Planet-technology MH-2001 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Hardware Planet-technology MH-2001 herunter. Planet Technology MH-2001 User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 297
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - MH-2001

MH-2001 Multi-Homing Security Gateway User’s Manual Multi-Homing Security Gateway MH-2001 User’s Manual

Seite 2

MH-2001 Multi-Homing Security Gateway User’s Manual 1.5 Specification Product Multi-Homing Security Gateway Model MH-2001 Hardware LAN 1 x 10/100Mb

Seite 3

MH-2001 Multi-Homing Security Gateway User’s Manual 6.6.2 Script Blocking To let Popup, ActiveX, Java, or Cookies in or keep them out. Step 1. Click C

Seite 4 - Table of Contents

MH-2001 Multi-Homing Security Gateway User’s Manual - 95 -6.6.3 Download Blocking Step 1. Click Content Blocking in the menu. Step 2. Select Downl

Seite 5

MH-2001 Multi-Homing Security Gateway User’s Manual - 96 -6.6.4 Upload Blocking Step 1. Click Content Blocking in the menu. Step 2. Select Upload

Seite 6

MH-2001 Multi-Homing Security Gateway User’s Manual 6.7 IM/P2P Blocking Restrict the Internal Users to access to the file on Internet by IM and P2P so

Seite 7 - Chapter 1: Introduction

MH-2001 Multi-Homing Security Gateway User’s Manual 6.8 Virtual Server MH-2001 separates an enterprise’s Intranet and Internet into LAN networks and W

Seite 8 - 1.3 MH-2001 Front View

MH-2001 Multi-Homing Security Gateway User’s Manual 6.8.1 Mapped IP Internal private IP addresses are translated through NAT (Network Address Translat

Seite 9 - 1.4 MH-2001 Rear Panel

MH-2001 Multi-Homing Security Gateway User’s Manual Step 4. Group the services (DNS, FTP, HTTP, POP3, SMTP…) that provided and used by server in Serv

Seite 10 - 1.5 Specification

MH-2001 Multi-Homing Security Gateway User’s Manual Step 6. Add a policy that includes STEP2 and 4 in Outgoing Policy. It makes the server to send e-

Seite 11

MH-2001 Multi-Homing Security Gateway User’s Manual 6.8.2 Virtual Server 1- 4 Virtual server is a one-to-many mapping technique, which maps a real IP

Seite 12 - 2.2 Operation Mode

MH-2001 Multi-Homing Security Gateway User’s Manual - 103 - Virtual Server Configuration WebUI Step 4. Add a new policy in Incoming Policy, which

Seite 13

MH-2001 Multi-Homing Security Gateway User’s Manual Chapter 2: Hardware Installation 2.1 Installation Requirements Before installing MH-2001, make sur

Seite 14 - Chapter 3: Getting Started

MH-2001 Multi-Homing Security Gateway User’s Manual 6.9 VPN The MH-2001 adopts VPN to set up safe and private network service. And combine the remote

Seite 15

MH-2001 Multi-Homing Security Gateway User’s Manual ESP (Encapsulating Security Payload):  One of the IPSec standards that provides for the confid

Seite 16

MH-2001 Multi-Homing Security Gateway User’s Manual Define the required fields of IPSec Function i:  To display the VPN connection status via icon。

Seite 17 - 3.5 Configure Policy

MH-2001 Multi-Homing Security Gateway User’s Manual Define the required fields of PPTP Server Function PPTP Server:  To select Enable or Disable

Seite 18 - STEP 4:

MH-2001 Multi-Homing Security Gateway User’s Manual Define the required fields of PPTP Client Function i:  To display the VPN connection status via

Seite 19 - Chapter 4: System

MH-2001 Multi-Homing Security Gateway User’s Manual Define the required fields of Tunnel Function i:  To display the VPN connection status via icon。

Seite 20

MH-2001 Multi-Homing Security Gateway User’s Manual We set up two VPN examples in this chapter: No. Range The Application Environments Pages Exampl

Seite 21 - Removing a Sub Administrator

MH-2001 Multi-Homing Security Gateway User’s Manual 6.9.1 Example.1 To access the static subnet resources via the IPSec VPN connection between two MH-

Seite 22 - Add Permitted IPs

MH-2001 Multi-Homing Security Gateway User’s Manual The Default Gateway of Company A is the MH-2001 LAN IP 192.168.10.1. Follow the steps below: STE

Seite 23

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 3 . Select Remote Gateway-Fixed IP or Domain Name In To Destination list and enter the IP Add

Seite 24 - Exporting MH-2001 settings

MH-2001 Multi-Homing Security Gateway User’s Manual - 6 -2.2 Operation Mode MH-2001 DMZ port supports three operation modes, Disable, NAT and Tran

Seite 25 - Importing MH-2001 settings

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 6 . You can choose Data Encryption + Authentication or Authentication Only to communicate in

Seite 26

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 9 . Enter the following setting in Tunnel of VPN function:  Enter a specific Tunnel Name.

