SofaWare Technologies SBXW-166LHGE-6 Wireless Broadband Router User Manual Check Point Safe Office User Guide

SofaWare Technologies Ltd. Wireless Broadband Router Check Point Safe Office User Guide

Contents

Manual Pt2

 Using SmartDefense  Chapter 9: Setting Your Security Policy  235  In this field…  Do this… Max. Connections/Second from Same Source IP Type the maximum number of network connections allowed per second from the same source IP address.  The default value is 100. Set a lower threshold for stronger protection against DoS attacks.  Note: Setting this value too low can lead to false alarms.   Welchia The Welchia worm uses the MS DCOM vulnerability or a WebDAV vulnerability. After infecting a computer, the worm begins searching for other live computers to infect. It does so by sending a specific ping packet to a target and waiting for the reply that signals that the target is alive. This flood of pings may disrupt network connectivity. You can configure how the Welchia worm should be handled.
Using SmartDefense    236  Check Point Safe@Office User Guide  Table 43: Welchia Fields In this field…  Do this… Action  Specify what action to take when the Welchia worm is detected, by selecting one of the following: • Block. Block the attack. This is the default.  • None. No action.  Track  Specify whether to log Welchia worm attacks, by selecting one of the following: • Log. Log the attack. This is the default.  • None. Do not log the attack.     Cisco IOS DOS Cisco routers are configured to process and accept Internet Protocol version 4 (IPv4) packets by default. When a Cisco IOS device is sent a specially crafted sequence of IPv4 packets (with protocol type 53 - SWIPE, 55 - IP Mobility, 77 - Sun ND, or 103 - Protocol Independent Multicast - PIM), the router will stop processing inbound traffic on that interface.
 Using SmartDefense  Chapter 9: Setting Your Security Policy  237  You can configure how Cisco IOS DOS attacks should be handled.  Table 44: Cisco IOS DOS  In this field…  Do this… Action  Specify what action to take when a Cisco IOS DOS attack occurs, by selecting one of the following: • Block. Block the attack. This is the default.  • None. No action.  Track  Specify whether to log Cisco IOS DOS attacks, by selecting one of the following: • Log. Log the attack. This is the default.  • None. Do not log the attack.  Number of Hops to Protect  Type the number of hops from the enforcement module that Cisco routers should be protected.  The default value is 10.
Using SmartDefense    238  Check Point Safe@Office User Guide  In this field…  Do this… Action Protection for SWIPE - Protocol 53 / IP Mobility - Protocol 55 / SUN-ND - Protocol 77 /  PIM - Protocol 103 Specify what action to take when an IPv4 packet of the specific protocol type is received, by selecting one of the following: • Block. Drop the packet. This is the default.  • None. No action.    Null Payload Some worms, such as Sasser, use ICMP echo request packets with null payload to detect potentially vulnerable hosts.  You can configure how null payload ping packets should be handled.  Table 45: Null Payload Fields In this field…  Do this… Action  Specify what action to take when null payload ping packets are detected, by selecting one of the following: • Block. Block the packets. This is the default.  • None. No action.
 Using SmartDefense  Chapter 9: Setting Your Security Policy  239  In this field…  Do this… Track  Specify whether to log null payload ping packets, by selecting one of the following: • Log. Log the packets. This is the default.  • None. Do not log the packets.    TCP This category allows you to configure various protections related to the TCP protocol. It includes the following: • Strict TCP on page 239 • Small PMTU on page 241  Strict TCP Out-of-state TCP packets are SYN-ACK or data packets that arrive out of order, before the TCP SYN packet.    Note: In normal conditions, out-of-state TCP packets can occur after the Safe@Office restarts, since connections which were established prior to the reboot are unknown. This is normal and does not indicate an attack.
Using SmartDefense    240  Check Point Safe@Office User Guide  You can configure how out-of-state TCP packets should be handled.   Table 46: Strict TCP  In this field…  Do this… Action  Specify what action to take when an out-of-state TCP packet arrives, by selecting one of the following: • Block. Block the packets. • None. No action. This is the default. Track  Specify whether to log null payload ping packets, by selecting one of the following: • Log. Log the packets. This is the default.  • None. Do not log the packets.
 Using SmartDefense  Chapter 9: Setting Your Security Policy  241   Small PMTU Small PMTU (Packet MTU) is a bandwidth attack in which the client fools the server into sending large amounts of data using small packets. Each packet has a large overhead that creates a "bottleneck" on the server. You can protect against this attack by specifying a minimum packet size for data sent over the Internet.   Table 47: Small PMTU Fields  In this field…  Do this… Action  Specify what action to take when a packet is smaller than the Minimal MTU Size threshold, by selecting one of the following: • Block. Block the packet.  • None. No action. This is the default.  Track  Specify whether to issue logs for packets are smaller than the Minimal MTU Size threshold, by selecting one of the following: • Log. Issue logs. This is the default.  • None. Do not issue logs.
Using SmartDefense    242  Check Point Safe@Office User Guide  In this field…  Do this… Minimal MTU Size Type the minimum value allowed for the MTU field in IP packets sent by a client. An overly small value will not prevent an attack, while an overly large value might degrade performance and cause legitimate requests to be dropped. The default value is 300.   Port Scan An attacker can perform a port scan to determine whether ports are open and vulnerable to an attack. This is most commonly done by attempting to access a port and waiting for a response. The response indicates whether or not the port is open.  This category includes the following types of port scans: • Host Port Scan. The attacker scans a specific host's ports to determine which of the ports are open. • Sweep Scan. The attacker scans various hosts to determine where a specific port is open.  You can configure how the Safe@Office appliance should react when a port scan is detected.
 Using SmartDefense  Chapter 9: Setting Your Security Policy  243  Table 48: Port Scan Fields  In this field…  Do this… Number of ports accessed SmartDefense detects ports scans by measuring the number of ports accessed over a period of time. The number of ports accessed must exceed the Number of ports accessed value, within the number of seconds specified by the In a period of [seconds] value, in order for SmartDefense to consider the activity a scan. Type the minimum number of ports that must be accessed within the In a period of [seconds] period, in order for SmartDefense to detect the activity as a port scan. For example, if this value is 30, and 40 ports are accessed within a specified period of time, SmartDefense will detect the activity as a port scan. For Host Port Scan, the default value is 30. For Sweep Scan, the default value is 50.
Using SmartDefense    244  Check Point Safe@Office User Guide  In this field…  Do this… In a period of [seconds] SmartDefense detects ports scans by measuring the number of ports accessed over a period of time. The number of ports accessed must exceed the Number of ports accessed value, within the number of seconds specified by the In a period of [seconds] value, in order for SmartDefense to consider the activity a scan. Type the maximum number of seconds that can elapse, during which the Number of ports accessed threshold is exceeded, in order for SmartDefense to detect the activity as a port scan. For example, if this value is 20, and the Number of ports accessed threshold is exceeded for 15 seconds, SmartDefense will detect the activity as a port scan. If the threshold is exceeded for 30 seconds, SmartDefense will not detect the activity as a port scan. The default value is 20 seconds. Track  Specify whether to issue logs for scans, by selecting one of the following: • Log. Issue logs. This is the default.  • None. Do not issue logs. This is the default.  Detect scans from Internet only Specify whether to detect only scans originating from the Internet, by selecting one of the following: • False. Do not detect only scans from the Internet. This is the default.  • True. Detect only scans from the Internet.
 Using SmartDefense  Chapter 9: Setting Your Security Policy  245   FTP This category allows you to configure various protections related to the FTP protocol. It includes the following: • FTP Bounce on page 245 • Block Known Ports on page 246 • Block Port Overflow  on page 247 • Blocked FTP Commands on page 248  FTP Bounce When connecting to an FTP server, the client sends a PORT command specifying the IP address and port to which the FTP server should connect and send data. An FTP Bounce attack is when an attacker sends a PORT command specifying the IP address of a third party instead of the attacker's own IP address. The FTP server then sends data to the victim machine. You can configure how FTP bounce attacks should be handled.
Using SmartDefense    246  Check Point Safe@Office User Guide  Table 49: FTP Bounce Fields In this field…  Do this… Action  Specify what action to take when an FTP Bounce attack occurs, by selecting one of the following: • Block. Block the attack. This is the default.  • None. No action.  Track  Specify whether to log FTP Bounce attacks, by selecting one of the following: • Log. Log the attack. This is the default.  • None. Do not log the attack.     Block Known Ports You can choose to block the FTP server from connecting to well-known ports.     Note: Known ports are published ports associated with services (for example, SMTP is port 25).  This provides a second layer of protection against FTP bounce attacks, by preventing such attacks from reaching well-known ports.
 Using SmartDefense  Chapter 9: Setting Your Security Policy  247  Table 50: Block Known Ports Fields In this field…  Do this… Action  Specify what action to take when the FTP server attempts to connect to a well-known port, by selecting one of the following: • Block. Block the connection. • None. No action. This is the default.    Block Port Overflow FTP clients send PORT commands when connecting to the FTP sever. A PORT command consists of a series of numbers between 0 and 255, separated by commas. To enforce compliance to the FTP standard and prevent potential attacks against the FTP server, you can block PORT commands that contain a number greater than 255.
Using SmartDefense    248  Check Point Safe@Office User Guide  Table 51: Block Port Overflow  In this field…  Do this… Action  Specify what action to take for PORT commands containing a number greater than 255, by selecting one of the following: • Block. Block the PORT command. This is the default.  • None. No action.     Blocked FTP Commands Some seldom-used FTP commands may compromise FTP server security and integrity. You can specify which FTP commands should be allowed to pass through the security server, and which should be blocked.  To enable FTP command blocking • In the Action drop-down list, select Block. The FTP commands listed in the Blocked commands box will be blocked. FTP command blocking is enabled by default.
 Using SmartDefense  Chapter 9: Setting Your Security Policy  249  To disable FTP command blocking • In the Action drop-down list, select None. All FTP commands are allowed, including those in the Blocked commands box.  To block a specific FTP command 1. In the Allowed commands box, select the desired FTP command. 2. Click Block. The FTP command appears in the Blocked commands box. 3. Click Apply. When FTP command blocking is enabled, the FTP command will be blocked. To allow a specific FTP command 1. In the Blocked commands box, select the desired FTP command. 2. Click Accept. The FTP command appears in the Allowed commands box. 3. Click Apply. The FTP command will be allowed, regardless of whether FTP command blocking is enabled or disabled.  Microsoft Networks This category includes File and Print Sharing. Microsoft operating systems and Samba clients rely on Common Internet File System (CIFS), a protocol for sharing files and printers. However, this protocol is also widely used by worms as a means of propagation.
Using SmartDefense    250  Check Point Safe@Office User Guide  You can configure how CIFS worms should be handled.  Table 52: File Print and Sharing Fields In this field…  Do this… Action  Specify what action to take when a CIFS worm attack is detected, by selecting one of the following: • Block. Block the attack.  • None. No action. This is the default.  Track  Specify whether to log CIFS worm attacks, by selecting one of the following: • Log. Log the attack.  • None. Do not log the attack. This is the default.  CIFS worm patterns list Select the worm patterns to detect.  Patterns are matched against file names (including file paths but excluding the disk share name) that the client is trying to read or write from the server.
 Using SmartDefense  Chapter 9: Setting Your Security Policy  251   IGMP This category includes the IGMP protocol. IGMP is used by hosts and routers to dynamically register and discover multicast group membership. Attacks on the IGMP protocol usually target a vulnerability in the multicast routing software/hardware used, by sending specially crafted IGMP packets. You can configure how IGMP attacks should be handled.  Table 53: IGMP Fields In this field…  Do this… Action  Specify what action to take when an IGMP attack occurs, by selecting one of the following: • Block. Block the attack. This is the default.  • None. No action.  Track  Specify whether to log IGMP attacks, by selecting one of the following: • Log. Log the attack. This is the default.  • None. Do not log the attack.
Using SmartDefense    252  Check Point Safe@Office User Guide  In this field…  Do this… Enforce IGMP to multicast addresses According to the IGMP specification, IGMP packets must be sent to multicast addresses. Sending IGMP packets to a unicast or broadcast address might constitute and attack; therefore the Safe@Office appliance blocks such packets.  Specify whether to allow or block IGMP packets that are sent to non-multicast addresses, by selecting one of the following: • Block. Block IGMP packets that are sent to non-multicast addresses. This is the default.  • None. No action.    Peer to Peer SmartDefense can block peer-to-peer traffic, by identifying the proprietary protocols and preventing the initial connection to the peer-to-peer networks. This prevents not only downloads, but also search operations.  This category includes the following nodes: • KaZaA • Gnutella • eMule • BitTorrent   Note: SmartDefense can detect peer-to-peer traffic regardless of the TCP port being used to initiate the session.
 Using SmartDefense  Chapter 9: Setting Your Security Policy  253  In each node, you can configure how peer-to-peer connections of the selected type should be handled, using the table below.  Table 54: Peer to Peer Fields In this field…  Do this… Action  Specify what action to take when a connection is attempted, by selecting one of the following: • Block. Block the connection. • None. No action. This is the default.  Track  Specify whether to log peer-to-peer connections, by selecting one of the following: • Log. Log the connection.  • None. Do not log the connection. This is the default.  Block proprietary protocols on all ports Specify whether proprietary protocols should be blocked on all ports, by selecting one of the following: • Block. Block the proprietary protocol on all ports. This in effect prevents all communication using this peer-to-peer application. This is the default.  • None. Do not block the proprietary protocol on all ports.
Using SmartDefense    254  Check Point Safe@Office User Guide  Instant Messengers SmartDefense can block instant messaging applications that use VoIP protocols, by identifying the messaging application's fingerprints and HTTP headers.  This category includes the following nodes:  • Skype • Yahoo • ICQ   Note: SmartDefense can detect instant messaging traffic regardless of the TCP port being used to initiate the session.  In each node, you can configure how instant messaging connections of the selected type should be handled, using the table below.
 Using SmartDefense  Chapter 9: Setting Your Security Policy  255  Table 55: Instant Messengers Fields In this field…  Do this… Action  Specify what action to take when a connection is attempted, by selecting one of the following: • Block. Block the connection. • None. No action. This is the default.  Track  Specify whether to log instant messenger connections, by selecting one of the following: • Log. Log the connection.  • None. Do not log the connection. This is the default.  Block proprietary protocols on all ports Specify whether proprietary protocols should be blocked on all ports, by selecting one of the following:  • Block. Block the proprietary protocol on all ports. This in effect prevents all communication using this instant messenger application. This is the default.  • None. Do not block the proprietary protocol on all ports.
Using Secure HotSpot    256  Check Point Safe@Office User Guide  Using Secure HotSpot  You can enable your Safe@Office appliance as a public Internet access hotspot for specific networks. When users on those networks attempt to access the Internet, they are automatically re-directed to the My HotSpot page http://my.hotspot. On this page, they must read and accept the My HotSpot terms of use, and if My HotSpot is configured to be password-protected, they must log on using their Safe@Office username and password. The users may then access the Internet.   Users can also log out in the My HotSpot page.    Note: HotSpot users are automatically logged out after one hour of inactivity.  Safe@Office Secure HotSpot is useful in any wired or wireless environment where Web-based user authentication or terms-of-use approval is required prior to gaining access to the network. For example, Secure HotSpot can be used in public computer labs, educational institutions, libraries, Internet cafés, and so on. The Safe@Office appliance allows you to add guest users quickly and easily. By default, guest users are given a username and password that expire in 24 hours and granted HotSpot Access permissions only. For information on adding quick guest users, see Adding Quick Guest Users on page 367.
 Using Secure HotSpot  Chapter 9: Setting Your Security Policy  257  You can choose to exclude specific network objects from HotSpot enforcement. For information, see Using Network Objects on page 129.    Important: SecuRemote VPN software users who are authenticated by the Internal VPN Server are automatically exempt from HotSpot enforcement. This allows, for example, authenticated employees to gain full access to the corporate LAN, while guest users are permitted to access the Internet only.    Note: HotSpot enforcement can block traffic passing through the firewall; however, it does not block local traffic on the same network segment (traffic that does not pass through the firewall).   Setting Up Secure HotSpot  To set up Secure HotSpot 1. Enable Secure HotSpot for the desired networks. See Enabling/Disabling Secure HotSpot on page 258. 2. Customize Secure HotSpot as desired. See Customizing Secure HotSpot on page 259. 3. Grant HotSpot Access permissions to users on the selected networks. See Adding and Editing Users on page 363. 4. To exclude specific computers from HotSpot enforcement, by adding or editing their network objects.  See Adding and Editing Network Objects on page 130.  You must select Exclude this computer/network from HotSpot enforcement option. 5. Add quick guest users as needed. See  Adding Quick Guest Users on page 367.
Using Secure HotSpot    258  Check Point Safe@Office User Guide  Enabling/Disabling Secure HotSpot  To enable/disable Secure HotSpot 1. Click Security in the main menu, and click the My HotSpot tab. The My HotSpot page appears.  2. In the HotSpot Networks area, do one of the following: • To enable Secure HotSpot for a specific network, select the check box next to the network.  • To disable Secure HotSpot for a specific network, clear the check box next to the network.  3. Click Apply.
 Using Secure HotSpot  Chapter 9: Setting Your Security Policy  259  Customizing Secure HotSpot  To customize Secure HotSpot 1. Click Security in the main menu, and click the My HotSpot tab. The My HotSpot page appears. 2. Complete the fields using the information in the table below. Additional fields may appear.  3. To preview the My HotSpot page, click Preview. A browser window opens displaying the My HotSpot page.
Using Secure HotSpot    260  Check Point Safe@Office User Guide  4. Click Apply. Your changes are saved.  Table 56: My HotSpot Fields In this field…  Do this… My HotSpot Title Type the title that should appear on the My HotSpot page. The default title is "Welcome to My HotSpot". My HotSpot Terms Type the terms to which the user must agree before accessing the Internet. You can use HTML tags as needed. My HotSpot is password protected Select this option to require users to enter their username and password before accessing the Internet.  If this option is not selected, users will be required only to accept the terms of use before accessing the network. The Allow a user to login from more than one computer at the same time check box appears. Allow a user to login from more than one computer at the same time Select this option to allow a single user to log on to My HotSpot from multiple computers at the same time.
 Defining an Exposed Host  Chapter 9: Setting Your Security Policy  261  Defining an Exposed Host  The Safe@Office appliance allows you to define an exposed host, which is a computer that is not protected by the firewall. This is useful for setting up a public server. It allows unlimited incoming and outgoing connections between the Internet and the exposed host computer. The exposed host receives all traffic that was not forwarded to another computer by use of Allow and Forward rules.   Warning: Entering an IP address may make the designated computer vulnerable to hacker attacks. Defining an exposed host is not recommended unless you are fully aware of the security risks. To define a computer as an exposed host 1. Click Security in the main menu, and click the Exposed Host tab. The Exposed Host page appears.
Defining an Exposed Host    262  Check Point Safe@Office User Guide  2. In the Exposed Host field, type the IP address of the computer you wish to define as an exposed host.  Alternatively, you can click This Computer to define your computer as the exposed host. 3. Click Apply.  The selected computer is now defined as an exposed host. To clear the exposed host 1. Click Security in the main menu, and click the Exposed Host tab. The Exposed Host page appears. 2. Click Clear. 3. Click Apply.  No exposed host is defined.
 Overview  Chapter 10: Using VStream Antivirus  263  Chapter 10 This chapter explains how to use the VStream Antivirus engine to block security threats before they reach your network. This chapter includes the following topics: Overview ..................................................................................................263 Enabling/Disabling VStream Antivirus....................................................265 Viewing VStream Signature Database Information .................................266 Configuring VStream Antivirus ...............................................................267 Updating VStream Antivirus....................................................................279   Overview The Safe@Office appliance includes VStream Antivirus, an embedded stream-based antivirus engine based on Check Point Stateful Inspection and Application Intelligence technologies, that performs virus scanning at the kernel level.  VStream Antivirus scans files for malicious content on the fly, without downloading the files into intermediate storage. This means minimal added latency and support for unlimited file sizes; and since VStream Antivirus stores only minimal state information per connection, it can scan thousands of connections concurrently. In order to scan archive files on the fly, VStream Antivirus performs real-time decompression and scanning of ZIP, TAR, and GZ archive files, with support for nested archive files.  When VStream Antivirus detects malicious content, the action it takes depends on the protocol in which the virus was found. See the table below. In each case, VStream Antivirus blocks the file and writes a log to the Event Log. Using VStream Antivirus
Overview    264  Check Point Safe@Office User Guide  Table 57: VStream Antivirus Actions If a virus if found in this protocol... VStream Antivirus does this...  The protocol is detected on this port... HTTP  • Terminates the connection   All ports on which VStream is enabled by the policy, not only port 80 POP3  • Terminates the connection •  Deletes the virus-infected email from the server The standard TCP port 110. IMAP  • Terminates the connection •  Replaces the virus-infected email with a message notifying the user that a virus was found The standard TCP port 143 SMTP  •  Rejects the virus-infected email with error code 554 •  Sends a "Virus detected" message to the sender The standard TCP port 25 FTP  •  Terminates the data connection •  Sends a "Virus detected" message to the FTP client The standard TCP port 21 TCP and UDP  • Terminates the connection  Generic TCP and UDP ports, other than those listed above   Note: In protocols that are not listed in this table, VStream Antivirus uses a "best effort" approach to detect viruses. In such cases, detection of viruses is not guaranteed and depends on the specific encoding used by the protocol.
