SofaWare Technologies SBXW-166LHGE-6 Wireless Broadband Router User Manual Check Point Safe Office User Guide

SofaWare Technologies Ltd. Wireless Broadband Router Check Point Safe Office User Guide

Contents

Manual Pt2

Download: SofaWare Technologies SBXW-166LHGE-6 Wireless Broadband Router User Manual Check Point Safe Office User Guide
Mirror Download [FCC.gov]SofaWare Technologies SBXW-166LHGE-6 Wireless Broadband Router User Manual Check Point Safe Office User Guide
Document ID694887
Application ID8y9/dn+VS6+zxQp1o8VnBg==
Document DescriptionManual Pt2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize241.09kB (3013602 bits)
Date Submitted2006-08-17 00:00:00
Date Available2006-08-17 00:00:00
Creation Date2006-08-17 09:18:38
Producing SoftwareAcrobat Distiller 7.0.5 (Windows)
Document Lastmod2006-08-17 09:19:50
Document TitleCheck Point Safe@Office User Guide
Document CreatorAcrobat PDFMaker 7.0.5 for Word

Using SmartDefense
In this field…
Do this…
Max.
Type the maximum number of network connections allowed per second
Connections/Second
from the same source IP address.
from Same Source IP
The default value is 100.
Set a lower threshold for stronger protection against DoS attacks.
Note: Setting this value too low can lead to false alarms.
Welchia
The Welchia worm uses the MS DCOM vulnerability or a WebDAV vulnerability.
After infecting a computer, the worm begins searching for other live computers to
infect. It does so by sending a specific ping packet to a target and waiting for the
reply that signals that the target is alive. This flood of pings may disrupt network
connectivity.
You can configure how the Welchia worm should be handled.
Chapter 9: Setting Your Security Policy
235
Using SmartDefense
Table 43: Welchia Fields
In this field…
Do this…
Action
Specify what action to take when the Welchia worm is detected, by selecting
one of the following:
Track
•
Block. Block the attack. This is the default.
•
None. No action.
Specify whether to log Welchia worm attacks, by selecting one of the
following:
•
Log. Log the attack. This is the default.
•
None. Do not log the attack.
Cisco IOS DOS
Cisco routers are configured to process and accept Internet Protocol version 4
(IPv4) packets by default. When a Cisco IOS device is sent a specially crafted
sequence of IPv4 packets (with protocol type 53 - SWIPE, 55 - IP Mobility, 77 Sun ND, or 103 - Protocol Independent Multicast - PIM), the router will stop
processing inbound traffic on that interface.
236
Check Point Safe@Office User Guide
Using SmartDefense
You can configure how Cisco IOS DOS attacks should be handled.
Table 44: Cisco IOS DOS
In this field…
Do this…
Action
Specify what action to take when a Cisco IOS DOS attack occurs,
by selecting one of the following:
Track
•
Block. Block the attack. This is the default.
•
None. No action.
Specify whether to log Cisco IOS DOS attacks, by selecting one of
the following:
Number of Hops to Protect
•
Log. Log the attack. This is the default.
•
None. Do not log the attack.
Type the number of hops from the enforcement module that Cisco
routers should be protected.
The default value is 10.
Chapter 9: Setting Your Security Policy
237
Using SmartDefense
In this field…
Do this…
Action Protection for
Specify what action to take when an IPv4 packet of the specific
SWIPE - Protocol 53 /
protocol type is received, by selecting one of the following:
IP Mobility - Protocol 55 /
•
Block. Drop the packet. This is the default.
SUN-ND - Protocol 77 /
•
None. No action.
PIM - Protocol 103
Null Payload
Some worms, such as Sasser, use ICMP echo request packets with null payload to
detect potentially vulnerable hosts.
You can configure how null payload ping packets should be handled.
Table 45: Null Payload Fields
In this field…
Do this…
Action
Specify what action to take when null payload ping packets are detected, by
selecting one of the following:
238
•
Block. Block the packets. This is the default.
•
None. No action.
Check Point Safe@Office User Guide
Using SmartDefense
In this field…
Do this…
Track
Specify whether to log null payload ping packets, by selecting one of the
following:
•
Log. Log the packets. This is the default.
•
None. Do not log the packets.
TCP
This category allows you to configure various protections related to the TCP
protocol. It includes the following:
• Strict TCP on page 239
• Small PMTU on page 241
Strict TCP
Out-of-state TCP packets are SYN-ACK or data packets that arrive out of order,
before the TCP SYN packet.
Note: In normal conditions, out-of-state TCP packets can occur after the
Safe@Office restarts, since connections which were established prior to the reboot
are unknown. This is normal and does not indicate an attack.
Chapter 9: Setting Your Security Policy
239
Using SmartDefense
You can configure how out-of-state TCP packets should be handled.
Table 46: Strict TCP
In this field…
Do this…
Action
Specify what action to take when an out-of-state TCP packet arrives, by
selecting one of the following:
Track
•
Block. Block the packets.
•
None. No action. This is the default.
Specify whether to log null payload ping packets, by selecting one of the
following:
240
•
Log. Log the packets. This is the default.
•
None. Do not log the packets.
Check Point Safe@Office User Guide
Using SmartDefense
Small PMTU
Small PMTU (Packet MTU) is a bandwidth attack in which the client fools the
server into sending large amounts of data using small packets. Each packet has a
large overhead that creates a "bottleneck" on the server.
You can protect against this attack by specifying a minimum packet size for data
sent over the Internet.
Table 47: Small PMTU Fields
In this field…
Do this…
Action
Specify what action to take when a packet is smaller than the Minimal MTU
Size threshold, by selecting one of the following:
Track
•
Block. Block the packet.
•
None. No action. This is the default.
Specify whether to issue logs for packets are smaller than the Minimal MTU
Size threshold, by selecting one of the following:
•
Log. Issue logs. This is the default.
•
None. Do not issue logs.
Chapter 9: Setting Your Security Policy
241
Using SmartDefense
In this field…
Do this…
Minimal MTU
Type the minimum value allowed for the MTU field in IP packets sent by a
Size
client.
An overly small value will not prevent an attack, while an overly large value
might degrade performance and cause legitimate requests to be dropped.
The default value is 300.
Port Scan
An attacker can perform a port scan to determine whether ports are open and
vulnerable to an attack. This is most commonly done by attempting to access a port
and waiting for a response. The response indicates whether or not the port is open.
This category includes the following types of port scans:
• Host Port Scan. The attacker scans a specific host's ports to determine
which of the ports are open.
• Sweep Scan. The attacker scans various hosts to determine where a specific
port is open.
You can configure how the Safe@Office appliance should react when a port scan is
detected.
242
Check Point Safe@Office User Guide
Using SmartDefense
Table 48: Port Scan Fields
In this field…
Do this…
Number of ports
SmartDefense detects ports scans by measuring the number of ports
accessed
accessed over a period of time. The number of ports accessed must exceed
the Number of ports accessed value, within the number of seconds specified by
the In a period of [seconds] value, in order for SmartDefense to consider the
activity a scan.
Type the minimum number of ports that must be accessed within the In a
period of [seconds] period, in order for SmartDefense to detect the activity as
a port scan.
For example, if this value is 30, and 40 ports are accessed within a specified
period of time, SmartDefense will detect the activity as a port scan.
For Host Port Scan, the default value is 30. For Sweep Scan, the default
value is 50.
Chapter 9: Setting Your Security Policy
243
Using SmartDefense
In this field…
Do this…
In a period of
SmartDefense detects ports scans by measuring the number of ports
[seconds]
accessed over a period of time. The number of ports accessed must exceed
the Number of ports accessed value, within the number of seconds specified by
the In a period of [seconds] value, in order for SmartDefense to consider the
activity a scan.
Type the maximum number of seconds that can elapse, during which the
Number of ports accessed threshold is exceeded, in order for SmartDefense to
detect the activity as a port scan.
For example, if this value is 20, and the Number of ports accessed threshold is
exceeded for 15 seconds, SmartDefense will detect the activity as a port
scan. If the threshold is exceeded for 30 seconds, SmartDefense will not
detect the activity as a port scan.
The default value is 20 seconds.
Track
Specify whether to issue logs for scans, by selecting one of the following:
•
Log. Issue logs. This is the default.
•
None. Do not issue logs. This is the default.
Detect scans
Specify whether to detect only scans originating from the Internet, by
from Internet only
selecting one of the following:
244
•
False. Do not detect only scans from the Internet. This is the
default.