Seite 27

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 10 . Enter the following setting in Outgoing Policy:  Tunnel: Select IPSec_VPN_Tunnel.  C

Seite 28

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 11 . Enter the following setting in Incoming Policy:  Tunnel: Select IPSec_VPN_Tunnel.  C

Seite 29 - To-Appliance Packets Log

MH-2001 Multi-Homing Security Gateway User’s Manual The Default Gateway of Company B is the LAN IP of the MH-2001 192.168.20.1. Follow the steps below

Seite 30 - 4.2.2 Date/Time

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 15 . Select Remote Gateway-Fixed IP or Domain Name In To Destination list and enter the IP Ad

Seite 31 - NAT mode

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 18 . You can choose Data Encryption + Authentication or Authentication Only to communicate in

Seite 32 - Multiple Subnet settings

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 21 . Enter the following setting in Tunnel of VPN function:  Enter a specific Tunnel Name

Seite 33

MH-2001 Multi-Homing Security Gateway User’s Manual - 122 -STEP 22 . Enter the following setting in Outgoing Policy:  Tunnel: Select IPSec_VPN_T

Seite 34 - Adding a new Static Route

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 23 . Enter the following setting in Incoming Policy:  Tunnel: Select IPSec_VPN_Tunnel.  C

Seite 35 - Entering the DHCP window

MH-2001 Multi-Homing Security Gateway User’s Manual 2.2.2 NAT Mode Connecting Example DMZ and WAN1 IP addresses are on the different subnet. This pro

Seite 36 - 4.2.6 Dynamic DNS

MH-2001 Multi-Homing Security Gateway User’s Manual 6.9.2 Example.2 The way to set the MH-2001 appliance IPSec VPN connection in Windows 2000. Th

Seite 37 - Click on S

MH-2001 Multi-Homing Security Gateway User’s Manual The A Company‘s default gateway is the LAN IP 192.168.10.1 in the MH-2001. Add the following setti

Seite 38

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 5 . In Encapsulation Æ select ISAKMP Algorithm. Select the needed algorithm as both sides sta

Seite 39 - 4.3 Logout

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 7 . In Perfect Forward Secrecy (NO-PFS/ GROUP 1, 2, 5), select GROUP 1. In ISAKMP Lifetime, e

Seite 40 - Chapter 5: Interface

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 9 . In VPN Æ Tunnel , add the following settings: Name, enter the Tunnel Name. From Sourc

Seite 41 - 5.2 WAN

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 10 . In Policy Æ Outgoing, add the following settings: Tunnel, select IPSec_VPN_Tunnel. C

Seite 42

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 11 . In Policy Æ Incoming, add the following settings: Tunnel, select IPSec_VPN_Tunnel. C

Seite 43 - PPPoE Connection

MH-2001 Multi-Homing Security Gateway User’s Manual The B Company’s real IP is 211.22.22.22, add the following settings: STEP 12 . Click Start Æ Run

Seite 44

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 13 . In Run Æ Open column, enter mmc. To startup the Windows 2000 IPSec VPN setting STEP

Seite 45 - Static IP Address Connection

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 15 . In Add / Remove Snap-in, click Add. In Add Standalone Snap-in, add IP Security Policy Ma

Seite 46 - 5.3 DMZ

MH-2001 Multi-Homing Security Gateway User’s Manual Chapter 3: Getting Started 3.1 Web Configuration STEP 1: Connect the Administrator’s PC and the LA

Seite 47

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 16 . Select Local Computer, click Finish. Select the type of IP Security Policy Management

Seite 48 - Chapter 6: Policy Object

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 17 . Complete to set the IP Security Policy Management. Complete to set the IP Security P

Seite 49 - Adding a new LAN Address

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 18 . Right click on the IP Security Policies on Local Machine, and select Create IP Security

Seite 50 - 6.1.2 LAN Group

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 19 . Click Next. Open IP Security Policy Wizard - 137 -

Seite 51 - 6.1.3 WAN

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 20 . Enter the VPN Name and Description, and click Next. Set the VPN name and description

Seite 52 - 6.1.4 WAN Group

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 21 . Disable to Activate the default response rule, and click Next. Disable to activate t

Seite 53 - 6.1.5 DMZ

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 22 . In IP Security Policy Wizard, select Edit properties, click Finish. Complete the IP Se

Seite 54 - Adding a new DMZ Address:

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 23 . In VPN_B Properties, do not select Use Add Wizard, and click Add. VPN_B Properties

Seite 55 - 6.1.6 DMZ Group

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 24 . In New Rule Properties, Click Add. New Rule Properties - 142 -

Seite 56

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 25 . In IP Filter List, do not select Use Add Wizard. Modify the Name into VPN_B WAN TO LAN,

Seite 57

MH-2001 Multi-Homing Security Gateway User’s Manual 3.2 Configure WAN 1 interface After entering the username and password, MH-2001 WebUI screen will

Seite 58

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 26 . In Filter Properties Æ Source address Æ A specific IP Address, enter B Company’s WAN

Seite 59

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 27 . Complete the setting, and close the IP Filter List. Complete the IP Filter List sett

Seite 60

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 28 . In New Rule Properties Æ Filter Action Æ Require Security. Click Edit. Filter Action

Seite 61

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 29 . In Require Security Properties, select Session Key Perfect Forward Secrecy. Select Ses

Seite 62 - 6.2.1 Pre-defined

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 30 . Select Custom / None / 3DES / MD5 Security Method, click Edit. Edit the Security Met

Seite 63 - 6.2.2 Custom

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 31 . Click Custom (for expert users), and click Settings. Custom Security Method - 149

Seite 64 - 6.2.3 Group

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 32 . Select Data intergrity and encryption, choose Intergrity algorithm Æ MD5. Encryption alg

Seite 65 - Adding Service Groups

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 33 . In New Rule Properties Æ Connection Type, select All network connections. Connection

Seite 66 - 6.3 Schedule

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 34 . In New Rule Properties Æ Tunnel Setting, select The tunnel endpoint is specified by this

Seite 67 - 6.4 QoS

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 35 . In New Rule Properties Æ Authentication Methods, click Edit. Authentication Methods

Seite 68 - Add New QoS

MH-2001 Multi-Homing Security Gateway User’s Manual Service: DNS You can select a DNS IP and Domain name by Assist, or type the related data manua

Seite 69 - 6.5.1 Auth Setting

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 36 . Select Use this string to protect the key exchange (Preshared key), enter the Preshared

