delete all Phase 2 security associa

Seite 138 - Attack Reports

Chapter 7 VPN206 X Family LSM User’s Guide V 2.5.1Configure Phase 1 Setup Parameters for an IKE ProposalThe values specified for Phase 1 IKE ne

Seite 139 - Traffic Reports

IKE ProposalX Family LSM User’s Guide V 2.5.1 207STEP 9If you are using Pre-Shared Key with Aggressive Mode:•From the Local ID Type drop-down list, s

Seite 140 - Update report data

Chapter 7 VPN208 X Family LSM User’s Guide V 2.5.1STEP 3To provide enhanced security, check Enable Perfect Forward Secrecy, and then select the

Seite 141 - Quarantine Report

L2TP ConfigurationX Family LSM User’s Guide V 2.5.1 209The following figure shows the L2TP Status page:From this page, you can complete the following

Seite 142 - Firewall Reports

Chapter 7 VPN210 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “L2TP Server Configuration” on page 21

Seite 143

L2TP ConfigurationX Family LSM User’s Guide V 2.5.1 211L2TP ConfigurationEnable L2TP Server and Configure L2TP Client and AddressesEnable L2TP Server

Seite 144

Chapter 7 VPN212 X Family LSM User’s Guide V 2.5.1STEP 7To configure your DNS Servers, either:•Select Device Acts as DNS Relay if you want the

Seite 145

PPTP ConfigurationX Family LSM User’s Guide V 2.5.1 213From this page, you can complete the following tasks:• View current PPTP connections on the de

Seite 146 - Configuration Overview

Logging InX Family LSM User’s Guide V 2.5.1 7STEP 2Enter your Username.STEP 3Enter your PasswordSTEP 4 Click Log On.The LSM validates your account in

Seite 147 - Deployment Modes

Chapter 7 VPN214 X Family LSM User’s Guide V 2.5.1The following figure shows the PPTP Server Configuration page:PPTP Server Configuration Param

Seite 148 - Network Port Configuration

PPTP ConfigurationX Family LSM User’s Guide V 2.5.1 215Enable PPTP Server and Configure PPTP Client and AddressesSTEP 1 If you are not using RADIUS t

Seite 149 - Port Configuration Tasks

Chapter 7 VPN216 X Family LSM User’s Guide V 2.5.1

Seite 150 - Chapter 6 Network

8X Family LSM User’s Guide V 2.5.1 217SystemThe System menu provides options to update and manage TOS and Digital Vaccine packages, configure timekeep

Seite 151 - Security Zone Configuration

Chapter 8 System218 X Family LSM User’s Guide V 2.5.1For details, see the following sections:• “Update TOS and Digital Vaccine Software” on pag

Seite 152 - Preconfigured Zones Ports

Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 219The following figure shows the Update page.For additional information, se

Seite 153 - Security Zone Configuration

Chapter 8 System220 X Family LSM User’s Guide V 2.5.1Rolling Back to a Previous TOS VersionA rollback operation reverts the currently running s

Seite 154

Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 221Perform a Software RollbackSTEP 1 On the Update page in the Current Insta

Seite 155

Chapter 8 System222 X Family LSM User’s Guide V 2.5.1For additional information, see the following:• “Updating the Digital Vaccine (Filters)” o

Seite 156 - IP Interfaces

Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 223When you select the check box, the scheduling fields appear so you can es

Seite 157 - Managing IP Interfaces

Chapter 2 LSM Navigation8 X Family LSM User’s Guide V 2.5.1LSM Screen LayoutThe LSM provides features in two main areas of the browser window:•

Seite 158

Chapter 8 System224 X Family LSM User’s Guide V 2.5.1MB. If the update package that you downloaded is smaller than <number>, proceed to S

Seite 159 - IP Interfaces

Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 225During a graceful shutdown, as during an update or reboot (in the LSM or

Seite 160

Chapter 8 System226 X Family LSM User’s Guide V 2.5.1STEP 1 If necessary, download a software update package from TMC.STEP 2From the LSM menu,

Seite 161

Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 227System SnapshotsFrom the System Snapshots page, you can create, manage, r

