Future Systems FGT100 VPN GATEWAY User Manual FCC040401

Future Systems, Inc. VPN GATEWAY FCC040401

Contents

Users Manual 2

Download: Future Systems FGT100 VPN GATEWAY User Manual         FCC040401
Mirror Download [FCC.gov]Future Systems FGT100 VPN GATEWAY User Manual         FCC040401
Document ID411287
Application IDQT/UujC5rlO+JWbcg32oOA==
Document DescriptionUsers Manual 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize104.82kB (1310200 bits)
Date Submitted2004-04-02 00:00:00
Date Available2004-04-02 00:00:00
Creation Date2004-04-02 18:06:15
Producing SoftwareAcrobat PDFWriter 4.0 Windows¿ë
Document Lastmod2004-04-02 18:09:36
Document Titleæ­¯FCC040401.PDF
Document Creatoræ­¯FCC040401.hwp
Document Author: 歯심재응

4-1
Chapter 4
Operating
SecuwayGate
100
『 Chapter4. Operating SecuwayGate 100 』 covers various
system maintenance features, including how to check the LED
displays, how to replace the whole or a part of SecuwayGate
100, and how to change IP addresses in SecuwayCenter 2000,
and how to change security policies in SecuwayGate 100.
The LED displays of SecuwayGate 100 help you identify the
current status of SecuwayGate 100 with regard to connection,
operation, and hardware failure. Depending on the status of the
device you identified, you may need to take appropriate actions,
such as editing the properties of the SecuwayGate 100 or
replacing the device with a new one.
4-2
Chapter 4
Operating SecuwayGate 2000
The SecuwayGate 100 log is stored in RAM and SecuwayCenter
2000
log is stored in the Center Log MSSQL database. The
SecuwayGate 100 sends its log in response to regular requests by
SecuwayCenter 2000, ever minute. SecuwayCenter 2000
stores the received SecuwayGate 100 logs in the Gate Log MSSQL
database. There is separation between the Center Logs and the Gate Logs
4-3
4.1 LED Status
When SecuwayGate 100 is in a normal state, the Power
LED and Secure LED are ‘ON’. The Net LED, which
represents the transmission state of the rear-panel network
interface, blinks in a normal state.
When SecuwayGate 100 is a in normal state
LED Display
Power LED ON
Alarm LED ON
Secure LED OFF
Initial State (Factory-Default)
It represents the initial factory default for
installing SecuwayGate 100.
LED Display
Power LED ON
Alarm LED OFF
Secure LED ON
Normal State (After Setup)
It indicates that the initial setup has been
completed with the Smart card issued from
SecuwayCenter
2000
and
SecuwayCenter 2000 has been found.
The normal state of each LED is as shown in
the left pane.
The Net LED on the front panel keeps blinking according to the
transmission state of the network interface port located on the rear side of
the device. If the port is not physically connected to a line or a device, the
Net LED is ‘OFF’, not blinking.
When an error occurred in SecuwayGate 100
LED
Error & Troubleshooting
Secure LED
blinks
Indicates that the SecuwayGate 100 failed to
receive
set
of
security settings from
SecuwayCenter 2000 when it attempted to
initiate a communication with Secuway Center
2000 as soon as it completed the configuration
setup. Check the cable connection to the Net port of
SecuwayGate 100 and the service status of
SecuwayCenter 2000.
4-4
Chapter 4
Operating SecuwayGate 2000
LED
Error & Troubleshooting
Secure LED is
OFF
Indicates that no security policy is applied to
SecuwayGate 100. If the Secure LED is turned
off during the normal service mode, it implies that
SecuwayGate 100 is incapable of acting in
accordance with the security policies set in
SecuwayCenter 2000. It means you need to
create a new Smart card (or file) in
SecuwayCenter
2000
and
initialize
SecuwayGate 100 with a new Smart card. The
Secure LED is often turned off automatically when
the SecuwayGate 100 administrator presses the
Emergency Erase button by mistake, or when the
security policies were not stored in SecuwayGate
100, due to a hardware problem. If there is a
problem with the hardware, please contact our service
center and request for a hardware checkup and
maintenance service.
Net LED is
OFF
If the Net LED is not blinking, it means that the
network interface is not in service. Check the cable
connection to the Net port of SecuwayGate 100.
Alarm LED is
ON
Indicates SecuwayGate 100 is in factory-default
settings or SecuwayGate 100 configuration
settings were erased by the act of pressing the
Emergency Erase button. Issue a new Smart card (or
file) from SecuwayCenter 2000 to initialize
SecuwayGate 100.
4-5
4.2 SecuwayGate 100 Replacement
Procedures
If the current SecuwayGate 100 system is defective and needs a
replacement, follow the replacement procedures below.