Seite 70 - 6.5.2 Auth User

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 37 . Click Apply Æ OK Æ Close. Complete the Authentication Methods setting - 155 -

Seite 71

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 38 . Complete the VPN_B WAN TO LAN settings. Complete the VPN_B WAN TO LAN policy setting

Seite 72

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 39 . In VPN _B Properties, do not select Use Add Wizard. Click Add, to add the second IP secu

Seite 73 - 6.5.3 Auth User Group

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 40 . In New Rule Properties, click Add. New Rule Properties - 158 -

Seite 74

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 41 . In IP Filter List, do not select Use Add Wizard. Modify the Name into VPN_B LAN TO WAN,

Seite 75

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 42 . In Filter PropertiesÆ Source address, select A specific IP Subnet, enter A Company‘s LAN

Seite 76 - 6.5.4 Radius Server

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 43 . Complete the settings, close the IP Filter List. Complete the IP Filter List setting

Seite 77

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 44 . In New Rule Properties Æ Filter Action, select Required Security, then click Edit. Fil

Seite 78

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 45 . In Require Security Properties, select Session key Perfect Froward Secrecy. Select S

Seite 79

MH-2001 Multi-Homing Security Gateway User’s Manual HTTP: Select this to allow the device WebUI to be accessed from the WAN network. This will allow t

Seite 80

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 46 . Select Custom / None / 3DES / MD5 Security Method. Click Edit. Set the Security Method

Seite 81

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 47 . Select Custom (for expert users), click Settings. Custom Security Method settings

Seite 82

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 48 . Select Data integrity and encryption (ESP). Integrity algorithm, select MD5. Encryption

Seite 83

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 49 . In New Rule Properties Æ Connection Type, select All network connections. Connection

Seite 84

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 50 . In New Rule Properties Æ Tunnel Setting, select The tunnel endpoint is specified by this

Seite 85

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 51 . In New Rule Properties Æ Authentication Methods, click Edit. Authentication Methods

Seite 86 - Select MD5-Challenge

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 52 . Select Use this string to protect the key exchange (Preshared key). Enter the Preshared

Seite 87

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 53 . Click Apply and close the setting window. Complete the New Rule setting - 171 -

Seite 88

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 54 . Complete the VPN_B LAN TO WAN setting. Complete the VPN_B LAN TO WAN Rule setting

Seite 89

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 55 . In VPN_B Properties Æ General, click Advanced. The VPN_B General setting - 173 -

Seite 90

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 4: The configuration is successful when the screen below is displayed. Please make su

Seite 91

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 56 . Select Master Key Perfect Forward Secrecy, click Methods. Key Exchange settings

Seite 92

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 57 . Click Move up or Move down to arrange IKE / 3DES / MD5 / to the Top, and click OK. T

Seite 93

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 58 . Complete all the Windows 2000 VPN settings. Complete all the Windows 2000 IPSec VPN

Seite 94

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 59 . Right click on VPN_B, select Assign. To assign the VPN_B Security Rules - 177 -

Seite 95

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 60 . We need to restart the IPsec Service. Click Start Æ Setting Æ Control Panel. Enter t

Seite 96

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 61 . In Control Panel, double click Administrative Tools icon. Enter the Administrative T

Seite 97

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 62 . In Administrative Tools, double click Services icon. Enter the Services - 180 -

Seite 98 - 6.6.1 URL Blocking

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 63 . In Services, right click on IPsec Policy Agent, select Restart. Restart IPSec Policy

Seite 99

MH-2001 Multi-Homing Security Gateway User’s Manual 6.9.3 Example.3 The way to set the IPSec VPN connection between two MH-2001 appliances. (Aggressiv

Seite 100 - 6.6.2 Script Blocking

MH-2001 Multi-Homing Security Gateway User’s Manual The A Company‘s default gateway is the MH-2001 LAN IP 192.168.10.1. Make the following settings:

Seite 101 - 6.6.3 Download Blocking

MH-2001 Multi-Homing Security Gateway User’s Manual Chapter 4: System MH-2001 Administration and monitoring configuration is set by the System Adminis

Seite 102 - 6.6.4 Upload Blocking

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 5 . In Encapsulation, select ISAKMP Algorithm, to select the needed algorithm.In ENC Algorith

Seite 103 - 6.7 IM/P2P Blocking

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 7 . In Perfect Forward Secrecy (NO-PFS/ GROUP 1, 2, 5), select GROUP 1. In ISAKMP Lifetime,

Seite 104 - 6.8 Virtual Server

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 10 . In VPN Æ Tunnel add the following settings: Name, enter the Tunnel name. From Source

Seite 105 - 6.8.1 Mapped IP

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 11 . In Policy Æ Outgoing , add the following settings: Tunnel, select IPSec_VPN_Tunnel. 

Seite 106

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 12 . In Policy Æ Incoming , add the following settings: Tunnel, select IPSec_VPN_Tunnel. 

Seite 107

MH-2001 Multi-Homing Security Gateway User’s Manual The B Company‘s default gateway is the MH-2001’s LAN IP 192.168.20.1. Add the following settings:

Seite 108 - 6.8.2 Virtual Server 1- 4

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 16 . In Authentication Method, select Preshare, enter the Preshared Key. (The maximum Preshar

Seite 109

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 19 . In Perfect Forward Secrecy(NO-PFS/ GROUP 1,2,5), select GROUP 1. In ISAKMP Lifetime, ent

Seite 110 - 6.9 VPN

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 22 . In VPN Æ TunnelÆ New Entry, add the following settings: Name, enter the Tunnel Name.

Seite 111

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 23 . In Policy Æ Outgoing , add the following settings: Tunnel, select IPSec_VPN_Tunnel. 

