SofaWare Technologies SBXW-166LHGE-4 Wireless Broadband Router User Manual Internet Security Appliance
SofaWare Technologies Ltd. Wireless Broadband Router Internet Security Appliance
Contents
- 1. DoC Revised
- 2. Users Manual Part 1
- 3. Users Manual Part 2
Users Manual Part 1
Check Point Safe@Office Internet Security Appliance User Guide Version 4.6 Part No: 700797, June 2004 COPYRIGHT & TRADEMARKS Safety or Performance and could result in violation of Part 15 of the FCC Rules. Copyright © 2004 SofaWare, All Rights Reserved. No part of this document may be reproduced in any form or by any means without written permission from SofaWare. When installing the appliance, ensure that the vents are not blocked. Information in this document is subject to change without notice and does not represent a commitment on part of SofaWare Technologies Ltd. Do not expose the appliance to liquid or moisture. SofaWare, Safe@Home and Safe@Office are trademarks, service marks, or registered trademarks of SofaWare Technologies Ltd. Do not drop, throw, or bend the appliance since rough treatment could damage it. Check Point, the Check Point logo, FireWall-1, FireWall-1 SecureServer, FireWall-1 SmallOffice, FloodGate-1, INSPECT, IQ Engine, Meta IP, MultiGate, Open Security Extension, OPSEC, Provider-1, SecureKnowledge, SecureUpdate, SiteManager-1, SVN, UAM, User-to-Address Mapping, UserAuthority, Visual Policy Editor, VPN-1, VPN-1 Accelerator Card, VPN-1 Gateway, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, and VPN-1 Edge are trademarks, service marks, or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668 and 5,835,726 and may be protected by other U.S. Patents, foreign patents, or pending applications. Do not use the appliance outdoors. Do not expose the appliance to extreme high or low temperatures. Do not use any accessories other than those approved by Check Point. Failure to do so may result in loss of performance, damage to the product, fire, electric shock or injury, and will void the warranty. Do not disassemble or open the appliance. Failure to comply will void the warranty. Do not route the cables in a walkway or in a location that will crimp the cables. POWER ADAPTER The appliance should only be used with the power adapter provided. The power adapter should be plugged into a surge protected power source. In addition, be careful not to overload the wall outlets, extension cords, etc. used to power this unit. Connect the power adapter only to power sources as marked on the product. To reduce risk of damage to the electric cord, remove it from the outlet by holding the power adapter rather than the cord. SAFETY PRECAUTIONS Carefully read the Safety Instructions the Installation and Operating Procedures provided in this User's Guide before attempting to install or operate the appliance. Failure to follow these instructions may result in damage to equipment and/or personal injuries. Before cleaning the appliance, unplug the power cord. Use only a soft cloth dampened with water for cleaning. Any changes or modifications to this product not explicitly approved by the manufacturer could void any assurances of SECURITY DISCLAIMER The appliance provides your office network with the highest level of security. However, no product can provide you with absolute protection against a determined effort to break into your system. We recommend using additional security measures to secure highly valuable or sensitive information. Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. Contents Contents Chapter 1: Introduction ................................................................................... 1 About Your Check Point Safe@Office Appliance ......................................... 1 Safe@Office Products .................................................................................... 2 Safe@Office 105 ........................................................................................ 2 Safe@Office 110 ........................................................................................ 2 Safe@Office 225 ........................................................................................ 3 Safe@Office 225U ..................................................................................... 3 Safe@Office 300 ........................................................................................ 4 Safe@Office 300W .................................................................................... 4 Safe@Office Features and Compatibility ....................................................... 4 Connectivity................................................................................................ 4 Firewall....................................................................................................... 6 VPN ............................................................................................................ 8 Management ............................................................................................... 9 Optional Security Services ....................................................................... 10 Package Contents...................................................................................... 11 Network Requirements ............................................................................. 13 Getting to Know Your Safe@Office 100 Series........................................... 14 Rear Panel................................................................................................. 14 Front Panel................................................................................................ 15 Getting to Know Your Safe@Office 200 Series........................................... 17 Rear Panel................................................................................................. 17 Front Panel................................................................................................ 19 Getting to Know Your Safe@Office 300 Series Appliance ......................... 20 Contents Contents Rear Panel................................................................................................. 20 Front Panel................................................................................................ 22 About This Guide ......................................................................................... 24 Contacting Technical Support ...................................................................... 24 Chapter 2: Installing and Setting up the Safe@Office Appliance .............. 25 Before You Install the Safe@Office Appliance............................................ 25 Windows 2000/XP.................................................................................... 26 Windows 98/Millennium .......................................................................... 31 Mac OS..................................................................................................... 37 Wall Mounting the Appliance....................................................................... 38 Network Installation ..................................................................................... 40 Setting Up the Safe@Office Appliance ........................................................ 41 Chapter 3: Getting Started ............................................................................ 45 Initial Login to the Safe@Office Portal........................................................ 45 Logging on to the Safe@Office Portal ......................................................... 47 Accessing the Safe@Office Portal Remotely ............................................... 49 Using the Safe@Office Portal ...................................................................... 50 Main Menu ............................................................................................... 52 Main Frame............................................................................................... 53 Status Bar.................................................................................................. 53 Logging off ................................................................................................... 56 Chapter 4: Configuring the Internet Connection ........................................ 57 Overview ...................................................................................................... 57 Using the Internet Wizard............................................................................. 58 Using a Direct LAN Connection .............................................................. 60 Using a Cable Modem Connection........................................................... 61 ii Check Point Safe@Office User Guide Contents Using a PPTP or PPPoE Dialer Connection ............................................. 62 Using PPPoE............................................................................................. 63 Using PPTP .............................................................................................. 64 Using Internet Setup ..................................................................................... 66 Using a LAN Connection ......................................................................... 68 Using a Cable Modem Connection........................................................... 70 Using a PPPoE Connection ...................................................................... 71 Using a PPTP Connection ........................................................................ 73 Using a Telstra (BPA) Connection ........................................................... 75 Using a Dialup Connection....................................................................... 77 Using No Connection ............................................................................... 79 Setting Up a Dialup Modem ......................................................................... 84 Cloning a MAC Address............................................................................... 86 Viewing Internet Connection Information.................................................... 88 Enabling/Disabling the Internet Connection................................................. 89 Using Quick Internet Connection/Disconnection ......................................... 90 Configuring a Backup Internet Connection .................................................. 91 Setting Up a LAN or Broadband Backup Connection .............................. 91 Setting Up a Dialup Backup Connection .................................................. 92 Chapter 5: Managing Your Network............................................................ 93 Configuring Network Settings ...................................................................... 93 Configuring a DHCP Server ..................................................................... 94 Changing IP Addresses........................................................................... 100 Enabling/Disabling Hide NAT ............................................................... 101 Configuring a DMZ Network ................................................................. 102 Configuring a WLAN Network .............................................................. 104 Contents iii Contents Configuring High Availability.................................................................... 117 Using Traffic Shaper................................................................................... 120 Adding and Editing a Class .................................................................... 122 Deleting Classes ..................................................................................... 127 Restoring Traffic Shaper Defaults .......................................................... 128 Using Network Objects............................................................................... 129 Adding and Editing Network Objects..................................................... 130 Viewing and Deleting Network Objects ................................................. 136 Using Static Routes..................................................................................... 137 Adding a Static Route............................................................................. 137 Viewing and Editing Static Routes......................................................... 139 Deleting a Static Route ........................................................................... 140 Chapter 6: Viewing Reports ........................................................................ 141 Viewing the Event Log ............................................................................... 141 Viewing Computers .................................................................................... 144 Viewing Connections.................................................................................. 147 Chapter 7: Setting Your Security Policy .................................................... 149 Setting the Firewall Security Level............................................................. 149 Configuring Servers.................................................................................... 152 Using Rules................................................................................................. 154 Adding and Editing Rules....................................................................... 157 Deleting Rules ........................................................................................ 163 Defining an Exposed Host .......................................................................... 163 Chapter 8: Using Subscription Services ..................................................... 165 Connecting to a Service Center................................................................... 165 Viewing Services Information .................................................................... 169 iv Check Point Safe@Office User Guide Contents Refreshing Your Service Center Connection.............................................. 171 Configuring Your Account ......................................................................... 171 Disconnecting from Your Service Center................................................... 172 Web Filtering .............................................................................................. 172 Enabling/Disabling Web Filtering .......................................................... 173 Selecting Categories for Blocking .......................................................... 174 Temporarily Disabling Web Filtering..................................................... 174 Virus Scanning............................................................................................ 175 Enabling/Disabling Email Antivirus....................................................... 176 Selecting Protocols for Scanning............................................................ 177 Temporarily Disabling Email Antivirus ................................................. 177 Automatic and Manual Updates ................................................................. 179 Checking for Software Updates when Locally Managed ....................... 179 Checking for Software Updates When Remotely Managed ................... 180 Chapter 9: Using SecureDesk ...................................................................... 183 Installing McAfee VirusScan ASaP............................................................ 184 Updating McAfee VirusScan ASaP on All Computers .............................. 186 Setting the SecureDesk Security Level....................................................... 186 Checking Antivirus Compliancy ................................................................ 189 Overriding SecureDesk............................................................................... 195 Viewing SecureDesk Reports ..................................................................... 196 Chapter 10: Working With VPNs ............................................................... 199 Overview .................................................................................................... 