Step 1
To replace SecuwayGate 100 with a new one, turn on the new
system, and insert the existing smart card for initial configuration. If
the new SecuwayGate 100 system has been used in other place,
it has to be initialized using the emergency erase switch before
inserting the smart card.
Be sure to press the emergency erase switch while the system is
turned off to initialize the system.
Step 2
Insert the existing smart card for initial configuration issued by
SecuwayCenter 2000, which has been used to initialize the
previous SecuwayGate 100 system, and turn on the system.
Check
cable
connectivity
for
communication
between
SecuwayCenter 2000 and SecuwayGate 100 at this time,
and check that the LED for cable connection on rear side is lit.
When the new SecuwayGate 100 system is turned on, the
system will read and save the information on the smart card
automatically.
If SecuwayGate 100 does not read the smart card automatically, turn
off the system, press the emergency erase switch, and turn on the system
again, as the system may not have been properly initilized.
4-6
Chapter 4
Operating SecuwayGate 2000
Step 3
Check that smart card is successfully read through that the LED
status is normal.
4-7
4.3 SecuwayGate 100 IP Address Change
Procedures
No SecuwayGate 100 console command can change the current
IP address of SecuwayGate 100. Only the administrator of
SecuwayCenter 2000 is authorized to change the IP address of
SecuwayGate 100.
The SecuwayCenter 2000 administrator can change the IP
address of SecuwayGate 100 in the following ways.
1. Start the SecuwayCenter 2000 (run SecuwayCenter 2000
Server → Secuway Center 2000 Client.) and select
SecuwayGate 100 of which IP address you want to change.
2. Double-click the selected SecuwayGate 100 and move to the ‘IP
Address’ step. The ‘IP Address’ window appears.
Disabled on the 3 Port System
Select the tab (Net1, Net2, Net3, and Net4) for the port. Enter the
new IP address in the ‘IP Address’ field, and click [Next]. Click [OK]
in the window that appears after you click [Next].
Note that you have just edited the database information, and now
you need to send the new IP information to SecuwayGate 100.
3. To send the new IP information to SecuwayGate 100, right-click
SecuwayGate 100 in which you have changed the IP address
4-8
Chapter 4
Operating SecuwayGate 2000
from the SecuwayCenter 2000 menu and ‘Resend Information’
from the popup menu list.
4. Before you can use the changed IP address in SecuwayGate 100,
you need to restart SecuwayGate 100.
4-9
4.4 Security Policy Change Procedures
To apply a changed security policy to SecuwayGate 100 after
changing the security policy in SecuwayCenter 2000, select
 from the menu of SecuwayCenter
2000 while the communication between SecuwayCenter
2000 and SecuwayGate 100 is working properly.
For more detailed procedures, refer to the SecuwayCenter
2000 Guide.
4-10
Chapter 4
Operating SecuwayGate 2000
4.5 Content Security
Content security applies the state analysis method to the
application-level to analyze and control the contents of the packet. It
refers to a function to prevent or convert the access by analyzing the
inbound packets and outbound packets. Among various content
security schemes, SecuwayGate 100 supports FTP filtering,
HTTP content filtering, and SMTP filtering. The packet filters
implemented in a firewall examine and control the incoming packets
with the user-specified filtering rules. SecuwayGate 100 filters all the
incoming and outgoing packets, except a few types of special packets
including broadcasting packet and Non-IP packet.
In general, three types of content security measures are widely used:
Packet Filtering, Application-level Proxy, and State analysis.
SecuwayGate 100 employs the State analysis method. These
three types of filtering methods are briefly explained below.
Packet Filtering
Packet filtering refers to the technology that collects the IP header
(which usually contains source IP, destination IP, and port number)
and protocol (e.g. TCP, UDP, ICMP, etc.) header and determines
which network packets to allow through the firewall in accordance
with the predefined security policies. Most routers have packet
filtering as a built-in feature, and most firewall solutions provide
this feature as well.
Application
Application
Session
Session
Transport
Packet Filtering
Transport
Network
Network
Network
Link
Link
Link
Physical
Physical
Physical
Sender
Packet-filtering Firewall
Receiver
- Strengths
Because of its simplicity, packet filtering is easy to implement. Since
a few basic rules need to be applied to check packets, packet filtering
is also very fast. Its transparent operation presents another strength
to users.
4-11
- Weaknesses
With packet filtering, it is impossible to implement a sophisticated
filtering rule for complicated network or service. Since it passes or
drops according to the limited number of simple access control rules,
packet filtering is too simple to act as a firewall and to protect the
internal resources effectively from the external intrusions.
Application-level Proxy
Application-level Proxy acts as a link between an external network
(the client) and a specific internal resource (the application server).
Acting as an application server to the client and as a client to the
application server, the application-level proxy intermediates the
communication between the two entities, as if the client directly
communicates with the application server. The application server
only recognizes that it is communicating with a client of the proxy
server , and does not have further information about the specific
client.