Seite 112

MH-2001 Multi-Homing Security Gateway User’s Manual Copyright Copyright© 2007 by PLANET Technology Corp. All rights reserved. No part of this publicat

Seite 113

MH-2001 Multi-Homing Security Gateway User’s Manual clicking New Sub Admin. Sub Admin have only read and monitor privilege and cannot change any sys

Seite 114

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 24 . In Policy Æ Incoming, add the following settings: Tunnel, select IPSec_VPN_Tunnel. C

Seite 115

MH-2001 Multi-Homing Security Gateway User’s Manual 6.9.4 Example.4 The way to set the IPSec VPN connection between two MH-2001 appliances. (The GRE p

Seite 116

MH-2001 Multi-Homing Security Gateway User’s Manual The A Company’s default gateway is the LAN IP 192.168.10.1 in MH-2001. STEP 1 . Enter the A Com

Seite 117 - VPN TEST Environment

MH-2001 Multi-Homing Security Gateway User’s Manual The IPSec Encapsulation setting STEP 6 . In IPSec Algorithm, select Data Encryption + Authentica

Seite 118

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 7 . In Perfect Forward Secrecy (NO-PFS/ GROUP 1, 2, 5), select GROUP 1. In ISKMP Lifetime, en

Seite 119

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 10 . In VPN Æ Tunnel , add the following settings:  Name, enter the Tunnel Name.  Fro

Seite 120

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 11 . In Policy Æ Outgoing, add the following settings:  Tunnel, select IPSec_VPN_Tunnel. 

Seite 121

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 12 . In Policy Æ Incoming , add the following settings:  Tunnel, select IPSec_VPN_Tunnel.

Seite 122 -  Click OK

MH-2001 Multi-Homing Security Gateway User’s Manual The B Company‘s default gateway is the LAN IP 192.168.20.1 of MH-2001. Add the following settings:

Seite 123

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 16 . In Authentication Method, select Preshare, enter the Preshared Key. (The maximum Preshar

Seite 124

MH-2001 Multi-Homing Security Gateway User’s Manual Removing a Sub Administrator Step 1. In the Administration table, locate the Administrator name

Seite 125

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 19 . In Perfect Forward Secrecy (NO-PFS/ GROUP 1, 2, 5), select GROUP 1. In ISAKMP Lifetime,

Seite 126

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 22 . In VPN Æ Tunnel , add the following settings:  In Name, enter the Tunnel name.  Fro

Seite 127

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 23 . In Policy ÆOutgoing , add the following settings:  Tunnel, select IPSec_VPN_Tunnel.

Seite 128

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 24 . In Policy Æ Incoming, add the following settings:  Tunnel, select IPSec_VPN_Tunnel.

Seite 129

MH-2001 Multi-Homing Security Gateway User’s Manual 6.9.5 Example.5 Setting PPTP VPN connection between two MH-2001 The Deployment Company A: WAN1 IP

Seite 130 - 6.9.2 Example.2

MH-2001 Multi-Homing Security Gateway User’s Manual The Default Gateway of Company A is the LAN IP of the MH-2001 192.168.10.1. Follow the steps below

Seite 131

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 2 . Add the following settings in PPTP Server of VPN function in the MH-2001 of Company A: 

Seite 132

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 3 . Enter the following setting in Tunnel of VPN function:  Enter a specific Tunnel Name.

Seite 133

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 4 . Enter the following setting in Outgoing Policy:  Tunnel: Select PPTP_VPN_Tunnel.  Cli

Seite 134

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 5 . Enter the following setting in Incoming Policy:  Tunnel: Select PPTP_VPN_Tunnel.  C

Seite 135

MH-2001 Multi-Homing Security Gateway User’s Manual 4.1.2 Permitted IPs Add Permitted IPs STEP 1﹒Add the following setting in Permitted IPs of Adminis

Seite 136

MH-2001 Multi-Homing Security Gateway User’s Manual The Default Gateway of Company B is the LAN IP of the MH-2001 192.168.20.1. Follow the steps below

Seite 137

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 7 . Enter the following setting in Tunnel of VPN function:  Enter a specific Tunnel Name.

Seite 138

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 8 . Enter the following setting in Outgoing Policy:  Tunnel: Select PPTP_VPN_Tunnel.  Cli

Seite 139

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 9 . Enter the following setting in Incoming Policy:  Tunnel: Select PPTP_VPN_Tunnel.  Cli

Seite 140

MH-2001 Multi-Homing Security Gateway User’s Manual 6.9.6 Example.6 The way to set the MH-2001 appliance PPTP VPN connection in Windows 2000. The Dep

Seite 141

MH-2001 Multi-Homing Security Gateway User’s Manual The A Company’s default gateway is the LAN IP 192.168.10.1 in MH-2001, add the following settings:

Seite 142

MH-2001 Multi-Homing Security Gateway User’s Manual  Click OK. The PPTP VPN setting Complete to set the PPTP VPN setting - 220 -

Seite 143

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 3 . In VPN Æ Tunnel, add the following settings: Name, enter the Tunnel name. From Source

Seite 144

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 4 . In Policy Æ Outgoing, add the following settings: Tunnel, select PPTP_VPN_Tunnel. Cli

Seite 145

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 5 . In Policy Æ Incoming, add the following settings: Tunnel, select PPTP_VPN_Tunnel. Cli

Seite 146

MH-2001 Multi-Homing Security Gateway User’s Manual 4.1.3 Software Update Under Software Update, the admin may update the device’s software with newer

Seite 147

MH-2001 Multi-Homing Security Gateway User’s Manual The B Company’s PC use the Real IP (211.22.22.22). Add the following settings: STEP 6 . Right cli

Seite 148

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 7 . In Network and Dial-up Connection, click Make New Connection. Network and Dial-up Conne