199 Site-to-Site VPNs ................................................................................... 201 Remote Access VPNs ............................................................................. 203 Setting Up Your Safe@Office Appliance as a Remote Access VPN Server204 Contents Contents Adding and Editing VPN Sites using Safe@Office 110 and 225 ............... 206 Configuring a Remote Access VPN Site ................................................ 208 Configuring a Site-to-Site VPN Gateway............................................... 219 Creating a PPPoE Tunnel ....................................................................... 228 Deleting a VPN Site.................................................................................... 231 Enabling/Disabling a VPN Site .................................................................. 232 Logging on to a VPN Site........................................................................... 233 Logging on through the Safe@Office Portal .......................................... 233 Logging on through the my.vpn page ..................................................... 235 Logging off a VPN Site .............................................................................. 236 Installing a Certificate................................................................................. 237 Uninstalling a Certificate ............................................................................ 240 Viewing VPN Tunnels................................................................................ 241 Chapter 11: Managing Users ....................................................................... 245 Changing Your Password ........................................................................... 245 Using Safe@Office 105.......................................................................... 245 Using Safe@Office 110 and 225 ............................................................ 246 Adding Users .............................................................................................. 248 Viewing and Editing Users ......................................................................... 248 Deleting Users ............................................................................................ 251 Setting Up Remote VPN Access for Users................................................. 252 Using RADIUS Authentication .................................................................. 252 Chapter 12: Maintenance............................................................................. 255 Viewing Firmware Status ........................................................................... 255 Updating the Firmware ............................................................................... 257 Upgrading Your Software Product ............................................................. 258 vi Check Point Safe@Office User Guide Contents Registering Your Safe@Office Appliance ................................................. 262 Configuring Syslog Logging ...................................................................... 263 Configuring HTTPS.................................................................................... 265 Setting the Time on the Appliance.............................................................. 267 Controlling the Appliance via the Command Line ..................................... 271 Using Diagnostic Tools .............................................................................. 272 Backing Up the Safe@Office Appliance Configuration............................. 274 Exporting the Safe@Office Appliance Configuration ............................ 274 Importing the Safe@Office Appliance Configuration ............................ 276 Resetting the Safe@Office Appliance to Defaults...................................... 277 Running Diagnostics................................................................................... 279 Rebooting the Safe@Office Appliance....................................................... 280 Chapter 13: Troubleshooting....................................................................... 283 Connectivity................................................................................................ 283 Service Center and Upgrades...................................................................... 288 Other Problems ........................................................................................... 288 Chapter 14: Specifications ........................................................................... 291 Technical Specifications ............................................................................. 291 CE Declaration of Conformity.................................................................... 295 Federal Communications Commission Radio Frequency Interference Statement .................................................................................................... 297 Glossary of Terms......................................................................................... 299 Index .............................................................................................................. 307 Contents vii About Your Check Point Safe@Office Appliance Chapter 1 Introduction This chapter introduces the Check Point Safe@Office appliance and this guide. This chapter includes the following topics: About Your Check Point Safe@Office Appliance ................................. 1 Safe@Office Products ............................................................................ 2 Safe@Office Features and Compatibility............................................... 4 Getting to Know Your Safe@Office 100 Series................................... 14 Getting to Know Your Safe@Office 200 Series................................... 17 Getting to Know Your Safe@Office 300 Series Appliance ................. 20 About This Guide ................................................................................. 24 Contacting Technical Support .............................................................. 24 About Your Check Point Safe@Office Appliance The Check Point Safe@Office appliance is an advanced Internet security appliance that enables secure high-speed Internet access from the office. Developed and supported by SofaWare Technologies, an affiliate of Check Point Software Technologies, the worldwide leader in securing the Internet, the Safe@Office appliance incorporates the 100, 200, and 300 product families. The Safe@Office firewall, based on the world-leading Check Point Embedded NG Stateful Inspection technology, inspects and filters all incoming and outgoing traffic, blocking all unauthorized traffic. The Safe@Office appliance also allows sharing your Internet connection among several PCs or other network devices, enabling advanced office networking and saving the cost of purchasing static IP addresses. With the Safe@Office appliance, you can subscribe to additional security services available from select service providers, including firewall security Chapter 1: Introduction Safe@Office Products updates, Web filtering, and dynamic DNS. Business users can use the Safe@Office appliance to securely connect to the office network. Safe@Office Products The Safe@Office appliance is available with the following hardware: • Safe@Office 100 series • Safe@Office 200 series • Safe@Office 300 series All three series provide a Web-based management interface, which enables you to manage and configure the Safe@Office appliance operation and options. However, the 200 series and 300 series provide higher firewall and VPN throughput and have a dedicated DMZ port and a serial port. The 300 series also provides two USB ports enabling printer server functionality, and the 300W functions as an access point for a wireless network. The 100 series includes models Safe@Office 105 and Safe@Office 110. The 200 series includes models Safe@Office 225 and Safe@Office 225U. The 300 series includes models Safe@Office 300 and Safe@Office 300W. Your 100 and 200 series Safe@Office appliance can be upgraded to a more advanced model within its hardware series, without replacing the hardware. Contact your reseller for more details. Safe@Office 105 Safe@Office 105 protects your home or small business network from hostile Internet activity. It can also act as a Remote Access VPN Server which allows a single user to securely access resources protected by the Safe@Office appliance from home or while traveling. It is intended for home or small business users and can be used by up to five computers. Safe@Office 110 In addition to all the benefits of Safe@Office 105, Safe@Office 110 provides expanded VPN functionality: it acts not only as a Remote Access VPN Server but as a Remote Access VPN Client, enabling employees working Check Point Safe@Office User Guide Safe@Office Products from home to securely connect to the office network. Safe@Office 110 can also be configured as a Site-to-Site VPN Gateway, which allows permanent bi-directional connections between two gateways, such as two company offices. Safe@Office 110 is intended for small and medium businesses with one or more branch offices, and for their employees working from home. It can be used by up to ten computers. Safe@Office 225 Safe@Office 225 provides all the benefits of Safe@Office 110, along with support for High Availability and Traffic Shaper. High Availability enables you to install a second Safe@Office appliance on your network and configure that appliance as a backup to the first Safe@Office appliance, thereby ensuring that your network is consistently protected and connected to the Internet. Traffic Shaper allows you to control the flow of communication so that important traffic takes precedence over less important traffic; this enables your business to function with minimum disruption, even when the network is congested. Safe@Office 225 includes a hardware DMZ port and offers higher VPN and firewall performance than the 100 series. It also supports the use of a dialup modem. Like Safe@Office 110, Safe@Office 225 is intended for small to mediumsized businesses with extended networks. Safe@Office 225 supports 25 computers. Safe@Office 225U Safe@Office 225U provides the same functionality as Safe@Office 225 but supports an unlimited number of computers. All references to Safe@Office 225 in this guide are also relevant to Safe@Office 225U. Chapter 1: Introduction Safe@Office Features and Compatibility Safe@Office 300 Safe@Office 300 provides all the benefits of Safe@Office 225, along with two USB ports for printer server functionality. Safe@Office 300 is intended for small to medium-sized businesses with extended networks. It can be used by up to 25 computers. Safe@Office 300W Safe@Office 300W provides the same functionality as Safe@Office 300, but can function as an access point for a wireless network. All references to Safe@Office 300 in this guide are also relevant to Safe@Office 300W. Safe@Office Features and Compatibility Connectivity Feature Safe@ Office 105 Safe@ Safe@ Safe@ 110 225/225U 300/300W 2,000 8,000 8,000 Office Office Office Concurrent firewall 2,000 connections LAN Ports 4-ports 10/100 Mbps Fast Ethernet switch 10/100 Mbps 10/100 Mbps Fast Ethernet Fast Ethernet Fast Ethernet Fast Ethernet DMZ/WAN2 10/100 Mbps 10/100 Mbps Port Fast Ethernet Fast Ethernet WAN Port 10/100 Mbps 10/100 Mbps Check Point Safe@Office User Guide Safe@Office Features and Compatibility Feature Safe@ Office 105 Safe@ Safe@ Safe@ 110 225/225U 300/300W Office Office Office WLAN Antennas 300W only USB Ports Serial Console Port Ethernet cable type recognition Users (nodes) 10 25 or Unlimited 25 or Unlimited Supported Internet Static IP, DHCP Client, Cable Modem, PPTP Client, connection PPPoE Client, Telstra BPA login methods DHCP Server DHCP relay MAC Cloning Backup Internet connection Chapter 1: Introduction Safe@Office Features and Compatibility Feature Safe@ Office 105 Safe@ Safe@ Safe@ 110 225/225U 300/300W Office Office Office High Availability Traffic Shaper Static NAT Static Routes Firewall Feature Safe@ Safe@ Safe@ Safe@ 105 110 225/225U 300/300W Office Firewall Type Office Office Office Check Point Firewall-1 Embedded NG Network Address Translation (NAT) INSPECT Policy Rules Unlimited Unlimited User-defined rules Check Point Safe@Office User Guide Unlimited Unlimited Safe@Office Features and Compatibility Feature Safe@ Safe@ Safe@ Safe@ 105 110 225/225U 300/300W Logical Physical Physical Office Office Office Office Three levels preset security policies DoS Protection Anti-spoofing Attack Logging Voice over IP (H.323) Support Exposed Host DMZ Network WLAN Network 300W only Chapter 1: Introduction Safe@Office Features and Compatibility VPN Feature Safe@ Safe@ Safe@ Safe@ 105 110 225/225U 300/300W Office VPN Type Office Office Office Check Point VPN-1 Embedded NG Remote Remote Remote Access Client Access Client Access Client IPSEC VPN mode Remote Access Server Remote Remote Remote Access Server Access Server Access Server Site-to-Site Site-to-Site Site-to-Site AES/3DES/ AES/3DES/ AES/3DES/ AES/3DES/ DES DES DES DES SHA1/MD5 SHA1/MD5 SHA1/MD5 SHA1/MD5 IPSEC VPN pass-through Encryption Authentication X.509 Digital Certificates RADIUS client Hardware Acceleration Check Point Safe@Office User Guide Safe@Office Features and Compatibility Feature Safe@ Safe@ Safe@ Safe@ 105 110 225/225U 300/300W Office Office Office Office Hardware Random Number Generator Management Feature Safe@ Office 105 Safe@ Office 110 Safe@ Office Safe@ Office 225/225U 300/300W Web Management HTTPS Access (local and remote) Multiple Administrators CLI Management Systems SofaWare SMP SofaWare SofaWare SofaWare SMP SMP SMP Chapter 1: Introduction Safe@Office Features and Compatibility Optional Security Services Feature Safe@ Office 105 Safe@ Safe@ Safe@ 110 225/225U 300/300W Office Firewall security and software updates Web Filtering Email Antivirus protection * Dynamic DNS Service * SecureDesk Antivirus Compliance Checking * VPN Management 10 Check Point Safe@Office User Guide Office Office Safe@Office Features and Compatibility Feature Safe@ Office 105 Safe@ Safe@ Safe@ 110 225/225U 300/300W Office Office Office Firewall security and software updates Centralized Logging and Intrusion Detection * When managed by SofaWare Security Management Portal (SMP). Package Contents Item Safe@Office 105, 100, 225/225U Safe@Office 300 Safe@Office 300W Safe@Office Internet Security Appliance Power adapter CAT5 Straightthrough Ethernet cable Chapter 1: Introduction 11 Safe@Office Features and Compatibility Item Safe@Office 105, 100, 225/225U Safe@Office 300 USB cable Two antennas Two plastic conical anchors Two cross-head screws Getting Started Guide This Users Guide 12 Check Point Safe@Office User Guide Safe@Office 300W Safe@Office Features and Compatibility Network Requirements • A broadband Internet connection via cable or DSL modem with Ethernet interface (RJ-45) • 10BaseT or 100BaseT Network Interface Card installed on each computer • TCP/IP network protocol installed on each computer • Internet Explorer 5.0 or higher, or Netscape Navigator 4.7 and higher • CAT 5 STP (Category 5 Shielded Twisted Pair) Straight Through Ethernet cable for each attached device Note: To cascade an additional hub or switch to the Safe@Office 100 appliance, you must use a crossed Ethernet cable instead. The Safe@Office 200 series automatically detects the cable type, so you can use either a straight-through or crossed cable. Note: For optimal results, it is highly recommended to use either Microsoft Internet Explorer 5.5 or higher, or Netscape Navigator 6.2 or higher. • When using Safe@Office 300W, a wireless card installed on each wireless client Chapter 1: Introduction 13 Getting to Know Your Safe@Office 100 Series Getting to Know Your Safe@Office 100 Series Rear Panel The following figure shows the Safe@Office 100 series appliance's rear panel. All physical connections (network and power) to the Safe@Office appliance are made via the rear panel of your Safe@Office appliance. Figure 1: Safe@Office Appliance 100 Rear Panel Items The following table lists