Application
Application
Application
Session
Session
Session
Transport
Transport
Transport
Network
Network
Network
Link
Link
Link
Physical
Physical
Physical
Sender
Application Proxy Firewall
Receiver
- Strengths
In an application-level proxy firewall environment, only the proxy
server is known to the external network, which enables complete
non-disclosure of the internal computer network system (e. g. IP
address).
- Weaknesses
Since a separate proxy server is required for each application service
4-12
Chapter 4
Operating SecuwayGate 2000
(e.g. FTP proxy server, TELNET proxy server, HTTP proxy server), it
is required to implement a proxy server for each internet service
provided by your organization.
If your organization decides to introduce a new internet service, it
may be impossible or may take a long time to implement the
relevant proxy server, especially when the internet service your
organization implements is not made of an industry-standard
protocol or unknown source codes.
It is also disadvantageous that each application requires a separate
user authentication process. In addition, the client software or user
module needs to be modified in most cases.
State analysis
State analysis does more than simply filter packets with the
information within the packet headers. It interprets and examines
the whole contents of a packet, from the network layer to the
application layer. It keeps track of incoming packets over a period of
time and determines whether to allow the packets to pass through
the firewall.
Application
Application
Application
Session
Session
Session
Transport
Transport
Transport
Network
Network
Network
Link
Link
Link
Physical
Physical
Physical
Maintain state
analysis table
For example, the first packet received in a session is compared with
the pre-configured set of access rules and the packet information is
added to the state analysis table. Once it is determined whether to
pass the first packet through the firewall, and the following packets
are automatically passed or dropped according to the results of the
state analysis. When the session is closed, the state information
entry in the state analysis table is deleted, but a set of derivative
access rules from the analysis results is reflected the state to enable
dynamic packet filtering.
4-13
You can also gather similar state information from the application
data of a stateless protocol(e.g. UDP or RPC) packet. If an
application service requires inspection against all application data, it
is also possible to apply additional application-level processing to
each packet for inspection.
In short, state analysis basically adopts the packet filtering
technique and imitates application-level proxy technique to
interpret and filter application data with far less overload than the
application-level proxy. In comparison with the application-level
proxy, a state analysis-based firewall offers a similar filtering
capability but with much more enhanced performance. The
transparent packet filtering feature for user applications is also a
good reason to choose state analysis.
Based on this state analysis technique, SecuwayGate 100 offers
you highly efficient filtering mechanism and powerful content
security.
5-1
Chapter 5
Console
Commands
In order to use the console commands in SecuwayGate 100,
you must connect the PC to the Console port at the rear of the
SecuwayGate 100.
『 Chapter 5 Console Commands 』 describes how to log in to
SecuwayGate 100 and use console commands with the Hyper
Terminal program.
5-2
Chapter 5
Console Commands
5.1 Connecting SecuwayGate 100
Step 1. Running Hyper Terminal Program
Connect the console port of SecuwayGate 100 and the
connector linked to the serial port of a laptop or PC.
SecuwayGate 100
PC used to execute console commands
A Administrators connect to SecuwayGate 100 from a host in the
protected network or form a PC installed with SecuwayClient 2000
Once you have established the connection, execute the Hyper
Terminal program by selecting Æ Æ
Æ Æ  in the
PC, which you will use as a console window.
Step 2. Configuring Hyper Terminal Environment
Once the Hyper Terminal is executed, select an icon and configure
the connection environment in the order of ‘Connection name’ Æ
‘COM port’ Æ ‘Port properties’
- Connection name entry
5-3
In this example, we entered “Upgrade” for the connection name. You
may choose any name you want. Then click OK. The following
dialogue box for setting the port to use for the connection will
appear.
- Com port setting
Select the port to connect. For connecting to the console port, direct
connection to COM1 or COM2 is usually selected. After checking the
actually connected port, click OK. Then the environment for the port
to connect will be set as follows.
- Setting environment for the connection port
When you select the port, the following dialogue box for setting
environment for the port will appear. Configure it as shown in the
figure. Be sure to set the bit per second to 38400 and select None for
the Flow control. Otherwise normal connection is disabled for some
5-4
Chapter 5
Console Commands
cases. Therefore you should set it just as indicated in the following
figure.
Confirming Correct Connection
After finishing the hyper-terminal settings, you will be able to log on
as shown below. For login ID and password, you may enter the ones
that have been previously issued from the master token issuer in
SecuwayCenter 2000.
The SecuwayGate 100 will only accept 3 failed login attempts for the
Security Administrator account, and will the deny login attempts for a period
of five minutes. This functionality can be disabled by the Security
Administrator for that SecuwayGate
100, if required.(see “sv
5-5
command” in chapter 5 Console Commands)
When the SecuwayGate 100 Security Administrator account is inactive
for 2 minutes, then it will logoff automatically.