 Enabling/Disabling VStream Antivirus  Chapter 10: Using VStream Antivirus  265  If you are subscribed to the VStream Antivirus subscription service, VStream Antivirus virus signatures are automatically updated, so that security is always up-to-date, and your network is always protected.   Note: VStream Antivirus differs from the Email Antivirus subscription service (part of the Email Filtering service) in the following ways:  •  Email Antivirus is centralized, redirecting traffic through the Service Center for scanning, while VStream Antivirus scans for viruses in the Safe@Office gateway itself.  •  Email Antivirus is specific to email, scanning incoming POP3 and outgoing SMTP connections only, while VStream Antivirus supports additional protocols, including incoming SMTP and outgoing POP3 connections. You can use either antivirus solution or both in conjunction. For information on Email Antivirus, see Email Filtering on page 294.    Enabling/Disabling VStream Antivirus  To enable/disable VStream Antivirus 1. Click Antivirus in the main menu, and click the Antivirus tab.
Viewing VStream Signature Database Information    266  Check Point Safe@Office User Guide  The VStream Antivirus page appears.  2. Drag the On/Off lever upwards or downwards. VStream Antivirus is enabled/disabled for all internal network computers.  Viewing VStream Signature Database Information  VStream Antivirus maintains two databases: a daily database and a main database. The daily database is updated frequently with the newest virus signatures. Periodically, the contents of the daily database are moved to the main database, leaving the daily database empty. This system of incremental updates to the main database allows for quicker updates and saves on network bandwidth.   You can view information about the VStream signature databases currently in use, in the VStream Antivirus page.
 Configuring VStream Antivirus  Chapter 10: Using VStream Antivirus  267  Table 58: Account Page Fields This field…  Displays… Main database  The date and time at which the main database was last updated, followed by the version number. Daily database  The date and time at which the daily database was last updated, followed by the version number.  Next update  The next date and time at which the Safe@Office appliance will check for updates. Status  The current status of the database. This includes the following statuses: • Database Not Installed • OK   Configuring VStream Antivirus You can configure VStream Antivirus in the following ways:  • Configuring the VStream Antivirus Policy on page 267 • Configuring VStream Advanced Settings on page 275  Configuring the VStream Antivirus Policy  VStream Antivirus includes a flexible mechanism that allows the user to define exactly which traffic should be scanned, by specifying the protocol, ports, and source and destination IP addresses.  VStream Antivirus processes policy rules in the order they appear in the Antivirus Policy table, so that rule 1 is applied before rule 2, and so on. This enables you to define exceptions to rules, by placing the exceptions higher up in the Rules table.
Configuring VStream Antivirus    268  Check Point Safe@Office User Guide  For example, if you want to scan all outgoing SMTP traffic, except traffic from a specific IP address, you can create a rule scanning all outgoing SMTP traffic and move the rule down in the Antivirus Policy table. Then create a rule passing SMTP traffic from the desired IP address and move this rule to a higher location in the Antivirus Policy table than the first rule. In the figure below, the general rule is rule number 2, and the exception is rule number 1.   The Safe@Office appliance will process rule 1 first, passing outgoing SMTP traffic from the specified IP address, and only then it will process rule 2, scanning all outgoing SMTP traffic. The following rule types exist:  VStream Antivirus Rule Types Table 59: VStream Antivirus Rule Types Rule Description Pass  This rule type enables you to specify that VStream Antivirus should not scan traffic matching the rule.
 Configuring VStream Antivirus  Chapter 10: Using VStream Antivirus  269  Rule Description Scan  This rule type enables you to specify that VStream Antivirus should scan traffic matching the rule. If a virus is found, it is blocked and logged.    Adding and Editing Rules  To add or edit a rule 1. Click Antivirus in the main menu, and click the Policy tab. The Antivirus Policy page appears.  2. Do one of the following: • To add a new rule, click Add Rule. • To edit an existing rule, click the Edit icon next to the desired rule.
Configuring VStream Antivirus    270  Check Point Safe@Office User Guide  The VStream Policy Rule Wizard opens, with the Step 1: Rule Type dialog box displayed.  3. Select the type of rule you want to create. 4. Click Next. The Step 2: Service dialog box appears. The example below shows a Scan rule.  5. Complete the fields using the relevant information in the table below.
 Configuring VStream Antivirus  Chapter 10: Using VStream Antivirus  271  6. Click Next. The Step 3: Destination & Source dialog box appears.  7. Complete the fields using the relevant information in the table below. The Step 4: Done dialog box appears.  8. Click Finish. The new rule appears in the Firewall Rules page.
Configuring VStream Antivirus    272  Check Point Safe@Office User Guide  Table 60: VStream Rule Fields In this field…  Do this… Any Service  Click this option to specify that the rule should apply to any service. Standard Service Click this option to specify that the rule should apply to a specific standard service. You must then select the desired service from the drop-down list. Custom Service  Click this option to specify that the rule should apply to a specific non-standard service. The Protocol and Port Range fields are enabled. You must fill them in. Protocol  Select the protocol (TCP, UDP, or ANY) for which the rule should apply. Ports  To specify the port range to which the rule applies, type the start port number in the left text box, and the end port number in the right text box. Note: If you do not enter a port range, the rule will apply to all ports. If you enter only one port number, the range will include only that port. If the connection source is Select the source of the connections you want to allow/block. To specify an IP address, select Specified IP and type the desired IP address in the filed provided. To specify an IP address range, select Specified Range and type the desired IP address range in the fields provided.
 Configuring VStream Antivirus  Chapter 10: Using VStream Antivirus  273  In this field…  Do this… And the destination is Select the destination of the connections you want to allow or block. To specify an IP address, select Specified IP and type the desired IP address in the text box. To specify an IP address range, select Specified Range and type the desired IP address range in the fields provided. This option is not available in Allow and Forward rules. To specify the Safe@Office Portal and network printers, select This Gateway. This option is not available in Allow and Forward rules. To specify any destination except the Safe@Office Portal and network printers, select ANY. Data Direction  Select the direction of connections to which the rule should apply: • Download and Upload data. The rule applies to downloaded and uploaded data. This is the default. • Download data. The rule applies to downloaded data, that is, data flowing from the destination of the connection to the source of the connection. • Upload data. The rule applies to uploaded data, that is, data flowing from the source of the connection to the destination of the connection.   Enabling/Disabling Rules  You can temporarily disable a VStream Antivirus rule.  To enable/disable a rule 1. Click Antivirus in the main menu, and click the Policy tab. The Antivirus Policy page appears.
Configuring VStream Antivirus    274  Check Point Safe@Office User Guide  2. Next to the desired rule, do one of the following: • To enable the rule, click  . The button changes to   and the rule is enabled. • To disable the rule, click  . The button changes to   and the rule is disabled.  Changing Rules' Priority  To change a rule's priority 1. Click Antivirus in the main menu, and click the Policy tab. The Antivirus Policy page appears. 2. Do one of the following: • Click   next to the desired rule, to move the rule up in the table. • Click   next to the desired rule, to move the rule down in the table. The rule's priority changes accordingly.  Deleting Rules  To delete an existing rule 1. Click Antivirus in the main menu, and click the Policy tab. The Antivirus Policy page appears. 2. Click the Erase   icon of the rule you wish to delete.  A confirmation message appears.
 Configuring VStream Antivirus  Chapter 10: Using VStream Antivirus  275  3. Click OK.  The rule is deleted.  Configuring VStream Advanced Settings  To configure VStream Antivirus advanced settings 1. Click Antivirus in the main menu, and click the Advanced tab. The Advanced Antivirus Settings page appears.  2. Complete the fields using the table below. 3. Click Apply. 4. To restore the default VStream Antivirus settings, do the following: a) Click Default. A confirmation message appears. b) Click OK.
Configuring VStream Antivirus    276  Check Point Safe@Office User Guide  The VStream Antivirus settings are reset to their defaults. For information on the default values, refer to the table below. Table 61: Advanced Antivirus Settings Fields In this field…  Do this… File Types  Block potentially unsafe file types in email messages Select this option to block all emails containing potentially unsafe attachments.  Unsafe file types are: •  DOS/Windows executables, libraries and drivers •  Compiled HTML Help files • VBScript files • Files with {CLSID} in their name •  The following file extensions: ade, adp, bas, bat, chm, cmd,com, cpl, crt, exe, hlp, hta, inf, ins, isp, js, jse, lnk, mdb, mde, msc, msi, msp, mst, pcd, pif, reg, scr, sct, shs,shb, url, vb, vbe, vbs, wsc, wsf, wsh.
 Configuring VStream Antivirus  Chapter 10: Using VStream Antivirus  277  In this field…  Do this… Pass safe file types without scanning Select this option to accept common file types that are known to be safe, without scanning them.  Safe files types are:  • MPEG streams •  RIFF Ogg Stream • MP3 • PDF • PostScript • WMA/WMV/ASF • RealMedia •  JPEG - only the header is scanned, and the rest of the file is skipped Selecting this option reduces the load on the gateway by skipping safe file types. This option is selected by default. Status  Maximum nesting level  Type the maximum number of nested content levels that VStream Antivirus should scan. Setting a higher number increases security. Setting a lower number prevents attackers from overloading the gateway by sending extremely nested archive files.  The default value is 5 levels.
Configuring VStream Antivirus    278  Check Point Safe@Office User Guide  In this field…  Do this… Maximum compression ratio 1:x Fill in the field to complete the maximum compression ratio of files that VStream Antivirus should scan.  For example, to specify a 1:150 maximum compression ratio, type 150. Setting a higher number allows the scanning of highly compressed files, but creates a potential for highly compressible files to create a heavy load on the appliance. Setting a lower number prevents attackers from overloading the gateway by sending extremely compressible files. The default value is 100. When archived file exceeds limit or extraction fails Specify how VStream Antivirus should handle files that exceed the Maximum nesting level or the Maximum compression ratio, and files for which scanning fails. Select one of the following: • Pass file without scanning. Scan only the number of levels specified, and skip the scanning of more deeply nested archives. Furthermore, skip scanning highly compressible files, and skip scanning archives that cannot be extracted because they are corrupt. This is the default. • Block file. Block the file. When a password-protected file is found in archive VStream Antivirus cannot extract and scan password-protected files inside archive. Specify how VStream Antivirus should handle such files, by selecting one of the following: • Pass file without scanning. Accept the file without scanning it. This is the default. • Block file. Block the file.
 Updating VStream Antivirus  Chapter 10: Using VStream Antivirus  279  Updating VStream Antivirus  When you are subscribed to the VStream Antivirus updates service, VStream Antivirus virus signatures are automatically updated, keeping security up-to-date with no need for user intervention. However, you can still check for updates manually, if needed.  To update the VStream Antivirus virus signature database 1. Click Antivirus in the main menu, and click the Antivirus tab. The VStream Antivirus page appears. 2. Click Update Now. The VStream Antivirus database is updated with the latest virus signatures.
 Connecting to a Service Center  Chapter 11: Using Subscription Services  281  Chapter 11 This chapter explains how to start subscription services, and how to use Software Updates, Web Filtering, and Email Filtering services.   Note: Check with your reseller regarding availability of subscription services, or surf to www.sofaware.com/servicecenters to locate a Service Center in your area.  This chapter includes the following topics: Connecting to a Service Center................................................................281 Viewing Services Information..................................................................287 Refreshing Your Service Center Connection............................................288 Configuring Your Account.......................................................................288 Disconnecting from Your Service Center.................................................289 Web Filtering............................................................................................290 Email Filtering..........................................................................................294 Automatic and Manual Updates...............................................................298   Connecting to a Service Center  To connect to a Service Center 1. Click Services in the main menu, and click the Account tab. Using Subscription Services
Connecting to a Service Center    282  Check Point Safe@Office User Guide  The Account page appears.   2. In the Service Account area, click Connect.
 Connecting to a Service Center  Chapter 11: Using Subscription Services  283  The Safe@Office Services Wizard opens, with the Service Center dialog box displayed.  3. Make sure the Connect to a different Service Center check box is selected. 4. Do one of the following: • To connect to the SofaWare Service Center, choose usercenter.sofaware.com.  • To specify a Service Center, choose Specified IP and then in the Specified IP field, enter the desired Service Center’s IP address, as given to you by your system administrator. 5. Click Next. • The Connecting… screen appears.
Connecting to a Service Center    284  Check Point Safe@Office User Guide  • If the Service Center requires authentication, the Service Center Login dialog box appears.  Enter your gateway ID and registration key in the appropriate fields, as given to you by your service provider, then click Next. • The Connecting… screen appears. • The Confirmation dialog box appears with a list of services to which you are subscribed.
 Connecting to a Service Center  Chapter 11: Using Subscription Services  285  6. Click Next. The Done screen appears with a success message.   7. Click Finish. The following things happen: • If a new firmware is available, the Safe@Office appliance may start downloading it. This may take several minutes. Once the download is complete, the Safe@Office appliance restarts using the new firmware. • The Welcome page appears.
Connecting to a Service Center    286  Check Point Safe@Office User Guide  • The services to which you are subscribed are now available on your Safe@Office appliance and listed as such on the Account page. See Viewing Services Information on page 287 for further information.  • The Services submenu includes the services to which you are subscribed.
 Viewing Services Information  Chapter 11: Using Subscription Services  287    Viewing Services Information  The Account page displays the following information about your subscription. Table 62: Account Page Fields This field…  Displays… Service Center Name The name of the Service Center to which you are connected (if known). Gateway ID  Your gateway ID. Subscription will end on The date on which your subscription to services will end. Service  The services available in your service plan. Subscription  The status of your subscription to each service:  • Subscribed  • Not Subscribed Status  The status of each service: • Connected. You are connected to the service through the Service Center.  • Connecting. Connecting to the Service Center. • N/A. The service is not available.
Refreshing Your Service Center Connection    288  Check Point Safe@Office User Guide  This field…  Displays… Information  The mode to which each service is set.  If you are subscribed to Dynamic DNS, this field displays your gateway's domain name. For further information, see Web Filtering on page 290, Virus Scanning on page 294, and Automatic and Manual Updates on page 298.  Refreshing Your Service Center Connection  This option restarts your Safe@Office appliance’s connection to the Service Center and refreshes your Safe@Office appliance’s service settings.  To refresh your Service Center connection 1. Click Services in the main menu, and click the Account tab. The Account page appears. 2. In the Service Account area, click Refresh. The Safe@Office appliance reconnects to the Service Center. Your service settings are refreshed.  Configuring Your Account  This option allows you to access your Service Center's Web site, which may offer additional configuration options for your account. Contact your Service Center for a user ID and password.
  Disconnecting from Your Service Center  Chapter 11: Using Subscription Services  289  To configure your account 1. Click Services in the main menu, and click the Account tab. The Account page appears. 2. In the Service Account area, click Configure.    Note: If no additional settings are available from your Service Center, this button will not appear. Your Service Center's Web site opens. 3. Follow the on-screen instructions.  Disconnecting from Your Service Center  If desired, you can disconnect from your Service Center.  To disconnect from your Service Center 1. Click Services in the main menu, and click the Account tab. The Account page appears. 2. In the Service Account area, click Connect.  The Safe@Office Services Wizard opens, with the first Subscription Services dialog box displayed. 3. Clear the Connect to a different Service Center check box. 4. Click Next. The Done screen appears with a success message.  5. Click Finish. The following things happen: • You are disconnected from the Service Center.
Web Filtering    290  Check Point Safe@Office User Guide  • The services to which you were subscribed are no longer available on your Safe@Office appliance.  Web Filtering When the Web Filtering service is enabled, access to Web content is restricted according to the categories specified under Allow Categories. Authorized users will be able to view Web pages with no restrictions, only after they have provided the administrator password via the Web Filtering pop-up window.   Note: Web Filtering is only available if you are connected to a Service Center and subscribed to this service.   Enabling/Disabling Web Filtering    Note: If you are remotely managed, contact your Service Center to change these settings. To enable/disable Web Filtering 1. Click Services in the main menu, and click the Web Filtering tab.
 Web Filtering  Chapter 11: Using Subscription Services  291  The Web Filtering page appears.  2. Drag the On/Off lever upwards or downwards. Web Filtering is enabled/disabled.  Selecting Categories for Blocking  You can define which types of Web sites should be considered appropriate for your family or office members, by selecting the categories. Categories marked with   will remain visible, while categories marked with   will be blocked and will require the administrator password for viewing.   Note: If you are remotely managed, contact your Service Center to change these settings.
Web Filtering    292  Check Point Safe@Office User Guide  To allow/block a category • In the Allow Categories area, click   or   next to the desired category.  Temporarily Disabling Web Filtering  If desired, you can temporarily disable the Web Filtering service. To temporarily disable Web Filtering 1. Click Services in the main menu, and click the Web Filtering tab. The Web Filtering page appears.  2. Click Snooze. • Web Filtering is temporarily disabled for all internal network computers.
 Web Filtering  Chapter 11: Using Subscription Services  293  • The Snooze button changes to Resume.  • The Web Filtering Off popup window opens.  3. To re-enable the service, click Resume, either in the popup window, or on the Web Filtering page.  • The service is re-enabled for all internal network computers. • If you clicked Resume in the Web Filtering page, the button changes to Snooze.
Email Filtering    294  Check Point Safe@Office User Guide  • If you clicked Resume in the Web Filtering Off popup window, the popup window closes.  Email Filtering There are two Email Filtering services:  • Email Antivirus When the Email Antivirus service is enabled, your email is automatically scanned for the detection and elimination of all known viruses and vandals. If a virus is detected, it is removed and replaced with a warning message.   Note: The Email Antivirus subscription service differs from VStream Antivirus in the following ways:  •  Email Antivirus is centralized, redirecting traffic through the Service Center for scanning, while VStream Antivirus scans for viruses in the Safe@Office gateway itself.  •  Email Antivirus is specific to email, scanning incoming POP3 and outgoing SMTP connections only, while VStream Antivirus supports additional protocols, including incoming SMTP and outgoing POP3 connections. You can use either antivirus solution or both in conjunction. For information on VStream Antivirus, see Using VStream Antivirus on page 263.  • Email Antispam When the Email Antispam service is enabled, your email is automatically scanned for the detection of spam. If spam is detected, the email’s Subject line is modified to indicate that it is suspected spam. You can create rules to divert such messages to a special folder.    Note: Email Filtering services are only available if you are connected to a Service Center and subscribed to the services.
 Email Filtering  Chapter 11: Using Subscription Services  295  Enabling/Disabling Email Filtering    Note: If you are remotely managed, contact your Service Center to change these settings. To enable/disable Email Filtering 1. Click Services in the main menu, and click the Email Filtering tab. The Email Filtering page appears.  2. Next to Email Antivirus, drag the On/Off lever upwards or downwards. Email Antivirus is enabled/disabled. 3. Next to Email Antispam, drag the On/Off lever upwards or downwards. Email Antispam is enabled/disabled.
Email Filtering    296  Check Point Safe@Office User Guide  Selecting Protocols for Scanning  If you are locally managed, you can define which protocols should be scanned for viruses and spam:  • Email retrieving (POP3). If enabled, all incoming email in the POP3 protocol will be scanned. • Email sending (SMTP). If enabled, all outgoing email will be scanned. Protocols marked with   will be scanned, while those marked with   will not.   Note: If you are remotely managed, contact your Service Center to change these settings. To enable virus and spam scanning for a protocol • In the Options area, click   or   next to the desired protocol.  Temporarily Disabling Email Filtering  If you are having problems sending or receiving email you can temporarily disable the Email Filtering services. To temporarily disable Email Filtering 1. Click Services in the main menu, and click the Email Filtering tab. The Email Filtering page appears.  2. Click Snooze. • Email Antivirus and Email Antispam are temporarily disabled for all internal network computers.