the Safe@Office appliance's rear panel elements. Table 1: Safe@Office Appliance 100 Rear Panel Elements Label Description PWR A power jack used for supplying power to the unit. Connect the supplied power adapter to this jack. 14 Check Point Safe@Office User Guide Getting to Know Your Safe@Office 100 Series Label Description RESET A button used for rebooting the Safe@Office appliance or resetting the Safe@Office appliance to its factory defaults. You need to use a pointed object to press this button. • Short press. Reboots the Safe@Office appliance • Long press (7 seconds). Resets the Safe@Office appliance to its factory defaults, and resets your firmware to the version that shipped with the Safe@Office appliance. This results in the loss of all security services and passwords and reverting to the factory default firmware. You will have to re-configure your Safe@Office appliance. Do not reset the unit without consulting your system administrator. WAN Wide Area Network: An Ethernet port (RJ-45) used for connecting your cable or xDSL modem LAN 1-4 Local Area Network switch: Four Ethernet ports (RJ-45) used for connecting computers or other network devices Front Panel The Safe@Office 100 appliance includes several status LEDs that enable you to monitor the appliance’s operation. Figure 2: Safe@Office 100 Appliance Front Panel For an explanation of the Safe@Office 100 appliance’s status LEDs, see the table below. Chapter 1: Introduction 15 Getting to Know Your Safe@Office 100 Series Table 2: Safe@Office 100 Appliance Status LEDs LED State Explanation PWR/SEC Off Power off Flashing quickly (Green) System boot-up Flashing slowly (Green) Establishing Internet connection LAN 1- On (Green) Normal operation Flashing (Red) Hacker attack blocked On (Red) Error LINK/ACT Off, 100 Off Link is down LINK/ACT On, 100 Off 10 Mbps link established 4/WAN for the corresponding port LINK/ACT On, 100 On 100 Mbps link established for the corresponding port LNK/ACT Flashing Data is being transmitted/received 16 Check Point Safe@Office User Guide Getting to Know Your Safe@Office 200 Series Getting to Know Your Safe@Office 200 Series Rear Panel The following figure shows the Safe@Office 200 series appliance's rear panel. All physical connections (network and power) to the Safe@Office appliance are made via the rear panel of your Safe@Office appliance. Figure 3: Safe@Office 200 Appliance Rear Panel Items The following table lists the Safe@Office 200 appliance's rear panel elements. Table 3: Safe@Office 200 Appliance Rear Panel Elements Label Description PWR A power jack used for supplying power to the unit. Connect the supplied power adapter to this jack. Chapter 1: Introduction 17 Getting to Know Your Safe@Office 200 Series Label Description RESET A button used for rebooting the Safe@Office appliance or resetting the Safe@Office appliance to its factory defaults. You need to use a pointed object to press this button. • Short press. Reboots the Safe@Office appliance • Long press (7 seconds). Resets the Safe@Office appliance to its factory defaults, and resets your firmware to the version that shipped with the Safe@Office appliance. This results in the loss of all security services and passwords and reverting to the factory default firmware. You will have to re-configure your Safe@Office appliance. Do not reset the unit without consulting your system administrator. RS-232 A serial port WAN Wide Area Network: An Ethernet port (RJ-45) used for connecting your cable or xDSL modem, or for connecting a hub when setting up more than one Internet connection DMZ/WAN A dedicated Ethernet port (RJ-45) used for a DMZ computer, or for a hub when connecting a DMZ network LAN 1-4 Local Area Network switch: Four Ethernet ports (RJ-45) used for connecting computers or other network devices 18 Check Point Safe@Office User Guide Getting to Know Your Safe@Office 200 Series Front Panel The Safe@Office 200 appliances includes several status LEDs that enable you to monitor the appliance’s operation. Figure 4: Safe@Office 200 Appliance Front Panel For an explanation of the Safe@Office 200 appliance’s status LEDs, see the table below. Table 4: Safe@Office 200 Appliance Status LEDs LED State Explanation PWR/SEC Off Power off Flashing quickly (Green) System boot-up Flashing slowly (Green) Establishing Internet connection LAN 1- On (Green) Normal operation Flashing (Red) Hacker attack blocked On (Red) Error LINK/ACT Off, 100 Off Link is down 4/WAN/ DMZ/WAN2 Chapter 1: Introduction 19 Getting to Know Your Safe@Office 300 Series Appliance LED State Explanation LINK/ACT On, 100 Off 10 Mbps link established for the corresponding port LINK/ACT On, 100 On 100 Mbps link established for the corresponding port LNK/ACT Flashing Data is being transmitted/received VPN Flashing (Green) VPN port in use Serial Flashing (Green) Serial port in use Getting to Know Your Safe@Office 300 Series Appliance Rear Panel All physical connections (network and power) to the Safe@Office appliance are made via the rear panel of your Safe@Office appliance. The following table lists the Safe@Office 300 appliance's rear panel elements. 20 Check Point Safe@Office User Guide Getting to Know Your Safe@Office 300 Series Appliance Table 5: Safe@Office 300 Appliance Rear Panel Elements Label PWR Description A power jack used for supplying power to the unit. Connect the supplied power adapter to this jack. RESET A button used for rebooting the Safe@Office appliance or resetting the Safe@Office appliance to its factory defaults. You need to use a pointed object to press this button. • Short press. Reboots the Safe@Office appliance • Long press (7 seconds). Resets the Safe@Office appliance to its factory defaults, and resets your firmware to the version that shipped with the Safe@Office appliance. This results in the loss of all security services and passwords and reverting to the factory default firmware. You will have to re-configure your Safe@Office appliance. Do not reset the unit without consulting your system administrator. USB A USB port COM1 A serial port WAN Wide Area Network: An Ethernet port (RJ-45) used for connecting your cable or xDSL modem, or for connecting a hub when setting up more than one Internet connection DMZ A dedicated Ethernet port (RJ-45) used for a DMZ computer, or for a hub when connecting a DMZ network LAN 1-4 Local Area Network switch: Four Ethernet ports (RJ-45) used for connecting computers or other network devices Chapter 1: Introduction 21 Getting to Know Your Safe@Office 300 Series Appliance Label Description ANT 1/ Antenna connectors (Safe@Office 300W only) ANT 2 Front Panel The Safe@Office 300 appliances includes several status LEDs that enable you to monitor the appliance’s operation. Figure 5: Safe@Office 300 Appliance Front Panel For an explanation of the Safe@Office 300 appliance’s status LEDs, see the table below. Table 6: Safe@Office 300 Appliance Status LEDs LED State Explanation PWR/SEC Off Power off Flashing quickly (Green) System boot-up Flashing slowly (Green) Establishing Internet connection 22 On (Green) Normal operation Flashing (Red) Hacker attack blocked On (Red) Error Check Point Safe@Office User Guide Getting to Know Your Safe@Office 300 Series Appliance LED State Explanation LAN 1- LINK/ACT Off, 100 Off Link is down LINK/ACT On, 100 Off 10 Mbps link established 4/WAN/ DMZ/WAN2 for the corresponding port LINK/ACT On, 100 On 100 Mbps link established for the corresponding port LNK/ACT Flashing Data is being transmitted/received VPN Flashing (Green) VPN port in use Serial Flashing (Green) Serial port in use USB Flashing (Green) USB port in use WLAN Flashing (Green) WLAN in use (300W only) Chapter 1: Introduction 23 About This Guide About This Guide To make finding information in this manual easier, some types of information are marked with special symbols or formatting. Boldface type is used for command and button names. Note: Notes are denoted by indented text and preceded by the Note icon. Warning: Warnings are denoted by indented text and preceded by the Warning icon. Each task is marked with a product bar indicating the Safe@Office products required to perform the task. If you cannot perform the task using a particular product, that product is crossed out. For example, the product bar below indicates a task that requires Safe@Office 110, 225, or 225U. You cannot perform this task with Safe@Office 105. Contacting Technical Support If there is a problem with your Safe@Office appliance, surf to http://www.sofaware.com/support and fill out a technical support request form. You can also download the latest version of this guide from the site. 24 Check Point Safe@Office User Guide Before You Install the Safe@Office Appliance Chapter 2 Installing and Setting up the Safe@Office Appliance This chapter describes how to properly set up and install your Safe@Office appliance in your networking environment. This chapter includes the following topics: Before You Install the Safe@Office Appliance ................................... 25 Wall Mounting the Appliance .............................................................. 38 Network Installation ............................................................................. 40 Setting Up the Safe@Office Appliance................................................ 41 Before You Install the Safe@Office Appliance Prior to connecting and setting up your Safe@Office appliance for operation, you must do the following: • Check if TCP/IP Protocol is installed on your computer. • Check your computer’s TCP/IP settings to make sure it obtains its IP address automatically. Refer to the relevant section in this guide in accordance with the operating system that runs on your computer. The sections below will guide you through the TCP/IP setup and installation process. Chapter 2: Installing and Setting up the Safe@Office Appliance 25 Before You Install the Safe@Office Appliance Windows 2000/XP Note: While Windows XP has an "Internet Connection Firewall" option, it is recommended to disable it if you are using a Safe@Office appliance, since the Safe@Office appliance offers better protection. If you want to subscribe to SecureDesk, you must disable the Windows XP firewall before you install the antivirus software. For information on SecureDesk, see Using SecureDesk on page 183. Checking the TCP/IP Installation 1. Click Start > Settings > Control Panel. The Control Panel window appears. 2. Double-click the Network and Dial-up Connections icon. 26 Check Point Safe@Office User Guide Before You Install the Safe@Office Appliance The Network and Dial-up Connections window appears. 3. Right-click the menu that opens. icon and select Properties from the pop-up Chapter 2: Installing and Setting up the Safe@Office Appliance 27 Before You Install the Safe@Office Appliance The Local Area Connection Properties window appears. 4. In the above window, check if TCP/IP appears in the components list and if it is properly configured with the Ethernet card, installed on your computer. If TCP/IP does not appear in the Components list, you must install it as described in the next section. 28 Check Point Safe@Office User Guide Before You Install the Safe@Office Appliance Installing TCP/IP Protocol 1. In the Local Area Connection Properties window click Install…. The Select Network Component Type window appears. 2. Choose Protocol and click Add. The Select Network Protocol window appears. 3. Choose Internet Protocol (TCP/IP) and click OK. TCP/IP protocol is installed on your computer. Chapter 2: Installing and Setting up the Safe@Office Appliance 29 Before You Install the Safe@Office Appliance TCP/IP Settings 1. In the Local Area Connection Properties window double-click the Internet Protocol (TCP/IP) component, or select it and click Properties. The Internet Protocol (TCP/IP) Properties window opens. 2. Click the Obtain an IP address automatically radio button. Note: Normally, it is not recommended to assign a static IP address to your PC but rather to obtain an IP address automatically. If for some reason you need to assign a static IP address, select Specify an IP address, type in an IP address in the range of 192.168.10.129-254, enter 255.255.255.0 in the Subnet Mask field, and click OK to save the new settings. (Note that 192.168.10 is the default value, and it may vary if you changed it in the My Network page.) 3. Click the Obtain DNS server address automatically radio button. 30 Check Point Safe@Office User Guide Before You Install the Safe@Office Appliance 4. Click OK to save the new settings. Your computer is now ready to access your Safe@Office appliance. Windows 98/Millennium Checking the TCP/IP Installation 1. Click Start > Settings > Control Panel. The Control Panel window appears. 2. Double-click the icon. Chapter 2: Installing and Setting up the Safe@Office Appliance 31 Before You Install the Safe@Office Appliance The Network window appears. 3. In the Network window, check if TCP/IP appears in the network components list and if it is already configured with the Ethernet card, installed on your computer. Installing TCP/IP Protocol Note: If TCP/IP is already installed and configured on your computer skip this section and move directly to TCP/IP Settings. 1. In the Network window, click Add. 32 Check Point Safe@Office User Guide Before You Install the Safe@Office Appliance The Select Network Component Type window appears. 2. Choose Protocol and click Add. The Select Network Protocol window appears. 3. In the Manufacturers list choose Microsoft, and in the Network Protocols list choose TCP/IP. 4. Click OK. If Windows asks for original Windows installation files, provide the installation CD and relevant path when required (e.g. D:\win98) 5. Restart your computer if prompted. Chapter 2: Installing and Setting up the Safe@Office Appliance 33 Before You Install the Safe@Office Appliance TCP/IP Settings Note: If you are connecting your Safe@Office appliance to an existing LAN, consult your network manager for the correct configurations. 1. In the Network window, double-click the TCP/IP service for the Ethernet card, which has been installed on your computer (e.g. The TCP/IP Properties window opens. 2. Click the Gateway tab, and remove any installed gateways. 34 Check Point Safe@Office User Guide ). Before You Install the Safe@Office Appliance 3. Click the DNS Configuration tab, and click the Disable DNS radio button. Chapter 2: Installing and Setting up the Safe@Office Appliance 35 Before You Install the Safe@Office Appliance 4. Click the IP Address tab, and click the Obtain an IP address automatically radio button. Note: Normally, it is not recommended to assign a static IP address to your PC but rather to obtain an IP address automatically. If for some reason you need to assign a static IP address, select Specify an IP address, type in an IP address in the range of 192.168.10.129-254, enter 255.255.255.0 in the Subnet Mask field, and click OK to save the new settings. (Note that 192.168.10 is the default value, and it may vary if you changed it in the My Network page.) 5. Click Yes when prompted for “Do you want to restart your computer?”. Your computer restarts, and the new settings to take effect. Your computer is now ready to access your Safe@Office appliance. 36 Check Point Safe@Office User Guide Before You Install the Safe@Office Appliance Mac OS Use the following procedure for setting up the TCP/IP Protocol. 1. Choose Apple Menus -> Control Panels -> TCP/IP. The TCP/IP window appears. 2. Click the Connect via drop-down list and select Ethernet. 3. Click the Configure drop-down list and select Using DHCP Server. 4. Close the window and save the setup. Chapter 2: Installing and Setting up the Safe@Office Appliance 37 Wall Mounting the Appliance Wall Mounting the Appliance If desired, you can mount your Safe@Office 300 series appliance on the wall. To mount the Safe@Office appliance on the wall 1. Decide where you want to mount your Safe@Office appliance. 2. Decide on the mounting orientation. You can mount the appliance on the wall facing up, down, left, or right. Note: Facing downwards is not recommended, as dust might accumulate in unused ports. 