5-6
Chapter 5
Console Commands
5.2 How to Use Commands
You can use console commands when your PC is connected to the
console port of SecuwayGate 100 or when a remote PC is
enabled to connect to a Telnet program from the outside.
A Administrators connect to SecuwayGate 100 from a host in the
protected network or from a PC installed with SecuwayClient 2000
The term ‘SecuwayGate’ mentioned in this document is a common
designation
of
SecuwayGate
2000,
SecuwayGate
1000,
SecuwayGate 100 and RenoGate.
The List of Commands
Command
addlog
advanced
arp
arp_hash
authinfo
Purpose
SecuwayGate forcibly generates a dummy log,
and transmits the log to SecuwayCenter 2000.
The log is used for verifying normal operation of log
transmission.
When functions are executed such as input,
correction and deletion of routing scripts, the
routing scripts stored in SecuwayCenter 2000
or Flash are executed upon system restarting or
receiving the policies, and control operation of
different services (daemons).
The command is similar to Linux arp command. The
command displays arp table, and adds or deletes arp
entries.
Caches arp to determine use of arp, and searches for
the current arp cache.
Displays the job list under user authentication (e.g.,
IP address, processing status, error number,
timestamp, retrial count and message length) and
the information list of user authentication in the
active session (i.e., session list of each user ID).
5-7
autoup
bypass
capture
center
change_ip
chk_gateway
cpuinfo
crypto
date
debug
del
delses
Automatically upgrades firmware or harmful
databases.
Ignores
the
security
policies
applied
to
SecuwayGate, and changes communication
between specific networks to bypass. This command
is
available
before
communication
with
SecuwayCenter
2000
after
entering
SecuwayGate setup information.
Displays brief header information of IP and TCP for
packets entered/displayed in/on specific IP or port.
Executing this command may degrade performance
of the system, and is only recommended for simple
packet inspection. The function is released with
'capture 0.'
Displays
or
changes
IP
address
of
SecuwayCenter 2000 currently stored in
SecuwayGate.
Changes
SecuwayGate
IP
and
SecuwayCenter
2000
IP
set
on
SecuwayGate objects.
Searches for a gateway for specific IP on specific
interface.
Displays information of CPU and system of
SecuwayGate.
Tests
the
boards
upon
acceleration
of
encryption/decryption. Devices available of testing
include FSC2002, Bud-F(FACE), and CAFE.
Algorithm test is available for FSC2002 only, and
stress test for FACE or cafe only. Every 5000th
testing
indicates
success
or
failure
of
encryption/decryption.
Converts the time currently set on the gate into UTC
and RTC type, or sets the time.
Converts the time currently set on the gate into UTC
and RTC type, or sets the time.
Erases and initializes the details including IPSecrelevant tables. The table initialized for respective
option is as follows:
Erases the session information.
5-8
Chapter 5
Console Commands
dev
dhcp
entry
eraseobj
failover
findcenter
get_arp
help
history
icmp
ipconfig
import
ip_hash
ip_verify
lb
lbinfo
lineinfo
It is possible to show information of devices and
systems, and change attributes (e.g., duplex and
speed) of the interface.
dhcp ip Shows or changes allocation information.
Shows items in the session table.
Erases the objects containing the security
information of SecuwayGate, and initializes
SecuwayGate.
Displays the failover operation mode of the current
SecuwayGate on the screen.
Searches for the location (interface number) of
SecuwayCenter 2000 communicating with
SecuwayGate, or stops searching.
Transmits ARP Request of concerned IP to the
specified interface.
Displays a list of available commands.
Shows the commands used on the shell so far.
Defines whether allowing ICMP communication or
not. The command is only available before
communication with SecuwayCenter 2000
after entering the initial setup information.
Same as existing Linux command. The command is
used when showing configuration information of the
whole interfaces, setting IP of specific interface or
stopping operation.
Initializes SecuwayGate with the initial files of
SecuwayGate issued from SecuwayCenter
2000, or enters the certificate.
Displays device (interface) information of a certain
IP on the screen, which is kept for a certain period
(as a hash table format). This command is mainly
used for verifying IP validity of the concerned device.
Inspects valid network belonging to IP address.
Shows the Line Load Balancing status. Inspects the
status of the leased line/VPN line/router backup
when using the line option.
Displays user ID and password of a line where Line
Load Balancing is set to..
Same as lb line command.
5-9
log
lookup
ls
mainfo
netstat
nvram_info
obj
ping
pppoe
proxy_arp
proxy_ip
reset
rhosttab
romc
route
session
set_mac
It is possible to check logs accumulated on
SecuwayGate, which have not been transmitted
to the log server.