•
True. Detect only scans from the Internet.
Check Point Safe@Office User Guide
Using SmartDefense
FTP
This category allows you to configure various protections related to the FTP
protocol. It includes the following:
• FTP Bounce on page 245
• Block Known Ports on page 246
• Block Port Overflow on page 247
• Blocked FTP Commands on page 248
FTP Bounce
When connecting to an FTP server, the client sends a PORT command specifying
the IP address and port to which the FTP server should connect and send data. An
FTP Bounce attack is when an attacker sends a PORT command specifying the IP
address of a third party instead of the attacker's own IP address. The FTP server
then sends data to the victim machine.
You can configure how FTP bounce attacks should be handled.
Chapter 9: Setting Your Security Policy
245
Using SmartDefense
Table 49: FTP Bounce Fields
In this field…
Do this…
Action
Specify what action to take when an FTP Bounce attack occurs, by selecting
one of the following:
Track
•
Block. Block the attack. This is the default.
•
None. No action.
Specify whether to log FTP Bounce attacks, by selecting one of the
following:
•
Log. Log the attack. This is the default.
•
None. Do not log the attack.
Block Known Ports
You can choose to block the FTP server from connecting to well-known ports.
Note: Known ports are published ports associated with services (for example, SMTP
is port 25).
This provides a second layer of protection against FTP bounce attacks, by
preventing such attacks from reaching well-known ports.
246
Check Point Safe@Office User Guide
Using SmartDefense
Table 50: Block Known Ports Fields
In this field…
Do this…
Action
Specify what action to take when the FTP server attempts to connect to a
well-known port, by selecting one of the following:
•
Block. Block the connection.
•
None. No action. This is the default.
Block Port Overflow
FTP clients send PORT commands when connecting to the FTP sever. A PORT
command consists of a series of numbers between 0 and 255, separated by
commas.
To enforce compliance to the FTP standard and prevent potential attacks against
the FTP server, you can block PORT commands that contain a number greater than
255.
Chapter 9: Setting Your Security Policy
247
Using SmartDefense
Table 51: Block Port Overflow
In this field…
Do this…
Action
Specify what action to take for PORT commands containing a number
greater than 255, by selecting one of the following:
•
Block. Block the PORT command. This is the default.
•
None. No action.
Blocked FTP Commands
Some seldom-used FTP commands may compromise FTP server security and
integrity. You can specify which FTP commands should be allowed to pass through
the security server, and which should be blocked.
To enable FTP command blocking
• In the Action drop-down list, select Block.
The FTP commands listed in the Blocked commands box will be blocked.
FTP command blocking is enabled by default.
248
Check Point Safe@Office User Guide
Using SmartDefense
To disable FTP command blocking
• In the Action drop-down list, select None.
All FTP commands are allowed, including those in the Blocked commands box.
To block a specific FTP command
1. In the Allowed commands box, select the desired FTP command.
2. Click Block.
The FTP command appears in the Blocked commands box.
3. Click Apply.
When FTP command blocking is enabled, the FTP command will be blocked.
To allow a specific FTP command
1. In the Blocked commands box, select the desired FTP command.
2. Click Accept.
The FTP command appears in the Allowed commands box.
3. Click Apply.
The FTP command will be allowed, regardless of whether FTP command
blocking is enabled or disabled.
Microsoft Networks
This category includes File and Print Sharing.
Microsoft operating systems and Samba clients rely on Common Internet File
System (CIFS), a protocol for sharing files and printers. However, this protocol is
also widely used by worms as a means of propagation.
Chapter 9: Setting Your Security Policy
249
Using SmartDefense
You can configure how CIFS worms should be handled.
Table 52: File Print and Sharing Fields
In this field…
Do this…
Action
Specify what action to take when a CIFS worm attack is detected, by
selecting one of the following:
Track
•
Block. Block the attack.
•
None. No action. This is the default.
Specify whether to log CIFS worm attacks, by selecting one of the
following:
•
•
CIFS worm patterns
list
250
Log. Log the attack.
None. Do not log the attack. This is the default.
Select the worm patterns to detect.
Patterns are matched against file names (including file
paths but excluding the disk share name) that the client is
trying to read or write from the server.
Check Point Safe@Office User Guide
Using SmartDefense
IGMP
This category includes the IGMP protocol.
IGMP is used by hosts and routers to dynamically register and discover multicast
group membership. Attacks on the IGMP protocol usually target a vulnerability in
the multicast routing software/hardware used, by sending specially crafted IGMP
packets.
You can configure how IGMP attacks should be handled.
Table 53: IGMP Fields
In this field…
Do this…
Action
Specify what action to take when an IGMP attack occurs, by selecting
one of the following:
Track
•
Block. Block the attack. This is the default.
•
None. No action.
Specify whether to log IGMP attacks, by selecting one of the following:
•
Log. Log the attack. This is the default.
•
None. Do not log the attack.
Chapter 9: Setting Your Security Policy
251
Using SmartDefense
In this field…
Do this…
Enforce IGMP to
According to the IGMP specification, IGMP packets must be sent to
multicast addresses
multicast addresses. Sending IGMP packets to a unicast or broadcast
address might constitute and attack; therefore the Safe@Office appliance
blocks such packets.
Specify whether to allow or block IGMP packets that are sent to nonmulticast addresses, by selecting one of the following:
•
Block. Block IGMP packets that are sent to non-multicast
addresses. This is the default.
•
None. No action.
Peer to Peer
SmartDefense can block peer-to-peer traffic, by identifying the proprietary
protocols and preventing the initial connection to the peer-to-peer networks. This
prevents not only downloads, but also search operations.
This category includes the following nodes:
• KaZaA
• Gnutella
• eMule
• BitTorrent
Note: SmartDefense can detect peer-to-peer traffic regardless of the TCP port being
used to initiate the session.
252
Check Point Safe@Office User Guide
Using SmartDefense
In each node, you can configure how peer-to-peer connections of the selected type
should be handled, using the table below.
Table 54: Peer to Peer Fields
In this field…
Do this…
Action
Specify what action to take when a connection is attempted, by selecting
one of the following:
Track
•
Block. Block the connection.
•
None. No action. This is the default.
Specify whether to log peer-to-peer connections, by selecting one of the
following:
•
Log. Log the connection.
•
None. Do not log the connection. This is the default.
Block proprietary
Specify whether proprietary protocols should be blocked on all ports, by
protocols on all ports
selecting one of the following:
•
Block. Block the proprietary protocol on all ports. This in effect
prevents all communication using this peer-to-peer
application. This is the default.
•
None. Do not block the proprietary protocol on all ports.
Chapter 9: Setting Your Security Policy
253
Using SmartDefense
Instant Messengers
SmartDefense can block instant messaging applications that use VoIP protocols, by
identifying the messaging application's fingerprints and HTTP headers.
This category includes the following nodes:
• Skype
• Yahoo
• ICQ
Note: SmartDefense can detect instant messaging traffic regardless of the TCP port
being used to initiate the session.
In each node, you can configure how instant messaging connections of the selected
type should be handled, using the table below.
254
Check Point Safe@Office User Guide
Using SmartDefense
Table 55: Instant Messengers Fields
In this field…
Do this…
Action
Specify what action to take when a connection is attempted, by selecting
one of the following:
Track
•
Block. Block the connection.
•
None. No action. This is the default.
Specify whether to log instant messenger connections, by selecting one
of the following:
•
Log. Log the connection.
•
None. Do not log the connection. This is the default.
Block proprietary
Specify whether proprietary protocols should be blocked on all ports, by
protocols on all ports
selecting one of the following:
•
Block. Block the proprietary protocol on all ports. This in effect
prevents all communication using this instant messenger
application. This is the default.
•
None. Do not block the proprietary protocol on all ports.
Chapter 9: Setting Your Security Policy
255
Using Secure HotSpot
Using Secure HotSpot
You can enable your Safe@Office appliance as a public Internet access hotspot for
specific networks. When users on those networks attempt to access the Internet,
they are automatically re-directed to the My HotSpot page http://my.hotspot. On
this page, they must read and accept the My HotSpot terms of use, and if My
HotSpot is configured to be password-protected, they must log on using their
Safe@Office username and password. The users may then access the Internet.
Users can also log out in the My HotSpot page.
Note: HotSpot users are automatically logged out after one hour of inactivity.