 Email Filtering  Chapter 11: Using Subscription Services  297  • The Snooze button changes to Resume.  • The Email Filtering Off popup window opens.   3. To re-enable Email Antivirus and Email Antispam, click Resume, either in the popup window, or on the Email Filtering page.  • The services are re-enabled for all internal network computers. • If you clicked Resume in the Email Filtering page, the button changes to Snooze. • If you clicked Resume in the Email Filtering Off popup window, the popup window closes.
Automatic and Manual Updates    298  Check Point Safe@Office User Guide  Automatic and Manual Updates The Software Updates service enables you to check for new security and software updates.    Note: Software Updates are only available if you are connected to a Service Center and subscribed to this service.   Checking for Software Updates when Remotely Managed  If your Safe@Office appliance is remotely managed, it automatically checks for software updates and installs them without user intervention. However, you can still check for updates manually, if needed.  To manually check for security and software updates 1. Click Services in the main menu, and click the Software Updates tab. The Software Updates page appears.  2. Click Update Now.
 Automatic and Manual Updates  Chapter 11: Using Subscription Services  299  The system checks for new updates and installs them.  Checking for Software Updates when Locally Managed  If your Safe@Office appliance is locally managed, you can set it to automatically check for software updates, or you can set it so that software updates must be checked for manually.  To configure software updates when locally managed 1. Click Services in the main menu, and click the Software Updates tab. The Software Updates page appears.  2. To set the Safe@Office appliance to automatically check for and install new software updates, drag the Automatic/Manual lever upwards. The Safe@Office appliance checks for new updates and installs them according to its schedule.
Automatic and Manual Updates    300  Check Point Safe@Office User Guide    Note: When the Software Updates service is set to Automatic, you can still manually check for updates.  3. To set the Safe@Office appliance so that software updates must be checked for manually, drag the Automatic/Manual lever downwards.  The Safe@Office appliance does not check for software updates automatically. 4. To manually check for software updates, click Update Now.  The system checks for new updates and installs them.
 Overview  Chapter 12: Working With VPNs  301  Chapter 12 This chapter describes how to use your Safe@Office appliance as a Remote Access VPN Client, server, or gateway. This chapter includes the following topics: Overview ..................................................................................................301 Setting Up Your Safe@Office Appliance as a VPN Server.....................307 Adding and Editing VPN Sites ................................................................312 Deleting a VPN Site .................................................................................343 Enabling/Disabling a VPN Site................................................................343 Logging on to a Remote Access VPN Site...............................................344 Logging off a Remote Access VPN Site ..................................................348 Installing a Certificate ..............................................................................348 Uninstalling a Certificate..........................................................................355 Viewing VPN Tunnels .............................................................................356 Viewing IKE Traces for VPN Connections..............................................359   Overview You can configure your Safe@Office appliance as part of a virtual private network (VPN). A VPN is a private data network consisting of a group of gateways that can securely connect to each other. Each member of the VPN is called a VPN site, and a connection between two VPN sites is called a VPN tunnel. VPN tunnels encrypt and authenticate all traffic passing through them. Through these tunnels, employees can safely use their company’s network resources when working at home. For example, they can securely read email, use the company’s intranet, or access the company’s database from home. The are four types of VPN sites: • Remote Access VPN Server. Makes a network remotely available to authorized users, who connect to the Remote Access VPN Server using the Working With VPNs
Overview    302  Check Point Safe@Office User Guide  Check Point SecuRemote VPN Client, provided for free with your Safe@Office, or from another Safe@Office.  • Internal VPN Server. SecuRemote can also be used from your internal networks, allowing you to secure your wired or wireless network with strong encryption and authentication. • Site-to-Site VPN Gateway. Can connect with another Site-to-Site VPN Gateway in a permanent, bi-directional relationship.  • Remote Access VPN Client. Can connect to a Remote Access VPN Server, but other VPN sites cannot initiate a connection to the Remote Access VPN Client. Defining a Remote Access VPN Client is a hardware alternative to using SecuRemote software.  Both Safe@Office 500 and 500W provide full VPN functionality. They can act as a Remote Access VPN Client, a Remote Access VPN Server for multiple users, or a Site-to-Site VPN Gateway.  A virtual private network (VPN) must include at least one Remote Access VPN Server or gateway. The type of VPN sites you include in a VPN depends on the type of VPN you want to create, Site-to-Site or Remote Access.  Note: A locally managed Remote Access VPN Server or gateway must have a static IP address. If you need a Remote Access VPN Server or gateway with a dynamic IP address, you must use SofaWare Security Management Portal (SMP) management. A SecuRemote or Safe@Office Remote Access VPN Client can have a dynamic IP address, regardless of whether it is locally or remotely managed.  Note: This chapter explains how to define a VPN locally. However, if your appliance is centrally managed by a Service Center, then the Service Center can automatically deploy VPN configuration for your appliance.   Site-to-Site VPNs A Site-to-Site VPN consists of two or more Site-to-Site VPN Gateways that can communicate with each other in a bi-directional relationship. The connected
 Overview  Chapter 12: Working With VPNs  303  networks function as a single network. You can use this type of VPN to mesh office branches into one corporate network.  Figure 12: Site-to-Site VPN
Overview    304  Check Point Safe@Office User Guide   To create a Site-to-Site VPN with two VPN sites 1. On the first VPN site’s Safe@Office appliance, do the following: a. Define the second VPN site as a Site-to-Site VPN Gateway, or create a PPPoE tunnel to the second VPN site, using the procedure Adding and Editing VPN Sites   on page 312. b. Enable the Remote Access VPN Server using the procedure Setting Up Your Safe@Office Appliance as a Remote Access VPN Server on page 307. 2. On the second VPN site’s Safe@Office appliance, do the following: a. Define the first VPN site as a Site-to-Site VPN Gateway, or create a PPPoE tunnel to the first VPN site, using the procedure  Adding and Editing VPN Sites   on page 312. b. Then enable the Remote Access VPN Server using the procedure Setting Up Your Safe@Office Appliance as a Remote Access VPN Server on page 307.
 Overview  Chapter 12: Working With VPNs  305  Remote Access VPNs A Remote Access VPN consists of one Remote Access VPN Server or Site-to-Site VPN Gateway, and one or more Remote Access VPN Clients. You can use this type of VPN to make an office network remotely available to authorized users, such as employees working from home, who connect to the office Remote Access VPN Server with their Remote Access VPN Clients.  Figure 13: Remote Access VPN
Overview    306  Check Point Safe@Office User Guide   To create a Remote Access VPN with two VPN sites 1. On the remote user VPN site's Safe@Office appliance, add the office Remote Access VPN Server as a Remote Access VPN site. See Adding and Editing VPN Sites   on page 312. The remote user's Safe@Office appliance will act as a Remote Access VPN Client. 2. On the office VPN site's Safe@Office appliance, enable the Remote Access VPN Server. See Setting Up Your Safe@Office Appliance as a Remote Access VPN Server on page 307.  Internal VPN Server You can use your Safe@Office appliance as an internal VPN Server, for enhanced wired and wireless security. When the internal VPN Server is enabled, internal network PCs and PDAs with SecuRemote VPN Client software installed can establish a Remote Access VPN session to the gateway. This means that connections from internal network users to the gateway can be encrypted and authenticated.  The benefits of using the internal VPN Server are two-fold: • Accessibility Using SecuRemote, you can enjoy a secure connection from anywhere—in your wireless network or on the road—without changing any settings. The standard is completely transparent and allows you to access company resources the same way, whether you are sitting at your desk or anywhere else. • Security Many of today's attacks are increasingly introduced from inside the network. Internal security threats cause outages, downtime, and lost revenue. Wired networks that deal with highly sensitive information—especially networks in public places, such as classrooms—are vulnerable to users trying to hack the internal network.
  Setting Up Your Safe@Office Appliance as a VPN Server  Chapter 12: Working With VPNs  307  Using the internal VPN Server, along with a strict security policy for non-VPN users, can enhance security both for wired networks and for wireless networks, which are particularly vulnerable to security breaches.  The internal VPN Server can be used in the Safe@Office 500W wireless appliance, regardless of the wireless security settings. It also can be used in wired appliances, both for wired stations and for wireless stations.    Note: You can enable wireless connections to a wired Safe@Office appliance, by connecting a wireless access point in bridge mode to one of the appliance's internal interfaces.  Do not connect computers to the same interface as a wireless access point, since allowing direct access from the wireless network may pose a significant security risk. For information on setting up your Safe@Office appliance as an internal VPN Server, see Setting Up Your Safe@Office Appliance as a VPN Server on page 307.  Setting Up Your Safe@Office Appliance as a VPN Server  You can make your network available to authorized users connecting from the Internet or from your internal networks, by setting up your Safe@Office appliance as a VPN Server. Users can connect to the VPN Server via Check Point SecuRemote or via a Safe@Office appliance in Remote Access VPN mode. Enabling the VPN Server for users connecting from your internal networks adds a layer of security to such connections. For example, while you could create a firewall rule allowing a specific user on the DMZ or WLAN to access the LAN, enabling VPN access for the user means that such connections can be encrypted and authenticated. For more information, see Internal VPN Server on page 306.
Setting Up Your Safe@Office Appliance as a VPN Server    308  Check Point Safe@Office User Guide   To set up your Safe@Office appliance as a VPN Server 1. Configure the VPN Server in one or more of the following ways: • To accept remote access connections from the Internet. See Configuring the Remote Access VPN Server on page 309. • To accept connections from your internal networks. See Configuring the Internal VPN Server on page 310. 2. If you configured the internal VPN Server, install SecuRemote on the desired internal network computers. See Installing SecuRemote on page 311.  3. Set up remote VPN access for users. See Setting Up Remote VPN Access for Users on page 369.   Note: Disabling the VPN Server for a specific type of connection (from the Internet or from internal networks) will cause all existing VPN tunnels of that type to disconnect.
  Setting Up Your Safe@Office Appliance as a VPN Server  Chapter 12: Working With VPNs  309    Configuring the Remote Access VPN Server  To configure the Remote Access VPN Server 1. Click VPN in the main menu, and click the VPN Server tab. The SecuRemote VPN Server page appears.  2. Select the Allow SecuRemote users to connect from the Internet check box.
Setting Up Your Safe@Office Appliance as a VPN Server    310  Check Point Safe@Office User Guide  New check boxes appear.  3. To allow authenticated users connecting from the Internet to bypass NAT when connecting to your internal network, select the Bypass NAT check box. 4. To allow authenticated users connecting from the Internet to bypass the firewall and access your internal network without restriction, select the Bypass the firewall check box. 5. Click Apply. The Remote Access VPN Server is enabled for the specified connection types.  Configuring the Internal VPN Server  To configure the internal VPN Server 1. Click VPN in the main menu, and click the VPN Server tab. The SecuRemote VPN Server page appears.
  Setting Up Your Safe@Office Appliance as a VPN Server  Chapter 12: Working With VPNs  311  2. Select the Allow SecuRemote users to connect from my internal networks check box. New check boxes appear.  3. To allow authenticated users connecting from internal networks to bypass the firewall and access your internal network without restriction, select the Bypass the firewall check box.  Bypass NAT is always enabled for the internal VPN server, and cannot be disabled. 4. Click Apply. The internal VPN Server is enabled for the specified connection types.  Installing SecuRemote  If you configured the Remote Access VPN Server to accept connections from your internal networks, you must install the SecuRemote VPN Client on internal network computers that should be allowed to remotely access your network.
Adding and Editing VPN Sites    312  Check Point Safe@Office User Guide  To install SecuRemote 1. Click VPN in the main menu, and click the VPN Server tab. The SecuRemote VPN Server page appears. 2. Click the Download SecuRemote VPN client link. The VPN-1 SecuRemote for Safe@Office page opens in a new window. 3. Follow the online instructions to complete installation.  SecuRemote is installed. For information on using SecuRemote, see the User Help. To access SecuRemote User Help, right-click on the SecuRemote VPN Client icon in the taskbar, select Settings, and then click Help.  Adding and Editing VPN Sites   To add or edit VPN sites 1. Click VPN in the main menu, and click the VPN Sites tab.
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  313  The VPN Sites page appears with a list of VPN sites.  2. Do one of the following:  • To add a VPN site, click New Site. • To edit a VPN site, click Edit in the desired VPN site’s row. The Safe@Office VPN Site Wizard opens, with the Welcome to the VPN Site Wizard dialog box displayed.
Adding and Editing VPN Sites    314  Check Point Safe@Office User Guide  3. Do one of the following: • Select Remote Access VPN to establish remote access from your Remote Access VPN Client to a Remote Access VPN Server. • Select Site-to-Site VPN to create a permanent bi-directional connection to another Site-to-Site VPN Gateway.  4. Click Next.  Configuring a Remote Access VPN Site If you selected Remote Access VPN, the VPN Gateway Address dialog box appears.  1. Enter the IP address of the Remote Access VPN Server to which you want to connect, as given to you by the network administrator. 2. To allow the VPN site to bypass the firewall and access your internal network without restriction, select the Bypass the firewall check box. 3. Click Next.
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  315  The VPN Network Configuration dialog box appears.  4. Specify how you want to obtain the VPN network configuration. Refer to VPN Network Configuration Fields on page 323. 5. Click Next. The following things happen in the order below: • If you chose Specify Configuration, a second VPN Network Configuration dialog box appears.
Adding and Editing VPN Sites    316  Check Point Safe@Office User Guide  Complete the fields using the information in VPN Network Configuration Fields on page 323 and click Next. • The Authentication Method dialog box appears.  6. Complete the fields using the information in Authentication Methods Fields on page 325. 7. Click Next.
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  317  Username and Password Authentication Method If you selected Username and Password, the VPN Login dialog box appears.  1. Complete the fields using the information in VPN Login Fields on page 325.  2. Click Next. • If you selected Automatic Login, the Connect dialog box appears.
Adding and Editing VPN Sites    318  Check Point Safe@Office User Guide  Do the following: 1) To try to connect to the Remote Access VPN Server, select the Try to Connect to the VPN Gateway check box. This allows you to test the VPN connection.   Warning: If you try to connect to the VPN site before completing the wizard, all existing tunnels will be terminated.  2) Click Next. If you selected Try to Connect to the VPN Gateway, the Connecting… screen appears, and then the Contacting VPN Site screen appears. • The Site Name dialog box appears.  3. Enter a name for the VPN site.  You may choose any name. 4. Click Next.
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  319  The VPN Site Created screen appears.  5. Click Finish. The VPN Sites page reappears. If you added a VPN site, the new site appears in the VPN Sites list. If you edited a VPN site, the modifications are reflected in the VPN Sites list.  Certificate Authentication Method If you selected Certificate, the Connect dialog box appears.
Adding and Editing VPN Sites    320  Check Point Safe@Office User Guide  1. To try to connect to the Remote Access VPN Server, select the Try to Connect to the VPN Gateway check box. This allows you to test the VPN connection.   Warning: If you try to connect to the VPN site before completing the wizard, all existing tunnels will be terminated.  2. Click Next. If you selected Try to Connect to the VPN Gateway, the Connecting… screen appears, and then the Contacting VPN Site screen appears. The Site Name dialog box appears.  3. Enter a name for the VPN site.  You may choose any name. 4. Click Next.
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  321  The VPN Site Created screen appears.  5. Click Finish. The VPN Sites page reappears. If you added a VPN site, the new site appears in the VPN Sites list. If you edited a VPN site, the modifications are reflected in the VPN Sites list.  RSA SecurID Authentication Method If you selected RSA SecurID, the Site Name dialog box appears.
Adding and Editing VPN Sites    322  Check Point Safe@Office User Guide  1. Enter a name for the VPN site.  You may choose any name. 2. Click Next. The VPN Site Created screen appears.  3. Click Finish. The VPN Sites page reappears. If you added a VPN site, the new site appears in the VPN Sites list. If you edited a VPN site, the modifications are reflected in the VPN Sites list.
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  323  Table 63: VPN Network Configuration Fields In this field…  Do this… Download Configuration Click this option to obtain the network configuration by downloading it from the VPN site.  This option will automatically configure your VPN settings, by downloading the network topology definition from the Remote Access VPN Server.  Note: Downloading the network configuration is only possible if you are connecting to a Check Point VPN-1 or Safe@Office Site-to-Site VPN Gateway.  Specify Configuration Click this option to provide the network configuration manually. Route All Traffic  Click this option to route all network traffic through the VPN site.  For example, if your VPN consists of a central office and a number of remote offices, and the remote offices are only allowed to access Internet resources through the central office, you can choose to route all traffic from the remote offices through the central office.  Note: You can only configure one VPN site to route all traffic.
Adding and Editing VPN Sites    324  Check Point Safe@Office User Guide  In this field…  Do this… Route Based VPN  Click this option to create a virtual tunnel interface (VTI) for this site, so that it can participate in a route-based VPN.  Route-based VPNs allow routing connections over VPN tunnels, so that remote VPN sites can participate in dynamic or static routing schemes. This improves network and VPN management efficiency for large networks.  For constantly changing networks, it is recommended to use a route-based VPN combined with OSPF dynamic routing. This enables you to make frequent changes to the network topology, such as adding an internal network, without having to reconfigure static routes.  OSPF is enabled using CLI. For information on using CLI, see Controlling the Appliance via the Command Line on page 388. For information on the relevant commands for OSPF, refer to the Embedded NGX CLI Reference Guide. This option is only available for when configuring a Site-to-Site VPN gateway. Destination network  Type up to three destination network addresses at the VPN site to which you want to connect. Subnet mask  Select the subnet masks for the destination network addresses.  Note: Obtain the destination networks and subnet masks from the VPN site’s system administrator.  Backup Gateway  Type the name of the VPN site to use if the primary VPN site fails.
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  325  Table 64: Authentication Methods Fields In this field…  Do this… Username and Password Select this option to use a user name and password for VPN authentication. In the next step, you can specify whether you want to log on to the VPN site automatically or manually. Certificate  Select this option to use a certificate for VPN authentication. If you select this option, a certificate must have been installed. (Refer to Installing a Certificate on page 348 for more information about certificates and instructions on how to install a certificate.) RSA SecurID Token Select this option to use an RSA SecurID token for VPN authentication.  When authenticating to the VPN site, you must enter a four-digit PIN code and the SecurID passcode shown in your SecurID token's display. The RSA SecurID token generates a new passcode every minute. SecurID is only supported in Remote Access manual login mode.
Adding and Editing VPN Sites    326  Check Point Safe@Office User Guide  Table 65: VPN Login Fields In this field…  Do this… Manual Login  Click this option to configure the site for Manual Login. Manual Login connects only the computer you are currently logged onto to the VPN site, and only when the appropriate user name and password have been entered. For further information on Automatic and Manual Login, see, Logging on to a VPN Site on page 344. Automatic Login  Click this option to enable the Safe@Office appliance to log on to the VPN site automatically. You must then fill in the Username and Password fields.  Automatic Login provides all the computers on your internal network with constant access to the VPN site. For further information on Automatic and Manual Login, see Logging on to a VPN Site on page 344. Username  Type the user name to be used for logging on to the VPN site. Password  Type the password to be used for logging on to the VPN site.
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  327    Configuring a Site-to-Site VPN Gateway If you selected Site-to-Site VPN, the VPN Gateway Address dialog box appears.  1. Complete the fields using the information in VPN Gateway Address Fields on page 338. 2. Click Next. The VPN Network Configuration dialog box appears.
Adding and Editing VPN Sites    328  Check Point Safe@Office User Guide  3. Specify how you want to obtain the VPN network configuration. Refer to VPN Network Configuration Fields on page 323.  4. Click Next. • If you chose Specify Configuration, a second VPN Network Configuration dialog box appears.   Complete the fields using the information in VPN Network Configuration Fields on page 323, and then click Next.
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  329  • If you chose Route Based VPN, the Route Based VPN dialog box appears.   Complete the fields using the information in Route Based VPN Fields on page 339, and then click Next. • The Authentication Method dialog box appears.  5. Complete the fields using the information in Authentication Methods Fields on page 340. 6. Click Next.
Adding and Editing VPN Sites    330  Check Point Safe@Office User Guide  Shared Secret Authentication Method If you selected Shared Secret, the Authentication dialog box appears.  If you chose Download Configuration, the dialog box contains additional fields.  1. Complete the fields using the information in VPN Authentication Fields on page 340 and click Next.