Seite 162

Chapter 8 System228 X Family LSM User’s Guide V 2.5.1The following figure shows the System Snapshots page:Figure 8–2: System: System Snapshots

Seite 163

Time OptionsX Family LSM User’s Guide V 2.5.1 229Import a SnapshotSTEP 1 From the LSM menu, select System > Update. Then, click the System Snapsho

Seite 164 - Configuring a GRE Tunnel

Chapter 8 System230 X Family LSM User’s Guide V 2.5.1Use the Time Options page (System > Configuration > Time Options) to configure the t

Seite 165

Time OptionsX Family LSM User’s Guide V 2.5.1 231Internal CMOS ClockSet the Internal CMOS Clock TimeSTEP 1 From the LSM, select System > Configura

Seite 166 - RIP for IP Interfaces

Chapter 8 System232 X Family LSM User’s Guide V 2.5.1Configure the X family device for NTP ServersSTEP 1 From the LSM menu, select System >

Seite 167 - RIPv2 Configuration Settings

SMS/NMSX Family LSM User’s Guide V 2.5.1 233From an NMS, you can remotely monitor the events and system status of the X family device. Configuring an

Seite 168

LSM Screen LayoutX Family LSM User’s Guide V 2.5.1 9Main Menu BarThe dark blue bar at the top of the LSM screen provides quick access to basic logon

Seite 169 - IP Address Groups

Chapter 8 System234 X Family LSM User’s Guide V 2.5.1The following figure shows the Configure - SMS and NMS page:Figure 8–4: Configure - SMS an

Seite 170

High AvailabilityX Family LSM User’s Guide V 2.5.1 235STEP 4 Click Apply.View or Configure NMS InformationSTEP 1 From the LSM menu, select System >

Seite 171

Chapter 8 System236 X Family LSM User’s Guide V 2.5.1How High Availability WorksThe following sections describe how high availability works in

Seite 172 - Default Gateway

High AvailabilityX Family LSM User’s Guide V 2.5.1 237PollingThe High Availability function provides an optional polling feature that can be configur

Seite 173 - Routing Table

Chapter 8 System238 X Family LSM User’s Guide V 2.5.1You can configure and manage High Availability from the High Availability page available f

Seite 174

Thresholds to Monitor Memory and Disk UsageX Family LSM User’s Guide V 2.5.1 239STEP AOn the High Availability page in the Communication Channel tab

Seite 175 - Static Routes

Chapter 8 System240 X Family LSM User’s Guide V 2.5.1You can specify the following settings for the disk and memory thresholds:• Major Level —

Seite 176 - RIP Setup

Email ServerX Family LSM User’s Guide V 2.5.1 241Email ServerThe X family device can be configured to send an email message when an IPS filter is tri

Seite 177 - Routing

Chapter 8 System242 X Family LSM User’s Guide V 2.5.1STEP 7Click Apply.STEP 8 Click Test E m a i l to verify your configuration settings.For

Seite 178

Setup WizardX Family LSM User’s Guide V 2.5.1 243You can also setup the X family devices from an ssh command line using the CLI setup wizard. The CLI

Seite 179 - Multicast (IGMP and PIM-DM)

Chapter 2 LSM Navigation10 X Family LSM User’s Guide V 2.5.1NavigationYou can access the available features of the LSM by selecting an option f

Seite 180

Chapter 8 System244 X Family LSM User’s Guide V 2.5.1

Seite 181 - PIM-DM Setup

9X Family LSM User’s Guide V 2.5.1 245AuthenticationThe Authentication section describes how to create and manage users accounts and configure the Pri

Seite 182

Chapter 9 Authentication246 X Family LSM User’s Guide V 2.5.1OverviewThe LSM Authentication menu pages enable Administrators to create and mana

Seite 183 - DHCP Server

User ListX Family LSM User’s Guide V 2.5.1 247TOS and Local User AccountsThe X family device has two types of user accounts:A TOS User account provid

Seite 184 - DHCP Server Page

Chapter 9 Authentication248 X Family LSM User’s Guide V 2.5.1Username and Password RequirementsRestrictions on username and password values for