Safe@Office Secure HotSpot is useful in any wired or wireless environment where
Web-based user authentication or terms-of-use approval is required prior to gaining
access to the network. For example, Secure HotSpot can be used in public
computer labs, educational institutions, libraries, Internet cafés, and so on.
The Safe@Office appliance allows you to add guest users quickly and easily. By
default, guest users are given a username and password that expire in 24 hours and
granted HotSpot Access permissions only. For information on adding quick guest
users, see Adding Quick Guest Users on page 367.
256
Check Point Safe@Office User Guide
Using Secure HotSpot
You can choose to exclude specific network objects from HotSpot enforcement.
For information, see Using Network Objects on page 129.
Important: SecuRemote VPN software users who are authenticated by the Internal
VPN Server are automatically exempt from HotSpot enforcement. This allows, for
example, authenticated employees to gain full access to the corporate LAN, while
guest users are permitted to access the Internet only.
Note: HotSpot enforcement can block traffic passing through the firewall; however, it
does not block local traffic on the same network segment (traffic that does not pass
through the firewall).
Setting Up Secure HotSpot
To set up Secure HotSpot
1. Enable Secure HotSpot for the desired networks.
See Enabling/Disabling Secure HotSpot on page 258.
2. Customize Secure HotSpot as desired.
See Customizing Secure HotSpot on page 259.
3. Grant HotSpot Access permissions to users on the selected networks.
See Adding and Editing Users on page 363.
4. To exclude specific computers from HotSpot enforcement, by adding or editing
their network objects.
See Adding and Editing Network Objects on page 130.
You must select Exclude this computer/network from HotSpot enforcement
option.
5. Add quick guest users as needed.
See Adding Quick Guest Users on page 367.
Chapter 9: Setting Your Security Policy
257
Using Secure HotSpot
Enabling/Disabling Secure HotSpot
To enable/disable Secure HotSpot
1. Click Security in the main menu, and click the My HotSpot tab.
The My HotSpot page appears.
2. In the HotSpot Networks area, do one of the following:
• To enable Secure HotSpot for a specific network, select the check box
next to the network.
• To disable Secure HotSpot for a specific network, clear the check box
next to the network.
3. Click Apply.
258
Check Point Safe@Office User Guide
Using Secure HotSpot
Customizing Secure HotSpot
To customize Secure HotSpot
1. Click Security in the main menu, and click the My HotSpot tab.
The My HotSpot page appears.
2. Complete the fields using the information in the table below.
Additional fields may appear.
3. To preview the My HotSpot page, click Preview.
A browser window opens displaying the My HotSpot page.
Chapter 9: Setting Your Security Policy
259
Using Secure HotSpot
4. Click Apply.
Your changes are saved.
Table 56: My HotSpot Fields
In this field…
Do this…
My HotSpot
Type the title that should appear on the My HotSpot page.
Title
The default title is "Welcome to My HotSpot".
My HotSpot
Type the terms to which the user must agree before accessing the Internet.
Terms
You can use HTML tags as needed.
My HotSpot is
Select this option to require users to enter their username and password
password
before accessing the Internet.
protected
If this option is not selected, users will be required only to accept the terms of
use before accessing the network.
The Allow a user to login from more than one computer at the same time check box
appears.
Allow a user to
Select this option to allow a single user to log on to My HotSpot from multiple
login from more
computers at the same time.
than one
computer at the
same time
260
Check Point Safe@Office User Guide
Defining an Exposed Host
Defining an Exposed Host
The Safe@Office appliance allows you to define an exposed host, which is a
computer that is not protected by the firewall. This is useful for setting up a public
server. It allows unlimited incoming and outgoing connections between the Internet
and the exposed host computer.
The exposed host receives all traffic that was not forwarded to another computer by
use of Allow and Forward rules.
Warning: Entering an IP address may make the designated computer vulnerable to
hacker attacks. Defining an exposed host is not recommended unless you are fully
aware of the security risks.
To define a computer as an exposed host
1. Click Security in the main menu, and click the Exposed Host tab.
The Exposed Host page appears.
Chapter 9: Setting Your Security Policy
261
Defining an Exposed Host
2. In the Exposed Host field, type the IP address of the computer you wish to
define as an exposed host.
Alternatively, you can click This Computer to define your computer as the
exposed host.
3. Click Apply.
The selected computer is now defined as an exposed host.
To clear the exposed host
1. Click Security in the main menu, and click the Exposed Host tab.
The Exposed Host page appears.
2. Click Clear.
3. Click Apply.
No exposed host is defined.
262
Check Point Safe@Office User Guide
Overview
Chapter 10
Using VStream Antivirus
This chapter explains how to use the VStream Antivirus engine to block security
threats before they reach your network.
This chapter includes the following topics:
Overview ..................................................................................................263
Enabling/Disabling VStream Antivirus....................................................265
Viewing VStream Signature Database Information .................................266
Configuring VStream Antivirus ...............................................................267
Updating VStream Antivirus ....................................................................279
Overview
The Safe@Office appliance includes VStream Antivirus, an embedded streambased antivirus engine based on Check Point Stateful Inspection and Application
Intelligence technologies, that performs virus scanning at the kernel level.
VStream Antivirus scans files for malicious content on the fly, without
downloading the files into intermediate storage. This means minimal added latency
and support for unlimited file sizes; and since VStream Antivirus stores only
minimal state information per connection, it can scan thousands of connections
concurrently. In order to scan archive files on the fly, VStream Antivirus performs
real-time decompression and scanning of ZIP, TAR, and GZ archive files, with
support for nested archive files.
When VStream Antivirus detects malicious content, the action it takes depends on
the protocol in which the virus was found. See the table below. In each case,
VStream Antivirus blocks the file and writes a log to the Event Log.
Chapter 10: Using VStream Antivirus
263
Overview
Table 57: VStream Antivirus Actions
If a virus if found in
VStream Antivirus does this...
this protocol...
on this port...
•
HTTP
The protocol is detected
Terminates the
connection
All ports on which VStream is
enabled by the policy, not
only port 80
POP3
IMAP
SMTP
FTP
TCP and UDP
•
Terminates the
connection
•
Deletes the virusinfected email from the
server
•
Terminates the
connection
•
Replaces the virusinfected email with a
message notifying the
user that a virus was
found
•
Rejects the virusinfected email with error
code 554
•
Sends a "Virus
detected" message to
the sender
•
Terminates the data
connection
•
Sends a "Virus detected"
message to the FTP
client
•
Terminates the
connection
The standard TCP port 110.
The standard TCP port 143
The standard TCP port 25
The standard TCP port 21
Generic TCP and UDP ports,
other than those listed above
Note: In protocols that are not listed in this table, VStream Antivirus uses a "best
effort" approach to detect viruses. In such cases, detection of viruses is not
guaranteed and depends on the specific encoding used by the protocol.
264
Check Point Safe@Office User Guide
Enabling/Disabling VStream Antivirus
If you are subscribed to the VStream Antivirus subscription service, VStream
Antivirus virus signatures are automatically updated, so that security is always upto-date, and your network is always protected.
Note: VStream Antivirus differs from the Email Antivirus subscription service (part of
the Email Filtering service) in the following ways:
•
Email Antivirus is centralized, redirecting traffic through the Service
Center for scanning, while VStream Antivirus scans for viruses in the
Safe@Office gateway itself.
•
Email Antivirus is specific to email, scanning incoming POP3 and
outgoing SMTP connections only, while VStream Antivirus supports
additional protocols, including incoming SMTP and outgoing POP3
connections.
You can use either antivirus solution or both in conjunction. For information on
Email Antivirus, see Email Filtering on page 294.
Enabling/Disabling VStream Antivirus
To enable/disable VStream Antivirus
1. Click Antivirus in the main menu, and click the Antivirus tab.
Chapter 10: Using VStream Antivirus
265
Viewing VStream Signature Database Information
The VStream Antivirus page appears.
2. Drag the On/Off lever upwards or downwards.
VStream Antivirus is enabled/disabled for all internal network computers.
Viewing VStream Signature Database Information
VStream Antivirus maintains two databases: a daily database and a main database.
The daily database is updated frequently with the newest virus signatures.
Periodically, the contents of the daily database are moved to the main database,
leaving the daily database empty. This system of incremental updates to the main
database allows for quicker updates and saves on network bandwidth.
You can view information about the VStream signature databases currently in use,
in the VStream Antivirus page.
266
Check Point Safe@Office User Guide
Configuring VStream Antivirus
Table 58: Account Page Fields
This field…
Displays…
Main database
The date and time at which the main database was last updated,
followed by the version number.