38 Check Point Safe@Office User Guide Wall Mounting the Appliance 3. Mark two drill holes on the wall, in accordance with the following sketch: 4. Drill two 3.5 mm diameter holes, approximately 25 mm deep. 5. Insert the two plastic conical anchors you received with your Safe@Office appliance into the holes. 6. Insert the two screws you received with your Safe@Office appliance into the plastic conical anchors, and turn them until they protrude approximately 5 mm from the wall. 7. Align the holes on the Safe@Office appliance's underside with the screws on the wall, then push the appliance in and down. Chapter 2: Installing and Setting up the Safe@Office Appliance 39 Network Installation Your Safe@Office appliance is wall mounted. You can now connect it to your computer. See Network Installation on page 40. Network Installation 1. Verify that you have the correct cable type. For information, see Network Requirements on page 13. 2. Connect the LAN cable: • Connect one end of the Ethernet cable to one of the LAN ports at the back of the unit. • Connect the other end to PCs, hubs, or other network devices. 3. Connect the WAN cable: • Connect one end of the Ethernet cable to the WAN port at the back of the unit. • Connect the other end of the cable to a Cable Modem, xDSL modem or office network. 4. Connect the power adapter to the power socket, labeled PWR, at the back of the Safe@Office appliance. Plug in the AC power adapter to the wall electrical outlet. Warning: The Safe@Office appliance AC adapter is compatible with either 100, 120 or 230 VAC input power. Please verify that the wall outlet voltage is compatible with the voltage specified on your power supply. Failure to observe this warning may result in injuries or damage to equipment. 40 Check Point Safe@Office User Guide Setting Up the Safe@Office Appliance Figure 6: Typical Connection Diagram 5. In Safe@Office appliance 300W, prepare the Safe@Office appliance for a wireless connection: a. Connect the antennas that came with your Safe@Office appliance to the ANT1 and ANT2 antenna connectors in the appliance's rear panel. b. Bend the antennas at the hinges, so that they point upwards. Setting Up the Safe@Office Appliance After you have installed the Safe@Office appliance, you must set it up using the steps shown below. When setting up your Safe@Office appliance for the first time after installation, these steps follow each other automatically. After you have logged on and set up your password, the Safe@Office Setup Wizard automatically opens and displays the dialog boxes for configuring your Internet connection. After you have configured your Internet connection, the Setup Wizard automatically displays the dialog boxes for registering your Safe@Office appliance. If desired, you can exit the Setup Wizard and perform each of these steps separately. Chapter 2: Installing and Setting up the Safe@Office Appliance 41 Setting Up the Safe@Office Appliance Logging on to the Safe@Office Portal and setting up your password Initial Login to the Safe@Office Portal on page 45 Configuring an Internet connection Using the Internet Wizard on page 58 Setting the Time on your Safe@Office appliance (200 series only) Setting the Time on the Appliance on page 267 Installing the Product Key Upgrading Your Software Product on page 258 Registering your Safe@Office Appliance Registering Your Safe@Office Appliance on page 262 Setting up subscription services Connecting to a Service Center on page 165 42 Check Point Safe@Office User Guide Setting Up the Safe@Office Appliance You can access the Setup Wizard at any time after initial setup, using the procedure below. To access the Setup Wizard 1. Click Setup in the main menu, and click the Firmware tab. The Firmware page appears. 2. Click Safe@Office Setup Wizard. 3. The Safe@Office Setup Wizard opens with the Welcome page displayed. Chapter 2: Installing and Setting up the Safe@Office Appliance 43 Initial Login to the Safe@Office Portal Chapter 3 Getting Started This chapter contains all the information you need in order to get started using your Safe@Office appliance. This chapter includes the following topics: Initial Login to the Safe@Office Portal................................................ 45 Logging on to the Safe@Office Portal ................................................. 47 Accessing the Safe@Office Portal Remotely ....................................... 49 Using the Safe@Office Portal .............................................................. 50 Logging off........................................................................................... 56 Initial Login to the Safe@Office Portal The first time you log on to the Safe@Office Portal, you must set up your password. To log on to the Safe@Office Portal for the first time 1. Browse to http://my.firewall. Chapter 3: Getting Started 45 Initial Login to the Safe@Office Portal The initial login page appears. 2. Type a password both in the Password and the Confirm Password fields. Note: The password must be five to 25 characters (letters or numbers). Note: You can change your password at any time. For further information, see Changing Your Password on page 245. 3. Click OK. The Safe@Office Setup Wizard opens, with the Welcome screen displayed. 46 Check Point Safe@Office User Guide Logging on to the Safe@Office Portal 4. Configure your Internet connection using one of the following ways: • Internet Wizard The Internet Wizard is the first part of the Setup Wizard, and it takes you through basic Internet connection setup, step by step. For information on using the Internet Wizard, see Using the Internet Wizard on page 58. After you have completed the Internet Wizard, the Setup Wizard continues to guide you through appliance setup. For more information, see Setting Up the Safe@Office Appliance on page 41. • Internet Setup Internet Setup offers advanced setup options. For example, if you are using Safe@Office 110 or 225, you can configure two Internet connections using Internet Setup. To use Internet Setup, click Cancel and refer to Using Internet Setup on page 66. Logging on to the Safe@Office Portal To log on to the Safe@Office Portal 1. Do one of the following: • Browse to http://my.firewall. Or • To log on through HTTPS (locally or remotely), follow the procedure Accessing the Safe@Office Portal Remotely on page 49. Chapter 3: Getting Started 47 Logging on to the Safe@Office Portal The login page appears. If you are using Safe@Office 105, the page appears without the Username field. 2. Type in your username and password. 3. Click OK. The Welcome page appears. 48 Check Point Safe@Office User Guide Accessing the Safe@Office Portal Remotely Accessing the Safe@Office Portal Remotely You can access the Safe@Office Portal remotely (from the Internet) through HTTPS. HTTPS is a protocol for accessing a secure Web server. It is used to transfer confidential user information, since it encrypts data and utilizes a secure port. If desired, you can also use HTTPS to access the Safe@Office Portal from your internal network. Note: In order to access the Safe@Office Portal remotely, you must first do the following: Configure your password, using HTTP. See Initial Login to the Safe@Office Portal on page 45. Configure HTTPS. See Configuring HTTPS on page 265. Note: Your browser must support 128 bit cipher strength. To check your browser's cipher strength, open Internet Explorer and click Help > About Internet Explorer. To access the Safe@Office Portal from your internal network • Browse to https://my.firewall. (Note that the URL starts with “https”, not “http”.) The Safe@Office Portal appears. To access the Safe@Office Portal from the Internet • Browse to https://:981. (Note that the URL starts with “https”, not “http”.) The following things happen in the order below: Chapter 3: Getting Started 49 Using the Safe@Office Portal If this is your first attempt to access the Safe@Office Portal through HTTPS, the certificate in the Safe@Office appliance is not yet known to the browser, so the Security Alert dialog box appears. To avoid seeing this dialog box again, install the certificate of the destination Safe@Office appliance. If you are using Internet Explorer 5, do the following: a. Click View Certificate. The Certificate dialog box appears, with the General tab displayed. b. Click Install Certificate. The Certificate Import Wizard opens. c. Click Next. d. Click Next. e. Click Finish. f. Click Yes. g. Click OK. The Security Alert dialog box reappears. h. Click Yes. The Safe@Office Portal appears. Using the Safe@Office Portal The Safe@Office Portal is a web-based management interface, which enables you to manage and configure the Safe@Office appliance operation and options. The Safe@Office Portal consists of three major elements. 50 Check Point Safe@Office User Guide Using the Safe@Office Portal Table 7: Safe@Office Portal Elements Element Main menu Description Used for navigating between the various topics (such as Reports, Security, and Setup). Main frame Displays information and controls related to the selected topic. The main frame may also contain tabs that allow you to view different pages related to the selected topic. Status bar Shows your Internet connection and managed services status. Figure 7: Safe@Office Portal Chapter 3: Getting Started 51 Using the Safe@Office Portal Main Menu The main menu includes the following submenus. Table 8: Main Menu Submenus This Does this… Welcome Displays the welcome information. Reports Provides reporting capabilities in terms of event submenu… logging, established connections, and active computers. Security Provides controls and options for setting the security of any computer in the network. Services Allows you to control your subscription to subscription services. Network Allows you to manage and configure your network settings and Internet connections. Setup Provides a set of tools for managing your Safe@Office appliance. Allows you to upgrade your product key and firmware and to configure HTTPS access to your Safe@Office appliance. Password Allows you to set your password. This submenu only appears in Safe@Office 105. 52 Check Point Safe@Office User Guide Using the Safe@Office Portal This Does this… Users Allows you to manage Safe@Office appliance users. submenu… This submenu only appears in Safe@Office 110 and 225. VPN Allows you to manage, configure, and log on to VPN sites. This submenu only appears in Safe@Office 110 and 225. Help Provides context-sensitive help. Logout Allows you to log off of the Safe@Office Portal. Main Frame The main frame displays the relevant data and controls pertaining to the menu and tab you select. These elements sometimes differ depending on what model you are using. The differences are described throughout this guide. Status Bar The status bar, located at the bottom of each page, displays the fields below. In the Safe@Office 200 series, the status bar also displays the date and time. Chapter 3: Getting Started 53 Using the Safe@Office Portal Table 9: Status Bar Fields This field… Displays this… Internet Your Internet connection status. The connection status may be one of the following: • Connected. The Safe@Office appliance is connected to the Internet. • Not Connected. The Internet connection is down. • Establishing Connection. The Safe@Office appliance is connecting to the Internet. • Contacting Gateway. The Safe@Office appliance is trying to contact the Internet default gateway. • Disabled. The Internet connection has been manually disabled. Note: Using Safe@Office 110 and 225, you can configure both a primary and a secondary Internet connection. When both connections are configured, the Status bar displays both statuses. For example “Internet [Primary]: Connected”. For information on configuring a secondary Internet connection, see Configuring the Internet Connection on page 57. 54 Check Point Safe@Office User Guide Using the Safe@Office Portal This field… Displays this… Service Displays your subscription services status. Center Your Service Center may offer various subscription services. These include the firewall service and optional services such as Web Filtering and Email Antivirus. Your subscription services status may be one of the following: • Not Subscribed. You are not subscribed to security services. • Connection Failed. The Safe@Office appliance failed to connect to the Service Center. • Connecting. The Safe@Office appliance is connecting to the Service Center. • Connected. You are connected to the Service Center, and security services are active. Chapter 3: Getting Started 55 Logging off Logging off Logging off terminates your administration session. Any subsequent attempt to connect to the Safe@Office Portal will require re-entering of the administration password. To log off of the Safe@Office Portal • Do one of the following: • If you are connected through HTTP, click Logout in the main menu. The Logout page appears. • If you are connected through HTTPS, the Logout option does not appear in the main menu. Close the browser window. 56 Check Point Safe@Office User Guide Overview Chapter 4 Configuring the Internet Connection This chapter describes how to configure and work with an Safe@Office Internet connection. This chapter includes the following topics: Overview .............................................................................................. 57 Using the Internet Wizard..................................................................... 58 Using Internet Setup ............................................................................. 66 Setting Up a Dialup Modem................................................................. 84 Cloning a MAC Address ...................................................................... 86 Viewing Internet Connection Information............................................ 88 Enabling/Disabling the Internet Connection......................................... 89 Using Quick Internet Connection/Disconnection ................................. 90 Configuring a Backup Internet Connection .......................................... 91 Overview You must configure your Internet connection before you can access the Internet through the Safe@Office appliance. You can configure your Internet connection using any of the following setup tools: • Setup Wizard. Guides you through the Safe@Office appliance setup step by step. The first part of the Setup Wizard is the Internet Wizard. For further information on the Setup Wizard, see Setting Up the Safe@Office Appliance on page 41. • Internet Wizard. Guides you through the Internet connection configuration process step by step. Chapter 4: Configuring the Internet Connection 57 Using the Internet Wizard • Internet Setup. Offers advanced setup options. If you are using Safe@Office 110 or 225, you can configure two Internet connections. In Safe@Office 225, you can also do the following: • Enable Traffic Shaper for traffic flowing through the connection. For information on Traffic Shaper, see Using Traffic Shaper on page 120. • Configure a dialup Internet connection. Before configuring the connection, you must first set up the modem. For information, see Setting Up a Dialup Modem on page 84. Using the Internet Wizard The Internet Wizard allows you to configure your Safe@Office appliance for Internet connection quickly and easily through its user-friendly interface. It lets you to choose between the following three types of broadband connection methods: • Direct LAN Connection • Cable Modem • PPTP or PPPoE dialer Note: The first time you log on to the Safe@Office Portal, the Internet Wizard starts automatically as part of the Setup Wizard. In this case, you should skip to step 2 in the procedure below. To set up the Internet connection using the Internet Wizard 1. Click Network in the main menu, and click the Internet tab. The Internet page appears 2. Click Internet Wizard. 58 Check Point Safe@Office User Guide Using the Internet Wizard The Internet Wizard opens with the Welcome page displayed. 3. Click Next. The Internet Connection Method dialog box appears. 4. Select the Internet connection method you want to use for connecting to the Internet. Note: If you selected PPTP or PPPoE dialer, do not use your dial-up software to connect to the Internet. 