Seite 149

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 8 . In Location Information, enter the Country /Region, Area code and select the phone system

Seite 150

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 9 . In Phone and Modem Options, click OK. Phone and Modem Options - 227 -

Seite 151

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 10 . In Network Connection Wizard, click Next. Network Connection Wizard - 228 -

Seite 152

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 11 . In Network Connection Wizard, select Connect to a private network through the Network. C

Seite 153

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 12 . In New Connection Wizard, enter the IP Address, then click Next. Setup the Host name o

Seite 154

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 13 . In Network Connection Wizard Æ Connection Availability, select For all users. Click Next

Seite 155

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 14 . In New Connection Wizard, enter the Connection Name, click Finish. Complete the New

Seite 156

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 15 . In Connect Virtual Private Connection, add the following settings:  User Name, enter P

Seite 157

MH-2001 Multi-Homing Security Gateway User’s Manual 4.2 Configure The Configure is according to the basic setting of theMH-2001. In this chapter the

Seite 158

MH-2001 Multi-Homing Security Gateway User’s Manual Creating the PPTP VPN Connection Complete to setup the PPTP VPN connection STEP 16 . Com

Seite 159

MH-2001 Multi-Homing Security Gateway User’s Manual Chapter 7: Policy This section provides the Administrator with facilities to sent control policies

Seite 160

MH-2001 Multi-Homing Security Gateway User’s Manual Source and Destination:  Source IP and Destination IP is according to the MH-2001’s point of vie

Seite 161

MH-2001 Multi-Homing Security Gateway User’s Manual Option:  To display if every function of Policy is enabled or not. If the function is enabled a

Seite 162

MH-2001 Multi-Homing Security Gateway User’s Manual MAX. Bandwidth Per Source IP:  Set the Max. Bandwidth of Downstream/Upstream that permitted by s

Seite 163

MH-2001 Multi-Homing Security Gateway User’s Manual Step 2: Configure all the parameters. Source Address: Select the name of the LAN network from th

Seite 164

MH-2001 Multi-Homing Security Gateway User’s Manual  Select Statistics  Click OK Setting the Outgoing Policy - 240 -

Seite 165

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 2﹒Go to Monitor / Log / Traffic menu, you can obtain the information of Traffic if you want

Seite 166

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 3﹒To display the traffic statistics that through Policy to access to Internet in Policy Stati

Seite 167

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 2﹒Enter the following setting in Virtual Server1 of Virtual Server function: Setting Virt

Seite 168

MH-2001 Multi-Homing Security Gateway User’s Manual Importing MH-2001 settings Under Backup/Restore Configuration, click on the Browse button next to

Seite 169

MH-2001 Multi-Homing Security Gateway User’s Manual 7.3 WAN To DMZ & LAN To DMZ This section describes steps to create policies for packets and se

Seite 170

MH-2001 Multi-Homing Security Gateway User’s Manual - 245 -STEP 2﹒Enter the following setting in Virtual Server1 of Virtual Server function: Set

Seite 171

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 4﹒Enter the following in WAN to DMZ Policy:  Click New Entry  Destination Address: Select

Seite 172

MH-2001 Multi-Homing Security Gateway User’s Manual 7.4 DMZ To WAN & DMZ To LAN This section describes steps to create policies for packets and

Seite 173

MH-2001 Multi-Homing Security Gateway User’s Manual The Mail Server’s IP Address Corresponds to Name Setting in Address Book of Mail Server STEP 3﹒

Seite 174

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 4﹒Enter the following setting in WAN to DMZ Policy:  Click New Entry  Destination Address:

Seite 175

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 6﹒Add the following setting in LAN to DMZ Policy:  Click New Entry  Destination Address: S

Seite 176

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 8﹒Add the following setting in DMZ to WAN Policy:  Click New Entry  Source Address: Select

Seite 177

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 10﹒Add the following setting in DMZ to LAN Policy:  Click New Entry  Source Address: Selec

Seite 178

MH-2001 Multi-Homing Security Gateway User’s Manual Chapter 8: Anomaly Flow IP When the MH-2001 received the intrusion packets from hackers, the inte

Seite 179

MH-2001 Multi-Homing Security Gateway User’s Manual Restoring Factory Default Settings Step 1. Select Reset Factory Settings. Click OK at the bottom-r

Seite 180

MH-2001 Multi-Homing Security Gateway User’s Manual Detect ICMP Flood  Can detect the data packets sent from hacker and use the Broadcast to send to

Seite 181

MH-2001 Multi-Homing Security Gateway User’s Manual Filter IP Route Option  Select the function can prevent some IP packets which the hacker use it

Seite 182

MH-2001 Multi-Homing Security Gateway User’s Manual To alert and block the external or internal anomalous data packets. STEP 1 . In Anomaly IP Æ Sett

Seite 183

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 2 . When the system detects the DDoS attack packets, it will show the message in Anomaly Flow

Seite 184

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 3 . Enable the System Æ E-Mail alert notification, and then the MH-2001 will send the mail no

Seite 185

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 4 . When internal user PC got virus – infected, the MH-2001 will show the alert message at fi

Seite 186

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 5 . Enable the Anomaly Flow IPÆAttack Event, then the MH-2001 shows the attack information in

Seite 187

MH-2001 Multi-Homing Security Gateway User’s Manual Chapter 9: Monitor 9.1 Log MH-2001 supports traffic logging and event logging to monitor and recor

Seite 188 - 6.9.3 Example.3

MH-2001 Multi-Homing Security Gateway User’s Manual 9.1.1 Traffic Log The Administrator queries MH-2001 for information, such as source address, desti

Seite 189

MH-2001 Multi-Homing Security Gateway User’s Manual Step 2. Follow the File Download pop-up window to save the traffic logs into a specified director