Seite 185 - Configure DHCP Server

User ListX Family LSM User’s Guide V 2.5.1 249Managing User Accounts From the User List menu, you can complete the following tasks:• Create an accoun

Seite 186

Chapter 9 Authentication250 X Family LSM User’s Guide V 2.5.1Create a New User Account in the TOS Authentication DatabaseSTEP 1 From the LSM me

Seite 187 - DHCP Relay

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 251See “Username and Password R

Seite 188 - Configuring DHCP Relay

Chapter 9 Authentication252 X Family LSM User’s Guide V 2.5.1STEP 1 A user logs on to the device to gain access to network resources.To access

Seite 189

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 253You may choose to use RADIUS

Seite 190 - Static Reservations

LSM Screen LayoutX Family LSM User’s Guide V 2.5.1 11Content and FunctionalityThe LSM displays all data in the central area of the browser window. As

Seite 191

Chapter 9 Authentication254 X Family LSM User’s Guide V 2.5.1The following figures shows the Privilege Groups page.Privilege Group Parameter De

Seite 192 - Network Tools

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 255STEP 3On the Create/Edit Pri

Seite 193 - Traffic Capture

Chapter 9 Authentication256 X Family LSM User’s Guide V 2.5.1own CA server or use a third-party organization for creating certificates. The sam

Seite 194

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 257CA CertificatesCA Certificat

Seite 195 - Traceroute

Chapter 9 Authentication258 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “X.509 Certificates” on pag

Seite 196

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 259Certificate Revocation Lists

Seite 197

Chapter 9 Authentication260 X Family LSM User’s Guide V 2.5.1Configure CRL Parameters for a CA CertificateSTEP 1 From the LSM menu, select Auth

Seite 198 - About VPN

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 261The following figure shows t

Seite 199 - VPN Configuration Overview

Chapter 9 Authentication262 X Family LSM User’s Guide V 2.5.1Managing Certificate RequestsYou can perform the following managment functions fro

Seite 200 - IPSec Configuration

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 263STEP A In the DN Attribute

Seite 201 - IPSec Status Details

Chapter 2 LSM Navigation12 X Family LSM User’s Guide V 2.5.1System Summary The System Summary page automatically displays when you first log on

Seite 202 - Chapter 7 VPN

Chapter 9 Authentication264 X Family LSM User’s Guide V 2.5.1The device uses PKCS#12 format for importing Local Certificates with their private

Seite 203

How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 265For additional information,

Seite 204

Chapter 9 Authentication266 X Family LSM User’s Guide V 2.5.1STEP 4Type the Local Certificate File path and filename for the signed local certi

Seite 205 - IPSec Configuration

PreferencesX Family LSM User’s Guide V 2.5.1 267The following figure shows the Preferences page used to configure LSM user security settings: Prefere

Seite 206

Chapter 9 Authentication268 X Family LSM User’s Guide V 2.5.1TOS User PreferencesSecurity Level Determines the length and complexity requiremen

Seite 207

PreferencesX Family LSM User’s Guide V 2.5.1 269Set User PreferencesSTEP 1 From the LSM menu, select Authentication > Preferences.The Preferences

Seite 208

Chapter 9 Authentication270 X Family LSM User’s Guide V 2.5.1

Seite 209

A=1AX Family LSM User’s Guide V 2.5.1 271Browser CertificatesDetails creating browser certificates for use in Internet Explorer to ensure notification

Seite 210

Appendix A Browser Certificates272 X Family LSM User’s Guide V 2.5.1Client Authentication MessageThe X family device uses the same HTTPS channe

Seite 211

Security AlertX Family LSM User’s Guide V 2.5.1 273STEP 1 Open Microsoft Internet Explorer (version 6.0 or later).STEP 2Select Tool s > Internet

Seite 212

System SummaryX Family LSM User’s Guide V 2.5.1 13Packet StatsThe Packet Stats section provides basic traffic statistics including the following:• Re

Seite 213

Appendix A Browser Certificates274 X Family LSM User’s Guide V 2.5.1Certificate AuthorityThe following dialog warning displays for a certificat

Seite 214 - IKE Proposal

Security AlertX Family LSM User’s Guide V 2.5.1 275STEP 3Select the Root Authority. Click View Certificate.STEP 4The Certificate Import Wizard opens.