The function finds IP address and MAC address
corresponding with the host name, and displays the
results on the screen.
Same as the help command.
The function controls starting or aborting MA, and
checks the system status information managed by
MA.
Displays the socket information of SecuwayGate.
Displays the nvram information.
Shows the objects of Gate.
Operates in a manner same as normal ping. Ping
uses
the
ICMP
protocol's
mandatory
ECHO_REQUEST datagram to elicit an ICMP
ECHO_RESPONSE from a host or gateway.
ECHO_REQUEST datagrams (“pings”) have an IP
and ICMP header, followed by a “struct timeval” and
then an arbitrary number of “pad” bytes used to fill
out the packet.
Verify the status of PPPoE.
Adds or deletes concerned entries to or from Arp
Proxy Table, or searches for the entries from the
table and displays the results.
Displays the Proxy IP information of the concerned
IP on the screen.
Reboots SecuwayGate.
The command is relevant to the hash table to seach
for SA of the remote host.
Displays the SecuwayGate flash memory
information.
Shows the routing table registered on the system,
and adds or deletes routing information.
Shows the session table.
Changes the MAC address of SecuwayGate.
5-10
Chapter 5
Console Commands
status
sv
sysbg
syslog
task
ted
timereq
traceroute
Displays
the
system
information
of
SecuwayGate, statistical information of packets
for each protocol, and the packet filtering status.
Dependent upon the options, it is possible to verify
the detail statistical data, the interface status and the
processing rate about transmitted and received
packets of the IP/TCP/UDP/ICMP protocols.
The command controls each flag value.
Displays the system log messages stored in the
backup SRAM of SecuwayGate 1000/2000 on
the screen.
Displays information of IP/port, number of
SecuwayCenter 2000 logs and the log types of
the server relevant to Syslog.
Viewing the kernel task list
SecuwayGate performs TED for the gate set on
the IPSec gate list based on the IPSec gate list set to
SecuwayCenter 2000 or GateAdmin, and
manages information of the counterpart gate in the
table. The ted command verifies the TED table (or
the VPN table) status, or manually performs TED.
Tests SecuwayCenter 2000 and the time
service. Upon system booting, SecuwayGate first
transmits
the
TimeRequest
packets
to
SecuwayCenter 2000 to synchronize the time
with SecuwayCenter 2000.
Plays a role same as the traceroute command on
Linux. The Internet is a large and complex
aggregation of network
hardware, connected together by
gateways.
Tracking the route one's packets follow (or finding
the miscreant gateway that's discarding your
packets) can be difficult. Traceroute utilizes the IP
protocol `time to l' field and attempts to elicit an
ICMP TIME_EXCEEDED response from each
gateway along the path to some host.
5-11
trap_buf
upgrade
version
view_traffic
xurl
xurl_db
ldap
p1info
pki
pic
sainfo
secinfo
view_tid
Once a trap takes place such as memory violation,
the command stores the monitor message in the
consoles as well as the flash memory in object id 14.
Therefore, it is possible to obtain various
information by analyzing the dump message.
The command upgrades the firmware. The
command first runs the upgrade daemon to the gate,
and receives and processes images when firmware
files are transmitted to the network. UDP protocol
port 9876 is used for upgrade. Please note that data
relevant to upgrade is not affected by the security
policies.
Displays the firmware version information, the
compiling date and the compiling option
information of SecuwayGate.
It is possible to verify the current CPU utilization,
memory utilization, number of sessions, and traffics
of SecuwayGate.
Checks the harmful site database provided from
SafeNet for any URL, or inspects the autonomy
grade of the concerned URL. The harmful site
database contains overseas sites, not domestic sites.
Manages the harmful site database.
Gains access to the LDAP server to search for CRL.
Shows the detail information of SA in step 1.
Shows the PKI information.
Shows information of PIC operation and SA. PIC is
used for authentication of Remote Access Client in
GateAdmin environments.
Shows the SA-relevant table.
Shows the IPSec-relevant table.
Displays the TID table on the screen.
Detailed Description of each Commands
Please refer to “SecuwayGate Console Commads” maual for futher
information on how to use SecuwayGate 100 console commands
6-1
Chapter 6
Upgrading
Firmware
The firmware of SecuwayGate 100 can be upgraded, if
necessary. The following section describes the firmware upgrading
procedures.
The administrator can load new firmware to upgrade functions
provided by SecuwayGate 100.
6-2
Chapter 5
Console Commands
6.1 Preparations for upgrade
Prepare PC with the HyperTerminal program and SecuwayGate
100 firmware loading program Lanload.exe which is included in
the installation CD.
Cable Connection
1. Connect the serial port of the PC and RS-232C port of
SecuwayGate 100 with the console connector as shown in the
following figure. (Use normal LAN cable as the connector).