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  331  The Security Methods dialog box appears.  2. To configure advanced security settings, click Show Advanced Settings. New fields appear.  3. Complete the fields using the information in Security Methods Fields on page 340 and click Next.
Adding and Editing VPN Sites    332  Check Point Safe@Office User Guide  The Connect dialog box appears.  4. To try to connect to the Remote Access VPN Server, select the Try to Connect to the VPN Gateway check box. This allows you to test the VPN connection.   Warning: If you try to connect to the VPN site before completing the wizard, all existing tunnels will be terminated.  5. Click Next. • If you selected Try to Connect to the VPN Gateway, the Connecting… screen appears, and then the Contacting VPN Site screen appears.
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  333  • The Site Name dialog box appears.  6. Enter a name for the VPN site.  You may choose any name. 7. To keep the tunnel to the VPN site alive even if there is no network traffic between the Safe@Office appliance and the VPN site, select Keep this site alive. 8. Click Next.
Adding and Editing VPN Sites    334  Check Point Safe@Office User Guide  • If you selected Keep this site alive, and previously you chose Download Configuration, the "Keep Alive" Configuration dialog box appears.  Do the following: 1) Type up to three IP addresses which the Safe@Office appliance should ping in order to keep the tunnel to the VPN site alive. 2) Click Next. • The VPN Site Created screen appears. 9. Click Finish. The VPN Sites page reappears. If you added a VPN site, the new site appears in the VPN Sites list. If you edited a VPN site, the modifications are reflected in the VPN Sites list.  Certificate Authentication Method If you selected Certificate, the following things happen:
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  335  • If you chose Download Configuration, the Authentication dialog box appears.  Complete the fields using the information in VPN Authentication Fields on page 340 and click Next. • The Security Methods dialog box appears.  1. To configure advanced security settings, click Show Advanced Settings.
Adding and Editing VPN Sites    336  Check Point Safe@Office User Guide  New fields appear.  2. Complete the fields using the information in Security Methods Fields on page 340 and click Next. The Connect dialog box appears.  3. To try to connect to the Remote Access VPN Server, select the Try to Connect to the VPN Gateway check box. This allows you to test the VPN connection.
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  337    Warning: If you try to connect to the VPN site before completing the wizard, all existing tunnels will be terminated.  4. Click Next. • If you selected Try to Connect to the VPN Gateway, the following things happen:  The Connecting… screen appears.  • The Contacting VPN Site screen appears. • The Site Name dialog box appears.  5. Enter a name for the VPN site.  You may choose any name. 6. To keep the tunnel to the VPN site alive even if there is no network traffic between the Safe@Office appliance and the VPN site, select Keep this site alive. 7. Click Next.
Adding and Editing VPN Sites    338  Check Point Safe@Office User Guide  • If you selected Keep this site alive, and previously you chose Download Configuration, the "Keep Alive" Configuration dialog box appears.  Do the following: 1) Type up to three IP addresses which the Safe@Office appliance should ping in order to keep the tunnel to the VPN site alive. 2) Click Next. • The VPN Site Created screen appears. 8. Click Finish. The VPN Sites page reappears. If you added a VPN site, the new site appears in the VPN Sites list. If you edited a VPN site, the modifications are reflected in the VPN Sites list.
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  339  Table 66: VPN Gateway Address Fields In this field…  Do this… Gateway Address  Type the IP address of the Site-to-Site VPN Gateway to which you want to connect, as given to you by the network administrator. Bypass NAT  Select this option to allow the VPN site to bypass NAT when connecting to your internal network.  This option is selected by default. Bypass the firewall Select this option to allow the VPN site to bypass the firewall and access your internal network without restriction.   Table 67: Route Based VPN Fields In this field…  Do this… Tunnel Local IP  Type a local IP address for this end of the VPN tunnel. Tunnel Remote IP  Type the IP address of the remote end of the VPN tunnel. OSPF Cost  Type the cost of this link for dynamic routing purposes.  The default value is 10. If OSPF is not enabled, this setting is not used. OSPF is enabled using the Safe@Office command line interface (CLI). For information on using CLI, see Controlling the Appliance via the Command Line on page 388. For information on the relevant commands for OSPF, refer to the Embedded NGX CLI Reference Guide.
Adding and Editing VPN Sites    340  Check Point Safe@Office User Guide  Table 68: Authentication Methods Fields In this field…  Do this… Shared Secret  Select this option to use a shared secret for VPN authentication. A shared secret is a string used to identify  VPN sites to each other. Certificate  Select this option to use a certificate for VPN authentication. If you select this option, a certificate must have been installed. (Refer to Installing a Certificate on page 348 for more information about certificates and instructions on how to install a certificate.)   Table 69: VPN Authentication Fields In this field…  Do this… Topology User  Type the topology user’s user name.  Topology Password Type the topology user’s password.  Use Shared Secret Type the shared secret to use for secure communications with the VPN site.  This shared secret is a string used to identify the VPN sites to each other. The secret can contain spaces and special characters.
 Adding and Editing VPN Sites  Chapter 12: Working With VPNs  341  Table 70: Security Methods Fields In this field…  Do this… Phase 1  Security Methods  Select the encryption and integrity algorithm to use for IKE negotiations: • Automatic. The Safe@Office appliance automatically selects the best security methods supported by the site. This is the default. • A specific algorithm Diffie-Hellman group Select the Diffie-Hellman group to use: • Automatic. The Safe@Office appliance automatically selects a group. This is the default. • A specific group A group with more bits ensures a stronger key but lowers performance. Renegotiate every  Type the interval in minutes between IKE Phase-1 key negotiations. This is the IKE Phase-1 SA lifetime. A shorter interval ensures higher security, but impacts heavily on performance. Therefore, it is recommended to keep the SA lifetime around its default value. The default value is 1440 minutes (one day). Phase 2  Security Methods  Select the encryption and integrity algorithm to use for VPN traffic: • Automatic. The Safe@Office appliance automatically selects the best security methods supported by the site. This is the default. • A specific algorithm
Adding and Editing VPN Sites    342  Check Point Safe@Office User Guide  In this field…  Do this… Perfect Forward Secrecy Specify whether to enable Perfect Forward Secrecy (PFS), by selecting one of the following: • Enabled. PFS is enabled. The Diffie-Hellman group field is enabled. • Disabled. PFS is disabled. This is the default. Enabling PFS will generate a new Diffie-Hellman key during IKE Phase 2 and renew the key for each key exchange.  PFS increases security but lowers performance. It is recommended to enable PFS only in situations where extreme security is required. Diffie-Hellman group Select the Diffie-Hellman group to use: • Automatic. The Safe@Office appliance automatically selects a group. This is the default. • A specific group A group with more bits ensures a stronger key but lowers performance. Renegotiate every  Type the interval in seconds between IPSec SA key negotiations. This is the IKE Phase-2 SA lifetime. A shorter interval ensures higher security. The default value is 3600 seconds (one hour).
 Deleting a VPN Site  Chapter 12: Working With VPNs  343   Deleting a VPN Site  To delete a VPN site 1. Click VPN in the main menu, and click the VPN Sites tab. The VPN Sites page appears, with a list of VPN sites. 2. In the desired VPN site’s row, click the Erase   icon. A confirmation message appears. 3. Click OK. The VPN site is deleted.  Enabling/Disabling a VPN Site   You can only connect to VPN sites that are enabled.  To enable/disable a VPN site 1. Click VPN in the main menu, and click the VPN Sites tab. The VPN Sites page appears, with a list of VPN sites. 2. To enable a VPN site, do the following: a. Click the   icon in the desired VPN site’s row. A confirmation message appears. b. Click OK. The icon changes to  , and the VPN site is enabled.
Logging on to a Remote Access VPN Site    344  Check Point Safe@Office User Guide  3. To disable a VPN site, do the following:    Note: Disabling a VPN site eliminates the tunnel and erases the network topology.  a. Click the   icon in the desired VPN site’s row. A confirmation message appears. b. Click OK. The icon changes to  , and the VPN site is disabled.  Logging on to a Remote Access VPN Site  You need to manually log on to Remote Access VPN Servers configured for Manual Login. You do not need to manually log on to a Remote Access VPN Server configured for Automatic Login or a Site-to-Site VPN Gateway: all the computers on your network have constant access to it.  Manual Login can be done through either the Safe@Office Portal or the my.vpn page. When you log on and traffic is sent to the VPN site, a VPN tunnel is established. Only the computer from which you logged on can use the tunnel. To share the tunnel with other computers in your home network, you must log on to the VPN site from those computers, using the same user name and password.   Note: You must use a single user name and password for each VPN destination gateway.
  Logging on to a Remote Access VPN Site  Chapter 12: Working With VPNs  345   Logging on through the Safe@Office Portal    Note: You can only login to sites that are configured for Manual Login. To manually log on to a VPN site through the Safe@Office Portal 1. Click VPN in the main menu, and click the VPN Login tab. The VPN Login page appears.  2. From the Site Name list, select the site to which you want to log on.   Note: Disabled VPN sites will not appear in the Site Name list. 3. Type your user name and password in the appropriate fields. 4. Click Login.
Logging on to a Remote Access VPN Site    346  Check Point Safe@Office User Guide  • If the Safe@Office appliance is configured to automatically download the network configuration, the Safe@Office appliance downloads the network configuration. • If when adding the VPN site you specified a network configuration, the Safe@Office appliance attempts to create a tunnel to the VPN site. • Once the Safe@Office appliance has finished connecting, the VPN Login Status box appears. The Status field displays “Connected”.   • The VPN Login Status box remains open until you manually log off the VPN site.  Logging on through the my.vpn page    Note: You don’t need to know the my.firewall page administrator’s password in order to use the my.vpn page. To manually log on to a VPN site through the my.vpn page 1. Direct your Web browser to http://my.vpn
  Logging on to a Remote Access VPN Site  Chapter 12: Working With VPNs  347  The VPN Login screen appears.  2. In the Site Name list, select the site to which you want to log on. 3. Enter your user name and password in the appropriate fields. 4. Click Login. • If the Safe@Office appliance is configured to automatically download the network configuration, the Safe@Office appliance downloads the network configuration. • If when adding the VPN site you specified a network configuration, the Safe@Office appliance attempts to create a tunnel to the VPN site. • The VPN Login Status box appears. The Status field tracks the connection’s progress. • Once the Safe@Office appliance has finished connecting, the Status field changes to “Connected”.  • The VPN Login Status box remains open until you manually log off of the VPN site.
Logging off a Remote Access VPN Site    348  Check Point Safe@Office User Guide  Logging off a Remote Access VPN Site  You need to manually log off a VPN site, if it is a Remote Access VPN site configured for Manual Login.  To log off a VPN site • In the VPN Login Status box, click Logout. All open tunnels from the Safe@Office appliance to the VPN site are closed, and the VPN Login Status box closes.   Note: Closing the browser or dismissing the VPN Login Status box will also terminate the VPN session within a short time.   Installing a Certificate  A digital certificate is a secure means of authenticating the Safe@Office appliance to other Site-to-Site VPN Gateways. The certificate is issued by the Certificate Authority (CA) to entities such as gateways, users, or computers. The entity then uses the certificate to identify itself and provide verifiable information. For instance, the certificate includes the Distinguished Name (DN) (identifying information) of the entity, as well as the public key (information about itself). After two entities exchange and validate each other's certificates, they can begin encrypting information between themselves using the public keys in the certificates.  The certificate also includes a fingerprint, a unique text used to identify the certificate. You can email your certificate's fingerprint to the remote user. Upon connecting to the Safe@Office VPN Server for the first time, the entity should check that the VPN peer's fingerprint displayed in the SecuRemote VPN Client is identical to the fingerprint received.
 Installing a Certificate  Chapter 12: Working With VPNs  349  The Safe@Office appliance supports certificates encoded in the PKCS#12 (Personal Information Exchange Syntax Standard) format, and enables you to install such certificates in the following ways: • By generating a self-signed certificate. See Generating a Self-Signed Certificate on page 349. • By importing a certificate. The PKCS#12 file you import must have a ".p12" file extension. If you do not have such a PKCS#12 file, obtain one from your network security administrator.  See Importing a Certificate on page 353.   Note: To use certificates authentication, each Safe@Office appliance should have a unique certificate. Do not use the same certificate for more than one gateway.     Note: If your Safe@Office appliance is centrally managed, a certificate is automatically generated and downloaded to your appliance. In this case, there is no need to generate a self-signed certificate.   Generating a Self-Signed Certificate  To generate a self-signed certificate 1. Click VPN in the main menu, and click the Certificate tab.
Installing a Certificate    350  Check Point Safe@Office User Guide  The Certificate page appears.  2. Click Install Certificate. The Safe@Office Certificate Wizard opens, with the Certificate Wizard dialog box displayed.  3. Click Generate a self-signed security certificate for this gateway.
 Installing a Certificate  Chapter 12: Working With VPNs  351  The Create Self-Signed Certificate dialog box appears.  4. Complete the fields using the information in the table below. 5. Click Next. The Safe@Office appliance generates the certificate. This may take a few seconds.  The Done dialog box appears, displaying the certificate's details.  6. Click Finish.
Installing a Certificate    352  Check Point Safe@Office User Guide  The Safe@Office appliance installs the certificate. If a certificate is already installed, it is overwritten. The Certificate Wizard closes. The Certificates page displays the following information: • The gateway's certificate • The gateway's name • The gateway certificate's fingerprint • The CA's certificate  • The name of the CA that issued the certificate (in this case, the Safe@Office gateway) • The CA certificate's fingerprint • The starting and ending dates between which the gateway's certificate and the CA's certificate are valid
 Installing a Certificate  Chapter 12: Working With VPNs  353  Table 71: Certificate Fields In this field…  Do this… Country  Select your country from the drop-down list. Organization Name Type the name of your organization. Organizational Unit  Type the name of your division. Gateway Name  Type the gateway's name. This name will appear on the certificate, and will be visible to remote users inspecting the certificate. This field is filled in automatically with the gateway's MAC address. If desired, you can change this to a more descriptive name.  Valid Until  Use the drop-down lists to specify the month, day, and year when this certificate should expire. Note: You must renew the certificate when it expires.   Importing a Certificate  To install a certificate 1. Click VPN in the main menu, and click the Certificate tab. The Certificate page appears. 2. Click Install Certificate. The Safe@Office Certificate Wizard opens, with the Certificate Wizard dialog box displayed. 3. Click Import a security certificate in PKCS#12 format.
Installing a Certificate    354  Check Point Safe@Office User Guide  The Import Certificate dialog box appears.  4. Click Browse to open a file browser from which to locate and select the file. The filename that you selected is displayed. 5. Click Next. The Import-Certificate Passphrase dialog box appears. This may take a few moments.  6. Type the pass-phrase you received from the network security administrator.
 Uninstalling a Certificate  Chapter 12: Working With VPNs  355  7. Click Next. The Done dialog box appears, displaying the certificate's details. 8. Click Finish. The Safe@Office appliance installs the certificate. If a certificate is already installed, it is overwritten. The Certificate Wizard closes. The Certificates page displays the following information: • The gateway's certificate • The gateway's name • The gateway certificate's fingerprint • The CA's certificate  • The name of the CA that issued the certificate • The CA certificate's fingerprint • The starting and ending dates between which the gateway's certificate and the CA's certificate are valid   Uninstalling a Certificate  If you uninstall the certificate, no certificate will exist on the Safe@Office appliance, and you will not be able to connect to the VPN if a certificate is required. You cannot uninstall the certificate if there is a VPN site currently defined to use certificate authentication.   Note: If you want to replace a currently-installed certificate, there is no need to uninstall the certificate first. When you install the new certificate, the old certificate will be overwritten.
Viewing VPN Tunnels    356  Check Point Safe@Office User Guide  To uninstall a certificate 1. Click VPN in the main menu, and click the Certificate tab. The Certificate page appears with the name of the currently installed certificate. 2. Click Uninstall. A confirmation message appears. 3. Click OK. The certificate is uninstalled. A success message appears. 4. Click OK.  Viewing VPN Tunnels  You can view a list of currently established VPN tunnels. VPN tunnels are created and closed as follows: • Remote Access VPN sites configured for Automatic Login and Site-to-Site VPN Gateways  A tunnel is created whenever your computer attempts any kind of communication with a computer at the VPN site. The tunnel is closed when not in use for a period of time.   Note: Although the VPN tunnel is automatically closed, the site remains open, and if you attempt to communicate with the site, the tunnel will be reestablished. • Remote Access VPN sites configured for Manual Login A tunnel is created whenever your computer attempts any kind of communication with a computer at the VPN site, after you have manually logged on to the site. All open tunnels connecting to the site are closed when you manually log off.
 Viewing VPN Tunnels  Chapter 12: Working With VPNs  357  To view VPN tunnels  1. Click Reports in the main menu, and click the VPN Tunnels tab. The VPN Tunnels page appears with a table of open tunnels to VPN sites.   The VPN Tunnels page includes the information described in the table below. 2. To refresh the table, click Refresh.  Table 72: VPN Tunnels Page Fields This field…  Displays…  Type  The currently active security protocol (IPSEC).  Source  The IP address or address range of the entity from which the tunnel originates.  The entity's type is indicated by an icon. See VPN Tunnel Icons on page 358.
Viewing VPN Tunnels    358  Check Point Safe@Office User Guide  This field…  Displays… Destination  The IP address or address range of the entity to which the tunnel is connected. The entity's type is indicated by an icon. See VPN Tunnel Icons on page 358. Security  The type of encryption used to secure the connection, and the type of Message Authentication Code (MAC) used to verify the integrity of the message. This information is presented in the following format: Encryption type/Authentication type Note: All VPN settings are automatically negotiated between the two sites. The encryption and authentication schemes used for the connection are the strongest of those used at the two sites. Your Safe@Office appliance supports AES, 3DES, and DES encryption schemes, and MD5 and SHA authentication schemes. Established  The time at which the tunnel was established.  This information is presented in the format hh:mm:ss, where:  hh=hours mm=minutes ss=seconds   Table 73: VPN Tunnels Icons This icon…  Represents…    This gateway
  Viewing IKE Traces for VPN Connections  Chapter 12: Working With VPNs  359  This icon…  Represents…    A network for which an IKE Phase-2 tunnel was negotiated     A Remote Access VPN Server  A Site-to-Site VPN Gateway  A remote access VPN user   Viewing IKE Traces for VPN Connections  If you are experiencing VPN connection problems, you can save a trace of IKE (Internet Key Exchange) negotiations to a file, and then use the free IKE View tool to view the file.  The IKE View tool is available for the Windows platform.   Note: Before viewing IKE traces, it is recommended to do the following:  •  The Safe@Office appliance stores traces for all recent IKE negotiations. If you want to view only new IKE trace data, clear all IKE trace data currently stored on the Safe@Office appliance.  •  Close all existing VPN tunnels except for the problematic tunnel, so as to make it easier to locate the problematic tunnel's IKE negotiation trace in the exported file. To clear all currently-stored IKE traces 1. Click Reports in the main menu, and click the VPN Tunnels tab. The VPN Tunnels page appears with a table of open tunnels to VPN sites.   2. Click Clear IKE Trace. All IKE trace data currently stored on the Safe@Office appliance is cleared.
Viewing IKE Traces for VPN Connections    360  Check Point Safe@Office User Guide  To view the IKE trace for a connection 1. Establish a VPN tunnel to the VPN site with which you are experiencing connection problems. For information on when and how VPN tunnels are established, see Viewing VPN Tunnels on page 356. 2. Click Reports in the main menu, and click the VPN Tunnels tab. The VPN Tunnels page appears with a table of open tunnels to VPN sites.   3. Click Save IKE Trace. A standard File Download dialog box appears. 4. Click Save. The Save As dialog box appears. 5. Browse to a destination directory of your choice. 6. Type a name for the *.elg file and click Save. The *.elg file is created and saved to the specified directory. This file contains the IKE traces of all currently-established VPN tunnels. 7. Use the IKE View tool to open and view the *.elg file, or send the file to technical support.