Seite 215 - IKE Proposal Details

Appendix A Browser Certificates276 X Family LSM User’s Guide V 2.5.1The Certificate Store dialog displays.STEP 5Select the Place all certificat

Seite 216 - Configuring IKE Proposals

Security AlertX Family LSM User’s Guide V 2.5.1 277STEP 6Click Finish to install the certificate. The Root Certificate Store indicates the status of

Seite 217 - IKE Proposal

Appendix A Browser Certificates278 X Family LSM User’s Guide V 2.5.1STEP 1 When the warning displays, click View Certificate. The Certificate d

Seite 218

Example - Creating Personal CertificateX Family LSM User’s Guide V 2.5.1 279STEP 5When browsing to the X family device, enter the workstation name in

Seite 219

Appendix A Browser Certificates280 X Family LSM User’s Guide V 2.5.1

Seite 220

BX Family LSM User’s Guide V 2.5.1 281Web Filter ServiceDetailed information about the Filter Service subscription service used to control access to w

Seite 221

Appendix B Web Filter Service282 X Family LSM User’s Guide V 2.5.1Core CategoriesCore Categories are used to classify web sites that contain off

Seite 222

X Family LSM User’s Guide V 2.5.1 283a public or private agency that provides educational information on drug use.GamblingThis Core category includes

Seite 223

ContentsX Family LSM User’s Guide V 2.5.1 iiiContentsAbout This Guide xiTarget Audience xiKnowledge, Skills, and Abilities xiConventions xiiCross

Seite 224 - L2TP Configuration

Chapter 2 LSM Navigation14 X Family LSM User’s Guide V 2.5.1For more detailed information about these logs, select Events > Logs.Product Spe

Seite 225 - L2TP Status Page Details

Appendix B Web Filter Service284 X Family LSM User’s Guide V 2.5.1WeaponsThis Core Category includes sites on the following topics:• Instruction

Seite 226 - L2TP Server Configuration

X Family LSM User’s Guide V 2.5.1 285Advertisement•Banner Ad Servers • Pop-Up advertisements •Adware Arts & Entertainment• Museums, galleries, art

Seite 227 - L2TP Configuration

Appendix B Web Filter Service286 X Family LSM User’s Guide V 2.5.1Finance & Investment• Web sites that provide stock quotes, stock tickers a

Seite 228 - PPTP Configuration

X Family LSM User’s Guide V 2.5.1 287Hobbies & Recreation• Recreational pastimes such as collecting, gardening, kit airplanes • Outdoor recreation

Seite 229 - PPTP Server Configuration

Appendix B Web Filter Service288 X Family LSM User’s Guide V 2.5.1Photo Searches• Sites that provide resources for photo and image searches • On

Seite 230

X Family LSM User’s Guide V 2.5.1 289ShoppingThis Productivity category includes sites on the following topics:• Internet malls and online auctions.•

Seite 231 - PPTP Configuration

Appendix B Web Filter Service290 X Family LSM User’s Guide V 2.5.1Each license allows one year of filtering for a specific X family product. Lic

Seite 232

CX Family LSM User’s Guide V 2.5.1 291Log Formats and System MessagesDetails the formats of the downloadable logs and system update status messages.Ov

Seite 233

Appendix C Log Formats and System Messages292 X Family LSM User’s Guide V 2.5.1Log FormatsIn the LSM, you can view all the logs in the GUI. In a

Seite 234 - Chapter 8 System

Log FormatsX Family LSM User’s Guide V 2.5.1 293Comp Software component that generated the message:•ALT = Alert Log•BLK = IPS Block LogMessage (Contai

Seite 235

3X Family LSM User’s Guide V 2.5.1 15IPS FilteringLSM Navigation describes the LSM interface, how to log in, and the general sections of the applicati

Seite 236 - Persistent Settings

Appendix C Log Formats and System Messages294 X Family LSM User’s Guide V 2.5.1Audit Log FormatAn example of a comma-delimited Audit Log entry f