Seite 190

MH-2001 Multi-Homing Security Gateway User’s Manual Click on Mail Test to test if E-mail Address 1 and E-mail Address 2 can receive the Alert Notific

Seite 191

MH-2001 Multi-Homing Security Gateway User’s Manual 9.1.2 Event When MH-2001 WAN detects events, the Administrator can get the details, such as time

Seite 192

MH-2001 Multi-Homing Security Gateway User’s Manual Clear the Event Logs The Administrator may clear on-line event logs to keep just the most updated

Seite 193

MH-2001 Multi-Homing Security Gateway User’s Manual 9.1.3 Connection Log Enter to the Connection Log window Step 1. Click the Connection option under

Seite 194

MH-2001 Multi-Homing Security Gateway User’s Manual Clear Connection Logs Step 1. In Connection Log window, click the Clear Logs button. Step 2. In

Seite 195

MH-2001 Multi-Homing Security Gateway User’s Manual 9.1.4 Log Backup Enter to the Log Backup window Click Log ÆLog Backup.  Log Mail Configuratio

Seite 196

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 2 . Monitor Æ Backup Æ enable Log mail Configuration. Click OK. Log mail configuration STE

Seite 197

MH-2001 Multi-Homing Security Gateway User’s Manual 9.2 Accounting Report Administrator can use this Accounting Report to inquire the LAN IP users and

Seite 198

MH-2001 Multi-Homing Security Gateway User’s Manual Source IP:  The IP address used by LAN users who use MH-2001 Destination IP:  The IP address u

Seite 199

MH-2001 Multi-Homing Security Gateway User’s Manual Inbound Accounting Report It is the statistics of downstream / upstream for all kinds of commu

Seite 200

MH-2001 Multi-Homing Security Gateway User’s Manual 9.2.2 Outbound STEP 1 . Enter Outbound in Accounting Report and select Top Users to inquire the s

Seite 201 - 6.9.4 Example.4

MH-2001 Multi-Homing Security Gateway User’s Manual MTU (set networking packet length) The administrator can modify the networking packet length. St

Seite 202

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 2 . Enter Outbound in Accounting Report and select Top Sites to inquire the statistics websit

Seite 203

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 3 . Enter Outbound in Accounting Report and select Top Services to inquire the statistics web

Seite 204

MH-2001 Multi-Homing Security Gateway User’s Manual According to the downstream / upstream report of the selected TOP numbering to draw the Protocol

Seite 205

MH-2001 Multi-Homing Security Gateway User’s Manual 9.2.3 Inbound STEP 1 . Enter Inbound in Accounting Report and select Top Users to inquire the stat

Seite 206

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 2 . Enter Inbound in Accounting Report and select Top Sites to inquire the statistics website

Seite 207

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 3 . Enter Inbound in Accounting Report and select Top Services to inquire the statistics webs

Seite 208

MH-2001 Multi-Homing Security Gateway User’s Manual According to the downstream / upstream report of the selected TOP numbering to draw the Protocol

Seite 209

MH-2001 Multi-Homing Security Gateway User’s Manual How to use Statistics The Administrator can get the current network status from statistics, and us

Seite 210

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 2 . In the Statistics window, find the network you want to check and click Minute on the rig

Seite 211

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 3 . Statistics Chart  Y-Coordinate:Network Traffic(Kbytes/Sec)  X-Coordinate:Time(Hour

Seite 212

MH-2001 Multi-Homing Security Gateway User’s Manual SIP protocol pass-through Select this option to the device’s SIP protocol pass-through. Once thi

Seite 213

MH-2001 Multi-Homing Security Gateway User’s Manual 9.3.2 Policy Statistics STEP 1 . If you had select Statistics in Policy, it will start to record

Seite 214 - 6.9.5 Example.5

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 3 . Statistics Chart Y-Coordinate:Network Traffic(Kbytes/Sec) X-Coordinate:Time(Hour/Min

Seite 215

MH-2001 Multi-Homing Security Gateway User’s Manual 9.4 Wake on Lan The MIS engineer can use the MH-2001 appliance to start up the internal PCs (by s

Seite 216

MH-2001 Multi-Homing Security Gateway User’s Manual 9.5 Status In this section, the device displays the status information about MH-2001. Status will

Seite 217

MH-2001 Multi-Homing Security Gateway User’s Manual Interface Status - 288 -

Seite 218

MH-2001 Multi-Homing Security Gateway User’s Manual 9.5.2 Authentication STEP 1 . Enter Authentication in Status function, it will display the record

Seite 219

MH-2001 Multi-Homing Security Gateway User’s Manual 9.5.3 ARP Table STEP 1 . Enter ARP Table in Status function; it will display a table about IP Add

Seite 220

MH-2001 Multi-Homing Security Gateway User’s Manual 9.5.4 DHCP Clients STEP 1 . In DHCP Clients of Status function, it will display the table of DHCP

Seite 221

MH-2001 Multi-Homing Security Gateway User’s Manual FCC Caution: To assure continued compliance (example-use only shielded interface cables when conne

Seite 222

MH-2001 Multi-Homing Security Gateway User’s Manual System Reboot Once this function is enabled, MH-2001 will be rebooted. Click Reboot. The confirm

Seite 223

MH-2001 Multi-Homing Security Gateway User’s Manual The value of Set Offset From GMT and Server IP / Name can be looking for from Assist. 4.2.3 Mult

Seite 224 - 6.9.6 Example.6

MH-2001 Multi-Homing Security Gateway User’s Manual Multiple Subnet settings Click Multiple Subnet under the System/Configure menu to enter Multiple S

Seite 225

MH-2001 Multi-Homing Security Gateway User’s Manual For example, the leased line of a company applies several real IP Addresses 168.85.88.0/24 and th