 Changing Your Password  Chapter 13: Managing Users  361  Chapter 13 This chapter describes how to manage Safe@Office appliance users. You can define multiple users, set their passwords, and assign them various permissions. This chapter includes the following topics: Changing Your Password.........................................................................361 Adding and Editing Users ........................................................................363 Adding Quick Guest HotSpot Users.........................................................367 Viewing and Deleting Users.....................................................................369 Setting Up Remote VPN Access for Users...............................................369 Using RADIUS Authentication................................................................370 Configuring the RADIUS Vendor-Specific Attribute ..............................374   Changing Your Password  You can change your password at any time.  To change your password 1. Click Users in the main menu, and click the Internal Users tab. Managing Users
Changing Your Password    362  Check Point Safe@Office User Guide  The Internal Users page appears.  2. In the row of your username, click Edit. The Account Wizard opens displaying the Set User Details dialog box.  3. Edit the Password and Confirm password fields.
 Adding and Editing Users  Chapter 13: Managing Users  363    Note: Use 5 to 25 characters (letters or numbers) for the new password. 4. Click Next. The Set User Permissions dialog box appears.  5. Click Finish. Your changes are saved.  Adding and Editing Users  This procedure explains how to add and edit users.  For information on quickly adding guest HotSpot users via a shortcut that the Safe@Office appliance provides, see Adding Quick Guest HotSpot Users on page 367. To add or edit a user 1. Click Users in the main menu, and click the Internal Users tab.
Adding and Editing Users    364  Check Point Safe@Office User Guide  The Internal Users page appears.  2. Do one of the following: • To create a new user, click New User. • To edit an existing user, click Edit next to the desire user.  The Account Wizard opens displaying the Set User Details dialog box.  3. Complete the fields using the information in Set User Details Fields on page 365.  4. Click Next.
 Adding and Editing Users  Chapter 13: Managing Users  365  The Set User Permissions dialog box appears.  The options that appear on the page are dependant on the software and services you are using. 5. Complete the fields using the information in Set User Permissions Fields on page 366.  6. Click Finish. The user is saved.  Table 74: Set User Details Fields In this field…  Do this… Username  Enter a username for the user. Password  Enter a password for the user. Use five to 25 characters (letters or numbers) for the new password.  Confirm Password  Re-enter the user’s password.
Adding and Editing Users    366  Check Point Safe@Office User Guide  In this field…  Do this… Expires On  To specify an expiration time for the user, select this option and specify the expiration date and time in the fields provided. When the user account expires, it is locked, and the user can no longer log on to the Safe@Office appliance. If you do not select this option, the user will not expire.   Table 75: Set User Permissions Fields In this field...  Do this... Administrator Level   Select the user’s level of access to the Safe@Office Portal. The levels are: • No Access: The user cannot access the Safe@Office Portal. • Read/Write: The user can log on to the Safe@Office Portal and modify system settings. • Read Only: The user can log on to the Safe@Office Portal, but cannot modify system settings or export the appliance configuration via the Setup>Tools page. For example, you could assign this administrator level to technical support personnel who need to view the Event Log. The default level is No Access. The “admin” user’s Administrator Level (Read/Write) cannot be changed. VPN Remote Access Select this option to allow the user to connect to this Safe@Office appliance using their VPN client.  For further information on setting up VPN remote access, see Setting Up Remote VPN Access for Users on page 369.
 Adding Quick Guest HotSpot Users  Chapter 13: Managing Users  367  Web Filtering Override Select this option to allow the user to override Web Filtering. This option only appears if the Web Filtering service is defined.  This option cannot be changed for the “admin” user. HotSpot Access  Select this option to allow the user to log on to the My HotSpot page.  For information on Secure HotSpot, see Configuring Secure HotSpot on page 256. This option only appears in Safe@Office 500 with Power Pack.   Adding Quick Guest HotSpot Users  The Safe@Office appliance provides a shortcut for quickly adding a guest HotSpot user. This is useful in situations where you want to grant temporary network access to guests, for example in an Internet café. The shortcut also enables printing the guest user's details in one click.  By default, the quick guest user has the following characteristics: • Username in the format guest<number>, where <number> is a unique three-digit number.  For example: guest123  • Randomly generated password • Expires in 24 hours • Administration Level: No Access • Permissions: HotSpot Access only For information on configuring Secure HotSpot, see Using Secure HotSpot on page 256.
Adding Quick Guest HotSpot Users    368  Check Point Safe@Office User Guide  To quickly create a guest user 1. Click Users in the main menu, and click the Internal Users tab. The Internal Users page appears.  2. Click Quick Guest. The Account Wizard opens displaying the Save Quick Guest dialog box.  3. In the Expires field, click on the arrows to specify the expiration date and time. 4. To print the user details, click Print. 5. Click Finish. The guest user is saved.  You can edit the guest user's details and permissions using the procedure Adding and Editing Users on page 363.
 Viewing and Deleting Users  Chapter 13: Managing Users  369  Viewing and Deleting Users    Note: The “admin” user cannot be deleted. To view or delete users 1. Click Users in the main menu, and click the Internal Users tab. The Internal Users page appears with a list of all users and their permissions. The expiration time of expired users appears in red. 2. To delete a user, do the following: a) In the desired user’s row, click the Erase   icon.  A confirmation message appears. b) Click OK. The user is deleted. 3. To delete all expired users, do the following: a) Click Clear Expired.  A confirmation message appears. b) Click OK. The expired users are deleted.  Setting Up Remote VPN Access for Users  If you are using your Safe@Office appliance as a Remote Access VPN Server or as an internal VPN Server, you can allow users to access it remotely through their
Using RADIUS Authentication    370  Check Point Safe@Office User Guide  Remote Access VPN Clients (a Check Point SecureClient, Check Point SecuRemote, or another Embedded NGX appliance).  To set up remote VPN access for a user 1. Enable your VPN Server, using the procedure Setting Up Your Safe@Office Appliance as a VPN Server on page 307. 2. Add or edit the user, using the procedure Adding and Editing Users on page 363.  You must select the VPN Remote Access option.  Using RADIUS Authentication  You can use Remote Authentication Dial-In User Service (RADIUS) to authenticate both Safe@Office appliance users and Remote Access VPN Clients trying to connect to the Safe@Office appliance.    Note: When RADIUS authentication is in use, Remote Access VPN Clients must have a certificate. When a user tries to log on to the Safe@Office Portal, the Safe@Office appliance sends the entered user name and password to the RADIUS server. The server then checks whether the RADIUS database contains a matching user name and password pair. If so, then the user is logged on. By default, all RADIUS-authenticated users are assigned the set of permissions specified in the Safe@Office Portal's RADIUS page. However, you can configure the RADIUS server to pass the Safe@Office appliance a specific set of permissions to grant the authenticated user, instead of these default permissions. This is done by configuring the RADIUS Vendor-Specific Attribute (VSA) with a set of attributes containing permission information for specific users. If the VSA is configured for a user, then the RADIUS server passes the VSA to the Embedded NGX gateway as part of the response to the authentication request, and the gateway assigns the user permissions as specified in the VSA. If the VSA is not returned by the RADIUS
 Using RADIUS Authentication  Chapter 13: Managing Users  371  server for a specific user, the gateway will use the default permission set for this user.  To use RADIUS authentication 1. Click Users in the main menu, and click the RADIUS tab. The RADIUS page appears.  2. Complete the fields using the table below. 3. Click Apply. 4. To restore the default RADIUS settings, do the following: a) Click Default.
Using RADIUS Authentication    372  Check Point Safe@Office User Guide  A confirmation message appears. b) Click OK. The RADIUS settings are reset to their defaults. For information on the default values, refer to the table below. 5. To use the RADIUS VSA to assign permissions to users, configure the VSA.  See Configuring the RADIUS Vendor-Specific Attribute on page 374.  Table 76: RADIUS Page Fields In this field…  Do this… Primary/Secondary RADIUS Server Configure the primary and secondary RADIUS servers. By default, the Safe@Office appliance sends a request to the primary RADIUS server first. If the primary RADIUS server does not respond after three attempts, the Safe@Office appliance will send the request to the secondary RADIUS server.  Address  Type the IP address of the computer that will run the RADIUS service (one of your network computers) or click the corresponding This Computer button to allow your computer to host the service. To clear the text box, click Clear. Port  Type the port number on the RADIUS server’s host computer.  The default port number is 1812. Shared Secret  Type the shared secret to use for secure communication with the RADIUS server.
 Using RADIUS Authentication  Chapter 13: Managing Users  373  In this field…  Do this… Realm  If your organization uses RADIUS realms, type the realm to append to RADIUS requests. The realm will be appended to the username as follows: <username>@<realm> For example, if you set the realm to “myrealm”, and the user "JohnS" attempts to log on to the Safe@Office Portal, the Safe@Office appliance will send the RADIUS server an authentication request with the username “JohnS@myrealm”. This field is optional. Timeout Type the interval of time in seconds between attempts to communicate with the RADIUS server.  The default value is 3 seconds. RADIUS User Permissions If the RADIUS VSA (Vendor-Specific Attribute) is configured for a user, the fields in this area will have no effect, and the user will be granted the permissions specified in the VSA.  If the VSA is not configured for the user, the permissions configured in this area will be used. Administrator Level   Select the level of access to the Safe@Office Portal to assign to all users authenticated by the RADIUS server. The levels are: • No Access: The user cannot access the Safe@Office Portal • Read/Write: The user can log on to the Safe@Office Portal and modify system settings. • Read Only: The user can log on to the Safe@Office Portal, but cannot modify system settings.  The default level is No Access.
Configuring the RADIUS Vendor-Specific Attribute    374  Check Point Safe@Office User Guide  In this field…  Do this… Web Filtering Override Select this option to allow all users authenticated by the RADIUS server to override Web Filtering. This option only appears if the Web Filtering service is defined. HotSpot Access  Select this option to allow the user to access the My HotSpot page. This option only appears in Safe@Office 500 with Power Pack.   Configuring the RADIUS Vendor-Specific Attribute  For detailed instructions and examples, refer to the "Configuring the RADIUS Vendor-Specific Attribute" white paper. To assign permissions to specific RADIUS-authenticated users 1. Create a remote access policy as follows:  a) Assign the policy’s VSA (attribute 26) the SofaWare vendor code (6983). b) For each permission you want to grant, configure the relevant attribute of the VSA with the desired value, as described in the table below.  For example, to assign the user VPN access permissions, set attribute number 2 to “true”. 2. Assign the policy to the desired user or user group.
 Configuring the RADIUS Vendor-Specific Attribute  Chapter 13: Managing Users  375  Table 77: VSA Syntax Permission Description Attribute Number Attribute Format Attribute Values  Notes Admin  Indicates the  administrator’s level of access to the Embedded NGX Portal 1 String none. The user cannot access the Safe@Office Portal. readonly.  The user can log on to the Safe@Office Portal, but cannot modify system settings.  readwrite. The user can log on to the Safe@Office Portal and modify system settings.  VPN Indicates whether the user can access the network from a Remote Access VPN Client.  2 String true. The user can remotely access the network via VPN. false. The user cannot remotely access the network via VPN.  This permission is only relevant if the Safe@Office Remote Access VPN Server is enabled. The gateway must have a certificate.
Configuring the RADIUS Vendor-Specific Attribute    376  Check Point Safe@Office User Guide  Permission Description Attribute Number Attribute Format Attribute Values  Notes Hotspot Indicates whether the user can log on via the My HotSpot page. 3 String true. The user can access the Internet via My HotSpot. false. The user cannot access the Internet via My HotSpot. This permission is only relevant if the Secure HotSpot feature is enabled. UFP Indicates whether the user can override Web Filtering. 4 String true. The user can override Web Filtering. false. The user cannot override Web Filtering. This permission is only relevant if the Web Filtering service is enabled.
 Viewing Firmware Status  Chapter 14: Maintenance  377  Chapter 14 This chapter describes the tasks required for maintenance and diagnosis of your Safe@Office appliance. This chapter includes the following topics: Viewing Firmware Status.........................................................................377 Updating the Firmware.............................................................................379 Upgrading Your Software Product...........................................................381 Registering Your Safe@Office Appliance ...............................................385 Configuring Syslog Logging....................................................................386 Controlling the Appliance via the Command Line...................................388 Configuring HTTPS .................................................................................392 Configuring SSH......................................................................................394 Configuring SNMP...................................................................................396 Setting the Time on the Appliance ...........................................................399 Using Diagnostic Tools............................................................................403 Backing Up the Safe@Office Appliance Configuration...........................417 Resetting the Safe@Office Appliance to Defaults ...................................420 Running Diagnostics ................................................................................423 Rebooting the Safe@Office Appliance ....................................................424   Viewing Firmware Status  The firmware is the software program embedded in the Safe@Office appliance.  You can view your current firmware version and additional details. Maintenance
Viewing Firmware Status    378  Check Point Safe@Office User Guide  To view the firmware status • Click Setup in the main menu, and click the Firmware tab. The Firmware page appears.   The Firmware page displays the following information: Table 78: Firmware Status Fields This field…  Displays…  For example… WAN MAC Address  The MAC address used for the Internet connection 00:80:11:22:33:44 Firmware Version  The current version of the firmware 6.0 Installed Product  The licensed software and the number of allowed nodes Safe@Office 500 unlimited nodes
 Updating the Firmware  Chapter 14: Maintenance  379  This field…  Displays…  For example… Uptime  The time that elapsed from the moment the unit was turned on 01:21:15 Hardware Type  The type of the current Safe@Office appliance hardware Sbox-500 Hardware Version  The current hardware version of the Safe@Office appliance 1.0   Updating the Firmware  If you are subscribed to Software Updates, firmware updates are performed automatically. These updates include new product features and protection against new security threats. Check with your reseller for the availability of Software Updates and other services. For information on subscribing to services, see Connecting to a Service Center on page 281. If you are not subscribed to the Software Updates service, you must update your firmware manually.   To update your Safe@Office firmware manually 1. Click Setup in the main menu, and click the Firmware tab. The Firmware page appears. 2. Click Firmware Update.
Updating the Firmware    380  Check Point Safe@Office User Guide  The Firmware Update page appears.   3. Click Browse.  A browse window appears. 4. Select the image file and click Open.  The Firmware Update page reappears. The path to the firmware update image file appears in the Browse text box. 5. Click Upload. Your Safe@Office appliance firmware is updated.  Updating may take a few minutes, during which time the PWR/SEC LED may start flashing red or orange. Do not power off the appliance. At the end of the process the Safe@Office appliance restarts automatically.
 Upgrading Your Software Product  Chapter 14: Maintenance  381    Upgrading Your Software Product  You can upgrade your Safe@Office 500 appliance by adding the Safe@Office 500 Power Pack. After purchasing the Power Pack, you will receive a new Product Key that enables you to use the Power Pack on the same Safe@Office appliance you have today. There is no need to replace your hardware. You can also purchase node upgrades, as needed.   Note: To purchase the Power Pack or node upgrades, contact your Safe@Office appliance provider. To upgrade your product, you must install the new Product Key.  To install a Product Key 1. Click Setup in the main menu, and click the Firmware tab. The Firmware page appears. 2. Click Upgrade Product.
Upgrading Your Software Product    382  Check Point Safe@Office User Guide  The Safe@Office Licensing Wizard opens, with the Install Product Key dialog box displayed.  3. Click Enter a different Product Key. 4. In the Product Key field, enter the new Product Key. 5. Click Next. The Installed New Product Key dialog box appears.  6. Click Next.
 Upgrading Your Software Product  Chapter 14: Maintenance  383  The first Registration dialog box appears.  7. Do one of the following: • To register your Safe@Office appliance later on, clear the I want to register my product check box and then click Next.  • To register your Safe@Office appliance now, do the following: 1) Click Next.
Upgrading Your Software Product    384  Check Point Safe@Office User Guide  A second Registration dialog box appears.  2) Enter your contact information in the appropriate fields. 3) To receive email notifications regarding new firmware versions and services, select the check box. 4) Click Next.  The Registration… screen appears. The third Registration dialog box appears.
  Registering Your Safe@Office Appliance  Chapter 14: Maintenance  385  8. Click Finish. Your Safe@Office appliance is restarted and the Welcome page appears.  Registering Your Safe@Office Appliance  If you want to activate your warranty and optionally receive notifications of new firmware versions and services, you must register your Safe@Office appliance. Privacy Statement: Check Point is committed to protecting your privacy. We use the information we collect about you to process orders and to improve our ability to serve your needs. We will under no circumstances sell, lease, or otherwise disclose any of your personal or contact details without your explicit permission. To register your Safe@Office appliance 1. Click Setup in the main menu, and click the Firmware tab. The Firmware page appears. 2. Click Upgrade Product. The Safe@Office Licensing Wizard opens, with the Install Product Key dialog box displayed. 3. Select Keep these settings. 4. Click Next. The first Registration dialog box appears. 5. Verify that the I want to register my product check box is selected. 6. Click Next. A second Registration dialog box appears. 7. Enter your contact information in the appropriate fields. 8. To receive email notifications regarding new firmware versions and services, select the check box.
Configuring Syslog Logging    386  Check Point Safe@Office User Guide  9. Click Next.  The Registration… screen appears. The third Registration dialog box appears. 10. Click Finish. Your Safe@Office appliance is restarted and the Welcome page appears.  Configuring Syslog Logging  You can configure the Safe@Office appliance to send event logs to a Syslog server residing in your internal network or on the Internet. The logs detail the date and the time each event occurred. If the event is a communication attempt that was rejected by the firewall, the event details include the source and destination IP address, the destination port, and the protocol used for the communication attempt (for example, TCP or UDP).  This same information is also available in the Event Log page (see Viewing the Event Log on page 187). However, while the Event Log can display hundreds of logs, a Syslog server can store an unlimited number of logs. Furthermore, Syslog servers can provide useful tools for managing your logs.   Note: Kiwi Syslog Daemon is freeware and can be downloaded from http://www.kiwisyslog.com. For technical support, contact Kiwi Enterprises.   To configure Syslog logging 1. Click Setup in the main menu, and click the Logging tab.
 Configuring Syslog Logging  Chapter 14: Maintenance  387  The Logging page appears.  2. Complete the fields using the information in the table below. 3. Click Apply. Table 79: Logging Page Fields In this field…  Do this… Syslog Server  Type the IP address of the computer that will run the Syslog service (one of your network computers), or click This Computer to allow your computer to host the service. Clear  Click to clear the Syslog Server field. Syslog Port  Type the port number of the Syslog server. Default  Click to reset the Syslog Port field to the default (port 514 UDP).
Controlling the Appliance via the Command Line    388  Check Point Safe@Office User Guide  Controlling the Appliance via the Command Line  Depending on your Safe@Office model, you can control your appliance via the command line in the following ways: • Using the Safe@Office Portal's command line interface. See Using the Safe@Office Portal on page 388. • Using a console connected to the Safe@Office appliance.  For information, see Using the Serial Console on page 390. • Using an SSH client.  See Configuring SSH on page 394.   Using the Safe@Office Portal  You can control your appliance via the Safe@Office Portal's command line interface. To control the appliance via the Safe@Office Portal 1. Click Setup in the main menu, and click the Tools tab.
  Controlling the Appliance via the Command Line  Chapter 14: Maintenance  389  The Tools page appears.   2. Click Command. The Command Line page appears.
Controlling the Appliance via the Command Line    390  Check Point Safe@Office User Guide  3. In the upper field, type a command. You can view a list of supported commands using the command help. For information on all commands, refer to the Embedded NGX CLI Reference Guide. 4. Click Go. The command is implemented.  Using the Serial Console  You can connect a console to the Safe@Office appliance, and use the console to control the appliance via the command line.    Note: Your terminal emulation software must be set to 57600 bps, N-8-1. To control the appliance via a console 1. Connect the serial console to your Safe@Office appliance's serial port, using an RS-232 Null modem cable. For information on locating the serial port, see Rear Panel. 2. Click Network in the main menu, and click the Ports tab.
  Controlling the Appliance via the Command Line  Chapter 14: Maintenance  391  The Ports page appears.  3. In the RS232 drop-down list, select Console. 4. Click Apply. You can now control the Safe@Office appliance from the serial console. For information on all supported commands, refer to the Embedded NGX CLI Reference Guide.
Configuring HTTPS    392  Check Point Safe@Office User Guide   Configuring HTTPS  You can enable Safe@Office appliance users to access the Safe@Office Portal from the Internet. To do so, you must first configure HTTPS. To configure HTTPS 1. Click Setup in the main menu, and click the Management tab. The Management page appears.   2. Specify from where HTTPS access to the Safe@Office Portal should be granted.  See Access Options on page 393 for information.   Warning: If remote HTTPS is enabled, your Safe@Office appliance settings can be changed remotely, so it is especially important to make sure all Safe@Office appliance users’ passwords are difficult to guess.