2. Connect any one of the ports Net1, Net2, Net3, and Net4 of
SecuwayGate 100 with the LAN port of PC. For explanation
purposes, port Net3 is chosen in the figure.
LAN Port
Net3 Port
Serial Port
RS-232C Port
6-3
6.2 Loading Firmware
Configuring HyperTerminal
1. Select [New Connection], input the name for the connection, and
click OK.
2. Configure Modem to Connect to COM1. (This may vary depending
on your PC configuration.)
6-4
Chapter 5
Console Commands
Setup port Net3onfiguration as shown in the following figure.
3. Click OK, and the HyperTerminal window will be displayed. In the
window, press  key to connect to SecuwayGate 100,
and a screen will be displayed allowing ID and password input.
6.3 Logon SecuwayGate 100
1. In the Hyper Terminal window, enter the registered login ID and
password.
2. Specify the port number of SecuwayGate 100 used to
upgrade the program in the following format (‘upgrade 2’, in this
case). Here ‘0’ means the port Net1 on the rear side, and ‘1’, ‘2’,
and ‘3’ refer to Net2, Net3, and Net4, respectively. In this case,
the Net3 is connected to the internal LAN, therefore you need to
type “upgrade 2” when prompted.
6-5
6-6
Chapter 5
Console Commands
6.4 Executing ‘Upgrade’ File
The ‘upgrade’ file is used to upgrade the existing firmware of
SecuwayGate 100.
Two firmware upgrade methods are supported in SecuwayGate
100: Initial and Normal. You can select either upgrade type in the
‘FirmUpgrade’ window, which appears when you execute
FirmUpgarde.exe.
Initial
Normal
Refers to upgrading in debug mode. Debug mode is a
pre-operation phase in which SecuwayGate 100
is completely reset. If you upgrade a firmware in
debug mode, the new firmware is automatically
reloaded and adopted in SecuwayGate 100.
Refers
to
upgrading
the
firmware
to
SecuwayGate 100 currently in operation. T
upgraded firmware is adopted only when the
admionistrator resets SecuwayGate
100
manually.
“Normal(N)” firmware upgrade type is widely used for its convenience.
6-7
6.4.1 Upgrading Firmware
Initial (I) Upgrade Type
1. Reset SecuwayGate 100. When you reboot SecuwayGate
100, press “~” key in the Hyper Terminal window and enter the
debug mode. The following figure is displayed:
2.Type “0” to enter the debug mode, and type “0” again. The Gate
100 prompt appears.
3. Type “x 0” and press ‘Enter’.
6-8
Chapter 5
Console Commands
4. Type “ll 2 IP address of SecuwayGate 100” and press ‘Enter’. The
“speedo_open ok.” message is displayed.
5. Execute FirmUpgarde.exe in a PC to which SecuwayGate 100
is connected. The ‘FirmUpgrade’ window appears. In the ‘Gate IP
Address’ field, enter the IP address of the Net3 port. Select ‘Initial’
for the ‘Upgrade Type’ field. The ‘Upgrade Port’ is already set to
‘9876’. If you edit this value, the system may not work properly.
Click [Start].
6-9
Enter the IP address of
Net3 port
6. The ‘ FirmUpgarde Configuration’ window appears. Specify the
location of the firmware upgrade file in ‘ File Name’
[Browse] and selecting the file. Click [OK].
Firmware
Index
by clicking
Transfers the firmware as well as the DB that blocks
harmful sites to SecuwayGate 100.
Indicates the memory allotment index of
SecuwayGate 100. While the index No. 1~8 are
pre-assigned to store the firmware, the index No. 9 is
assigned to the DB for blocking harmful sites.
Usually, No. 1 is used to store the firmware. It is
because SecuwayGate 100 starts to check the
availability of the firmware with the index No. 1 and
loads the first one available in the index. If no
6-10
Chapter 5
Console Commands
firmware is available in the index No. 1, it checks the
index in the order of No.2, 3, 4, … 8 to load the first
available firmware.
The name of a firmware file is either ‘first’ or ‘firm’. If you are updating the
firware in initial mode, you must select the firmware named as ‘first’.
Click [OK]. The ‘Download’ window appears to show you the process
of transmitting the firmware file to SecuwayGate 100 as shown
below.
Once the file transmission is completed, “Download completed”
message appears.
If the firmware transmission is completed, you will see the following
messages in the Hyper Terminal window, and SecuwayGate
100 is automatically reset.
6-11
6-12
Chapter 5
Console Commands
Normal (N) Upgrade Type
1. Execute FirmUpgarde.exe in a PC to which SecuwayGate 100
is connected. The ‘FirmUpgrade’ window appears. In the ‘Gate IP
Address’ field, enter the IP address of the Net3 port. Select the
‘Initial’ for ‘Upgrade Type’ field. The ‘Upgrade Port’ is already set to
‘9876’. If you edit this value, the system may not work properly.