5. Click Next. Chapter 4: Configuring the Internet Connection 59 Using the Internet Wizard Using a Direct LAN Connection No further settings are required for a direct LAN (Local Area Network) connection. The Confirmation screen appears. 1. Click Next. The system attempts to connect to the Internet via the selected connection. The Connecting… screen appears. At the end of the connection process the Connected screen appears. 2. Click Finish. 60 Check Point Safe@Office User Guide Using the Internet Wizard Using a Cable Modem Connection If you selected the Cable Modem connection method, the Identification dialog box appears. 1. If your ISP requires a specific hostname for authentication, enter it in the Host Name field. The ISP will supply you with the proper hostname, if required. Most ISPs do not require a specific hostname. 2. A MAC address is a 12-digit identifier assigned to every network device. If your ISP restricts connections to specific, recognized MAC addresses, they will instruct you to enter the MAC address. Otherwise, you may leave this field blank. If your ISP requires the MAC address, do either of the following: • Click This Computer to automatically "clone" the MAC address of your computer to the Safe@Office appliance. Or • If the ISP requires authentication using the MAC address of a different computer, enter the MAC address in the MAC cloning field. 3. Click Next. The Confirmation screen appears. 4. Click Next. Chapter 4: Configuring the Internet Connection 61 Using the Internet Wizard The system attempts to connect to the Internet. The Connecting… screen appears. At the end of the connection process the Connected screen appears. 5. Click Finish. Using a PPTP or PPPoE Dialer Connection If you selected the PPTP or PPPoE dialer connection method, the DSL Connection Type dialog box appears. 1. Select the connection method used by your DSL provider. Note: Most xDSL providers use PPPoE. If you are uncertain regarding which connection method to use contact your xDSL provider. 2. Click Next. 62 Check Point Safe@Office User Guide Using the Internet Wizard Using PPPoE If you selected the PPPoE connection method, the DSL Configuration dialog box appears. 1. Complete the fields using the information in the table below. 2. Click Next. The Confirmation screen appears. 3. Click Next. The system attempts to connect to the Internet via the DSL connection. The Connecting… screen appears. At the end of the connection process the Connected screen appears. 4. Click Finish. Table 10: PPPoE Connection Fields In this field… Do this… Username Type your user name. Password Type your password. Confirm password Type your password. Chapter 4: Configuring the Internet Connection 63 Using the Internet Wizard In this field… Do this… Service Type your service name. This field can be left blank. Using PPTP If you selected the PPTP connection method, the DSL Configuration dialog box appears. 1. Complete the fields using the information in the table below. 2. Click Next. The Confirmation screen appears. 3. Click Next. The system attempts to connect to the Internet via the DSL connection. The Connecting… screen appears. At the end of the connection process the Connected screen appears. 4. Click Finish. 64 Check Point Safe@Office User Guide Using the Internet Wizard Table 11: PPTP Connection Fields In this field… Do this… Username Type your user name. Password Type your password. Confirm password Type your password. Service Type your service name. Server IP Type the IP address of the PPTP modem. Internal IP Type the local IP address required for accessing the PPTP modem. Subnet Mask Type the subnet mask of the PPTP modem. Chapter 4: Configuring the Internet Connection 65 Using Internet Setup Using Internet Setup Internet Setup allows you to manually configure your Internet connection. To configure the Internet connection using Internet Setup 1. Click Network in the main menu, and click the Internet tab. If you are using Safe@Office 105, the secondary connection does not appear. 2. If your ISP restricts connections to specific, recognized MAC addresses, clone a MAC address using the procedure Cloning a MAC Address on page 86. 3. Next to the Internet connection, click Edit. 66 Check Point Safe@Office User Guide Using Internet Setup The Internet Setup page appears. 4. From the Connection Type drop-down list, select the Internet connection type you are using/intend to use. The display changes according to the connection type you selected. The following steps should be performed in accordance with the connection type you have chosen. Chapter 4: Configuring the Internet Connection 67 Using Internet Setup Using a LAN Connection Note: The QoS area only appears in the Safe@Office 200 series. 1. Complete the fields using the relevant information in Internet Setup Fields on page 79. 68 Check Point Safe@Office User Guide Using Internet Setup New fields appear, depending on the check boxes you selected. 2. Click Apply. The Safe@Office appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”. Chapter 4: Configuring the Internet Connection 69 Using Internet Setup Using a Cable Modem Connection 1. Complete the fields using the relevant information in Internet Setup Fields on page 79. New fields appear, depending on the check boxes you selected. 2. Click Apply. The Safe@Office appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”. 70 Check Point Safe@Office User Guide Using Internet Setup Using a PPPoE Connection 1. Complete the fields using the relevant information in Internet Setup Fields on page 79. Chapter 4: Configuring the Internet Connection 71 Using Internet Setup New fields appear, depending on the check boxes you selected. 2. Click Apply. The Safe@Office appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”. 72 Check Point Safe@Office User Guide Using Internet Setup Using a PPTP Connection 1. Complete the fields using the relevant information in Internet Setup Fields on page 79. Chapter 4: Configuring the Internet Connection 73 Using Internet Setup New fields appear, depending on the check boxes you selected. 2. Click Apply. The Safe@Office appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”. 74 Check Point Safe@Office User Guide Using Internet Setup Using a Telstra (BPA) Connection Use this Internet connection type only if you are subscribed to Telstra® BigPond™ Internet. Telstra BigPond is a trademark of Telstra Corporation Limited. 1. Complete the fields using the relevant information in Internet Setup Fields on page 79. Chapter 4: Configuring the Internet Connection 75 Using Internet Setup New fields appear, depending on the check boxes you selected. 2. Click Apply. The Safe@Office appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”. 76 Check Point Safe@Office User Guide Using Internet Setup Using a Dialup Connection To use this connection type, you must first set up the dialup modem. For information, see Setting Up a Dialup Modem on page 84. 1. Complete the fields using the relevant information in Internet Setup Fields on page 79. Chapter 4: Configuring the Internet Connection 77 Using Internet Setup New fields appear, depending on the check boxes you selected. 2. Click Apply. The Safe@Office appliance attempts to connect to the Internet, and the Status Bar displays the Internet status “Connecting”. This may take several seconds. Once the connection is made, the Status Bar displays the Internet status “Connected”. 78 Check Point Safe@Office User Guide Using Internet Setup Using No Connection If you are using Safe@Office 110 or 225, and you do not have a secondary Internet connection, set the connection type to None. • Click Apply. Table 12: Internet Setup Fields In this field… Do this… Host Name Type the hostname for authentication. If your ISP has not provided you with a host name, leave this field blank. Most ISPs do not require a specific hostname. Username Type your user name. Password Type your password. Confirm password Type your password. Service Type your service name. If your ISP has not provided you with a service name, leave this field empty. Server IP If you selected PPTP, type the IP address of the PPTP server as given by your ISP. If you selected Telstra (BPA), type the IP address of the Telstra authentication server as given by Telstra. Chapter 4: Configuring the Internet Connection 79 Using Internet Setup In this field… Do this… Phone Number If you selected Dialup, type the phone number that the modem should dial, as given by your ISP. Dial On Demand Connect on Select this option if you do not want the dialup demand modem to be constantly connected to the Internet. The modem will dial a connection only under certain conditions. This option is useful when configuring a dialup backup connection. For information, see Setting Up a Dialup Backup Connection on page 92. When no other Select this option to specify that the dialup modem Internet should only dial a connection if no other connection connection is exists, and the Safe@Office appliance is not acting available as a Backup appliance. If another connection opens, or if the Safe@Office appliance becomes a Backup appliance, the dialup modem will disconnect. For information on configuring the appliance as a Backup or Master, see Configuring High Availability on page 117. 80 Check Point Safe@Office User Guide Using Internet Setup In this field… Do this… On outgoing Select this option to specify that the dialup modem activity should only dial a connection if no other connection exists, and there is outgoing activity (that is, packets need to be transmitted to the Internet). If another connection opens, or if the connection times out, the dialup modem will disconnect. Idle timeout Type the amount of time (in minutes) that the connection can remain idle. Once this period of time has elapsed, the dialup modem will disconnect. Name Servers Obtain IP address Clear this option if you do not want the Safe@Office automatically appliance to obtain an IP address automatically (using DHCP) using DHCP. Obtain Domain Clear this option if you want the Safe@Office Name Servers appliance to obtain an IP address automatically automatically using DHCP, but not to automatically configure DNS servers. Obtain WINS Clear this option if you want the Safe@Office Server appliance to obtain an IP address automatically automatically using DHCP, but not to automatically configure the WINS server. IP Address Type the static IP address of your Safe@Office appliance. Chapter 4: Configuring the Internet Connection 81 Using Internet Setup In this field… Do this… Subnet Mask Select the subnet mask that applies to the static IP address of your Safe@Office appliance. Default Gateway Type the IP address of your ISP’s default gateway. Primary DNS Type the Primary DNS server IP address. Server Secondary DNS Type the Secondary DNS server IP address. Server WINS Server Type the WINS server IP address. QoS Shape Upstream: Select this option to enable Traffic Shaper for Link Rate outgoing traffic. Then type a rate (in kilobits/second) slightly lower than your Internet connection's maximum measured upstream speed in the field provided. It is recommended to try different rates in order to determine which one provides the best results. For information on using Traffic Shaper, see Using Traffic Shaper on page 120. 82 Check Point Safe@Office User Guide Using Internet Setup In this field… Do this… Shape Select this option to enable Traffic Shaper for Downstream: Link incoming traffic. Then type a rate (in kilobits/second) Rate slightly lower than your Internet connection's maximum measured downstream speed in the field provided. It is recommended to try different rates in order to determine which one provides the best results. Note: Traffic Shaper cannot control the number or type of packets it receives from the Internet; it can only affect the rate of incoming traffic by dropping received packets. This makes the shaping of inbound traffic less accurate than the shaping of outbound traffic. It is therefore recommended to enable traffic shaping for incoming traffic only if necessary. For information on using Traffic Shaper, see Using Traffic Shaper on page 120. Advanced External IP If you selected PPTP, type the IP address of the PPTP client as given by your ISP. If you selected PPPoE, this field is optional, and you do not have to fill it in unless your ISP has instructed you to do so. Chapter 4: Configuring the Internet Connection 83 Setting Up a Dialup Modem In this field… Do this… MTU This field allows you to control the maximum transmission unit size. As a general recommendation you should leave this field empty. If however you wish to modify the default MTU, it is recommended that you consult with your ISP first and use MTU values between 1300 and 1500. Setting Up a Dialup Modem You can use a dialup modem as a primary or secondary Internet connection method. This is useful in locations where broadband Internet access is unavailable. When used as a backup Internet connection, the modem can be automatically disconnected when not in use. For information on setting up a dialup backup connection, see Setting Up a Dialup Backup Connection on page 92. To set up a dialup modem 1. Connect a regular or ISDN dialup modem to your Safe@Office appliance's serial port. For information on locating the serial port, see Rear Panel on page 17. 2. Click Network in the main menu, and click the Dialup tab. 84 Check Point Safe@Office User Guide Setting Up a Dialup Modem The Dialup page appears. 3. Complete the fields using the information in the table below. 4. Click Apply. 5. To check that that the values you entered are correct, click Test. The Dialup page displays a message indicating whether the test succeeded. 6. Configure a Dialup Internet connection using the information in Using Internet Setup on page 66. Table 13: Dialup Fields In this field… Do this… Modem Type Select the modem type. If you selected Custom, the Installation String field is enabled. Otherwise, it is filled in with the correct installation string for the modem type. Chapter 4: Configuring the Internet Connection 85 Cloning a MAC Address In this field… Do this… Initialization String Type the installation string for the custom modem type. Is you selected a standard modem type, this field is read-only. Dial Mode Select the dial mode the modem uses. Port Speed Select the modem's port speed (in bits per second). Cloning a MAC Address A MAC address is a 12-digit identifier assigned to every network device. If your ISP restricts connections to specific, recognized MAC addresses, you must clone a MAC address. To clone a MAC address 1. Click Network in the main menu, and click the Internet tab. The Internet page appears. 2. In the Cloned MAC address field, click Edit. 86 Check Point Safe@Office User Guide Cloning a MAC Address The MAC Cloning page appears. 3. Do one of the following: • Click This Computer to automatically "clone" the MAC address of your computer to the Safe@Office appliance. Or • If the ISP requires authentication using the MAC address of a different computer, enter the MAC address in the MAC cloning field. 4. Click Apply. 5. Click Back. The Internet page reappears with your computer’s MAC address displayed. Chapter 4: Configuring the Internet Connection 87 Viewing Internet Connection Information Viewing Internet Connection Information You can view information on your Internet connection(s) in terms of status, duration, and activity. To view Internet connection information 1. Click Network in the main menu, and click the Internet tab. The Internet page appears. For an explanation of the fields on this page, see the table below. 