Daily database
The date and time at which the daily database was last updated, followed
by the version number.
Next update
The next date and time at which the Safe@Office appliance will check for
updates.
Status
The current status of the database. This includes the following statuses:
•
Database Not Installed
•
OK
Configuring VStream Antivirus
You can configure VStream Antivirus in the following ways:
• Configuring the VStream Antivirus Policy on page 267
• Configuring VStream Advanced Settings on page 275
Configuring the VStream Antivirus Policy
VStream Antivirus includes a flexible mechanism that allows the user to define
exactly which traffic should be scanned, by specifying the protocol, ports, and
source and destination IP addresses.
VStream Antivirus processes policy rules in the order they appear in the Antivirus
Policy table, so that rule 1 is applied before rule 2, and so on. This enables you to
define exceptions to rules, by placing the exceptions higher up in the Rules table.
Chapter 10: Using VStream Antivirus
267
Configuring VStream Antivirus
For example, if you want to scan all outgoing SMTP traffic, except traffic from a
specific IP address, you can create a rule scanning all outgoing SMTP traffic and
move the rule down in the Antivirus Policy table. Then create a rule passing SMTP
traffic from the desired IP address and move this rule to a higher location in the
Antivirus Policy table than the first rule. In the figure below, the general rule is rule
number 2, and the exception is rule number 1.
The Safe@Office appliance will process rule 1 first, passing outgoing SMTP traffic
from the specified IP address, and only then it will process rule 2, scanning all
outgoing SMTP traffic.
The following rule types exist:
VStream Antivirus Rule Types
Table 59: VStream Antivirus Rule Types
Rule
Description
Pass
This rule type enables you to specify that VStream Antivirus should not scan
traffic matching the rule.
268
Check Point Safe@Office User Guide
Configuring VStream Antivirus
Rule
Description
Scan
This rule type enables you to specify that VStream Antivirus should scan traffic
matching the rule.
If a virus is found, it is blocked and logged.
Adding and Editing Rules
To add or edit a rule
1. Click Antivirus in the main menu, and click the Policy tab.
The Antivirus Policy page appears.
2. Do one of the following:
• To add a new rule, click Add Rule.
• To edit an existing rule, click the Edit icon next to the desired rule.
Chapter 10: Using VStream Antivirus
269
Configuring VStream Antivirus
The VStream Policy Rule Wizard opens, with the Step 1: Rule Type dialog box
displayed.
3. Select the type of rule you want to create.
4. Click Next.
The Step 2: Service dialog box appears.
The example below shows a Scan rule.
5. Complete the fields using the relevant information in the table below.
270
Check Point Safe@Office User Guide
Configuring VStream Antivirus
6. Click Next.
The Step 3: Destination & Source dialog box appears.
7. Complete the fields using the relevant information in the table below.
The Step 4: Done dialog box appears.
8. Click Finish.
The new rule appears in the Firewall Rules page.
Chapter 10: Using VStream Antivirus
271
Configuring VStream Antivirus
Table 60: VStream Rule Fields
In this field…
Do this…
Any Service
Click this option to specify that the rule should apply to any service.
Standard
Click this option to specify that the rule should apply to a specific standard
Service
service.
You must then select the desired service from the drop-down list.
Custom Service
Click this option to specify that the rule should apply to a specific nonstandard service.
The Protocol and Port Range fields are enabled. You must fill them in.
Protocol
Select the protocol (TCP, UDP, or ANY) for which the rule should apply.
Ports
To specify the port range to which the rule applies, type the start port
number in the left text box, and the end port number in the right text box.
Note: If you do not enter a port range, the rule will apply to all ports. If you
enter only one port number, the range will include only that port.
If the
connection
source is
Select the source of the connections you want to allow/block.
To specify an IP address, select Specified IP and type the desired IP address
in the filed provided.
To specify an IP address range, select Specified Range and type the desired
IP address range in the fields provided.
272
Check Point Safe@Office User Guide
Configuring VStream Antivirus
In this field…
Do this…
And the
Select the destination of the connections you want to allow or block.
destination is
To specify an IP address, select Specified IP and type the desired IP address
in the text box.
To specify an IP address range, select Specified Range and type the desired
IP address range in the fields provided. This option is not available in Allow
and Forward rules.
To specify the Safe@Office Portal and network printers, select This Gateway.
This option is not available in Allow and Forward rules.
To specify any destination except the Safe@Office Portal and network
printers, select ANY.
Data Direction
Select the direction of connections to which the rule should apply:
•
Download and Upload data. The rule applies to downloaded and
uploaded data. This is the default.
•
Download data. The rule applies to downloaded data, that is, data
flowing from the destination of the connection to the source of the
connection.
•
Upload data. The rule applies to uploaded data, that is, data flowing
from the source of the connection to the destination of the
connection.
Enabling/Disabling Rules
You can temporarily disable a VStream Antivirus rule.
To enable/disable a rule
1. Click Antivirus in the main menu, and click the Policy tab.
The Antivirus Policy page appears.
Chapter 10: Using VStream Antivirus
273
Configuring VStream Antivirus
2. Next to the desired rule, do one of the following:
• To enable the rule, click
The button changes to
• To disable the rule, click
The button changes to
and the rule is enabled.
and the rule is disabled.
Changing Rules' Priority
To change a rule's priority
1. Click Antivirus in the main menu, and click the Policy tab.
The Antivirus Policy page appears.
2. Do one of the following:
• Click
next to the desired rule, to move the rule up in the table.
• Click next to the desired rule, to move the rule down in the table.
The rule's priority changes accordingly.
Deleting Rules
To delete an existing rule
1. Click Antivirus in the main menu, and click the Policy tab.
The Antivirus Policy page appears.
2. Click the Erase
icon of the rule you wish to delete.
A confirmation message appears.
274
Check Point Safe@Office User Guide
Configuring VStream Antivirus
3. Click OK.
The rule is deleted.
Configuring VStream Advanced Settings
To configure VStream Antivirus advanced settings
1. Click Antivirus in the main menu, and click the Advanced tab.
The Advanced Antivirus Settings page appears.
2. Complete the fields using the table below.
3. Click Apply.
4. To restore the default VStream Antivirus settings, do the following:
a) Click Default.
A confirmation message appears.
b) Click OK.
Chapter 10: Using VStream Antivirus
275
Configuring VStream Antivirus
The VStream Antivirus settings are reset to their defaults. For information on
the default values, refer to the table below.
Table 61: Advanced Antivirus Settings Fields
In this field…
Do this…
File Types
Block potentially unsafe
Select this option to block all emails containing potentially unsafe
file types in email
attachments.
messages
Unsafe file types are:
276
•
DOS/Windows executables, libraries and drivers
•
Compiled HTML Help files
•
VBScript files
•
Files with {CLSID} in their name
•
The following file extensions: ade, adp, bas, bat, chm,
cmd,com, cpl, crt, exe, hlp, hta, inf, ins, isp, js, jse,
lnk, mdb, mde, msc, msi, msp, mst, pcd, pif, reg, scr,
sct, shs,shb, url, vb, vbe, vbs, wsc, wsf, wsh.
Check Point Safe@Office User Guide
Configuring VStream Antivirus
In this field…
Do this…
Pass safe file types
Select this option to accept common file types that are known to
without scanning
be safe, without scanning them.
Safe files types are:
•
MPEG streams
•
RIFF Ogg Stream
•
MP3
•
PDF
•
PostScript
•
WMA/WMV/ASF
•
RealMedia
•
JPEG - only the header is scanned, and the rest of
the file is skipped
Selecting this option reduces the load on the gateway by skipping
safe file types. This option is selected by default.
Status
Maximum nesting level
Type the maximum number of nested content levels that
VStream Antivirus should scan.
Setting a higher number increases security. Setting a lower
number prevents attackers from overloading the gateway by
sending extremely nested archive files.
The default value is 5 levels.
Chapter 10: Using VStream Antivirus
277
Configuring VStream Antivirus
In this field…
Do this…
Maximum compression
Fill in the field to complete the maximum compression ratio of
ratio 1:x
files that VStream Antivirus should scan.
For example, to specify a 1:150 maximum compression ratio,
type 150.
Setting a higher number allows the scanning of highly
compressed files, but creates a potential for highly compressible
files to create a heavy load on the appliance. Setting a lower
number prevents attackers from overloading the gateway by
sending extremely compressible files.
The default value is 100.