Click [Start].
Enter the IP address of
Net3 port.
2. The ‘ FirmUpgarde Configuration’
window appears. Specify the
location of the firmware upgrade file in ‘ File Name’
[Browse] and selecting the file. Click [OK]
by clicking
The name of a firmware file is either ‘first’ or ‘firm’. If you are updating the
firware in normal mode, you must select the firmware named as ‘firm’.
6-13
Click [Transmit]. The ‘Download’ window appears to show you the
process of transmitting the firmware file to SecuwayGate 100
as shown below
You can also verify the firmware downloading process in the “Index:
0x1” section of the Hyper Terminal.
Once the file transmission is completed, “Download completed”
message.
3. If the firmware transmission is completed, execute “reset” in the
Hyper Terminal. To apply the ungraded firmware, you must execute
“reset”command.
6-14
Chapter 5
Console Commands
4. SecuwayGate 100 is restarted once the firmware has been
upgraded.
6-15
6.5 Checking Firmware Loading
The version of the firmware can be checked through HyperTerminal
on the PC connected to the SecuwayGate 100 console. To check
the version of the firmware, type the “version” command.
ApCpheanpdtie
xrA7
Q&
&A
AA
Abboouutt
SeacyuGw
yG
Secuw
aa
te
1a
0t0e
100
1) I want to change the IP address of the SecuwayGate 100 which is
in use. What should I do?
In order to change the IP address of the SecuwayGate 100
which is in use, select the [Modification] feature in the [Gate
Management (G)] in SecuwayCenter 2000. After changing
features, you must send the changed features using [Resend (R)],
and in particular when you have changed the IP address, you must
run [Gate Restart (T)].
2) Is it mandatory to use the four ports, i.e., Private, Multi, Public, and
Black Zone ports at the rear for their specified purposes?
The four ports Net1 (Private), Net2 (Multi), Net3 (Public), Net 4
(Black Zone) are specified for user convenience, and you don’t have
to use them for their specified uses. In actual application, the
administrator may use the four ports in his/her discretion for
operational convenience.
Because the four ports at the rear are controlled by valid network
setting and security policy in SecuwayCenter 2000, they may
not be used for Private, Multi, Public, and Black Zone as specified,
but for separating the network into four networks to control each
network individually.
3) How can I change the security policy of SecuwayGate 100?
7-2
Chapter 5
Console Commands
After changing the security policy in SecuwayCenter 2000,
send it to SecuwayGate 100 on-line. Then the changed
security policy will be applied immediately. The SecuwayGate
2000 administrator cannot insert or delete a security policy by
accessing through the Console port or Telnet. If the security policy
needs to be changed, you must ask the administrator of
SecuwayCenter 2000 to do it.
4) When moving the SecuwayGate 100 to another place, what
settings should be changed?
You must consider the following two cases when moving the system
to another place. If the TCP/IP related information is changed, you
must change and transmit the IP address or other network
information, before moving the SecuwayGate 100 or you must
have the initial setting smart card reissued from
SecuwayCenter
2000
and
then
import
it
into
SecuwayGate 100 after moving.
5) How can I stop the use of SecuwayGate 100 in emergency?
In order to stop it, you must first discuss with the administrator of
SecuwayCenter 2000 or Gate Admin, and then run the [Stop
Service] in the [Gate (G)] menu in SecuwayCenter 2000
6) is the meaning of the “Valid network” and the reason of setting it
with the issuance of SecuwayGate 100?
Valid network is a set of valid IPs of the hosts connected to each
interface, i.e., Net1, Net2 and Net3. Valid network must be set in
order to decide the paths through which received packets are sent.
By setting the valid network, you can also prevent IP Spoofing by
verifying the validity of the starting IP address. If the valid network
is incorrectly configured, the IP spoofing error message will appear
in SecuwayCenter 2000, and it may cause such problems as
the data accepted on security policy are transferred to other
interfaces and do not arrive at the destination. For details on
setting valid network, please refer to the User’s Guide for
SecuwayCenter 2000 .
7) It is said that SecuwayGate 100 processes the send/receive
packets through the conditional analysis method. How does it
manage sessions? In other words, when is the time that the session
is registered and deleted?
For TCP, the session is registered when the Syn packet is received,
and for UDP, it is registered when the Data packet enters. In both
cases, the session can be registered only when the security policy is
in the “Accept” state in SecuwayGate 100.
The time when the session is deleted is different with Firmware
versions for TCP. In version 1.5, 2.0 and higher, the session is
deleted when the Timeout value of the security policy is exceeded in
SecuwayCenter 2000, or FIN or Reset Packet is received. On
the other hand, in hardware of versions lower than 1.5,2.0, the
session is deleted only when the FIN or Reset Packet is received.