Seite 237

Log FormatsX Family LSM User’s Guide V 2.5.1 295Entry_time Date and time of event. YYYY-MM-DD 24H:MI:SSAccess The access-level of the user performing

Seite 238

Appendix C Log Formats and System Messages296 X Family LSM User’s Guide V 2.5.1Firewall Block Log FormatAn example of a comma-delimited Firewall

Seite 239

Log FormatsX Family LSM User’s Guide V 2.5.1 297Message(cont.)Destination IP The destination IP address and port for the session. This represents the

Seite 240 - Updating the TOS Software

Appendix C Log Formats and System Messages298 X Family LSM User’s Guide V 2.5.1The fields in this table are populated depending on the event bei

Seite 241

Log FormatsX Family LSM User’s Guide V 2.5.1 299VPN Log FormatAn example of a comma-delimited VPN Log entry follows:17,2006-10-05 17:12:31,INFO,VPN,&q

Seite 242

Appendix C Log Formats and System Messages300 X Family LSM User’s Guide V 2.5.1System Log FormatAn example of a comma-delimited System Log entry

Seite 243 - System Snapshots

Remote Syslog Log FormatX Family LSM User’s Guide V 2.5.1 301Remote Syslog Log Format The remote syslog format for the Alert, IPS Block, and the Firew

Seite 244

Appendix C Log Formats and System Messages302 X Family LSM User’s Guide V 2.5.1High Availability Log MessagesThe High Availability mechanism log

Seite 245 - Time Options

System Update Status MessagesX Family LSM User’s Guide V 2.5.1 303System Update Status MessagesThe LSM provides update status on the progress of the u

Seite 246 - Figure 8–3: Time Options Page

Chapter 3 IPS Filtering16 X Family LSM User’s Guide V 2.5.1The default security profile is set to the ANY ==> ANY security zone pair with al

Seite 247 - NTP Server

Appendix C Log Formats and System Messages304 X Family LSM User’s Guide V 2.5.1If an error occurs, the information changes. The state displays a

Seite 248 - Time Zones

DX Family LSM User’s Guide V 2.5.1 305Device Maximum ValuesDetails the maximum values for X family devices.The following table give the maximum values

Seite 249 - SMS/NMS

Appendix B Device Maximum Values306 X Family LSM User’s Guide V 2.5.1NetworkIP Address Groups 25 200Entries per IP Address Group 50 200Virtual I

Seite 250

FX Family LSM User’s Guide V 2.5.1 307Glossaryaction setAn integral part of an attack or peer-to-peer filter, action sets determine what the X family

Seite 251 - High Availability

Glossary308 X Family LSM User’s Guide V 2.5.1Application ProtectionCategory of filter types that defend against known and unknown exploits that

Seite 252 - How High Availability Works

X Family LSM User’s Guide V 2.5.1 309Digital Vaccine FiltersDigital Vaccine Filters block attacks and other malicious traffic from the network. Filt

Seite 253

Glossary310 X Family LSM User’s Guide V 2.5.1IKE (Internet Key Exchange)Internet Key Exchange (IKE) is used to negotiate the keying material tha

Seite 254

X Family LSM User’s Guide V 2.5.1 311Network Equipment filtersFilters that detect and block the malicious attacks that target equipment accessible th

Seite 255

Glossary312 X Family LSM User’s Guide V 2.5.1attack has gathered data by probing your system and scanning your network, it continues with pointe

Seite 256

X Family LSM User’s Guide V 2.5.1 313Streaming Media filtersStreaming Media filters detect and control traffic from Streaming Media applications that

Seite 257 - Email Server

Security ProfilesX Family LSM User’s Guide V 2.5.1 17Security ProfilesOn the X family device, Security Profiles are used to apply DV filter policies.