When archived file
Specify how VStream Antivirus should handle files that exceed
exceeds limit or extraction
the Maximum nesting level or the Maximum compression ratio, and
fails
files for which scanning fails. Select one of the following:
•
Pass file without scanning. Scan only the number of
levels specified, and skip the scanning of more deeply
nested archives. Furthermore, skip scanning highly
compressible files, and skip scanning archives that
cannot be extracted because they are corrupt. This is
the default.
•
Block file. Block the file.
When a password-
VStream Antivirus cannot extract and scan password-protected
protected file is found in
files inside archive. Specify how VStream Antivirus should handle
archive
such files, by selecting one of the following:
278
•
Pass file without scanning. Accept the file without
scanning it. This is the default.
•
Block file. Block the file.
Check Point Safe@Office User Guide
Updating VStream Antivirus
Updating VStream Antivirus
When you are subscribed to the VStream Antivirus updates service, VStream
Antivirus virus signatures are automatically updated, keeping security up-to-date
with no need for user intervention. However, you can still check for updates
manually, if needed.
To update the VStream Antivirus virus signature database
1. Click Antivirus in the main menu, and click the Antivirus tab.
The VStream Antivirus page appears.
2. Click Update Now.
The VStream Antivirus database is updated with the latest virus signatures.
Chapter 10: Using VStream Antivirus
279
Connecting to a Service Center
Chapter 11
Using Subscription Services
This chapter explains how to start subscription services, and how to use Software
Updates, Web Filtering, and Email Filtering services.
Note: Check with your reseller regarding availability of subscription services, or surf
to www.sofaware.com/servicecenters to locate a Service Center in your area.
This chapter includes the following topics:
Connecting to a Service Center ................................................................281
Viewing Services Information..................................................................287
Refreshing Your Service Center Connection............................................288
Configuring Your Account.......................................................................288
Disconnecting from Your Service Center.................................................289
Web Filtering............................................................................................290
Email Filtering..........................................................................................294
Automatic and Manual Updates ...............................................................298
Connecting to a Service Center
To connect to a Service Center
1. Click Services in the main menu, and click the Account tab.
Chapter 11: Using Subscription Services
281
Connecting to a Service Center
The Account page appears.
2. In the Service Account area, click Connect.
282
Check Point Safe@Office User Guide
Connecting to a Service Center
The Safe@Office Services Wizard opens, with the Service Center dialog box
displayed.
3. Make sure the Connect to a different Service Center check box is selected.
4. Do one of the following:
• To connect to the SofaWare Service Center, choose
usercenter.sofaware.com.
• To specify a Service Center, choose Specified IP and then in the Specified
IP field, enter the desired Service Center’s IP address, as given to you by
your system administrator.
5. Click Next.
• The Connecting… screen appears.
Chapter 11: Using Subscription Services
283
Connecting to a Service Center
• If the Service Center requires authentication, the Service Center Login
dialog box appears.
Enter your gateway ID and registration key in the appropriate fields, as given
to you by your service provider, then click Next.
• The Connecting… screen appears.
• The Confirmation dialog box appears with a list of services to which you
are subscribed.
284
Check Point Safe@Office User Guide
Connecting to a Service Center
6. Click Next.
The Done screen appears with a success message.
7. Click Finish.
The following things happen:
• If a new firmware is available, the Safe@Office appliance may start
downloading it. This may take several minutes. Once the download is
complete, the Safe@Office appliance restarts using the new firmware.
• The Welcome page appears.
Chapter 11: Using Subscription Services
285
Connecting to a Service Center
• The services to which you are subscribed are now available on your
Safe@Office appliance and listed as such on the Account page. See
Viewing Services Information on page 287 for further information.
• The Services submenu includes the services to which you are subscribed.
286
Check Point Safe@Office User Guide
Viewing Services Information
Viewing Services Information
The Account page displays the following information about your subscription.
Table 62: Account Page Fields
This field…
Displays…
Service Center
The name of the Service Center to which you are connected (if known).
Name
Gateway ID
Your gateway ID.
Subscription will
The date on which your subscription to services will end.
end on
Service
The services available in your service plan.
Subscription
The status of your subscription to each service:
Status
•
Subscribed
•
Not Subscribed
The status of each service:
•
Connected. You are connected to the service through the
Service Center.
•
Connecting. Connecting to the Service Center.
•
N/A. The service is not available.
Chapter 11: Using Subscription Services
287
Refreshing Your Service Center Connection
This field…
Displays…
Information
The mode to which each service is set.
If you are subscribed to Dynamic DNS, this field displays your gateway's
domain name.
For further information, see Web Filtering on page 290, Virus Scanning
on page 294, and Automatic and Manual Updates on page 298.
Refreshing Your Service Center Connection
This option restarts your Safe@Office appliance’s connection to the Service Center
and refreshes your Safe@Office appliance’s service settings.
To refresh your Service Center connection
1. Click Services in the main menu, and click the Account tab.
The Account page appears.
2. In the Service Account area, click Refresh.
The Safe@Office appliance reconnects to the Service Center.
Your service settings are refreshed.
Configuring Your Account
This option allows you to access your Service Center's Web site, which may offer
additional configuration options for your account. Contact your Service Center for
a user ID and password.
288
Check Point Safe@Office User Guide
Disconnecting from Your Service Center
To configure your account
1. Click Services in the main menu, and click the Account tab.
The Account page appears.
2. In the Service Account area, click Configure.
Note: If no additional settings are available from your Service Center, this button will
not appear.
Your Service Center's Web site opens.
3. Follow the on-screen instructions.
Disconnecting from Your Service Center
If desired, you can disconnect from your Service Center.
To disconnect from your Service Center
1. Click Services in the main menu, and click the Account tab.
The Account page appears.
2. In the Service Account area, click Connect.
The Safe@Office Services Wizard opens, with the first Subscription Services
dialog box displayed.
3. Clear the Connect to a different Service Center check box.
4. Click Next.
The Done screen appears with a success message.
5. Click Finish.
The following things happen:
• You are disconnected from the Service Center.
Chapter 11: Using Subscription Services
289
Web Filtering
• The services to which you were subscribed are no longer available on
your Safe@Office appliance.
Web Filtering
When the Web Filtering service is enabled, access to Web content is restricted
according to the categories specified under Allow Categories. Authorized users will
be able to view Web pages with no restrictions, only after they have provided the
administrator password via the Web Filtering pop-up window.
Note: Web Filtering is only available if you are connected to a Service Center and
subscribed to this service.
Enabling/Disabling Web Filtering
Note: If you are remotely managed, contact your Service Center to change these
settings.
To enable/disable Web Filtering
1. Click Services in the main menu, and click the Web Filtering tab.
290
Check Point Safe@Office User Guide
Web Filtering
The Web Filtering page appears.
2. Drag the On/Off lever upwards or downwards.
Web Filtering is enabled/disabled.
Selecting Categories for Blocking
You can define which types of Web sites should be considered appropriate for your
family or office members, by selecting the categories. Categories marked with
will remain visible, while categories marked with will be blocked and will
require the administrator password for viewing.
Note: If you are remotely managed, contact your Service Center to change these
settings.
Chapter 11: Using Subscription Services
291
Web Filtering
To allow/block a category
• In the Allow Categories area, click
or
next to the desired category.
Temporarily Disabling Web Filtering
If desired, you can temporarily disable the Web Filtering service.
To temporarily disable Web Filtering
1. Click Services in the main menu, and click the Web Filtering tab.
The Web Filtering page appears.
2. Click Snooze.
• Web Filtering is temporarily disabled for all internal network computers.
292
Check Point Safe@Office User Guide
Web Filtering
• The Snooze button changes to Resume.
• The Web Filtering Off popup window opens.
3. To re-enable the service, click Resume, either in the popup window, or on the
Web Filtering page.
• The service is re-enabled for all internal network computers.
• If you clicked Resume in the Web Filtering page, the button changes to
Snooze.
Chapter 11: Using Subscription Services
293
Email Filtering
• If you clicked Resume in the Web Filtering Off popup window, the popup
window closes.
Email Filtering
There are two Email Filtering services:
• Email Antivirus
When the Email Antivirus service is enabled, your email is automatically
scanned for the detection and elimination of all known viruses and vandals. If a
virus is detected, it is removed and replaced with a warning message.
Note: The Email Antivirus subscription service differs from VStream Antivirus in the
following ways:
•
Email Antivirus is centralized, redirecting traffic through the Service
Center for scanning, while VStream Antivirus scans for viruses in the
Safe@Office gateway itself.