2. To refresh the information on this page, click Refresh. Table 14: Internet Page Fields Field Description Status Indicates the connection’s status. Duration Indicates the connection duration, if active. The duration is given in the format hh:mm:ss, where: hh=hours mm=minutes ss=seconds IP Address 88 Your IP address. Check Point Safe@Office User Guide Enabling/Disabling the Internet Connection Field Description Enabled Indicates whether or not the connection is enabled. For further information, see Enabling/Disabling the Internet Connection on page 89 WAN MAC The Safe@Office appliance’s MAC address. Address Cloned MAC The cloned MAC address. Address For further information, see Cloning a MAC Address on page 86. Received Packets The number of data packets received in the active connection. Sent Packets The number of data packets sent in the active connection. Enabling/Disabling the Internet Connection You can temporarily disable an Internet connection. This is useful if, for example, you are going on vacation and do not want to leave your computer connected to the Internet. If you are using Safe@Office 110 or 225 and have two Internet connections, you can force the Safe@Office appliance to use a particular connection, by disabling the other connection. The Internet connection’s Enabled/Disabled status is persistent through Safe@Office appliance reboots. Chapter 4: Configuring the Internet Connection 89 Using Quick Internet Connection/Disconnection To enable/disable an Internet connection 1. Click Network in the main menu, and click the Internet tab. The Internet page appears. 2. Next to the Internet connection, do one of the following: • To enable the connection, click The button changes to and the connection is enabled. • To disable the connection, click The button changes to and the connection is disabled. Using Quick Internet Connection/Disconnection By clicking the Connect or Disconnect button (depending on the connection status) on the Internet page, you can establish a quick Internet connection using the currently-selected connection type. In the same manner, you can terminate the active connection. The Internet connection retains its Connected/Not Connected status until the Safe@Office appliance is rebooted. The Safe@Office appliance then connects to the Internet if the connection is enabled. For information on enabling an Internet connection, see Enabling/Disabling the Internet Connection on page 89. 90 Check Point Safe@Office User Guide Configuring a Backup Internet Connection Configuring a Backup Internet Connection You can configure both a primary and a secondary Internet connection. The secondary connection acts as a backup, so that if the primary connection fails, the Safe@Office appliance remains connected to the Internet. Note: You can configure different DNS servers for the primary and secondary connections. The Safe@Office appliance acts as a DNS relay and routes requests from computers within the network to the appropriate DNS server for the active Internet connection. Setting Up a LAN or Broadband Backup Connection To set up a LAN or broadband backup Internet connection 1. Connect a hub or switch to the WAN port on your appliance's rear panel. Note: Do not connect to the DMZ port. 2. Connect your two modems or routers to the hub/switch. 3. Configure two Internet connections. For instructions, see Using Internet Setup on page 66. Important: The two connections can be of different types. However, they cannot both be LAN DHCP connections. Chapter 4: Configuring the Internet Connection 91 Configuring a Backup Internet Connection Setting Up a Dialup Backup Connection If desired, you can use a dialup modem as the secondary Internet connection method. The Safe@Office appliance automatically dials the modem if the primary Internet connection fails. To set up a dialup backup Internet connection 1. Setup a dialup modem. For instructions, see Setting Up a Dialup Modem on page 84. 2. Configure a LAN or broadband primary Internet connection. For instructions, see Using Internet Setup on page 66. 3. Configure a Dialup secondary Internet connection. For instructions, see Using Internet Setup on page 66. 92 Check Point Safe@Office User Guide Configuring Network Settings Chapter 5 Managing Your Network This chapter describes how to manage and configure your network connection and settings. This chapter includes the following topics: Configuring Network Settings.............................................................. 93 Configuring High Availability............................................................ 117 Using Traffic Shaper .......................................................................... 120 Using Network Objects ...................................................................... 129 Using Static Routes ............................................................................ 137 Configuring Network Settings Warning: These are advanced settings. Do not change them unless it is necessary and you are qualified to do so. Note: If you change the network settings to incorrect values and are unable to correct the error, you can reset the Safe@Office appliance to its default settings. See Resetting the Safe@Office appliance to Defaults on page 277. Chapter 5: Managing Your Network 93 Configuring Network Settings Configuring a DHCP Server By default, the Safe@Office appliance operates as a DHCP (Dynamic Host Configuration Protocol) server. This allows the Safe@Office appliance to automatically configure all the devices on your network with their network configuration details. Note: The DHCP server only serves computers that are configured to obtain an IP address automatically. If a computer is not configured to obtain an IP address automatically, it is recommended to assign it an IP address outside of the DHCP address range. If you do assign it an IP address within the DHCP address range, the DHCP server will not assign this IP address to another computer. If you already have a DHCP server in your internal network, and you want to use it instead of the Safe@Office DHCP server, you must disable the Safe@Office DHCP server, since you cannot have two DHCP servers or relays on the same network segment. If you want to use a DHCP server on the Internet or via a VPN, instead of the Safe@Office DHCP server, you can configure DHCP relay. When in DHCP relay mode, the Safe@Office appliance relays information from the desired DHCP server to the devices on your network. Note: When using a Safe@Office 200 series appliance, you can configure a DHCP server for a DMZ network. Note: You can perform DHCP reservation using network objects. For information, see Using Network Objects on page 129. 94 Check Point Safe@Office User Guide Configuring Network Settings Enabling/Disabling the Safe@Office DHCP Server To enable/disable the Safe@Office DHCP server 1. Click Network in the main menu, and click the My Network tab. The My Network page appears. If you are using Safe@Office 105, the page appears without the DMZ area. 2. In the desired network's row, click Edit. Chapter 5: Managing Your Network 95 Configuring Network Settings The Edit Network Settings page appears. 3. From the DHCP Server list, select Enabled or Disabled. 4. Click Apply. A warning message appears. 5. Click OK. A success message appears 6. If your computer is configured to obtain its IP address automatically (using DHCP), and either the Safe@Office DHCP server or another DHCP server is enabled, restart your computer. If you enabled the DHCP server, your computer obtains an IP address in the DHCP address range. Configuring the DHCP Address Range By default, the Safe@Office DHCP server automatically sets the DHCP address range. The DHCP address range is the range of IP addresses that the DHCP server can assign to network devices. IP addresses outside of the DHCP address range are reserved for statically addressed computers. 96 Check Point Safe@Office User Guide Configuring Network Settings If desired, you can set the Safe@Office DHCP range manually. To configure the DHCP address range 1. Click Network in the main menu, and click the My Network tab. The My Network page appears. 2. In the desired network's row, click Edit. The Edit Network Settings page appears. 3. To set the DHCP range manually: a. Clear the Automatic DHCP range check box. The DHCP IP range fields appear. b. In the DHCP IP range fields, type the desired DHCP range. 4. To allow the DHCP server to set the IP address range, select the Automatic DHCP range check box. 5. Click Apply. A warning message appears. 6. Click OK. A success message appears Chapter 5: Managing Your Network 97 Configuring Network Settings 7. If your computer is configured to obtain its IP address automatically (using DHCP), and either the Safe@Office DHCP server or another DHCP server is enabled, restart your computer. Your computer obtains an IP address in the new DHCP address range. 98 Check Point Safe@Office User Guide Configuring Network Settings Configuring DHCP Relay To configure DHCP relay 1. Click Network in the main menu, and click the My Network tab. The My Network page appears. 2. In the desired network's row, click Edit. The Edit Network Settings page appears. 3. In the DHCP Server list, select Relay. The Automatic DHCP range check box is disabled, and the Relay to IP field appears. 4. In the Relay to IP field, type the IP address of the desired DHCP server. 5. Click Apply. A warning message appears. 6. Click OK. Chapter 5: Managing Your Network 99 Configuring Network Settings A success message appears 7. If your computer is configured to obtain its IP address automatically (using DHCP), and either the Safe@Office DHCP server or another DHCP server is enabled, restart your computer. Your computer obtains an IP address in the DHCP address range. Changing IP Addresses If desired, you can change your Safe@Office appliance’s internal IP address. Using Safe@Office 110 or 225, you can also change the entire range of IP addresses in your internal network. You may want to perform these tasks if, for example, you are adding the Safe@Office appliance to a large existing network and don't want to change that network’s IP address range, or if you are using a DHCP server other than the Safe@Office appliance, that assigns addresses within a different range. To change IP addresses 1. Click Network in the main menu, and click the My Network tab. The My Network page appears. 2. In the LAN network's row, click Edit. The Edit Network Settings page appears. 3. To change the Safe@Office appliance’s internal IP address, enter the new IP address in the IP Address field. 4. To change the internal network range, enter a new value in the Subnet Mask field. 100 Check Point Safe@Office User Guide Configuring Network Settings Note: The internal network range is defined both by the Safe@Office appliance’s internal IP address and by the subnet mask. For example, if the Safe@Office appliance’s internal IP address is 192.168.100.7, and you set the subnet mask to 255.255.255.0, the network’s IP address range will be 192.168.100.1 – 192.168.100.254. The default internal network range is 192.168.10.*. 5. Click Apply. A warning message appears. 6. Click OK. • The Safe@Office appliance's internal IP address and/or the internal network range are changed. • A success message appears. 7. Do one of the following: • If your computer is configured to obtain its IP address automatically (using DHCP), and the Safe@Office DHCP server is enabled, restart your computer. Your computer obtains an IP address in the new range. • Otherwise, manually reconfigure your computer to use the new address range using the TCP/IP settings. For information on configuring TCP/IP, see TCP/IP Settings on page 34, on page 30. Enabling/Disabling Hide NAT Hide Network Address Translation (NAT) enables you to share a single public Internet IP address among several computers, by “hiding” the private IP addresses of the internal computers behind the Safe@Office appliance’s single Internet IP address. Chapter 5: Managing Your Network 101 Configuring Network Settings Note: If Hide NAT is disabled, you must obtain a range of Internet IP addresses from your ISP. Hide NAT is enabled by default. Note: Static NAT and Hide NAT can be used together. To enable/disable Hide NAT 1. Click Network in the main menu, and click the My Network tab. The My Network page appears. 2. In the desired network's row, click Edit. The Edit Network Settings page appears. 3. From the Hide NAT list, select Enabled or Disabled. 4. Click Apply. A warning message appears. 5. Click OK. • If you chose to disable Hide NAT, it is disabled. • If you chose to enable Hide NAT, it is enabled. Configuring a DMZ Network In addition to the LAN network, you can define a second internal network called a DMZ (demilitarized zone) network, when using Safe@Office 110 and 225. Safe@Office 110 does not have a dedicated DMZ port, so the DMZ is a logical second network behind the Safe@Office appliance, and you must connect DMZ computers to LAN ports. Safe@Office 225 has a dedicated DMZ port to which you must connect all DMZ computers. By default, all traffic is allowed from the LAN network to the DMZ network, and no traffic is allowed from the DMZ network to the LAN and WLAN 102 Check Point Safe@Office User Guide Configuring Network Settings networks. You can easily customize this behavior by creating firewall user rules. For further information, see Using Rules on page 154. For example, you could assign your company’s accounting department to the LAN network and the rest of the company to the DMZ network. The accounting department would be able to connect to all company computers, while the rest of the employees would not be able to access any sensitive information on the accounting department computers. You could then create firewall rules that allow specific DMZ computers (such a manager’s computer) to connect to the LAN network and the accounting department. Note: If you are using Safe@Office 225, you can enable the DHCP server for the DMZ network. If you are using Safe@Office 110, computers in the DMZ network cannot obtain IP addresses using DHCP, and therefore must be assigned static IP address. For instructions, see TCP/IP Settings on page 34, on page 30. Note: The default gateway for the DMZ computers should be specified as the Safe@Office DMZ IP address. To configure a DMZ network 1. Connect the DMZ computer(s) as follows: • If you are using Safe@Office 110, connect the DMZ computers to any of the appliance's LAN ports. • If you are using Safe@Office 225, connect the DMZ computer to the DMZ port. If you have more than one computer in the DMZ network, connect a hub or switch to the DMZ port, and connect the DMZ computers to the hub. 2. Click Network in the main menu, and click the My Network tab. The My Network page appears. 3. In the DMZ network's row, click Edit. Chapter 5: Managing Your Network 103 Configuring Network Settings The Edit Network Settings page appears. 4. In the Mode drop-down list, select Enabled. The fields are enabled. 5. If desired, enable or disable Hide NAT. See Enabling/Disabling Hide NAT on page 101. 6. If desired, configure a DHCP server. See Configuring a DHCP Server on page 94. 7. In the IP Address field, type the IP address of the DMZ network's default gateway. Note: The DMZ network must not overlap the LAN network. 8. In the Subnet Mask field, type the DMZ’s internal network range. 9. Click Apply. A warning message appears. 10. Click OK. A success message appears. Configuring a WLAN Network In addition to the LAN and DMZ networks, you can define a wireless internal network called a WLAN (wireless LAN) network, when using Safe@Office 300W. By default, all traffic is allowed from the LAN network to the WLAN network, and no traffic is allowed from the WLAN network to the LAN or DMZ networks. You can easily customize this behavior by creating firewall user rules. For further information, see Using Rules on page 154. By default, access from the WLAN network to Safe@Office Portal (my.firewall and my.vpn) is not allowed. You can enable access from the WLAN to the Safe@Office Portal in either of the following ways: 104 Check Point Safe@Office User Guide Configuring Network Settings • In the Management page, select ANY in either the SSH or HTTPS drop-down list. • Create a custom firewall rule to allow the desired protocols from the WLAN, or from an IP address in the WLAN. To configure a WLAN network 1. Prepare the appliance for a wireless connection as described in Network Installation on page 40. 2. Click Network in the main menu, and click the My Network tab. The My Network page appears. 3. In the WLAN network's row, click Edit. The Edit Network Settings page appears. 4. In the Mode drop-down list, select Enabled. The fields are enabled. 