Seite 258 - Setup Wizard

Glossary314 X Family LSM User’s Guide V 2.5.1

Seite 259

X Family LSM User’s Guide V 2.5.1 315Aaccess level, user 247action set 307action sets 44Block 45Block + Notify 45Block + Notify + Trace 45

Seite 260

316 X Family LSM User’s Guide V 2.5.1warning xiiirelated documentation xivscreen captures xiiiHhealthAuto Refresh option 267module 118p

Seite 261 - Authentication

X Family LSM User’s Guide V 2.5.1 317resetfilters 35packet statistics 13TCP 45RIP, definition of 312role, user 247rollbackstates, messages

Seite 262 - User List

Chapter 3 IPS Filtering18 X Family LSM User’s Guide V 2.5.1In Example 2, a packet going from the LAN zone to the WAN zone matches Security Prof

Seite 263 - TOS User Security Level

Security ProfilesX Family LSM User’s Guide V 2.5.1 19Managing Security ProfilesUse the Security Profiles page (IPS > Security Profiles) to create

Seite 264

Chapter 3 IPS Filtering20 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “Security Profile Details” on

Seite 265 - Managing User Accounts

Security ProfilesX Family LSM User’s Guide V 2.5.1 21For additional information, see the following topics:• “Create a Security Profile” on page 21• “

Seite 266

Chapter 3 IPS Filtering22 X Family LSM User’s Guide V 2.5.1Settings table, change the global State or Action for a filter Category Group if req

Seite 267

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 23IPS Digital Vaccine (DV) FiltersTippingPoint IPS Digital Vaccine (DV) Filters are

Seite 268 - Chapter 9 Authentication

Contentsiv X Family LSM User’s Guide V 2.5.1 Tabbed Menu Options 11System Summary 12System Status 12Health 12Packet Stats 13Network DHCP 1

Seite 269 - Privilege Groups

Chapter 3 IPS Filtering24 X Family LSM User’s Guide V 2.5.1Filter ComponentsIPS filters have the following components which determine the ident

Seite 270

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 25Filter Override SettingsFor the best system performance, we recommend that you us

Seite 271 - X.509 Certificates

Chapter 3 IPS Filtering26 X Family LSM User’s Guide V 2.5.1View DV FiltersYou can view and manage filters configured for a Security Profile usi

Seite 272

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 27Filter SearchFilter search provides options to view all filters or only those mat

Seite 273 - CA Certificates

Chapter 3 IPS Filtering28 X Family LSM User’s Guide V 2.5.1Filter List DetailsThe following table describes the information and functions avail

Seite 274

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 29For details on viewing filters on the Filter List page, see the following topics:

Seite 275

Chapter 3 IPS Filtering30 X Family LSM User’s Guide V 2.5.1installed on your network. From the LSM, you can modify the filter configuration for

Seite 276 - Certificate Requests

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 31The following figure shows the Category Settings table.Click Show Advanced Option

Seite 277

Chapter 3 IPS Filtering32 X Family LSM User’s Guide V 2.5.1Edit Individual Filter SettingsSTEP 1 From the LSM menu, click Security Profiles.STE

Seite 278 - Managing Certificate Requests

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 33On the View Filter page, you can also add or remove the filter from Security Prof

Seite 279 - Local Certificates

ContentsX Family LSM User’s Guide V 2.5.1 vManaging Firewall Rules 68Configuring Firewall Rules 71Firewall Services 75Firewall Services Page Field

Seite 280

Chapter 3 IPS Filtering34 X Family LSM User’s Guide V 2.5.1Configure Filter Limits/Exceptions based on IP Address Limits and exceptions allow y

Seite 281

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 35STEP 4In the Application Protection Filter Setting Exceptions section, specify th

Seite 282 - Preferences

Chapter 3 IPS Filtering36 X Family LSM User’s Guide V 2.5.1The Port Scan/Host Sweep Filters (Filter numbers 7000- 7004) available in the Applic

Seite 283 - Preferences Parameter Details

IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 37STEP 3Locate the Port Scan/Host Sweep filters:STEP AClick Search Filters. Then,

Seite 284

Chapter 3 IPS Filtering38 X Family LSM User’s Guide V 2.5.1Traffic Threshold FiltersTraffic threshold filters alert you and the device when net

Seite 285

Traffic Threshold FiltersX Family LSM User’s Guide V 2.5.1 39Managing Traffic Threshold FiltersYou can manage Traffic Threshold filters from the Traf

Seite 286

Chapter 3 IPS Filtering40 X Family LSM User’s Guide V 2.5.1Units The number of selected units per second. The unit values include packets, byte