•
Email Antivirus is specific to email, scanning incoming POP3 and
outgoing SMTP connections only, while VStream Antivirus supports
additional protocols, including incoming SMTP and outgoing POP3
connections.
You can use either antivirus solution or both in conjunction. For information on
VStream Antivirus, see Using VStream Antivirus on page 263.
• Email Antispam
When the Email Antispam service is enabled, your email is automatically
scanned for the detection of spam. If spam is detected, the email’s Subject line is
modified to indicate that it is suspected spam. You can create rules to divert
such messages to a special folder.
Note: Email Filtering services are only available if you are connected to a Service
Center and subscribed to the services.
294
Check Point Safe@Office User Guide
Email Filtering
Enabling/Disabling Email Filtering
Note: If you are remotely managed, contact your Service Center to change these
settings.
To enable/disable Email Filtering
1. Click Services in the main menu, and click the Email Filtering tab.
The Email Filtering page appears.
2. Next to Email Antivirus, drag the On/Off lever upwards or downwards.
Email Antivirus is enabled/disabled.
3. Next to Email Antispam, drag the On/Off lever upwards or downwards.
Email Antispam is enabled/disabled.
Chapter 11: Using Subscription Services
295
Email Filtering
Selecting Protocols for Scanning
If you are locally managed, you can define which protocols should be scanned for
viruses and spam:
• Email retrieving (POP3). If enabled, all incoming email in the POP3
protocol will be scanned.
• Email sending (SMTP). If enabled, all outgoing email will be scanned.
Protocols marked with
will be scanned, while those marked with
will not.
Note: If you are remotely managed, contact your Service Center to change these
settings.
To enable virus and spam scanning for a protocol
• In the Options area, click
or
next to the desired protocol.
Temporarily Disabling Email Filtering
If you are having problems sending or receiving email you can temporarily disable
the Email Filtering services.
To temporarily disable Email Filtering
1. Click Services in the main menu, and click the Email Filtering tab.
The Email Filtering page appears.
2. Click Snooze.
• Email Antivirus and Email Antispam are temporarily disabled for all
internal network computers.
296
Check Point Safe@Office User Guide
Email Filtering
• The Snooze button changes to Resume.
• The Email Filtering Off popup window opens.
3. To re-enable Email Antivirus and Email Antispam, click Resume, either in the
popup window, or on the Email Filtering page.
• The services are re-enabled for all internal network computers.
• If you clicked Resume in the Email Filtering page, the button changes to
Snooze.
• If you clicked Resume in the Email Filtering Off popup window, the popup
window closes.
Chapter 11: Using Subscription Services
297
Automatic and Manual Updates
Automatic and Manual Updates
The Software Updates service enables you to check for new security and software
updates.
Note: Software Updates are only available if you are connected to a Service Center
and subscribed to this service.
Checking for Software Updates when Remotely Managed
If your Safe@Office appliance is remotely managed, it automatically checks for
software updates and installs them without user intervention. However, you can
still check for updates manually, if needed.
To manually check for security and software updates
1. Click Services in the main menu, and click the Software Updates tab.
The Software Updates page appears.
2. Click Update Now.
298
Check Point Safe@Office User Guide
Automatic and Manual Updates
The system checks for new updates and installs them.
Checking for Software Updates when Locally Managed
If your Safe@Office appliance is locally managed, you can set it to automatically
check for software updates, or you can set it so that software updates must be
checked for manually.
To configure software updates when locally managed
1. Click Services in the main menu, and click the Software Updates tab.
The Software Updates page appears.
2. To set the Safe@Office appliance to automatically check for and install new
software updates, drag the Automatic/Manual lever upwards.
The Safe@Office appliance checks for new updates and installs them according
to its schedule.
Chapter 11: Using Subscription Services
299
Automatic and Manual Updates
Note: When the Software Updates service is set to Automatic, you can still manually
check for updates.
3. To set the Safe@Office appliance so that software updates must be checked for
manually, drag the Automatic/Manual lever downwards.
The Safe@Office appliance does not check for software updates automatically.
4. To manually check for software updates, click Update Now.
The system checks for new updates and installs them.
300
Check Point Safe@Office User Guide
Overview
Chapter 12
Working With VPNs
This chapter describes how to use your Safe@Office appliance as a Remote Access
VPN Client, server, or gateway.
This chapter includes the following topics:
Overview ..................................................................................................301
Setting Up Your Safe@Office Appliance as a VPN Server .....................307
Adding and Editing VPN Sites ................................................................312
Deleting a VPN Site .................................................................................343
Enabling/Disabling a VPN Site ................................................................343
Logging on to a Remote Access VPN Site ...............................................344
Logging off a Remote Access VPN Site ..................................................348
Installing a Certificate ..............................................................................348
Uninstalling a Certificate..........................................................................355
Viewing VPN Tunnels .............................................................................356
Viewing IKE Traces for VPN Connections..............................................359
Overview
You can configure your Safe@Office appliance as part of a virtual private network
(VPN). A VPN is a private data network consisting of a group of gateways that can
securely connect to each other. Each member of the VPN is called a VPN site, and
a connection between two VPN sites is called a VPN tunnel. VPN tunnels encrypt
and authenticate all traffic passing through them. Through these tunnels, employees
can safely use their company’s network resources when working at home. For
example, they can securely read email, use the company’s intranet, or access the
company’s database from home.
The are four types of VPN sites:
• Remote Access VPN Server. Makes a network remotely available to
authorized users, who connect to the Remote Access VPN Server using the
Chapter 12: Working With VPNs
301
Overview
Check Point SecuRemote VPN Client, provided for free with your
Safe@Office, or from another Safe@Office.
• Internal VPN Server. SecuRemote can also be used from your internal
networks, allowing you to secure your wired or wireless network with
strong encryption and authentication.
• Site-to-Site VPN Gateway. Can connect with another Site-to-Site VPN
Gateway in a permanent, bi-directional relationship.
• Remote Access VPN Client. Can connect to a Remote Access VPN Server,
but other VPN sites cannot initiate a connection to the Remote Access
VPN Client. Defining a Remote Access VPN Client is a hardware
alternative to using SecuRemote software.
Both Safe@Office 500 and 500W provide full VPN functionality. They can act as a
Remote Access VPN Client, a Remote Access VPN Server for multiple users, or a
Site-to-Site VPN Gateway.
A virtual private network (VPN) must include at least one Remote Access VPN
Server or gateway. The type of VPN sites you include in a VPN depends on the
type of VPN you want to create, Site-to-Site or Remote Access.
Note: A locally managed Remote Access VPN Server or gateway must have a static
IP address. If you need a Remote Access VPN Server or gateway with a dynamic
IP address, you must use SofaWare Security Management Portal (SMP)
management.
A SecuRemote or Safe@Office Remote Access VPN Client can have a dynamic IP
address, regardless of whether it is locally or remotely managed.
Note: This chapter explains how to define a VPN locally. However, if your appliance
is centrally managed by a Service Center, then the Service Center can
automatically deploy VPN configuration for your appliance.
Site-to-Site VPNs
A Site-to-Site VPN consists of two or more Site-to-Site VPN Gateways that can
communicate with each other in a bi-directional relationship. The connected
302
Check Point Safe@Office User Guide
Overview
networks function as a single network. You can use this type of VPN to mesh
office branches into one corporate network.
Figure 12: Site-to-Site VPN
Chapter 12: Working With VPNs
303
Overview
To create a Site-to-Site VPN with two VPN sites
1. On the first VPN site’s Safe@Office appliance, do the following:
a. Define the second VPN site as a Site-to-Site VPN Gateway, or create
a PPPoE tunnel to the second VPN site, using the procedure Adding
and Editing VPN Sites on page 312.
b. Enable the Remote Access VPN Server using the procedure Setting
Up Your Safe@Office Appliance as a Remote Access VPN Server on
page 307.
2. On the second VPN site’s Safe@Office appliance, do the following:
a. Define the first VPN site as a Site-to-Site VPN Gateway, or create a
PPPoE tunnel to the first VPN site, using the procedure Adding and
Editing VPN Sites on page 312.
b. Then enable the Remote Access VPN Server using the procedure
Setting Up Your Safe@Office Appliance as a Remote Access VPN
Server on page 307.