 Configuring HTTPS  Chapter 14: Maintenance  393    Note: You can use HTTPS to access the Safe@Office Portal from your internal network, by surfing to https://my.firewall. If you selected IP Address Range, additional fields appear.  3. If you selected IP Address Range, enter the desired IP address range in the fields provided. 4. Click Apply. The HTTPS configuration is saved. If you configured remote HTTPS, you can now access the Safe@Office Portal through the Internet, using the procedure Accessing the Safe@Office Portal Remotely on page 44.  Table 80: Access Options Select this option… To allow access from… Internal Network  The internal network only. This disables remote access capability.
Configuring SSH    394  Check Point Safe@Office User Guide  Select this option… To allow access from… Internal Network and VPN The internal network and your VPN. IP Address Range  A particular range of IP addresses. Additional fields appear, in which you can enter the desired IP address range. ANY  Any IP address. Disabled Nowhere. This completely disables access. This option is only available for SNMP.   Configuring SSH  Safe@Office appliance users can control the appliance via the command line, using the SSH (Secure Shell) management protocol. You can enable users to do so via the Internet, by configuring remote SSH access. You can also integrate the Safe@Office appliance with SSH-based management systems.   Note: The Safe@Office appliance supports SSHv2 clients only. The SSHv1 protocol contains security vulnerabilities and is not supported. To configure SSH 1. Click Setup in the main menu, and click the Management tab. The Management page appears. 2. Specify from where SSH access should be granted.
 Configuring SSH  Chapter 14: Maintenance  395  See Access Options on page 393 for information.   Warning: If remote SSH is enabled, your Safe@Office appliance settings can be changed remotely, so it is especially important to make sure all Safe@Office appliance users’ passwords are difficult to guess. If you selected IP Address Range, additional fields appear.  3. If you selected IP Address Range, enter the desired IP address range in the fields provided. 4. Click Apply. The SSH configuration is saved. If you configured remote SSH access, you can now control the Safe@Office appliance from the Internet, using an SSHv2 client. For information on all supported commands, refer to the Embedded NGX CLI Reference Guide.
Configuring SNMP    396  Check Point Safe@Office User Guide  Configuring SNMP  The Safe@Office appliance users can monitor the Safe@Office appliance, using tools that support SNMP (Simple Network Management Protocol). You can enable users can do so via the Internet, by configuring remote SNMP access.  The Safe@Office appliance supports the following SNMP MIBs: • SNMPv2-MIB • RFC1213-MIB • IF-MIB • IP-MIB All SNMP access is read-only. To configure SNMP 1. Click Setup in the main menu, and click the Management tab. The Management page appears. 2. Specify from where SNMP access should be granted.  See Access Options on page 393 for information. If you selected IP Address Range, additional fields appear.
 Configuring SNMP  Chapter 14: Maintenance  397  The Community field and the Advanced link are enabled.  3. If you selected IP Address Range, enter the desired IP address range in the fields provided. 4. In the Community field, type the name of the SNMP community string.  SNMP clients uses the SNMP community string as a password, when connecting to the Safe@Office appliance. The default value is "public". It is recommended to change this string.  5. To configure advanced SNMP settings, click Advanced.
Configuring SNMP    398  Check Point Safe@Office User Guide  The SNMP Configuration page appears.  6. Complete the fields using the table below. 7. Click Apply. The SNMP configuration is saved.  8. Configure the SNMP clients with the SNMP community string. Table 81: Advanced SNMP Settings In this field...  Do this… System Location  Type a description of the appliance's location.  This information will be visible to SNMP clients, and is useful for administrative purposes. System Contact  Type the name of the contact person.  This information will be visible to SNMP clients, and is useful for administrative purposes.
 Setting the Time on the Appliance  Chapter 14: Maintenance  399  In this field...  Do this… SNMP Port  Type the port to use for SNMP. The default port is 161.   Setting the Time on the Appliance  You set the time displayed in the Safe@Office Portal during initial appliance setup. If desired, you can change the date and time using the procedure below.   To set the time 1. Click Setup in the main menu, and click the Tools tab. The Tools page appears. 2. Click Set Time. The Safe@Office Set Time Wizard opens displaying the Set the Safe@Office Time dialog box.
Setting the Time on the Appliance    400  Check Point Safe@Office User Guide  3. Complete the fields using the information in Set Time Wizard Fields on page 402. 4. Click Next. The following things happen in the order below: • If you selected Specify date and time, the Specify Date and Time dialog box appears.  Set the date, time, and time zone in the fields provided, then click Next.
 Setting the Time on the Appliance  Chapter 14: Maintenance  401  • If you selected Use a Time Server, the Time Servers dialog box appears.  Complete the fields using the information in Time Servers Fields on page 402, then click Next. • The Date and Time Updated screen appears.  5. Click Finish.
Setting the Time on the Appliance    402  Check Point Safe@Office User Guide  Table 82: Set Time Wizard Fields Select this option…  To do the following… Your computer's clock  Set the appliance time to your computer’s system time. Your computer’s system time is displayed to the right of this option. Keep the current time  Do not change the appliance’s time. The current appliance time is displayed to the right of this option. Use a Time Server  Synchronize the appliance time with a Network Time Protocol (NTP) server. Specify date and time  Set the appliance to a specific date and time.   Table 83: Time Servers Fields In this field…  Do this… Primary Server  Type the IP address of the Primary NTP server. Secondary Server  Type the IP address of the Secondary NTP server. This field is optional. Clear  Clear the field. Select your time zone  Select the time zone in which you are located.
 Using Diagnostic Tools  Chapter 14: Maintenance  403  Using Diagnostic Tools  The Safe@Office appliance is equipped with a set of diagnostic tools that are useful for troubleshooting Internet connectivity. Table 84: Diagnostic Tools Use this tool… To do this…  For information, see... Ping  Check that a specific IP address or DNS name can be reached via the Internet. Using IP Tools on page 404 Traceroute  Display a list of all routers used to connect from the Safe@Office appliance to a specific IP address or DNS name. Using IP Tools on page 404 WHOIS  Display the name and contact information of the entity to which a specific IP address or DNS name is registered. This information is useful in tracking down hackers. Using IP Tools on page 404 Packet Sniffer  Capture network traffic. This information is useful troubleshooting network problems. Using Packet Sniffer on page 406
Using Diagnostic Tools    404  Check Point Safe@Office User Guide   Using IP Tools  To use an IP tool 1. Click Setup in the main menu, and click the Tools tab. The Tools page appears. 2. In the IP Tools drop-down list, select the desired tool. 3. In the Address field, type the IP address or DNS name for which to run the tool. 4. Click Go. • If you selected Ping, the following things happen: The Safe@Office appliance sends packets to the specified the IP address or DNS name. The IP Tools window opens and displays the percentage of packet loss and the amount of time it each packet took to reach the specified host and return (round-trip) in milliseconds.  • If you selected Traceroute, the following things happen: The Safe@Office appliance connects to the specified IP address or DNS name.
 Using Diagnostic Tools  Chapter 14: Maintenance  405  The IP Tools window opens and displays a list of routers used to make the connection.  • If you selected WHOIS, the following things happen: The Safe@Office appliance queries the Internet WHOIS server. A window displays the name of the entity to which the IP address or DNS name is registered and their contact information.
Using Diagnostic Tools    406  Check Point Safe@Office User Guide   Using Packet Sniffer  The Safe@Office appliance includes the Packet Sniffer tool, which enables you to capture packets from any internal network or Safe@Office port. This is useful for troubleshooting network problems and for collecting data about network behavior. The Safe@Office appliance saves the captured packets to a file on your computer. You can use a free protocol analyzer, such as Ethereal, to analyze the file, or you can send it to technical support. Ethereal runs on all popular computing platforms and can be downloaded from http://www.ethereal.com. To use Packet Sniffer 1. Click Setup in the main menu, and click the Tools tab. The Tools page appears. 2. Click Sniffer. The Packet Sniffer window opens.  3. Complete the fields using the information in the table below. 4. Click Start.
 Using Diagnostic Tools  Chapter 14: Maintenance  407  The Packet Sniffer window displays the name of the interface, the number of packets collected, and the percentage of storage space remaining on the appliance for storing the packets.  5. Click Stop to stop collecting packets. A standard File Download dialog box appears. 6. Click Save. The Save As dialog box appears. 7. Browse to a destination directory of your choice. 8. Type a name for the configuration file and click Save. The *.cap file is created and saved to the specified directory. 9. Click Cancel to close the Packet Sniffer window.
Using Diagnostic Tools    408  Check Point Safe@Office User Guide  Table 85: Packet Sniffer Fields In this field…  Do this… Interface  Select the interface from which to collect packets. The list includes the primary Internet connection, the Safe@Office appliance ports, and all defined networks. Filter String  Type the filter string to use for filtering the captured packets. Only packets that match the filter condition will be saved. For a list of basic filter strings elements, see Filter String Syntax on page 409. For detailed information on filter syntax, go to http://www.tcpdump.org/tcpdump_man.html. Note: Do not enclose the filter string in quotation marks.  If you do not specify a filter string, Packet Sniffer will save all packets on the selected interface.   Capture only traffic to/from this gateway Select this option to capture incoming and outgoing packets for this gateway only. If this option is not selected, Packet Sniffer will collect packets for all traffic on the interface.
 Using Diagnostic Tools  Chapter 14: Maintenance  409   Filter String Syntax The following represents a list of basic filter string elements:  • and on page 409 • dst on page 410 • dst port on page 410 • ether proto on page 411 • host on page 412 • not on page 412 • or on page 413 • port on page 413 • src on page 414 • src port on page 414 • tcp on page 415 • udp on page 416 For detailed information on filter syntax, refer to http://www.tcpdump.org.  and PURPOSE The and element is used to concatenate filter string elements. The filtered packets must match all concatenated filter string elements. SYNTAX element and element [and element...] element && element [&& element...]
Using Diagnostic Tools    410  Check Point Safe@Office User Guide  PARAMETERS  element String. A filter string element. EXAMPLE The following filter string saves packets that both originate from IP address is 192.168.10.1 and are destined for port 80: src 192.168.10.1 and dst port 80  dst PURPOSE The dst element captures all packets with a specific destination. SYNTAX dst destination PARAMETERS  destination IP Address or String. The computer to which the packet is sent. This can be the following: •  An IP address •  A host name EXAMPLE The following filter string saves packets that are destined for the IP address 192.168.10.1: dst 192.168.10.1  dst port PURPOSE The dst port element captures all packets destined for a specific port.  SYNTAX dst port port
 Using Diagnostic Tools  Chapter 14: Maintenance  411    Note: This element can be prepended by tcp or udp. For information, see tcp on page 415 and udp on page 416. PARAMETERS  port Integer. The port to which the packet is sent. EXAMPLE The following filter string saves packets that are destined for port 80: dst port 80  ether proto PURPOSE The ether proto element is used to capture packets of a specific ether protocol type.      SYNTAX ether proto \protocol PARAMETERS  protocol String. The protocol type of the packet.  This can be the following: ip, ip6, arp, rarp, atalk, aarp,  dec net,  sca, lat, mopdl, moprc, iso, stp, ipx, or netbeui. EXAMPLE The following filter string saves ARP packets: ether proto arp
Using Diagnostic Tools    412  Check Point Safe@Office User Guide  host PURPOSE The host element captures all incoming and outgoing packets for a specific computer. SYNTAX host host PARAMETERS  host IP Address or String. The computer to/from which the packet is sent. This can be the following: •  An IP address •  A host name EXAMPLE The following filter string saves all packets that either originated from IP address 192.168.10.1, or are destined for that same IP address: host 192.168.10.1  not PURPOSE The not element is used to negate filter string elements.  SYNTAX not element ! element PARAMETERS  element String. A filter string element.
 Using Diagnostic Tools  Chapter 14: Maintenance  413  EXAMPLE The following filter string saves packets that are not destined for port 80: not dst port 80  or PURPOSE The or element is used to alternate between string elements. The filtered packets must match at least one of the filter string elements. SYNTAX element or element [or element...] element || element [|| element...] PARAMETERS  element String. A filter string element. EXAMPLE The following filter string saves packets that either originate from IP address 192.168.10.1 or IP address 192.168.10.10: src 192.168.10.1 or src 192.168.10.10  port PURPOSE The port element captures all packets originating from or destined for a specific port. SYNTAX port port   Note: This element can be prepended by tcp or udp. For information, see tcp on page 415 and udp on page 416.
Using Diagnostic Tools    414  Check Point Safe@Office User Guide  PARAMETERS  port Integer. The port from/to which the packet is sent.  EXAMPLE The following filter string saves all packets that either originated from port 80, or are destined for port 80: port 80  src PURPOSE The src element captures all packets with a specific source. SYNTAX src source PARAMETERS  source IP Address or String. The computer from which the packet is sent. This can be the following: •  An IP address •  A host name EXAMPLE The following filter string saves packets that originated from IP address 192.168.10.1: src 192.168.10.1  src port PURPOSE The src port element captures all packets originating from a specific port. SYNTAX src port port
 Using Diagnostic Tools  Chapter 14: Maintenance  415    Note: This element can be prepended by tcp or udp. For information, see tcp on page 415 and udp on page 416. PARAMETERS  port Integer. The port to which the packet is sent. EXAMPLE The following filter string saves packets that originated from port 80: src port 80  tcp PURPOSE The tcp element captures all TCP packets. This element can be prepended to port-related elements.   Note: When not prepended to other elements, the tcp element is the equivalent of ip proto tcp. SYNTAX tcp tcp element PARAMETERS  element String. A port-related filter string element that should be restricted to saving only TCP packets. This can be the following: • dst port - Capture all TCP packets destined for a specific port.  • port - Captures all TCP packets originating from or destined for a specific port. • src port - Capture all TCP packets originating from a specific port.
Using Diagnostic Tools    416  Check Point Safe@Office User Guide  EXAMPLE 1 The following filter string captures all TCP packets: tcp EXAMPLE 2 The following filter string captures all TCP packets destined for port 80: tcp dst port 80  udp PURPOSE The udp element captures all UDP packets. This element can be prepended to port-related elements.   Note: When not prepended to other elements, the udp element is the equivalent of ip proto udp. SYNTAX udp udp element PARAMETERS  element String. A port-related filter string element that should be restricted to saving only UDP packets. This can be the following: • dst port - Capture all UDP packets destined for a specific port.  • port - Captures all UDP packets originating from or destined for a specific port. • src port - Capture all UDP packets originating from a specific port. EXAMPLE 1 The following filter string captures all UDP packets:
  Backing Up the Safe@Office Appliance Configuration  Chapter 14: Maintenance  417  udp EXAMPLE 2 The following filter string captures all UDP packets destined for port 80: udp dst port 80  Backing Up the Safe@Office Appliance Configuration  You can export the Safe@Office appliance configuration to a *.cfg file, and use this file to backup and restore Safe@Office appliance settings, as needed. The file includes all your settings. The configuration file is saved as a textual CLI script. If desired, you can edit the file. For a full explanation of the CLI script format and the supported CLI commands, see the Embedded NGX CLI Reference Guide.  Exporting the Safe@Office Appliance Configuration  Exporting the Safe@Office appliance configuration creates a configuration file. To export the Safe@Office appliance configuration 1. Click Setup in the main menu, and click the Tools tab. The Tools page appears. 2. Click Export.  A standard File Download dialog box appears. 3. Click Save. The Save As dialog box appears.
Backing Up the Safe@Office Appliance Configuration    418  Check Point Safe@Office User Guide  4. Browse to a destination directory of your choice. 5. Type a name for the configuration file and click Save. The *.cfg configuration file is created and saved to the specified directory.  Importing the Safe@Office Appliance Configuration  In order to restore your Safe@Office appliance’s configuration from a configuration file, you must import the file. To import the Safe@Office appliance configuration 1. Click Setup in the main menu, and click the Tools tab. The Tools page appears. 2. Click Import. The Import Settings page appears.  3. Do one of the following:
  Backing Up the Safe@Office Appliance Configuration  Chapter 14: Maintenance  419  • In the Import Settings field, type the full path to the configuration file. Or • Click Browse, and browse to the configuration file. 4. Click Upload. A confirmation message appears. 5. Click OK. The Safe@Office appliance settings are imported. The Import Settings page displays the configuration file's content and the result of implementing each configuration command.    Note: If the appliance's IP address changed as a result of the configuration import, your computer may be disconnected from the network; therefore you may not be able to see the results.
Resetting the Safe@Office Appliance to Defaults    420  Check Point Safe@Office User Guide  Resetting the Safe@Office Appliance to Defaults  You can reset the Safe@Office appliance to its default settings. When you reset your Safe@Office appliance, it reverts to the state it was originally in when you purchased it. You can choose to keep the current firmware or to revert to the firmware version that shipped with the Safe@Office appliance.   Warning: This operation erases all your settings and password information. You will have to set a new password and reconfigure your Safe@Office appliance for Internet connection. For information on performing these tasks, see Setting Up the Safe@Office Appliance. You can reset the Safe@Office appliance to defaults via the Web management interface (software) or by manually pressing the Reset button (hardware) located at the back of the Safe@Office appliance.  To reset the Safe@Office appliance to factory defaults via the Web interface 1. Click Setup in the main menu, and click the Tools tab. The Tools page appears. 2. Click Factory Settings.
  Resetting the Safe@Office Appliance to Defaults  Chapter 14: Maintenance  421  A confirmation message appears.  3. To revert to the firmware version that shipped with the appliance, select the check box. 4. Click OK.  • The Please Wait screen appears.  • The Safe@Office appliance returns to its factory defaults.  • The Safe@Office appliance is restarted (the PWR/SEC LED flashes quickly). This may take a few minutes. • The Login page appears.
Resetting the Safe@Office Appliance to Defaults    422  Check Point Safe@Office User Guide  To reset the Safe@Office appliance to factory defaults using the Reset button 1. Make sure the Safe@Office appliance is powered on. 2. Using a pointed object, press the RESET button on the back of the Safe@Office appliance steadily for seven seconds and then release it. 3. Allow the Safe@Office appliance to boot-up until the system is ready (PWR/SEC LED flashes slowly or illuminates steadily in green light). For information on the appliance's front and rear panels, see the relevant Getting to Know Your Appliance section in Introduction on page 1.   Warning: If you choose to reset the Safe@Office appliance by disconnecting the power cable and then reconnecting it, be sure to leave the Safe@Office appliance disconnected for at least three seconds, or the Safe@Office appliance might not function properly until you reboot it as described below.
 Running Diagnostics  Chapter 14: Maintenance  423    Running Diagnostics  You can view technical information about your Safe@Office appliance’s hardware, firmware, license, network status, and Service Center.  This information is useful for troubleshooting. You can export it to an *.html file and send it to technical support.  To view diagnostic information 1. Click Setup in the main menu, and click the Tools tab. The Tools page appears. 2. Click Diagnostics.  Technical information about your Safe@Office appliance appears in a new window. 3. To save the displayed information to an *.html file: a. Click Save. A standard File Download dialog box appears. b. Click Save. The Save As dialog box appears. c. Browse to a destination directory of your choice. d. Type a name for the configuration file and click Save. The *.html file is created and saved to the specified directory. 4. To refresh the contents of the window, click Refresh. The contents are refreshed. 5. To close the window, click Close.
Rebooting the Safe@Office Appliance    424  Check Point Safe@Office User Guide  Rebooting the Safe@Office Appliance  If your Safe@Office appliance is not functioning properly, rebooting it may solve the problem. To reboot the Safe@Office appliance 1. Click Setup in the main menu, and click the Firmware tab. The Firmware page appears. 2. Click Restart.  A confirmation message appears. 3. Click OK.  • The Please Wait screen appears.  • The Safe@Office appliance is restarted (the PWR/SEC LED flashes quickly). This may take a few minutes. • The Login page appears.
 Overview  Chapter 15: Using Network Printers  425  Chapter 15 This chapter describes how to set up and use network printers. This chapter includes the following topics: Overview ..................................................................................................425 Setting Up Network Printers.....................................................................426 Configuring Computers to Use Network Printers.....................................427 Viewing Network Printers........................................................................437 Changing Network Printer Ports...............................................................437 Resetting Network Printers.......................................................................438   Overview The Safe@Office 500W includes a built-in print server, enabling you to connect USB-based printers to the appliance and share them across the network.    Note: When using computers with a Windows 2000/XP operating system, the Safe@Office appliance supports connecting up to four USB-based printers to the appliance. When using computers with a MAC OS-X operating system, the Safe@Office appliance supports connecting one printer. The appliance automatically detects printers as they are plugged in, and they immediately become available for printing. Usually, no special configuration is required on the Safe@Office appliance.   Note: The Safe@Office print server supports printing via "all-in-one" printers. Copying and scanning functions are not supported.   Using Network Printers
Setting Up Network Printers    426  Check Point Safe@Office User Guide  Setting Up Network Printers  To set up a network printer 1. Connect the network printer to the Safe@Office appliance. See Network Installation on page 35. 2. Turn the printer on. 3. In the Safe@Office Portal, click Setup in the main menu, and click the Printers tab. The Printers page appears. If the Safe@Office appliance detected the printer, the printer is listed on the page.  4. If the printer is not listed, check that you connected the printer correctly, then click Refresh to refresh the page. 5. Write down the port number allocated to the printer.