Seite 287 - Browser Certificates

Traffic Threshold FiltersX Family LSM User’s Guide V 2.5.1 41Create or Edit a Traffic Threshold FilterUse the Create or Edit Traffic Threshold Filter

Seite 288 - Client Authentication Message

Chapter 3 IPS Filtering42 X Family LSM User’s Guide V 2.5.1Traffic Threshold Configuration ParametersThe following table describes the Traffic

Seite 289 - Security Alert

Traffic Threshold FiltersX Family LSM User’s Guide V 2.5.1 43Configure a Traffic Threshold FilterSTEP 1 From the LSM menu, select IPS > Traffic Th

Seite 290 - Certificate Authority

Contentsvi X Family LSM User’s Guide V 2.5.1 Memory and Disk Usage 117Module Health 118Performance/Throughput 120Port Health 120Reports 121

Seite 291 - Security Alert

Chapter 3 IPS Filtering44 X Family LSM User’s Guide V 2.5.1STEP DFor Below Normal Minor, select the Enabled check box, enter a percentage amou

Seite 292

Action SetsX Family LSM User’s Guide V 2.5.1 45in the action set. For example, the user can display a Quarantine web page to notify the user of the p

Seite 293 - Invalid Certificate Name

Chapter 3 IPS Filtering46 X Family LSM User’s Guide V 2.5.1Default Action SetsThe X family device is pre-configured with a collection of defaul

Seite 294 - Figure A–11: HOSTS File

Action SetsX Family LSM User’s Guide V 2.5.1 47Managing ActionsUse the Action Sets page to review, create and modify Action Sets. The following figur

Seite 295

Chapter 3 IPS Filtering48 X Family LSM User’s Guide V 2.5.1Configure an Action SetSTEP 1 From the LSM menu, select IPS > Action Sets. The IP

Seite 296

Action SetsX Family LSM User’s Guide V 2.5.1 49STEP 6Choose one or more Contacts by checking the box next to the appropriate Contact Name. If there a

Seite 297

Chapter 3 IPS Filtering50 X Family LSM User’s Guide V 2.5.1For additional information on configuring Quarantine Action Sets, see the following

Seite 298 - Core Categories

Action SetsX Family LSM User’s Guide V 2.5.1 51Configure a Quarantine Action SetSTEP 1 From the LSM menu, click Action Sets. STEP 2On the Action Sets

Seite 299 - Violence

Chapter 3 IPS Filtering52 X Family LSM User’s Guide V 2.5.1STEP AIn the Allow quarantined hosts to access the following IP address(es) table,

Seite 300 - Productivity Categories

Notification ContactsX Family LSM User’s Guide V 2.5.1 53minute timer starts. The device sends e-mail notifications until the threshold is reached. A

Seite 301 - Education

ContentsX Family LSM User’s Guide V 2.5.1 viiMulticast (IGMP and PIM-DM) 163IGMP Setup 163PIM-DM Setup 165Default Gateway 167 DHCP Server 167Over

Seite 302 - Appendix B Web Filter Service

Chapter 3 IPS Filtering54 X Family LSM User’s Guide V 2.5.1Configure the Remote System Log ContactSTEP 1 From the LSM menu, select IPS > Act

Seite 303

IPS ServicesX Family LSM User’s Guide V 2.5.1 55You cannot delete a Notification Contact if it is currently configured on an Action Set.STEP 3On the

Seite 304

Chapter 3 IPS Filtering56 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “IPS Services Page Details” o

Seite 305

PreferencesX Family LSM User’s Guide V 2.5.1 57PreferencesUse the IPS Preferences page (IPS > Preferences) to configure settings related to the Th

Seite 306 - Free 14-day Trial Period

Chapter 3 IPS Filtering58 X Family LSM User’s Guide V 2.5.1Configure Threat Suppression Engine (TSE)On the IPS Preferences page, configure glob

Seite 307 - Log Formats and System

PreferencesX Family LSM User’s Guide V 2.5.1 59Configure Global Settings for the TSESTEP 1 From the LSM menu, select IPS > Preferences.STEP 2On th