Seite 226

MH-2001 Multi-Homing Security Gateway User’s Manual 4.2.4 Route Table In this section, the Administrator can add static routes for the networks. Ent

Seite 227

MH-2001 Multi-Homing Security Gateway User’s Manual 4.2.5 DHCP In this section, the Administrator can configure DHCP (Dynamic Host Configuration Pro

Seite 228

MH-2001 Multi-Homing Security Gateway User’s Manual Enabling DHCP Support Step 1. In the DHCP window, click Enable DHCP Support. Domain Name: The Adm

Seite 229

MH-2001 Multi-Homing Security Gateway User’s Manual - 31 -The icons in Dynamic DNS window: ! : Update Status Chart Meaning Update successfu

Seite 230

MH-2001 Multi-Homing Security Gateway User’s Manual - 32 -Step 3. Click OK to add dynamic DNS or click Cancel to discard changes. 4.2.7 Host Tab

Seite 231

MH-2001 Multi-Homing Security Gateway User’s Manual 4.3 Logout STEP 1﹒Click Logout in System to protect the system while Administrator is away. C

Seite 232

MH-2001 Multi-Homing Security Gateway User’s Manual Table of Contents CHAPTER 1: INTRODUCTION ...

Seite 233

MH-2001 Multi-Homing Security Gateway User’s Manual Chapter 5: Interface In this section, the Administrator can set up the IP addresses for the office

Seite 234

MH-2001 Multi-Homing Security Gateway User’s Manual 5.2 WAN Entering the Interface menu Click on Interface in the left menu bar. Then click on WAN b

Seite 235

MH-2001 Multi-Homing Security Gateway User’s Manual Setting WAN Interface Address STEP 1﹒Select WAN in Interface and click Modify in WAN1 Interface.

Seite 236

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 3﹒Select the Connecting way:  PPPoE (ADSL User): 1. Select PPPoE 2. Enter User Name as an ac

Seite 237

MH-2001 Multi-Homing Security Gateway User’s Manual  Dynamic IP Address (Cable Modem User) : 1. Select Dynamic IP Address (Cable Modem User) 2. Click

Seite 238

MH-2001 Multi-Homing Security Gateway User’s Manual  Static IP Address 1. Select Static IP Address 2. Enter IP Address, Netma

Seite 239

MH-2001 Multi-Homing Security Gateway User’s Manual 5.3 DMZ The Administrator uses the DMZ Interface to set up the DMZ network. The DMZ network cons

Seite 240

MH-2001 Multi-Homing Security Gateway User’s Manual Setting DMZ Interface Address (Transparent Mode) STEP 1﹒Select DMZ Interface STEP 2﹒Select Transpa

Seite 241 - Chapter 7: Policy

MH-2001 Multi-Homing Security Gateway User’s Manual Chapter 6: Policy Object 6.1 Address MH-2001 allows the Administrator to set addresses of the LA

Seite 242

MH-2001 Multi-Homing Security Gateway User’s Manual network. Click Remove to delete the settings. If one of the members has been added to Policy or

Seite 243

MH-2001 Multi-Homing Security Gateway User’s Manual 5.1 LAN ...

Seite 244 - 7.1 Outgoing

MH-2001 Multi-Homing Security Gateway User’s Manual 6.1.2 LAN Group Entering the LAN Group window The LAN Addresses may be combined together to become

Seite 245 - Threshold for example)

MH-2001 Multi-Homing Security Gateway User’s Manual 6.1.3 WAN Entering the WAN window Step 1. Click WAN under the Address menu to enter the WAN wind

Seite 246

MH-2001 Multi-Homing Security Gateway User’s Manual message – . In this case, you are not allowed to modify or remove the setting. You have to remove

Seite 247

MH-2001 Multi-Homing Security Gateway User’s Manual Adding an WAN Group Step 2. In the WAN Group window, click the New Entry button and the Add New Ad

Seite 248 - 7.2 Incoming

MH-2001 Multi-Homing Security Gateway User’s Manual Definition Name: Name of DMZ network address. IP: IP address of DMZ network Netmask: subnet mask

Seite 249

MH-2001 Multi-Homing Security Gateway User’s Manual 6.1.6 DMZ Group Entering the DMZ Group window Click DMZ Group under the Address menu to enter the

Seite 250

MH-2001 Multi-Homing Security Gateway User’s Manual - 50 -

Seite 251

MH-2001 Multi-Homing Security Gateway User’s Manual 6.1.7 Example1 Under DHCP situation, assign the specific IP to static users and restrict them to a

Seite 252

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 2﹒Adding the following setting in Outgoing Policy: Add a Policy of Restricting the Specific

Seite 253

MH-2001 Multi-Homing Security Gateway User’s Manual 6.1.8 Example2 Setup a policy that only allows partial users to connect with specific IP (External

Seite 254

MH-2001 Multi-Homing Security Gateway User’s Manual 6.9.5 Example.5...

Seite 255

MH-2001 Multi-Homing Security Gateway User’s Manual Complete Adding LAN Address Group The setting mode of WAN Group and DMZ Group of Address are t

Seite 256

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 4 . To exercise STEP1~3 in Policy To Exercise Address Setting in Policy Complete the Po

Seite 257

MH-2001 Multi-Homing Security Gateway User’s Manual 6.2 Service In this section, network services are defined and new network services can be added. T

Seite 258

MH-2001 Multi-Homing Security Gateway User’s Manual Icons and Descriptions FigureDescription Any Service TCP services, e.g. TCP, FTP, FINGER, HTTP,

Seite 259 - Chapter 8: Anomaly Flow IP

MH-2001 Multi-Homing Security Gateway User’s Manual If one of the Services has been added to Policy or Group, Configure column will show the message

Seite 260

MH-2001 Multi-Homing Security Gateway User’s Manual Definitions: Group name: The Group name of the defined Service. Service: The Service item of the G

Seite 261

MH-2001 Multi-Homing Security Gateway User’s Manual 6.3 Schedule MH-2001 allows the Administrator to configure a schedule for policies to take affect.