  Configuring Computers to Use Network Printers  Chapter 15: Using Network Printers  427  The port number appears in the Printer Server TCP Port field. You will need this number later, when configuring computers to use the network printer. 6. To change the port number, do the following: a. Type the desired port number in the Printer Server TCP Port field.   Note: Printer port numbers may not overlap, and must be high ports.  b. Click Apply. You may want to change the port number if, for example, the printer you are setting up is intended to replace another printer. In this case, you should change the replacement printer's port number to the old printer's port number, and you can skip the next step.   7. Configure each computer from which you want to enable printing to the network printer. See Configuring Computers to Use Network Printers on page 427.  Configuring Computers to Use Network Printers  Perform the relevant procedure on each computer from which you want to enable printing via the Safe@Office print server to a network printer.   Windows 2000/XP This procedure is relevant for computers with a Windows 2000/XP operating system.  To configure a computer to use a network printer 1. If the computer for which you want to enable printing is located on the WAN, create an Allow rule for connections from the computer to This Gateway.  See Adding and Editing Rules on page 213.
Configuring Computers to Use Network Printers    428  Check Point Safe@Office User Guide  2. Click Start > Settings > Control Panel.  The Control Panel window opens. 3. Click Printers and Faxes. The Printers and Faxes window opens. 4. Right-click in the window, and click Add Printer in the popup menu. The Add Printer Wizard opens with the Welcome dialog box displayed.  5. Click Next. The Local or Network Printer dialog box appears.  6. Click Local printer attached to this computer.
  Configuring Computers to Use Network Printers  Chapter 15: Using Network Printers  429    Note: Do not select the Automatically detect and install my Plug and Play printer check box. 7. Click Next. The Select a Printer Port dialog box appears.  8. Click Create a new port. 9. In the Type of port drop-down list, select Standard TCP/IP Port. 10. Click Next. The Add Standard TCP/IP Port Wizard opens with the Welcome dialog box displayed.  11. Click Next.
Configuring Computers to Use Network Printers    430  Check Point Safe@Office User Guide  The Add Port dialog box appears.  12. In the Printer Name or IP Address field, type the Safe@Office appliance's LAN IP address, or "my.firewall".  You can find the LAN IP address in the Safe@Office Portal, under Network > My Network.  The Port Name field is filled in automatically. 13. Click Next. The Add Standard TCP/IP Printer Port Wizard opens, with the Additional Port Information Required dialog box displayed.  14. Click Custom. 15. Click Settings.
  Configuring Computers to Use Network Printers  Chapter 15: Using Network Printers  431  The Configure Standard TCP/IP Port Monitor dialog box opens.  16. In the Port Number field, type the printer's port number, as shown in the Printers page. 17. In the Protocol area, make sure that Raw is selected. 18. Click OK. The Add Standard TCP/IP Printer Port Wizard reappears. 19. Click Next. The Completing the Add Standard TCP/IP Printer Port Wizard dialog box appears.  20. Click Finish.
Configuring Computers to Use Network Printers    432  Check Point Safe@Office User Guide  The Add Printer Wizard reappears, with the Install Printer Software dialog box displayed.  21. Do one of the following: • Use the lists to select the printer's manufacturer and model. • If your printer does not appear in the lists, insert the CD that came with your printer in the computer's CD-ROM drive, and click Have Disk. 22. Click Next. 23. Complete the remaining dialog boxes in the wizard as desired, and click Finish. The printer appears in the Printers and Faxes window. 24. Right-click the printer and click Properties in the popup menu. The printer's Properties dialog box opens. 25. In the Ports tab, in the list box, select the port you added.
  Configuring Computers to Use Network Printers  Chapter 15: Using Network Printers  433  The port's name is IP_<LAN IP address>.   26. Click OK.  MAC OS-X This procedure is relevant for computers with the latest version of the MAC OS-X operating system.    Note: This procedure may not apply to earlier MAC OS-X versions. To configure a computer to use a network printer 1. If the computer for which you want to enable printing is located on the WAN, create an Allow rule for connections from the computer to This Gateway.  See Adding and Editing Rules on page 213. 2. Choose Apple -> System Preferences.
Configuring Computers to Use Network Printers    434  Check Point Safe@Office User Guide  The System Preferences window appears.  3. Click Show All to display all categories. 4. In the Hardware area, click Print & Fax. The Print & Fax window appears.   5. In the Printing tab, click Set Up Printers.
  Configuring Computers to Use Network Printers  Chapter 15: Using Network Printers  435  The Printer List window appears.   6. Click Add.  New fields appear.  7. In the first drop-down list, select IP Printing.  8. In the Printer Type drop-down list, select Socket/HP Jet Direct. 9. In the Printer Address field, type the Safe@Office appliance's LAN IP address, or "my.firewall".  You can find the LAN IP address in the Safe@Office Portal, under Network > My Network. 10. In the Queue Name field, type the name of the required printer queue.  For example, the printer queue name for HP printers is RAW.
Configuring Computers to Use Network Printers    436  Check Point Safe@Office User Guide  11. In the Printer Model list, select the desired printer type. A list of models appears.   12. In the Model Name list, select the desired model. 13. Click Add. The new printer appears in the Printer List window.  14. In the Printer List window, select the newly added printer, and click Make Default.
 Viewing Network Printers  Chapter 15: Using Network Printers  437  Viewing Network Printers  To view network printers 1. Click Setup in the main menu, and click the Printers tab. The Printers page appears, displaying a list of connected printers. For each printer, the model, serial number, port, and status is displayed.   A printer can have the following statuses: • Initialize. The printer is initializing. • Ready. The printer is ready. • Not Ready. The printer is not ready. For example, it may be out of paper. • Printing. The printer is processing a print job. • Restarting. The printer server is restarting. • Fail. An error occurred. See the Event Log for details (Viewing the Event Log on page 187). 2. To refresh the display, click Refresh.  Changing Network Printer Ports  When you set up a new network printer, the Safe@Office appliance automatically assigns a port number to the printer. If you want to use a different port number, you can easily change it, as described in Setting up Network Printers on page 426.  However, you may sometimes need to change the port number after completing printer setup. For example, you may want to replace a malfunctioning network printer, with another existing network printer, without reconfiguring the client
Resetting Network Printers    438  Check Point Safe@Office User Guide  computers. To do this, you must change the replacement printer's port number to the malfunctioning printer's port number, as described below.    Note: Each printer port number must be different, and must be a high port.  To change a printer's port 1. Click Setup in the main menu, and click the Printers tab. The Printers page appears. 2. In the printer's Printer Server TCP Port field, type the desired port number. 3. Click Apply.  Resetting Network Printers  You can cause a network printer to restart the current print job, by resetting the network printer. You may want to do this if the print job has stalled. To reset a network printer 1. Click Setup in the main menu, and click the Printers tab. The Printers page appears. 2. Next to the desired printer, click Reset. The network printer's current print job is restarted.
 Resetting Network Printers  Chapter 16: Troubleshooting  439  Chapter 16 This chapter provides solutions to common problems you may encounter while using the Safe@Office appliance.   Note: For information on troubleshooting wireless connectivity, see Troubleshooting Wireless Connectivity on page 183.  This chapter includes the following topics: Connectivity ............................................................................................ 440 Service Center and Upgrades................................................................... 444 Other Problems........................................................................................ 445   Troubleshooting
Connectivity    440  Check Point Safe@Office User Guide  Connectivity  I cannot access the Internet. What should I do? • Check if the PWR/SEC LED is green. If not, check the power connection to the Safe@Office appliance. • Check if the WAN LINK/ACT LED is green. If not, check the network cable to the modem and make sure the modem is turned on. • Check if the LAN LINK/ACT LED for the port used by your computer is green. If not, check if the network cable linking your computer to the Safe@Office appliance is connected properly. Try replacing the cable or connecting it to a different LAN port. • Using your Web browser, go to http://my.firewall and see whether "Connected" appears on the Status Bar. Make sure that your Safe@Office appliance network settings are configured as per your ISP directions.  • Check your TCP/IP configuration according to Installing and Setting up the Safe@Office Appliance on page 15. • If Web Filtering or Email Filtering are on, try turning them off. • Check if you have defined firewall rules which block your Internet connectivity. • Check with your ISP for possible service outage. • Check whether you are exceeding the maximum number of computers allowed by your license, by viewing the Active Computers page. I cannot access my DSL broadband connection. What should I do? DSL equipment comes in two flavors: bridges (commonly known as DSL modems) and routers. Some DSL equipment can be configured to work both ways.
 Connectivity  Chapter 16: Troubleshooting  441  • If you connect to your ISP using a PPPoE or PPTP dialer defined in your operating system, your equipment is most likely configured as a DSL bridge. Configure a PPPoE or PPTP type DSL connection.  • If you were not instructed to configure a dialer in your operating system, your equipment is most likely configured as a DSL router. Configure a LAN connection, even if you are using a DSL connection. For instructions, see Configuring the Internet Connection on page 53. I cannot access my Cable broadband connection. What should I do? • Some cable ISPs require you to register the MAC address of the device behind the cable modem. You may need to clone your Ethernet adapter MAC address onto the Safe@Office appliance. For instructions, see Configuring the Internet Connection on page 53. • Some cable ISPs require using a hostname for the connection. Try reconfiguring your Internet connection and specifying a hostname. For further information, see Configuring the Internet Connection on page 53. I cannot access http://my.firewall or http://my.vpn. What should I do? • Verify that the Safe@Office appliance is operating (PWR/SEC LED is active) • Check if the LAN LINK/ACT LED for the port used by your computer is on. If not, check if the network cable linking your computer to the Safe@Office appliance is connected properly.   Note: You may need to use a crossed cable when connecting the Safe@Office appliance to another hub/switch. • Try surfing to 192.168.10.1 instead of to my.firewall.   Note: 192.168.10 is the default value, and it may vary if you changed it in the My Network page.
Connectivity    442  Check Point Safe@Office User Guide  • Check your TCP/IP configuration according to Installing and Setting up the Safe@Office Appliance on page 15. • Restart your Safe@Office appliance and your broadband modem by disconnecting the power and reconnecting after 5 seconds. • If your Web browser is configured to use an HTTP proxy to access the Internet, add "my.firewall" or "my.vpn" to your proxy exceptions list.  My network seems extremely slow. What should I do? • The Ethernet cables may be faulty. For proper operation, the Safe@Office appliance requires STP CAT5 (Shielded Twisted Pair Category 5) Ethernet cables. Make sure that this specification is printed on your cables. • Your Ethernet card may be faulty or incorrectly configured. Try replacing your Ethernet card. • There may be an IP address conflict in your network. Check that the TCP/IP settings of all your computers are configured to obtain an IP address automatically. I changed the network settings to incorrect values and am unable to correct my error. What should I do? Reset the network to its default settings using the button on the back of the Safe@Office appliance unit. See Resetting the Safe@Office Appliance to Defaults on page 420.  I am using the Safe@Office appliance behind another NAT device, and I am having problems with some applications. What should I do? By default, the Safe@Office appliance performs Network Address Translation (NAT). It is possible to use the Safe@Office appliance behind another device that performs NAT, such as a DSL router or Wireless router, but the device will block all incoming connections from reaching your Safe@Office appliance.   To fix this problem, do ONE of the following. (The solutions are listed in order of preference.)
 Connectivity  Chapter 16: Troubleshooting  443  • Consider whether you really need the router. The Safe@Office appliance can be used as a replacement for your router, unless you need it for some additional functionality that it provides, such as Wireless access. • If possible, disable NAT in the router. Refer to the router’s documentation for instructions on how to do this. • If the router has a “DMZ Computer” or “Exposed Host” option, set it to the Safe@Office appliance’s external IP address.  • Open the following ports in the NAT device:  • UDP 9281/9282 • UDP 500 • TCP 256 • TCP 264 • ESP IP protocol 50 • TCP 981 I cannot receive audio or video calls through the Safe@Office appliance. What should I do? To enable audio/video, you must configure an IP Telephony (H.323) virtual server. For instructions, see Configuring Servers on page 207. I run a public Web server at home but it cannot be accessed from the Internet. What should I do? Configure a virtual Web Server. For instructions, see Configuring Servers on page 207. I cannot connect to the LAN network from the DMZ or WLAN network. What should I do? By default, connections from the DMZ or WLAN network to the LAN network are blocked. To allow traffic from the DMZ or WLAN to the LAN, configure appropriate firewall rules. For instructions, see Using Rules on page 209.
Service Center and Upgrades    444  Check Point Safe@Office User Guide  Service Center and Upgrades I purchased an advanced Safe@Office model, but I only have the functionality of a simpler Safe@Office model. What should I do?  Your have not installed your product key. For further information, see Upgrading Your Software Product on page 381. I have exceeded my node limit. What does this mean? What should I do?  Your Product Key specifies a maximum number of nodes that you may connect to the Safe@Office appliance.  The Safe@Office appliance tracks the cumulative number of nodes on the internal network that have communicated through the firewall. When the Safe@Office appliance encounters an IP address that exceeds the licensed node limit, the Active Computers page displays a warning message and marks nodes over the node limit in red. These nodes will not be able to access the Internet through the Safe@Office appliance, but will be protected. The Event Log page also warns you that you have exceeded the node limit. To upgrade your Safe@Office appliance to support more nodes, purchase a new Product Key. Contact your reseller for upgrade information. While trying to connect to a Service Center, I received the message “The Service Center did not respond”. What should I do? • If you are using a Service Center other than the Check Point Service Center, check that the Service Center IP address is typed correctly. • The Safe@Office appliance connects to the Service Center using UDP ports 9281/9282. If the Safe@Office appliance is installed behind another firewall, make sure that these ports are open.
 Other Problems  Chapter 16: Troubleshooting  445   Other Problems I have forgotten my password. What should I do? Reset your Safe@Office appliance to factory defaults using the Reset button as detailed in Resetting the Safe@Office Appliance to Defaults on page 420. Why are the date and time displayed incorrectly? You can adjust the time on the Setup page's Tools tab. For information, see Setting the Time on the Appliance on page 399. I cannot use a certain network application. What should I do? Look at the Event Log page. If it lists blocked attacks, do the following: • Set the Safe@Office appliance's firewall level to Low and try again. • If the application still does not work, set the computer on which you want to use the application to be the exposed host.  For instructions, see Defining an Exposed Host on page 261. When you have finished using the application, make sure to clear the exposed host setting, otherwise your security might be compromised.
 Technical Specifications  Chapter 17: Specifications  447  Chapter 17 This chapter includes the following topics: Technical Specifications.......................................................................... 447 CE Declaration of Conformity................................................................. 451 Federal Communications Commission Radio Frequency Interference Statement................................................................................................. 453   Technical Specifications Table 86: Safe@Office Appliance Attributes Attribute Safe@Office 500  SBX-166LHGE-6 Safe@Office 500  SBX-166LHGE-6 /  Safe@Office 500W  SBXW-166LHGE-6 General   Dimensions  (width x height x depth)  20.32 x 3.05 x 12.19 cm  (8 x 1.2 x 4.8 inches) 20 x 3.1 x 15.5 cm (7.9 x 1.2 x 6.1 inches) Weight   0.7 kg (1.56 lbs)  0.69 kg (1.55 lbs) Specifications
Technical Specifications    448  Check Point Safe@Office User Guide  Attribute Safe@Office 500  SBX-166LHGE-6 Safe@Office 500  SBX-166LHGE-6 /  Safe@Office 500W  SBXW-166LHGE-6 Power supply nominal input voltage, frequency US Model: 90~132 VAC,  50~60Hz    Japan Model: 100VAC,  50~60Hz   EU Model: 200~265 VAC, 50~60Hz All Models: 100~240VAC, 50~60Hz  Power supply nominal output voltage All Models: 9VAC, 1.5A  All Models: 5VDC, 3A Max. Power Consumption 7.5W   8W (1.6A w/o external USB devices) 13W (2.6A w USB devices) Retail box dimensions (width x height x depth) 31 x 10 x 16 cm  (12.4 x 4 x 6.4 inches) 29 x 25 x 7.6 cm (11.4 x 9.8 x 3 inches) Retail box weight  1.3 kg (2.9 lbs)  1.35 kg (3 lbs) Environmental Conditions   Temperature: Storage/Transport - 20°C to +70°C  - 5°C to +70°C Temperature: Operation  + 5°C to +45°C  - 5°C ~ 50°C
 Technical Specifications  Chapter 17: Specifications  449  Attribute Safe@Office 500  SBX-166LHGE-6 Safe@Office 500  SBX-166LHGE-6 /  Safe@Office 500W  SBXW-166LHGE-6 Humidity: Storage/Operation 5%~90% at 25°C/ None condensed  5%~90% at 25°C/ None condensed  Applicable Standards    Shock & Vibration  ETSI 300 019-2-3 CLASS 3.1 & Bellcore GR 63 (NEBS) CNS1219 C6343 Safety   EN60950/ IEC60950/ UL60950 EN60950/ IEC60950/ cTUVus 60950 Quality   ISO9001  ISO9001:2000 TL9000-HW R3.0 ISO14001 Ohsas18001: 1999 Mean Time Between Failures (MTBF) 68,000 Hours at 30 ºC  68,000 Hours at 30 ºC
Technical Specifications    450  Check Point Safe@Office User Guide  Table 87: Safe@Office Wireless Attributes Attribute   Safe@Office 500W series Operation Frequency  2.412-2.484 MHz Transmission Power  79.4 mW Modulation OFDM, DSSS, 64QAM, 16QAM, QPSK, BPSK, CCK, DQPSK, DBPSK WPA Authentication Modes EAP-TLS, EAP-TTLS, PEAP (EAP-GTC), PEAP (EAP-MSCHAP V2)
 CE Declaration of Conformity  Chapter 17: Specifications  451    CE Declaration of Conformity SofaWare Technologies Ltd., 3 Hilazon St., Ramat-Gan Israel, hereby declares that this equipment is in conformity with the essential requirements specified in Article 3.1 (a) and 3.1 (b) of:   • Directive 89/336/EEC (EMC Directive) • Directive 73/23/EEC (Low Voltage Directive – LVD) • Directive 99/05/EEC (Radio Equipment and Telecommunications Terminal Equipment Directive) In accordance with the following standards: Table 88: Safe@Office Appliance Standards Attribute Safe@Office 500  SBX-166LHGE-6 Safe@Office 500 SBX-166LHGE-6 /  Safe@Office 500W  SBXW-166LHGE-6  EMC EN 55022:1998 EN 61000-3-2: 1995 EN 61000-3-3: 1995 EN 61000-4-2:1995 EN 61000-4-3:1995 EN 61000-4-4:1995 EN 61000-4-5:1995 EN 61000-4-6:1996 EN 50081-1:1992 EN 50082-1:1997 EN 61000-6-1:2001 EN 61000-6-3:2001 EN 55022:1998 EN 55024:1998 EN 61000-3-2: 1995 EN 61000-3-3: 1995
CE Declaration of Conformity    452  Check Point Safe@Office User Guide  Attribute Safe@Office 500  SBX-166LHGE-6 Safe@Office 500 SBX-166LHGE-6 /  Safe@Office 500W  SBXW-166LHGE-6   EN 61000-4-8:1993 EN 61000-4-11:1994 ENV50204:1995  EN 61000-4-2:1995 EN 61000-4-3:1996/A2:2001 EN 61000-4-4:1995 EN 61000-4-5:1995 EN 61000-4-6:1996 EN 61000-4-7:1993 EN 61000-4-8:1993 EN 61000-4-9:1993 EN 61000-4-10:1993 EN 61000-4-11:1994 EN 61000-4-12:1995 Safety  EN 60950: 2000 IEC 60950:1999 EN 60950: 2000 IEC 60950:1999   The "CE" mark is affixed to this product to demonstrate conformance to the R&TTE Directive 99/05/EEC (Radio Equipment and Telecommunications Terminal Equipment Directive) and FCC Part 15 Class B. The product has been tested in a typical configuration.  For a copy of the Original Signed Declaration (in full conformance with EN45014), please contact SofaWare at the above address.