5. If desired, enable or disable Hide NAT. See Enabling/Disabling Hide NAT on page 101. Chapter 5: Managing Your Network 105 Configuring Network Settings 6. If desired, configure a DHCP server. See Configuring a DHCP Server on page 94. 7. Complete the fields using the information in the table below. New fields appear depending on the options you selected. 8. Click Apply. A warning message appears. 9. Click OK. A success message appears. 10. Prepare the wireless clients by doing one of the following: 106 Check Point Safe@Office User Guide Configuring Network Settings • If you selected the 802.1X or WPA security mode, configure RADIUS servers. See Using RADIUS Authentication on page 252. • If you selected the WEP security mode, give the WEP key to the wireless clients. • If you selected the WPA-PSK security mode, give the passphrase to the wireless clients. 11. The wireless clients' administrators should configure the wireless clients and connect them to the WLAN. Refer to the wireless cards' documentation for details. Note: Some wireless cards have "Infrastructure" and "Ad-hoc" modes. These modes are also called "Access Point" and "Peer to Peer". Choose the "Infrastructure" or "Access Point" mode. Note: The wireless cards' region and the Safe@Office appliance's region must both match the region of the world where you are located. If you purchased your Safe@Office appliance in a different region, contact technical support. Chapter 5: Managing Your Network 107 Configuring Network Settings Table 15: WLAN Settings Fields In this field… Do this… IP Address Type the IP address of the WLAN network's default gateway. Note: The WLAN network must not overlap the LAN network. Subnet Mask Type the WLAN’s internal network range. Wireless Settings Network Name Type the network name (SSID) that identifies your (SSID) wireless network. It can be up to 32 alphanumeric characters long and is case-sensitive. Country Select the country where you are located. Warning: Choosing an incorrect country may result in the violation of government regulations. 108 Check Point Safe@Office User Guide Configuring Network Settings In this field… Do this… Operation Mode Select an operation mode: • 802.11b (11Mbps) - Operates in the 2.4 GHz range and offers a rate of 11 Mbps (in theory). • 802.11g (54 Mbps) - Operates in the 2.4 GHz range, and offers a rate of 54 Mbps (in theory). Compatible with 802.11b. • Turbo G (108 Mbps) - Operates in the 2.4 GHz range, and offers a rate of 54 Mbps (in theory). Compatible with 802.11b and 802.11g. Each operation mode indicates a wireless protocol (such as Turbo G), followed by the maximum bandwidth (such as 108 Mbps). The list of modes is dependent on the selected country. Note: The actual data transfer speed is usually significantly lower than the maximum bandwidth. Important: The client wireless cards must support the selected operation mode. Chapter 5: Managing Your Network 109 Configuring Network Settings In this field… Do this… Channel Select the radio frequency to use for the wireless connection: • Automatic - The Safe@Office appliance automatically selects a channel. This is the default. • A specific channel - The list of channels is dependent on the selected country and operation mode. Note: If there is another wireless network in the vicinity, the two networks may interfere with one another. To avoid this problem, the networks should be assigned channels that are at least 25 MHz (5 channels) apart. 110 Check Point Safe@Office User Guide Configuring Network Settings In this field… Do this… Security Select the security protocol to use: • None - No security method is used. This option is not recommended, because it allows unauthorized users to access your network. • WEP encryption - In the WEP (Wired Equivalent Privacy) encryption security method, wireless clients must use a preshared key to connect to your network. This option is not recommended, due to known security flaws. If you select this option, the WEP Keys area opens, and you must configure at least one WEP key. The wireless clients must be configured with this key as well. • 802.1X: RADIUS authentication, no encryption - In the 802.1x security method, wireless clients (supplicants) attempting to connect to the access point (authenticator) must first be authenticated by RADIUS servers (authentication servers). All messages are passed in EAP (Extensible Authentication Protocol). To use this security method, you must configure RADIUS servers. See Using RADIUS Authentication. on page 252 Chapter 5: Managing Your Network 111 Configuring Network Settings In this field… Passphrase Do this… • WPA: RADIUS authentication, encryption The WPA (Wi-Fi Protected Access) security method uses MIC (message integrity check) to ensure the integrity of messages, and TKIP (Temporal Key Integrity Protocol) to enhance data encryption. Furthermore, WPA includes 802.1x and EAP authentication, based on a central RADIUS authentication server. To use this security method, you must configure RADIUS servers. See Using RADIUS Authentication. on page 252 • WPA-PSK: password authentication, encryption - The WPA-PSK security mode is a variation of WPA that does not require an authentication server. WPAPSK periodically changes and authenticates encryption keys. This is called rekeying. If you select this option, the Passphrase field appears. The wireless clients must be configured with this passphrase as well. Type the passphrase for accessing the network. This must be between 8 and 63 characters. It can contain spaces and special characters, and is casesensitive. Show/Hide Advanced Settings Click to show/hide advanced WLAN settings. The Advanced Security and Wireless Transmitter areas are displayed. 112 Check Point Safe@Office User Guide Configuring Network Settings In this field… Do this… WEP Keys Key 1, 2, 3, 4 radio Click the radio button next to the desired WEP key. button 64 Bits:10x[0-9, A- Select the WEP key length from the drop-down list. F] The possible key lengths are: • 64 Bits - The key length is 10 characters. • 128 Bits - The key length is 26 characters. • 152 Bits - The key length is 32 characters. Note: Some wireless card vendors call these lengths 40/104/128, respectively. Key 1, 2, 3, 4 text Type the WEP key, or click Random to randomly box generate a key matching the selected length. The key is composed of characters 0-9 and A-F, and is not case-sensitive. Chapter 5: Managing Your Network 113 Configuring Network Settings In this field… Do this… Advanced Security Hide the Network Specify whether you want to hide your network's SSID, Name (SSID) by selecting one of the following: • Yes - Hide the SSID. Only devices to which your SSID is known can connect to your network. • No - Do not hide the SSID. Any device within within range can detect your network name using the wireless network discovery features of some products, such as Microsoft Windows XP, and attempt to connect to your network. This is the default. Note: Hiding the SSID does not provide strong security, because your SSID can still be discovered using specialized test equipment such as wireless sniffers. Therefore, it is not recommended to rely on this setting alone for security. 114 Check Point Safe@Office User Guide Configuring Network Settings In this field… Do this… MAC Address Specify whether you want to enable MAC address filtering filtering, by selecting one of the following: • Yes - Enable MAC address filtering. Only MAC addresses that you added as network objects can connect to your network. For information on network objects, see Using Network Objects on page 129. • No - Disable MAC address filtering. This is the default. Note: MAC address filtering does not provide strong security, therefore it is not recommended to rely on this setting alone for security. Wireless Transmitter Transmission Rate Transmitter Power Select the transmission rate: • Automatic - The Safe@Office appliance automatically selects a rate. This is the default. • A specific rate Select the transmitter power. Setting a higher transmitter power increases the access point's range. A lower power reduces interference with other access points in the vicinity. The default value is Full, providing a maximum range of 300m, under ideal outdoor conditions. It is not necessary to change this value, unless there are other access points in the vicinity. Chapter 5: Managing Your Network 115 Configuring Network Settings In this field… Do this… Fragmentation Type the smallest IP packet size (in bytes) that Threshold requires that the IP packet be split into smaller fragments. If you are experiencing significant radio interference, set the threshold to a low value (around 1000), to reduce error penalty and increase overall throughput. Otherwise, set the threshold to a high value (around 2000), to reduce overhead. The default value is 2346. RTS Threshold Type the smallest IP packet size for which a client must send an RTS (Request To Send) before sending the IP packet. If multiple wireless clients are in range of the access point, but not in range of each other, they might send data to the access point simultaneously, thereby causing data collisions and failures. RTS ensures that the channel is clear before the each packet is sent. If your network is congested, and the users are distant from one another, set the RTS threshold to a low value (around 500). Setting a value equal to the fragmentation threshold effectively disables RTS. The default value is 2346. 116 Check Point Safe@Office User Guide Configuring High Availability Configuring High Availability You can install two Safe@Office appliances on your network, one acting as the “Master”, the default gateway through which all network traffic is routed, and one acting as the “Backup”. If the Master fails, the Backup automatically and transparently takes over all the roles of the Master. This ensures that your network is consistently protected by a Safe@Office appliance and connected to the Internet. The Master and Backup each have separate IP addresses within the local network. In addition, the Master and Backup share a single virtual IP address, which is the default gateway address for the local network. The virtual IP address is used by the Master gateway, which sends periodic signals, or “heartbeats”, to the network. If the Backup gateway detects that the heartbeat has stopped (indicating that the Master gateway has failed), it takes over of the virtual IP address and all of the Master gateway’s roles. When the Master gateway is running once again, it reclaims the virtual IP address and resumes its roles. Before configuring High Availability, the following requirements must be met: • You must have two identical Safe@Office appliances. • The Safe@Office appliances must have identical firmware versions and firewall rules. • The Safe@Office appliances must have different LAN and DMZ IP addresses, and they must be located on the same subnet. For information on configuring LAN and DMZ addresses, see Configuring Network Settings on page 93. • The LAN ports of the two Safe@Office appliances must be connected via a hub or a switch. You can configure both the LAN network and the DMZ network for High Availability. Chapter 5: Managing Your Network 117 Configuring High Availability The procedure below explains how to configure High Availability for the LAN network, but can be used to configure High Availability for the DMZ network as well. Note: You can enable the DHCP server in both Safe@Office appliances. The Backup gateway’s DHCP server will start answering DHCP requests only if the Master gateway fails. Note: You can force a fail-over to the Backup Safe@Office appliance. You may want to do this in order to verify that High Availability is working properly, or if the Master Safe@Office appliance needs repairs. To force a fail-over, switch off the primary box or disconnect it from the LAN network. To configure High Availability 1. In the Master Safe@Office appliance, do the following: a. Set the appliance’s internal IP address. For further information, see Changing IP Addresses on page 100. b. Configure the LAN network range. For further information, see Changing IP Addresses on page 100. c. Click Network in the main menu, and click the High Availability tab. 118 Check Point Safe@Office User Guide Configuring High Availability The High Availability page appears. d. In the LAN area, in the High Availability Mode drop-down list, select Master. e. In the Virtual Router IP field, type the default gateway IP address. This can be any unused IP address in the LAN network, and must be the same for both gateways. f. Click Apply. A success message appears. 2. In the Backup appliance, do the following: a. Set the appliance’s internal IP address. For further information, see Changing IP Addresses on page 100. The internal IP address must differ from the Master appliance’s internal IP address. b. Configure the LAN network range to the same range you configured in the Master appliance. For further information, see Changing IP Addresses on page 100. c. Click Network in the main menu, and click the High Availability tab. The High Availability page appears. Chapter 5: Managing Your Network 119 Using Traffic Shaper d. In the LAN area, in the High Availability Mode drop-down list, select Backup. e. In the Virtual Router IP field, type the default gateway IP address. This address must be identical to the Virtual Router IP address you specified when configuring the Master gateway. f. Click Apply. A success message appears. Using Traffic Shaper Traffic Shaper is a bandwidth management solution that allows you to set bandwidth policies to control the flow of communication. Traffic Shaper ensures that important traffic takes precedence over less important traffic, so that your business can continue to function with minimum disruption, despite network congestion. Traffic Shaper uses Stateful Inspection technology to access and analyze data derived from all communication layers. This data is used to classify traffic in up to eight user-defined Quality of Service (QoS) classes. Traffic Shaper divides available bandwidth among the classes according to weight. For example, suppose Web traffic is deemed three times as important as FTP traffic, and these services are assigned weights of 30 and 10 respectively. If the lines are congested, Traffic Shaper will maintain the ratio of bandwidth allocated to Web traffic and FTP traffic at 3:1. If a specific class is not using all of its bandwidth, the leftover bandwidth is divided among the remaining classes, in accordance with their relative weights. In the example above, if only one Web and one FTP connection are active and they are competing, the Web connection will receive 75% (30/40) of the leftover bandwidth, and the FTP connection will receive 25% (10/40) of the leftover bandwidth. If the Web connection closes, the FTP connection will receive 100% of the bandwidth. 120 Check Point Safe@Office User Guide Using Traffic Shaper Traffic Shaper allows you to give a class a bandwidth limit. A class's bandwidth limit is the maximum amount of bandwidth that connections belonging to that class may use together. Once a class has reached its bandwidth limit, connections belonging to that class will not be allocated further bandwidth, even if there is unused bandwidth available. For example, you can limit all traffic used by Peer-To-Peer file-sharing applications to a specific rate, such as 512 kilobit per second. Traffic Shaper also allows you to assign a “Delay Sensitivity” value to a class, indicating whether connections belonging to the class should be given precedence over connections belonging to other classes. Traffic Shaper supports DiffServ (Differentiated Services) Packet Marking. DiffServ marks packets as belonging to a certain Quality of Service class. These packets are then granted priority on the public network according to their class. To use Traffic Shaper 1. Enable Traffic Shaper for the Internet connection. You can enable Traffic Shaper for incoming or outgoing connections. See Using Internet Setup on page 66. 2. Define QoS classes that reflect your communication needs. Alternatively, use the four built-in QoS classes. See Adding and Editing a Class on page 122. 