304
Check Point Safe@Office User Guide
Overview
Remote Access VPNs
A Remote Access VPN consists of one Remote Access VPN Server or Site-to-Site
VPN Gateway, and one or more Remote Access VPN Clients. You can use this
type of VPN to make an office network remotely available to authorized users,
such as employees working from home, who connect to the office Remote Access
VPN Server with their Remote Access VPN Clients.
Figure 13: Remote Access VPN
Chapter 12: Working With VPNs
305
Overview
To create a Remote Access VPN with two VPN sites
1. On the remote user VPN site's Safe@Office appliance, add the office Remote
Access VPN Server as a Remote Access VPN site.
See Adding and Editing VPN Sites on page 312.
The remote user's Safe@Office appliance will act as a Remote Access VPN
Client.
2. On the office VPN site's Safe@Office appliance, enable the Remote Access
VPN Server.
See Setting Up Your Safe@Office Appliance as a Remote Access VPN Server
on page 307.
Internal VPN Server
You can use your Safe@Office appliance as an internal VPN Server, for enhanced
wired and wireless security. When the internal VPN Server is enabled, internal
network PCs and PDAs with SecuRemote VPN Client software installed can
establish a Remote Access VPN session to the gateway. This means that
connections from internal network users to the gateway can be encrypted and
authenticated.
The benefits of using the internal VPN Server are two-fold:
• Accessibility
Using SecuRemote, you can enjoy a secure connection from anywhere—in your
wireless network or on the road—without changing any settings. The standard is
completely transparent and allows you to access company resources the same
way, whether you are sitting at your desk or anywhere else.
• Security
Many of today's attacks are increasingly introduced from inside the network.
Internal security threats cause outages, downtime, and lost revenue. Wired
networks that deal with highly sensitive information—especially networks in
public places, such as classrooms—are vulnerable to users trying to hack the
internal network.
306
Check Point Safe@Office User Guide
Setting Up Your Safe@Office Appliance as a VPN Server
Using the internal VPN Server, along with a strict security policy for non-VPN
users, can enhance security both for wired networks and for wireless networks,
which are particularly vulnerable to security breaches.
The internal VPN Server can be used in the Safe@Office 500W wireless appliance,
regardless of the wireless security settings. It also can be used in wired appliances,
both for wired stations and for wireless stations.
Note: You can enable wireless connections to a wired Safe@Office appliance, by
connecting a wireless access point in bridge mode to one of the appliance's internal
interfaces. Do not connect computers to the same interface as a wireless access
point, since allowing direct access from the wireless network may pose a significant
security risk.
For information on setting up your Safe@Office appliance as an internal VPN
Server, see Setting Up Your Safe@Office Appliance as a VPN Server on page
307.
Setting Up Your Safe@Office Appliance as a VPN
Server
You can make your network available to authorized users connecting from the
Internet or from your internal networks, by setting up your Safe@Office appliance
as a VPN Server. Users can connect to the VPN Server via Check Point
SecuRemote or via a Safe@Office appliance in Remote Access VPN mode.
Enabling the VPN Server for users connecting from your internal networks adds a
layer of security to such connections. For example, while you could create a
firewall rule allowing a specific user on the DMZ or WLAN to access the LAN,
enabling VPN access for the user means that such connections can be encrypted
and authenticated. For more information, see Internal VPN Server on page 306.
Chapter 12: Working With VPNs
307
Setting Up Your Safe@Office Appliance as a VPN Server
To set up your Safe@Office appliance as a VPN Server
1. Configure the VPN Server in one or more of the following ways:
• To accept remote access connections from the Internet.
See Configuring the Remote Access VPN Server on page 309.
• To accept connections from your internal networks.
See Configuring the Internal VPN Server on page 310.
2. If you configured the internal VPN Server, install SecuRemote on the desired
internal network computers.
See Installing SecuRemote on page 311.
3. Set up remote VPN access for users.
See Setting Up Remote VPN Access for Users on page 369.
Note: Disabling the VPN Server for a specific type of connection (from the Internet or
from internal networks) will cause all existing VPN tunnels of that type to
disconnect.
308
Check Point Safe@Office User Guide
Setting Up Your Safe@Office Appliance as a VPN Server
Configuring the Remote Access VPN Server
To configure the Remote Access VPN Server
1. Click VPN in the main menu, and click the VPN Server tab.
The SecuRemote VPN Server page appears.
2. Select the Allow SecuRemote users to connect from the Internet check box.
Chapter 12: Working With VPNs
309
Setting Up Your Safe@Office Appliance as a VPN Server
New check boxes appear.
3. To allow authenticated users connecting from the Internet to bypass NAT when
connecting to your internal network, select the Bypass NAT check box.
4. To allow authenticated users connecting from the Internet to bypass the firewall
and access your internal network without restriction, select the Bypass the
firewall check box.
5. Click Apply.
The Remote Access VPN Server is enabled for the specified connection types.
Configuring the Internal VPN Server
To configure the internal VPN Server
1. Click VPN in the main menu, and click the VPN Server tab.
The SecuRemote VPN Server page appears.
310
Check Point Safe@Office User Guide
Setting Up Your Safe@Office Appliance as a VPN Server
2. Select the Allow SecuRemote users to connect from my internal networks check
box.
New check boxes appear.
3. To allow authenticated users connecting from internal networks to bypass the
firewall and access your internal network without restriction, select the Bypass
the firewall check box.
Bypass NAT is always enabled for the internal VPN server, and cannot be
disabled.
4. Click Apply.
The internal VPN Server is enabled for the specified connection types.
Installing SecuRemote
If you configured the Remote Access VPN Server to accept connections from your
internal networks, you must install the SecuRemote VPN Client on internal
network computers that should be allowed to remotely access your network.
Chapter 12: Working With VPNs
311
Adding and Editing VPN Sites
To install SecuRemote
1. Click VPN in the main menu, and click the VPN Server tab.
The SecuRemote VPN Server page appears.
2. Click the Download SecuRemote VPN client link.
The VPN-1 SecuRemote for Safe@Office page opens in a new window.
3. Follow the online instructions to complete installation.
SecuRemote is installed.
For information on using SecuRemote, see the User Help. To access
SecuRemote User Help, right-click on the SecuRemote VPN Client icon in the
taskbar, select Settings, and then click Help.
Adding and Editing VPN Sites
To add or edit VPN sites
1. Click VPN in the main menu, and click the VPN Sites tab.
312
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
The VPN Sites page appears with a list of VPN sites.
2. Do one of the following:
• To add a VPN site, click New Site.
• To edit a VPN site, click Edit in the desired VPN site’s row.
The Safe@Office VPN Site Wizard opens, with the Welcome to the VPN Site
Wizard dialog box displayed.
Chapter 12: Working With VPNs
313
Adding and Editing VPN Sites
3. Do one of the following:
• Select Remote Access VPN to establish remote access from your Remote
Access VPN Client to a Remote Access VPN Server.
• Select Site-to-Site VPN to create a permanent bi-directional connection to
another Site-to-Site VPN Gateway.
4. Click Next.
Configuring a Remote Access VPN Site
If you selected Remote Access VPN, the VPN Gateway Address dialog box appears.
1. Enter the IP address of the Remote Access VPN Server to which you want to
connect, as given to you by the network administrator.
2. To allow the VPN site to bypass the firewall and access your internal network
without restriction, select the Bypass the firewall check box.
3. Click Next.
314
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
The VPN Network Configuration dialog box appears.
4. Specify how you want to obtain the VPN network configuration. Refer to VPN
Network Configuration Fields on page 323.
5. Click Next.
The following things happen in the order below:
• If you chose Specify Configuration, a second VPN Network Configuration
dialog box appears.
Chapter 12: Working With VPNs
315
Adding and Editing VPN Sites
Complete the fields using the information in VPN Network Configuration
Fields on page 323 and click Next.
• The Authentication Method dialog box appears.
6. Complete the fields using the information in Authentication Methods Fields on
page 325.
7. Click Next.
316
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
Username and Password Authentication Method
If you selected Username and Password, the VPN Login dialog box appears.
1. Complete the fields using the information in VPN Login Fields on page 325.
2. Click Next.
• If you selected Automatic Login, the Connect dialog box appears.
Chapter 12: Working With VPNs
317
Adding and Editing VPN Sites
Do the following:
1) To try to connect to the Remote Access VPN Server, select the Try
to Connect to the VPN Gateway check box.
This allows you to test the VPN connection.
Warning: If you try to connect to the VPN site before completing the wizard, all
existing tunnels will be terminated.
2) Click Next.