  Federal Communications Commission Radio Frequency Interference Statement  Chapter 17: Specifications  453  Federal Communications Commission Radio Frequency Interference Statement This equipment complies with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Shielded cables must be used with this equipment to maintain compliance with FCC regulations. Any changes or modifications to this product not explicitly approved by the manufacturer could void the user’s authority to operate the equipment and any assurances of Safety or Performance, and could result in violation of Part 15 of the FCC Rules. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This Class B digital apparatus complies with Canadian ICES-003.    SofaWare declares that SBXW-166LHGE-6,  ( FCC ID: P6XSBXW-166LHGE-6 )    is limited in CH1~CH11 for 2.4 GHz by specified firmware controlled in U.S.A. FCC Radiation Exposure Statement for Wireless Models  This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. The antenna(s) used for this equipment must be installed to provide a separation distance of at least eight inches (20 cm) from all persons. This equipment must not be operated in conjunction with any other antenna.  •This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.  These limits are designed to provide reasonable protection against harmful interference in a residential installation.  This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.  However, there is no guarantee that interference will not occur in a particular installation.  If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:•-•Reorient or relocate the receiving antenna.•-•Increase the separation between the equipment and receiver.•-•Connect the equipment into an outlet on a circuit different from that•to which the receiver is connected.•-•Consult the dealer or an experienced radio/TV technician for help.•Shielded cables must be used with this equipment to maintain compliance withFCC regulations.•This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.•FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.•FCC Radiation Exposure Statement for Wireless Models•This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. The antenna(s) used for this equipment must be installed to provide a separation distance of at least eight inches (20 cm) from all persons.•This equipment must not be operated in conjunction with any other antenna.•SofaWare declares that US model of SBXW-166LHGE-6, ( FCC ID: P6XSBXW-166LHGE-6 ) is limited in CH1~CH11 for 2.4 G band by specific firmware controlled by the manufacturer and is not user changeable.
 Glossary of Terms  Glossary of Terms  455  A ADSL Modem A device connecting a computer to the Internet via an existing phone line. ADSL (Asymmetric Digital Subscriber Line) modems offer a high-speed 'always-on' connection.  C CA The Certificate Authority (CA) issues certificates to entities such as gateways, users, or computers. The entity later uses the certificate to identify itself and provide verifiable information. For instance, the certificate includes the Distinguished Name (DN) (identifying information) of the entity, as well as the public key (information about itself), and possibly the IP address. After two entities exchange and validate each other's certificates, they can begin encrypting information between themselves using the public keys in the certificates.  Cable Modem A device connecting a computer to the Internet via the cable television network. Cable modems offer a high-speed 'always-on' connection.  Certificate Authority The Certificate Authority (CA) issues certificates to entities such as gateways, users, or computers. The entity later uses the certificate to identify itself and provide verifiable information. For instance, the certificate includes the Distinguished Name (DN) (identifying information) of the entity, as well as the public key (information about itself), and possibly the IP address. After two entities exchange and validate each other's certificates, they can begin encrypting information between themselves using the public keys in the certificates.  Cracking An activity in which someone breaks into someone else's computer system, bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. The end result is that whatever resides on the computer can be viewed and sensitive data can be stolen without Glossary of Terms
Glossary of Terms    456  Check Point Safe@Office User Guide  anyone knowing about it. Sometimes, tiny programs are 'planted' on the computer that are designed to watch out for, seize and then transmit to another computer, specific types of data.  D DHCP Any machine requires a unique IP address to connect to the Internet using Internet Protocol. Dynamic Host Configuration Protocol (DHCP) is a communications protocol that assigns Internet Protocol (IP) addresses to computers on the network. DHCP uses the concept of a "lease" or amount of time that a given IP address will be valid for a computer.  DMZ A DMZ (demilitarized zone) is an internal network defined in addition to the LAN network and protected by the Safe@Office appliance.  DNS The Domain Name System (DNS) refers to the Internet domain names, or easy-to-remember "handles", that are translated into IP addresses. An example of a Domain Name is 'www.sofaware.com'.  Domain Name System Domain Name System. The Domain Name System (DNS) refers to the Internet domain names, or easy-to-remember "handles", that are translated into IP addresses. An example of a Domain Name is 'www.sofaware.com'.  E Exposed Host An exposed host allows one computer to be exposed to the Internet. An example of using an exposed host would be exposing a public server, while preventing outside users from getting direct access form this server back to the private network.  F Firmware Software embedded in a device.  G Gateway A network point that acts as an entrance to another network.  H Hacking An activity in which someone breaks into someone else's computer system, bypasses passwords or licenses in computer programs; or in
 Glossary of Terms  Glossary of Terms  457  other ways intentionally breaches computer security. The end result is that whatever resides on the computer can be viewed and sensitive data can be stolen without anyone knowing about it. Sometimes, tiny programs are 'planted' on the computer that are designed to watch out for, seize and then transmit to another computer, specific types of data.  HTTPS Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL. A protocol for accessing a secure Web server. It uses SSL as a sublayer under the regular HTTP application. This directs messages to a secure port number rather than the default Web port number, and uses a public key to encrypt data HTTPS is used to transfer confidential user information.  Hub A device with multiple ports, connecting several PCs or network devices on a network.  I IP Address An IP address is a 32-bit number that identifies each computer sending or receiving data packets across the Internet. When you request an HTML page or send e-mail, the Internet Protocol part of TCP/IP includes your IP address in the message and sends it to the IP address that is obtained by looking up the domain name in the Uniform Resource Locator you requested or in the e-mail address you're sending a note to. At the other end, the recipient can see the IP address of the Web page requestor or the e-mail sender and can respond by sending another message using the IP address it received.  IP Spoofing A technique where an attacker attempts to gain unauthorized access through a false source address to make it appear as though communications have originated in a part of the network with higher access privileges. For example, a packet originating on the Internet may be masquerading as a local packet with the source IP address of an internal host. The firewall can protect against IP spoofing attacks by limiting network access based on the gateway interface from which data is being received.
Glossary of Terms    458  Check Point Safe@Office User Guide  IPSEC IPSEC is the leading Virtual Private Networking (VPN) standard. IPSEC enables individuals or offices to establish secure communication channels ('tunnels') over the Internet.  ISP An ISP (Internet service provider) is a company that provides access to the Internet and other related services.  L LAN A local area network (LAN) is a group of computers and associated devices that share a common communications line and typically share the resources of a single server within a small geographic area.  M MAC Address The MAC (Media Access Control) address is a computer's unique hardware number. When connected to the Internet from your computer, a mapping relates your IP address to your computer's physical (MAC) address on the LAN.  Mbps Megabits per second. Measurement unit for the rate of data transmission.  MTU The Maximum Transmission Unit (MTU) is a parameter that determines the largest datagram than can be transmitted by an IP interface (without it needing to be broken down into smaller units). The MTU should be larger than the largest datagram you wish to transmit un-fragmented. Note: This only prevents fragmentation locally. Some other link in the path may have a smaller MTU - the datagram will be fragmented at that point. Typical values are 1500 bytes for an Ethernet interface or 1452 for a PPP interface.  N NAT Network Address Translation (NAT) is the translation or mapping of an IP address to a different IP address. NAT can be used to map several internal IP addresses to a single IP address, thereby sharing a single IP address assigned by the ISP among several PCs. Check Point FireWall-1's Stateful Inspection Network Address Translation (NAT) implementation supports hundreds of pre-defined applications, services, and protocols, more than any other firewall vendor.
 Glossary of Terms  Glossary of Terms  459  NetBIOS NetBIOS is the networking protocol used by DOS and Windows machines.  P Packet A packet is the basic unit of data that flows from one source on the Internet to another destination on the Internet. When any file (e-mail message, HTML file, GIF file etc.) is sent from one place to another on the Internet, the file is divided into "chunks" of an efficient size for routing. Each of these packets is separately numbered and includes the Internet address of the destination. The individual packets for a given file may travel different routes through the Internet. When they have all arrived, they are reassembled into the original file at the receiving end.  PPPoE PPPoE (Point-to-Point Protocol over Ethernet) enables connecting multiple computer users on an Ethernet local area network to a remote site or ISP, through common customer premises equipment (e.g. modem).  PPTP The Point-to-Point Tunneling Protocol (PPTP) allows extending a local network by establishing private “tunnels” over the Internet. This protocol it is also used by some DSL providers as an alternative for PPPoE.  R RJ-45 The RJ-45 is a connector for digital transmission over ordinary phone wire.  Router A router is a device that determines the next network point to which a packet should be forwarded toward its destination. The router is connected to at least two networks.  S Server A server is a program (or host) that awaits and requests from client programs across the network. For example, a Web server is the computer program, running on a specific host, that serves requested HTML pages or files. Your browser is the client program, in this case.  Stateful Inspection Stateful Inspection was invented by Check Point to provide the highest
Glossary of Terms    460  Check Point Safe@Office User Guide  level of security by examining every layer within a packet, unlike other systems of inspection. Stateful Inspection extracts information required for security decisions from all application layers and retains this information in dynamic state tables for evaluating subsequent connection attempts. In other words, it learns!  Subnet Mask A 32-bit identifier indicating how the network is split into subnets. The subnet mask indicates which part of the IP address is the host ID and which indicates the subnet.  T TCP TCP (Transmission Control Protocol) is a set of rules (protocol) used along with the Internet Protocol (IP) to send data in the form of message units between computers over the Internet. While IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet. For example, when an HTML file is sent to you from a Web server, the Transmission Control Protocol (TCP) program layer in that server divides the file into one or more packets, numbers the packets, and then forwards them individually to the IP program layer. Although each packet has the same destination IP address, it may get routed differently through the network. At the other end (the client program in your computer), TCP reassembles the individual packets and waits until they have arrived to forward them to you as a single file.  TCP/IP TCP/IP (Transmission Control Protocol/Internet Protocol) is the underlying communication protocol of the Internet.  U UDP UDP (User Datagram Protocol) is a communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses the Internet Protocol (IP). UDP is an alternative to the Transmission Control Protocol (TCP) and, together with IP, is sometimes referred to as UDP/IP. Like the Transmission Control Protocol, UDP uses the Internet Protocol to actually get a data unit (called a datagram) from one computer to another. Unlike
 Glossary of Terms  Glossary of Terms  461  TCP, however, UDP does not provide the service of dividing a message into packets (datagrams) and reassembling it at the other end. UDP is often used for applications such as streaming data.  URL A URL (Uniform Resource Locator) is the address of a file (resource) accessible on the Internet. The type of resource depends on the Internet application protocol. On the Web (which uses the Hypertext Transfer Protocol), an example of a URL is 'http://www.sofaware.com'.  V VPN A virtual private network (VPN) is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.  VPN tunnel A secure connection between a Remote Access VPN Client and a Remote Access VPN Server.  W WLAN A WLAN is a wireless local area network protected by the Safe@Office appliance.
 Index  Index  463  8 802.1x • 161, 163 A account, configuring • 288 active computers, viewing • 194 active connections, viewing • 197 Allow and Forward rules, explained • 213 Allow rules, explained • 213 Automatic login • 344 B backup connection configuring • 90 dialup • 92 LAN or broadband • 91 Block Known Ports • 246 Block Port Overflow • 247 Block rules, explained • 213 Blocked FTP Commands • 248 C CA, explained • 348, 455 cable modem connection • 58, 67 explained • 455 cable type • 35 certificate explained • 348 generating self-signed • 349 importing • 353 installing • 348 uninstalling • 355 Cisco IOS DOS • 236 command line interface controlling the appliance via • 388 D DHCP configuring • 94 explained • 456 options • 101 DHCP Server enabling/disabling • 94 explained • 94 diagnostic tools Packet Sniffer • 406 Ping • 403 Traceroute • 403 using • 403 WHOIS • 403 Index
Index    464  Check Point Safe@Office User Guide  diagnostics • 423 dialup connection • 75, 92 modem • 84 dialup modem, setting up • 84 DMZ configuring • 108 configuring High Availability for • 119 explained • 108, 456 DNS • 90, 403, 456 Dynamic DNS • 5, 287 E Email Antispam, see Email Filtering • 294 Email Antivirus, see Email Filtering • 294 Email Filtering Email Antispam • 294 Email Antivirus • 294 enabling/disabling • 295 selecting protocols for • 296 snoozing • 296 temporarily disabling • 296 event log, viewing • 187 exposed host defining a computer as • 261 explained • 261, 456 F File and Print Sharing • 249 firewall levels • 204 rule types • 211 setting security level • 204 firmware explained • 377, 456 updating manually • 379 viewing status • 377 FTP Bounce • 245 G gateways backup • 119 default • 108, 119, 139 explained • 456 ID • 287 master • 119 Site-to-Site VPN • 301 H Hide NAT enabling/disabling • 107 explained • 107, 458 high availability configuring • 119 explained • 119
 Index  Index  465  Host Port Scan • 242 HTTPS configuring • 392 explained • 457 using • 44 hub • 35, 90, 119, 440, 457 I IGMP • 251 IKE traces, viewing • 359 initial login • 39 installation cable type • 35 network • 35 Instant Messengers • 254 internal VPN Server configuring • 310 explained • 306 Internet connection configuring • 53 configuring backup • 90 enabling/disabling • 88 establishing quick • 88 terminating • 90 troubleshooting • 440 viewing information • 87 Internet Setup • 63 Internet Wizard • 54 IP address changing • 105 explained • 457 hiding • 107 IP Fragments • 232 IPSEC VPN mode • 457 ISP, explained • 458 L LAN cable • 35 configuring High Availability for • 119 connection • 54, 56, 65 explained • 458 ports • 35 LAND • 226 licenses • 194, 377, 423, 440 upgrading • 381 link configurations, modifying • 149 logs exporting • 187 viewing • 187 M MAC address • 458 Manual Login • 344 Max Ping Size • 231
Index    466  Check Point Safe@Office User Guide  MTU, explained • 77, 458 N NetBIOS, explained • 458 network changing internal range of • 105 configuring • 93 configuring a DMZ • 108 configuring a VLAN • 111 configuring a WLAN • 161 configuring DHCP options • 101 configuring high availability • 119 configuring the OfficeMode network • 110 enabling DHCP Server on • 94 enabling Hide NAT • 107 installation on • 35 managing • 93 objects • 129 network objects adding and editing • 130 using • 129 viewing and deleting • 138 Network Quota • 234 node limit, viewing • 194 Non-TCP Flooding • 227 Null Payload • 238 O OfficeMode about • 110 configuring • 110 P packet • 87, 139, 403, 457, 459 Packet Sanity • 229 Packet Sniffer filter string syntax • 409 using • 406 Pass rules, explained • 268 password changing • 361 setting up • 39 Peer to Peer • 252 Ping • 403 Ping of Death • 225 Port-based VLAN about • 111 adding and editing • 114 ports managing • 145 modifying assignments • 147 modifying link configurations • 149 resetting to defaults • 150 viewing statuses • 146 PPTP
 Index  Index  467  connection • 61, 71 explained • 459 print server • 425 printers changing ports • 437 configuring computers to use • 427 resetting • 438 setting up • 426 using • 425 viewing • 437 Q QoS classes • 151 explained • 151 QoS classes adding and editing • 155 assigning services to • 209 built-in • 154, 160 deleting • 159 explained • 151 restoring defaults • 160 R RADIUS configuring VSA • 374 explained • 370 using • 370 rebooting • 424 registering • 385 Remote Access VPN Clients, explained • 301 Remote Access VPN Servers configuring • 307, 309 explained • 301 Remote Access VPN sites • 314 reports active computers • 194 active connections • 197 event log • 187 node limit • 194 traffic • 191 viewing • 187 wireless statistics • 198 routers • 90, 119, 403, 440, 459 rules security • 209 VStream Antivirus • 267 S Safe@Office  series rear panel • 11 Safe@Office 500 front panel • 10 rear panel • 8 Safe@Office 500 series
Index    468  Check Point Safe@Office User Guide  about • 1 features • 2 product family • 2 Safe@Office 500W front panel • 13 rear panel • 11 Safe@Office appliance backing up • 417 changing internal IP address of • 105 configuring Internet connection • 53 exporting configuration • 417 importing configuration • 418 installing • 15, 35 maintenance • 377 mounting • 30 rebooting • 424 registering • 385 resetting to factory defaults • 420 setting the time • 399 setting up • 36 Safe@Office Portal elements • 46 initial login • 39 logging on • 42 remotely accessing • 44 using • 46 Scan rules, explained • 268 Secure HotSpot customizing • 259 enabling/disabling • 258 quick guest users • 367 setting up • 257 using • 256 SecuRemote explained • 306 installing • 311 security configuring servers • 207 creating rules • 209 defining a computer as an exposed host • 261 firewall • 204 Secure HotSpot • 256 SmartDefense • 220 security policy default • 203 setting up • 203 security rules adding and editing • 213 changing priority • 219 deleting • 219 enabling/disabling • 218 types • 213 using • 209 serial console • 11
 Index  Index  469  controlling appliance via • 390 using • 390 servers configuring • 207 explained • 459 Remote Access VPN • 301, 307 Web • 129, 207, 440 Service Center connecting to • 281 disconnecting from • 289 refreshing a connection to • 288 services Email Filtering • 294 software updates • 298 Web Filtering • 290 Setup Wizard • 39, 54 Site-to-Site VPN gateways • 312 explained • 301 installing a certificate • 348 PPPoE tunnels • 312 Small PMTU • 241 SmartDefense categories • 224 configuring • 221 using • 220 SNMP configuring • 396 explained • 396 software updates checking for manually • 298 explained • 298 source routing, about • 139 SSH configuring • 394 explained • 394 Stateful Inspection • 458, 459 Static NAT explained • 129 using • 130 static routes adding and editing • 139 explained • 139 using • 139 viewing and deleting • 144 Strict TCP • 239 subnet masks, explained • 460 subscription services explained • 281 starting • 281 viewing information • 287 Sweep Scan • 242 Syslog logging configuring • 386 explained • 386
Index    470  Check Point Safe@Office User Guide  T Tag-based VLAN about • 111 adding and editing • 116 TCP, explained • 460 TCP/IP explained • 460 setting up for MAC OS • 26 setting up for Windows 95/98 • 21 setting up for Windows XP/2000 • 16 Teardrop • 224 technical support • 14 Telstra • 73 Traceroute • 403 Traffic Monitor configuring • 193 exporting reports • 194 using • 191 viewing reports • 191 traffic reports exporting • 194 viewing • 191 Traffic Shaper advanced • 151 enabling • 63, 151 explained • 151 restoring defaults • 160 setting up • 153 simplified • 151 using • 151 troubleshooting • 439 U UDP, explained • 460 URL, explained • 461 users adding and editing • 363 adding quick guest HotSpot • 367 managing • 361 setting up remote VPN access for • 369 viewing and deleting • 369 V Vendor-Specific Attribute about • 370 configuring • 267 VLAN adding and editing • 114, 116 deleting • 118 port-based • 111, 114 tag-based • 111, 116 VPN explained • 301, 461 Remote Access • 305, 312 sites • 301, 343, 344
 Index  Index  471  Site-to-Site • 302, 312 tunnnels • 301, 344, 356 viewing IKE traces • 359 VPN sites adding and editing using Safe@Office • 312 deleting • 343 enabling/disabling • 343 logging on • 344 VPN tunnels creation and closing of • 356 establishing • 344 explained • 301, 461 viewing • 356 VStream Antivirus about • 263 configuring • 267 configuring advanced settings • 275 configuring policy • 267 enabling/disabling • 265 rules • 268 updating • 279 viewing database information • 266 VStream Antivirus rules adding and editing • 269 changing priority • 274 deleting • 274 enabling/disabling • 273 types • 268 W WAN cable • 35 connections • 209 ports • 35, 90 Web Filtering enabling/disabling • 290 selecting categories for • 291 snoozing • 292 temporarily disabling • 292 Welchia • 235 WEP • 161, 163 WHOIS • 403 wireless hardware • 162 wireless protocols • 163 wireless stations preparing • 182 viewing • 198 WLAN configuring • 161 defined • 461 preparing stations for • 182 troubleshooting connectivity • 183 viewing statistics for • 198 WPA • 161, 163 WPA2 • 163
Index    472  Check Point Safe@Office User Guide  WPA-PSK • 161, 163

Navigation menu