3. Use Allow rules to assign different types of connections to QoS classes. For example, if Traffic Shaper is enabled for outgoing traffic, and you create an Allow rule associating all outgoing VPN traffic with the Urgent QoS class, then Traffic Shaper will handle outgoing VPN traffic as specified in the bandwidth policy for the Urgent class. See Adding and Editing Rules on page 157. Note: Traffic Shaper must be enabled for the direction of traffic specified in the rule. Chapter 5: Managing Your Network 121 Using Traffic Shaper Note: If you do not assign a connection type to a class, Traffic Shaper automatically assigns the connection type to the built-in "Default" class. Adding and Editing a Class To add or edit a QoS class 1. Click Network in the main menu, and click the Traffic Shaper tab. The Quality of Service Classes page appears. 2. Click Add. 122 Check Point Safe@Office User Guide Using Traffic Shaper The Safe@Office QoS Class Editor wizard opens, with the Step 1 of 3: Quality of Service Parameters dialog box displayed. 3. Complete the fields using the relevant information in the table below. 4. Click Next. The Step 2 of 3: Advanced Options dialog box appears. 5. Complete the fields using the relevant information in the table below. 6. Click Next. Chapter 5: Managing Your Network 123 Using Traffic Shaper The Step 3 of 3: Save dialog box appears with a summary of the class. 7. Type a name for the class. For example, if you are creating a class for high priority Web connections, you can name the class "High Priority Web". 8. Click Finish. The new class appears in the Quality of Service Classes page. Table 16: QoS Class Fields In this field… Relative Weight Do this… Type a value indicating the class's importance relative to the other defined classes. For example, if you assign one class a weight of 100, and you assign another class a weight of 50, the first class will be allocated twice the amount of bandwidth as the second when the lines are congested. When you complete this field, the Guaranteed Rate field is filled in automatically. 124 Check Point Safe@Office User Guide Using Traffic Shaper In this field… Do this… Guaranteed Rate The percentage of bandwidth that the class is guaranteed, out of the total amount of bandwidth. For example, if there are only two classes, and you assign one class a weight of 100 and the other class a weight of 50, the first class's guaranteed rate will be 66% and the second class's guaranteed rate will be 33%. This field is read-only and is shown for informational purposes. Note: Traffic Shaper may not enforce guaranteed rates and relative weights for incoming traffic as accurately as for outgoing traffic. This is because Traffic Shaper cannot control the number or type of packets it receives from the Internet; it can only affect the rate of incoming traffic by dropping received packets. It is therefore recommended to enable traffic shaping for incoming traffic only if necessary. For information on enabling Traffic Shaper for incoming and outgoing traffic, see Using Internet Setup on page 66. Chapter 5: Managing Your Network 125 Using Traffic Shaper In this field… Do this… Delay Sensitivity Select the degree of precedence to give this class in the transmission queue: • Low (Bulk Traffic) - Traffic that is not sensitive to long delays. For example, SMTP traffic (outgoing email). • Medium (Normal Traffic) - Normal traffic • High (Interactive Traffic) - Traffic that is highly sensitive to delay. For example, IP telephony, videoconferencing, and interactive protocols that require quick user response, such as telnet. Traffic Shaper serves delay-sensitive traffic with a lower latency. That is, Traffic Shaper attempts to send packets with a "High (Interactive Traffic)" level before packets with a "Medium (Normal Traffic)" or "Low (Bulk Traffic)" level. Limit outgoing Select this option to limit the rate of outgoing traffic traffic rate to belonging to this class. Then type the maximum rate (in kilobits/second) in the field provided. Limit incoming Select this option to limit the rate of incoming traffic traffic rate to belonging to this class. Then type the maximum rate (in kilobits/second) in the field provided. 126 Check Point Safe@Office User Guide Using Traffic Shaper In this field… Do this… DiffServ Code Select this option to mark packets belonging to this Point class with a DiffServ Code Point (DSCP), which is an integer between 0 and 63. Then type the DSCP in the field provided. The marked packets will be given priority on the public network according to their DSCP. To use this option, your ISP or private WAN must support DiffServ. You can obtain the correct DSCP value from your ISP or private WAN administrator. Deleting Classes You cannot delete a class that is currently used by a rule. You can determine whether a class is in use or not, by viewing the Rules page. To delete an existing QoS class 1. Click Network in the main menu, and click the Traffic Shaper tab. The Quality of Service Classes page appears. 2. Click the icon of the class you wish to delete. A confirmation message appears. 3. Click OK. The class is deleted. Chapter 5: Managing Your Network 127 Using Traffic Shaper Restoring Traffic Shaper Defaults The Safe@Office appliance provides four built-in QoS classes: If desired, you can reset the Traffic Shaper bandwidth policy to use these classes, and restore the classes to their default settings (shown above). Note: This will delete any additional classes you defined in Traffic Shaper and reset all rules to use the Default class. If one of the additional classes is currently used by a rule, you cannot reset Traffic Shaper to defaults. You can determine whether a class is in use or not, by viewing the Rules page. To restore Traffic Shaper defaults 1. Click Network in the main menu, and click the Traffic Shaper tab. The Quality of Service Classes page appears. 2. Click Restore Defaults. A confirmation message appears. 3. Click OK. 128 Check Point Safe@Office User Guide Using Network Objects Using Network Objects You can add individual computers or networks as network objects. This enables you to configure various settings for the computer or network represented by the network object. You can configure the following settings for a network object: • Static NAT (or One-to-One NAT) Static NAT allows the mapping of Internet IP addresses or address ranges to hosts inside the internal network. This is useful if you want a computer in your private network to have its own Internet IP address. For example, if you have both a mail server and a Web server in your network, you can map each one to a separate Internet IP address. Static NAT rules do not imply any security rules. To allow incoming traffic to a host for which you defined Static NAT, you must create an Allow rule. When specifying firewall rules for such hosts, use the host’s internal IP address, and not the Internet IP address to which the internal IP address is mapped. For further information, see Using Rules on page 154. Note: Static NAT and Hide NAT can be used together. Note: Safe@Office appliance supports Proxy ARP (Address Resolution Protocol). When an external source attempts to communicate with such a computer, the Safe@Office appliance automatically replies to ARP queries with its own MAC address, thereby enabling communication. As a result, the Static NAT Internet IP addresses appear to external sources to be real computers connected to the WAN interface. Chapter 5: Managing Your Network 129 Using Network Objects • Assign the network object's IP address to a MAC address Normally, the Safe@Office DHCP server consistently assigns the same IP address to a specific computer. However, if the Safe@Office DHCP server runs out of IP addresses and the computer is down, then the DHCP server may reassign the IP address to a different computer. If you want to guarantee that a particular computer's IP address remains constant, you can reserve the IP address for use by the computer's MAC address only. This is called DHCP reservation, and it is useful if you are hosting a public Internet server on your network. • Exclude the network object from SecureDesk enforcement If you are subscribed to SecureDesk, you can choose to disable SecureDesk for a specific computer or network. For example, you might want to disable SecureDesk for a printer with an IP address, or for a computer with an operating system that VirusScan does not support. If you disable SecureDesk for a computer or network, the firewall will allow access from that computer or network, regardless of whether the installed antivirus software complies with the SecureDesk security level conditions. Note: To disable SecureDesk for all computers, set the security level to Off. For instructions on setting the security level, see Setting the SecureDesk Security Level on page 186. For information on SecureDesk, see Using SecureDesk on page 183. Adding and Editing Network Objects You can add or edit network objects via: • The Network Objects page This page enables you to add both individual computers and networks. 130 Check Point Safe@Office User Guide Using Network Objects • The Active Computers page This page enables you to add only individual computers as network objects. The computer's details are filled in automatically in the wizard. To add or edit a network object via the Network Objects page 1. Click Network in the main menu, and click the Network Objects tab. The Network Objects page appears with a list of network objects. 2. Do one of the following: • To add a network object, click New. • To edit an existing network object, click Edit next to the desired computer in the list. Chapter 5: Managing Your Network 131 Using Network Objects The Safe@Office Network Object Wizard opens, with the Step 1: Network Object Type dialog box displayed. 3. Do one of the following: • To specify that the network object should represent a single computer or device, click Single Computer. • To specify that the network object should represent a network, click Network. 4. Click Next. The Step 2: Computer Details dialog box appears. If you chose Single Computer, the dialog box includes the Perform Static NAT option. 132 Check Point Safe@Office User Guide Using Network Objects If you chose Network, the dialog box does not include this option. 5. Complete the fields using the information in the tables below. 6. Click Next. The Step 3: Save dialog box appears. 7. Type a name for the network object in the field. 8. Click Finish. To add or edit a network object via the Active Computers page 1. Click Reports in the main menu, and click the Active Computers tab. Chapter 5: Managing Your Network 133 Using Network Objects The Active Computers page appears. If a computer has not yet been added as a network object, the Add button appears next to it. If a computer has already been added as a network object, the Edit button appears next to it. 2. Do one of the following: • To add a network object, click Add next to the desired computer. • To edit a network object, click Edit next to the desired computer. The Safe@Office Network Object Wizard opens, with the Step 2: Computer Details dialog box displayed. The computer's IP address and MAC address are automatically filled in. 3. Complete the fields using the information in the tables below. 4. Click Next. The Step 3: Save dialog box appears with the network object's name. If you are adding a new network object, this name is the computer's name. 5. To change the network object name, type the desired name in the field. 6. Click Finish. The new object appears in the Network Objects page. 134 Check Point Safe@Office User Guide Using Network Objects Table 17: Network Object Fields for a Single Computer In this field… IP Address Do this… Type the IP address of the local computer, or click This Computer to specify your computer. Reserve this IP for use Select this option to assign the network object's by the following MAC IP address to a MAC address. address MAC Address Type the MAC address you want to assign to the network object's IP address, or click This Computer to specify your computer's MAC address. Perform Static NAT Select this option to map the local computer's IP (Network Address address to an Internet IP address. Translation) External IP You must then fill in the External IP field. Type the Internet IP address to which you want to map the local computer's IP address. Exclude this computer Select this option to disable SecureDesk for the from SecureDesk computer. enforcement For information on SecureDesk, see Using SecureDesk on page 183. Chapter 5: Managing Your Network 135 Using Network Objects Table 18: Network Object Fields for a Network In this field… IP Range Do this… Type the range of local computer IP addresses in the network. Perform Static NAT Select this option to map the network's IP (Network Address address range to a range of Internet IP addresses Translation) of the same size. You must then fill in the External IP Range field. External IP Range Type the Internet IP address range to which you want to map the network's IP address range. Exclude this network Select this option to disable SecureDesk for the from SecureDesk network. enforcement For information on SecureDesk, see Using SecureDesk on page 183. Viewing and Deleting Network Objects To view or delete a network object 1. Click Network in the main menu, and click the Network Objects tab. The Network Objects page appears with a list of network objects. 2. To delete a network object, do the following: a. In the desired network object's row, click the Delete icon. 136 Check Point Safe@Office User Guide Using Static Routes A confirmation message appears. b. Click OK. The network object is deleted. Using Static Routes A static route is a setting that explicitly specifies the route for packets destined for a certain subnet. Packets with a destination that does not match any defined static route will be routed to the default gateway. To modify the default gateway, see Using a LAN Connection on page 68. The Static Routes page lists all existing routes, including the default, and indicates whether each route is currently "Up", or reachable, or not. Adding a Static Route To add a static route 1. Click Network in the main menu, and click the Routes tab. Chapter 5: Managing Your Network 137 Using Static Routes The Static Routes page appears, with a listing of existing static routes. 2. Click New Route. The Edit Route page appears. 3. Complete the fields using the information in the table below. 4. Click Apply. The new static route is saved. 138 Check Point Safe@Office User Guide Using Static Routes Table 19: Edit Route Page Fields In this field… Do this… Destination Network Type the network address of the destination network. Subnet Mask Select the subnet mask. Gateway IP Type the IP address of the gateway (next hop router) to which to route the packets destined for this network. Metric Type the static route's metric. The gateway sends a packet to the route that matches the packet's destination and has the lowest metric. Viewing and Editing Static Routes To edit a static route 1. Click Network in the main menu, and click the Routes tab. The Static Routes page appears, with a listing of existing static routes. 2. To edit the route details, do the following: a. In the desired route row, click Edit. The Edit Route page appears displaying the destination network, subnet mask, and gateway IP of the selected route. b. Edit the fields using Edit Route Page Fields on page 139. Chapter 5: Managing Your Network 139
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Encryption : Standard V1.2 (40-bit) User Access : Print, Copy, Fill forms, Extract, Assemble, Print high-res Modify Date : 2004:09:17 10:27:35+08:00 Create Date : 2004:09:17 10:27:05+08:00 Title : Internet Security Appliance Subject : Check Point Safe@Office Author : Part No: 700797, June 2004 Creator : (Acrobat PDFMaker 6.0 for Word) Producer : Acrobat Distiller 6.0 (Windows) Page Count : 150 Mod Date : 2004:09:17 10:27:35+08:00 Creation Date : 2004:09:17 10:27:05+08:00 Metadata Date : 2004:09:17 10:27:35+08:00 Has XFA : NoEXIF Metadata provided by EXIF.tools