Seite 262

MH-2001 Multi-Homing Security Gateway User’s Manual In setting a Schedule, the value in Start time must be less than the value in Stop Time, or you

Seite 263

MH-2001 Multi-Homing Security Gateway User’s Manual The Flow After Using QoS (Max. Bandwidth: 400Kbps, Guaranteed Bandwidth: 200Kbps) Configuration

Seite 264

MH-2001 Multi-Homing Security Gateway User’s Manual Step 2. Click the OK button to add new QoS. 6.5 Authentication By configuring the Authenticati

Seite 265

MH-2001 Multi-Homing Security Gateway User’s Manual Chapter 1: Introduction As Internet become essential for your business, the only way to prevent yo

Seite 266

MH-2001 Multi-Homing Security Gateway User’s Manual Definitions:  Authentication Port: The internal users have to pass the authentication to acces

Seite 267 - Chapter 9: Monitor

MH-2001 Multi-Homing Security Gateway User’s Manual  Auth-User Name: enter the username of new Authentication.  Password: enter a password for the

Seite 268 - 9.1.1 Traffic Log

MH-2001 Multi-Homing Security Gateway User’s Manual Step 5. When the user connect to external network by Authentication, the following page will be

Seite 269

MH-2001 Multi-Homing Security Gateway User’s Manual 6.5.3 Auth User Group Entering the Auth User Group window Click Authentication in the menu bar on

Seite 270 - 9.1.2 Event

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 2 . Add a policy in Outgoing Policy and input the Address and Authentication of STEP 1 Auth

Seite 271

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 3 . When user is going to access to Internet through browser, the authentication UI will app

Seite 272 - 9.1.3 Connection Log

MH-2001 Multi-Homing Security Gateway User’s Manual 6.5.4 Radius Server To plan the users connect to the WAN through the authenticaton in policy .To u

Seite 273 - Clear Connection Logs

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 3 . Select Internet Authentication Service. Add new network authentication service component

Seite 274 - 9.1.4 Log Backup

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 4 . Click Start Æ Control Panel Æ Administrative Tools, select Network Authentication Servic

Seite 275

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 5 . Right click RADIUS Clients Æ New RADIUS Client. Add new RADIUS client - 73 -

Seite 276 - 9.2.1 Setting

MH-2001 Multi-Homing Security Gateway User’s Manual TCP/UDP port number and give guarantee and burst bandwidth with three levels of priority  Dynami

Seite 277

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 6 . Enter the Name and Client Address (It is the same as MH-2001 IP Address). Add New RADIUS

Seite 278 - Inbound Accounting Report

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 7 . Select RADISU Standard; enter the Shared secret and Confirm Shared secret. (It must be th

Seite 279 - 9.2.2 Outbound

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 8 . Right click on Remote Access PoliciesÆ New Remote Access Policy. Add new romote access

Seite 280

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 9 . Select Use the wizard to set up a typical policy for a common scenario, and enter the Pol

Seite 281

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 10 . Select Ethernet. The way to add new remote access policy - 78 -

Seite 282

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 11 . Select User. Add new remote access policy user and group - 79 -

Seite 283 - 9.2.3 Inbound

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 12 . Select MD5-Challenge. The authentication of add new remote access policy - 80 -

Seite 284

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 13 . Right click on the Radius Æ Properties. The network authentication service setting

Seite 285

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 14 . Select Grant remote access permission, and Remove the original setting, then click Add.

Seite 286 - 9.3 Statistics

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 15 . Add Service-Type. Add new RADIUS properties attribute - 83 -

Seite 287 - 9.3.1 WAN Statistics

MH-2001 Multi-Homing Security Gateway User’s Manual - Port definition Port Description WAN1, WAN2 Connect to your xDSL/Cable modem or other Internet

Seite 288

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 16 . Add Authenticate Only from the left side. Add RADIUS properties service-type - 8

Seite 289

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 17 . Click Edit Profile, select Authentication, and check Unencrypted authentication (PAP, SP

Seite 290 - 9.3.2 Policy Statistics

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 18 . Add Auth User, click Start Æ Setting Æ Control PanelÆAdministrative Tools, select Comput

Seite 291

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 19 . Right click on Users, select New User. Add new user STEP 20 . Complete the Windows 20

Seite 292 - 9.4 Wake on Lan

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 21 . In Authentication Æ RADIUS function, enter IP, Port and Shared Secret. (The setting must

Seite 293 - 9.5.1 Interface Status

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 23 . In Policy Æ Outgoing, apply the Authentication Group (RADIUS included) in STEP22. To add

Seite 294

MH-2001 Multi-Homing Security Gateway User’s Manual 6.5.5 POP3 To plan the users connect to the WAN through the authentication by policy. (To use the

Seite 295 - 9.5.2 Authentication

MH-2001 Multi-Homing Security Gateway User’s Manual STEP 3 . In Policy Æ Outgoing, apply the Step2 (The authentication group) in to the policy. Th

Seite 296 - 9.5.3 ARP Table

MH-2001 Multi-Homing Security Gateway User’s Manual 6.6 Content Blocking Content Filtering includes “URL Blocking”, “Script Blocking”, “Download Bloc

Seite 297 - 9.5.4 DHCP Clients

MH-2001 Multi-Homing Security Gateway User’s Manual Step 3. Click OK to add the policy. Click Cancel to discard changes. Step 4. After finishing Con

Kommentare zu diesen Handbüchern

Keine Kommentare