Therefore, when the session finishes abnormally in the PC or server,
the sessions will be accumulated. For UDP, because the session
timeout value is set to 30 seconds regardless of firmware versions,
the session will be canceled when packet transmission time exceeds
30 seconds for the session.
8) What types of L4 switches support load balancing by interoperation
with SecuwayGate 100 (VPN) equipment?
1) Radware: FireProof
2) Piolink: Pinkbox1016
3) Alton: AD3, 180e
9) When should we reboot SecuwayGate 100 due to modification of
information in SecuwayGate 100?
1) When the IP of SecuwayGate 100 is changed.
2) When upgrading firmware.
3) You don’t have to reboot when the valid network is changed.
10) Does the SecuwayGate 100 equipment support line/server loadbalancing feature?
7-4
Chapter 5
Console Commands
SecuwayGate 100 supports both line load-balancing (LLB)
and server load-balancing (SLB).
LLB enables the duplication of the Internet lines with two ADSL
lines, or with one ADSL line and one dedicated line, enhancing
availability of the Internet. LLB decides its line by combination of
the starting IP address and destination IP address, and make it
possible that all communication will be processed through the
remaining line even if one line fails.
SLB checks the availability of the homogeneous servers, enabling
continuous service. The methods of supporting SLB include: server
inspection by using PING to check the activation of the server,
server inspection by checking the use of the service, round-robin
method for service distribution to servers and the number of
sessions method.
11) Does the firewall features of SecuwayGate 100 include blocking
of harmful websites?
SecuwayGate 100 supports the feature to block harmful
websites through HTTP Content filtering function. You can block
the access to the hosts containing specific character strings, or to
specific directories or files. In addition, the feature of filtering
various dangerous scripts (JavaScript, VBScript, etc.) is provided.
12) Can SecuwayGate 100 be operated on other vendors’ NMS
program?
SecuwayGate 100 supports SNMP V1.0 to enable its operation
on other vendor’s NMS’s. However, due to various security
problems, not all SNMP functions are supported. Only viewing is
allowed for most functions.
13) What should be checked, if file upload fails after going through
SecuwayGate 100 using a fixed IP?
For ADSL modems, there is a limit in MTU size. It is typical that the
size is limited for floating IPs, but not for fixed IPs. Samsung ADSL
modems generally fall in this case, but Hyundai ADSL modems are
usually configured to limit the MTU size for fixed IPs by default. If
file upload fails on the Internet or into tunnels after installing
SecuwayGate 100, the ADSL modem must be checked. You
can determine that this is the problem if a file of 1 Kbytes is
uploaded but a file of over 2 Kbytes is not uploaded.
14) Which ports are used for various messengers?
ICQ / AOL: 5190
Chollian (CQM) : 1421
Bluebird: 3300
MSN: 1863
Soft Messenger: 5004
Netsgo (Minigo): 5004
Yahoo: since Yahoo cannot be controlled by port, you should block
cs.yahoo.com or scsa.yahoo.com. However, you must be careful
because if you block these two sites, it may not be possible to access
yahoo.com itself.
For some of the above ports, only the login ports are listed. (If you
block only the login port, access is disabled.)
15) Can ADSL fixed and floating lines and the ADSL lines of different
vendors be used together?
With KT’s ADSL line, line load balancing and fail-over are normally
operated for all situations such as fixed/fixed, floating/ floating,
and fixed/ floating, as well as with Hanaro Telecom and
Thrunet.

- When setting ADSL LLB: For [fixed/fixed] or [fixed/ floating]
configuration, the NAT Rule is applied (in fixed IP) to allow
access to external Web. However, for floating [/floating]
configuration, no extra NAT Rule is required.
When setting ADSL fail-over: it correctly operates for all
situations such as modem’ s power off, line cut-off of
modem or gate, and serial line cut-off of the modem.
7-6
Chapter 5
Console Commands
16) What is the PIN arrangement of the SecuwayGate 100’s console
cable?
Numbers marked in the console connector
Line color
Yellow
Green
Red
Brown
15.Jan. 2004 Future Systems, Inc.
7,8F, Koland Bldg, 1009-1, Daechi-dong, Knagnam-gu, Seoul, 135-851 Korea
Tel : +82-2-3468-7777 , Fax : +82-2-3468-7700
Homepage : http://www.future.co.kr

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
Creator                         : .歯.FCC040401.hwp
Create Date                     : 2004:04:02 18:06:15
Title                           : .歯.FCC040401.PDF
Author                          : .歯.심재응
Producer                        : Acrobat PDFWriter 4.0 Windows¿ë
Modify Date                     : 2004:04:02 18:09:36+09:00
Page Count                      : 49
EXIF Metadata provided by EXIF.tools
FCC ID Filing: PN4FGT100

Navigation menu