Seite 308 - Log Formats

Chapter 3 IPS Filtering60 X Family LSM User’s Guide V 2.5.1Adaptive Filter ConfigurationYou can configure the global settings for the Adaptive

Seite 309

PreferencesX Family LSM User’s Guide V 2.5.1 61STEP 3 Select the Log Severity of the system log message that is automatically generated when a filter

Seite 310 - Audit Log Format

Chapter 3 IPS Filtering62 X Family LSM User’s Guide V 2.5.1

Seite 311 - Field Name Description

4X Family LSM User’s Guide V 2.5.1 63FirewallThe Firewall section describes how to enable, disable, and modify firewall rules and various features usi

Seite 312 - Firewall Block Log Format

Contentsviii X Family LSM User’s Guide V 2.5.1 Updating the TOS Software 224System Snapshots 227Time Options 229Internal CMOS Clock 231NTP S

Seite 313

Chapter 4 Firewall64 X Family LSM User’s Guide V 2.5.1You can view and manage Firewall Rules and configuration options from the Firewall menu p

Seite 314 - Firewall Session Log Format

How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 65STEP 1 The user starts a web browser. The web browser resolves the DNS name fo

Seite 315 - VPN Log Format

Chapter 4 Firewall66 X Family LSM User’s Guide V 2.5.1The firewall rule table is searched from the top of the table to the end (if necessary) l

Seite 316 - System Log Format

How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 67For additional information on setting up firewall rules, see the following top

Seite 317 - Remote Syslog Log Format

Chapter 4 Firewall68 X Family LSM User’s Guide V 2.5.1The default firewall rules configured for the this-device zone use the LAN security zone.

Seite 318

How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 69The following figure shows the Firewall Rules page.You can complete the follow

Seite 319 - System Update Status Messages

Chapter 4 Firewall70 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “Firewall Rules List Details” on p

Seite 320

How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 71Configuring Firewall RulesWhen configuring a firewall rules, you must define t

Seite 321 - Device Maximum

Chapter 4 Firewall72 X Family LSM User’s Guide V 2.5.1the device. If a local user has not been authenticated, the rule is ignored and lower pri

Seite 322 - Parameter X5 X506

How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 73STEP GTo record sessions matching this firewall rule in the Firewall Session L

Seite 323 - Glossary

ContentsX Family LSM User’s Guide V 2.5.1 ixSecurity Alert 273Certificate Authority 274Invalid Certificate Name 277Example - Creating Personal Cert

Seite 324

Chapter 4 Firewall74 X Family LSM User’s Guide V 2.5.1To control the rate of traffic flow between zones, configure bandwidth management as foll

Seite 325

How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 75STEP 3On the Edit Firewall Rule page in the Firewall Rule Setup table, click t

Seite 326

Chapter 4 Firewall76 X Family LSM User’s Guide V 2.5.1Service and Service Groups have been configured, you can assign them to firewall rules or

Seite 327

How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 77Firewall Services Page Field DescriptionsThe following table describes the fie

Seite 328 - X family device

Chapter 4 Firewall78 X Family LSM User’s Guide V 2.5.1•From the Ty p e drop-down list, select the service type. Protocol types supported a r e

Seite 329

SchedulesX Family LSM User’s Guide V 2.5.1 79STEP 4For each service you want to add to the group, select the service from the Service drop-down list.

Seite 330

Chapter 4 Firewall80 X Family LSM User’s Guide V 2.5.1You can apply the same schedule to as many firewall rules as required. For device maximum

Seite 331

SchedulesX Family LSM User’s Guide V 2.5.1 81For additional information, see the following topics:• “Add or Edit a Schedule” on page 81• “Delete Days

Seite 332

Chapter 4 Firewall82 X Family LSM User’s Guide V 2.5.1STEP 5Click Save/Create.Click Cancel to return to the Firewall - Schedules page without s

Seite 333

Virtual ServersX Family LSM User’s Guide V 2.5.1 83Virtual Servers pageUse the Virtual Servers page (Firewall > Virtual Servers) to view and confi

Kommentare zu diesen Handbüchern

Keine Kommentare