If you selected Try to Connect to the VPN Gateway, the Connecting…
screen appears, and then the Contacting VPN Site screen appears.
• The Site Name dialog box appears.
3. Enter a name for the VPN site.
You may choose any name.
4. Click Next.
318
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
The VPN Site Created screen appears.
5. Click Finish.
The VPN Sites page reappears. If you added a VPN site, the new site appears in
the VPN Sites list. If you edited a VPN site, the modifications are reflected in the
VPN Sites list.
Certificate Authentication Method
If you selected Certificate, the Connect dialog box appears.
Chapter 12: Working With VPNs
319
Adding and Editing VPN Sites
1. To try to connect to the Remote Access VPN Server, select the Try to Connect to
the VPN Gateway check box.
This allows you to test the VPN connection.
Warning: If you try to connect to the VPN site before completing the wizard, all
existing tunnels will be terminated.
2. Click Next.
If you selected Try to Connect to the VPN Gateway, the Connecting… screen
appears, and then the Contacting VPN Site screen appears.
The Site Name dialog box appears.
3. Enter a name for the VPN site.
You may choose any name.
4. Click Next.
320
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
The VPN Site Created screen appears.
5. Click Finish.
The VPN Sites page reappears. If you added a VPN site, the new site appears in
the VPN Sites list. If you edited a VPN site, the modifications are reflected in the
VPN Sites list.
RSA SecurID Authentication Method
If you selected RSA SecurID, the Site Name dialog box appears.
Chapter 12: Working With VPNs
321
Adding and Editing VPN Sites
1. Enter a name for the VPN site.
You may choose any name.
2. Click Next.
The VPN Site Created screen appears.
3. Click Finish.
The VPN Sites page reappears. If you added a VPN site, the new site appears in
the VPN Sites list. If you edited a VPN site, the modifications are reflected in the
VPN Sites list.
322
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
Table 63: VPN Network Configuration Fields
In this field…
Do this…
Download
Click this option to obtain the network configuration by downloading it from
Configuration
the VPN site.
This option will automatically configure your VPN settings, by downloading
the network topology definition from the Remote Access VPN Server.
Note: Downloading the network configuration is only possible if you are
connecting to a Check Point VPN-1 or Safe@Office Site-to-Site VPN
Gateway.
Specify
Click this option to provide the network configuration manually.
Configuration
Route All Traffic
Click this option to route all network traffic through the VPN site.
For example, if your VPN consists of a central office and a number of
remote offices, and the remote offices are only allowed to access Internet
resources through the central office, you can choose to route all traffic from
the remote offices through the central office.
Note: You can only configure one VPN site to route all traffic.
Chapter 12: Working With VPNs
323
Adding and Editing VPN Sites
In this field…
Do this…
Route Based VPN
Click this option to create a virtual tunnel interface (VTI) for this site, so
that it can participate in a route-based VPN.
Route-based VPNs allow routing connections over VPN tunnels, so that
remote VPN sites can participate in dynamic or static routing schemes.
This improves network and VPN management efficiency for large
networks.
For constantly changing networks, it is recommended to use a route-based
VPN combined with OSPF dynamic routing. This enables you to make
frequent changes to the network topology, such as adding an internal
network, without having to reconfigure static routes.
OSPF is enabled using CLI. For information on using CLI, see Controlling
the Appliance via the Command Line on page 388. For information on
the relevant commands for OSPF, refer to the Embedded NGX CLI
Reference Guide.
This option is only available for when configuring a Site-to-Site VPN
gateway.
Destination network
Type up to three destination network addresses at the VPN site to which
you want to connect.
Subnet mask
Select the subnet masks for the destination network addresses.
Note: Obtain the destination networks and subnet masks from the VPN
site’s system administrator.
Backup Gateway
324
Type the name of the VPN site to use if the primary VPN site fails.
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
Table 64: Authentication Methods Fields
In this field…
Do this…
Username and
Select this option to use a user name and password for VPN
Password
authentication.
In the next step, you can specify whether you want to log on to the VPN
site automatically or manually.
Certificate
Select this option to use a certificate for VPN authentication.
If you select this option, a certificate must have been installed. (Refer to
Installing a Certificate on page 348 for more information about
certificates and instructions on how to install a certificate.)
RSA SecurID
Select this option to use an RSA SecurID token for VPN authentication.
Token
When authenticating to the VPN site, you must enter a four-digit PIN code
and the SecurID passcode shown in your SecurID token's display. The
RSA SecurID token generates a new passcode every minute.
SecurID is only supported in Remote Access manual login mode.
Chapter 12: Working With VPNs
325
Adding and Editing VPN Sites
Table 65: VPN Login Fields
In this field…
Do this…
Manual Login
Click this option to configure the site for Manual Login.
Manual Login connects only the computer you are currently logged onto to
the VPN site, and only when the appropriate user name and password
have been entered. For further information on Automatic and Manual
Login, see, Logging on to a VPN Site on page 344.
Automatic Login
Click this option to enable the Safe@Office appliance to log on to the VPN
site automatically.
You must then fill in the Username and Password fields.
Automatic Login provides all the computers on your internal network with
constant access to the VPN site. For further information on Automatic and
Manual Login, see Logging on to a VPN Site on page 344.
Username
Type the user name to be used for logging on to the VPN site.
Password
Type the password to be used for logging on to the VPN site.
326
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
Configuring a Site-to-Site VPN Gateway
If you selected Site-to-Site VPN, the VPN Gateway Address dialog box appears.
1. Complete the fields using the information in VPN Gateway Address Fields on
page 338.
2. Click Next.
The VPN Network Configuration dialog box appears.
Chapter 12: Working With VPNs
327
Adding and Editing VPN Sites
3. Specify how you want to obtain the VPN network configuration. Refer to VPN
Network Configuration Fields on page 323.
4. Click Next.
• If you chose Specify Configuration, a second VPN Network Configuration
dialog box appears.
Complete the fields using the information in VPN Network Configuration
Fields on page 323, and then click Next.
328
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
• If you chose Route Based VPN, the Route Based VPN dialog box appears.
Complete the fields using the information in Route Based VPN Fields on
page 339, and then click Next.
• The Authentication Method dialog box appears.
5. Complete the fields using the information in Authentication Methods Fields on
page 340.
6. Click Next.
Chapter 12: Working With VPNs
329
Adding and Editing VPN Sites
Shared Secret Authentication Method
If you selected Shared Secret, the Authentication dialog box appears.
If you chose Download Configuration, the dialog box contains additional fields.
1. Complete the fields using the information in VPN Authentication Fields on
page 340 and click Next.
330
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
The Security Methods dialog box appears.
2. To configure advanced security settings, click Show Advanced Settings.
New fields appear.
3. Complete the fields using the information in Security Methods Fields on page
340 and click Next.
Chapter 12: Working With VPNs
331
Adding and Editing VPN Sites
The Connect dialog box appears.
4. To try to connect to the Remote Access VPN Server, select the Try to Connect to
the VPN Gateway check box.
This allows you to test the VPN connection.
Warning: If you try to connect to the VPN site before completing the wizard, all
existing tunnels will be terminated.
5. Click Next.
• If you selected Try to Connect to the VPN Gateway, the Connecting…
screen appears, and then the Contacting VPN Site screen appears.
332
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
• The Site Name dialog box appears.
6. Enter a name for the VPN site.
You may choose any name.
7. To keep the tunnel to the VPN site alive even if there is no network traffic
between the Safe@Office appliance and the VPN site, select Keep this site alive.
8. Click Next.
Chapter 12: Working With VPNs
333
Adding and Editing VPN Sites
• If you selected Keep this site alive, and previously you chose Download
Configuration, the "Keep Alive" Configuration dialog box appears.
Do the following:
1) Type up to three IP addresses which the Safe@Office appliance
should ping in order to keep the tunnel to the VPN site alive.
2) Click Next.
• The VPN Site Created screen appears.
9. Click Finish.
The VPN Sites page reappears. If you added a VPN site, the new site appears in
the VPN Sites list. If you edited a VPN site, the modifications are reflected in the
VPN Sites list.
Certificate Authentication Method
If you selected Certificate, the following things happen:
334
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
• If you chose Download Configuration, the Authentication dialog box
appears.
Complete the fields using the information in VPN Authentication Fields on
page 340 and click Next.
• The Security Methods dialog box appears.
1. To configure advanced security settings, click Show Advanced Settings.
Chapter 12: Working With VPNs
335
Adding and Editing VPN Sites
New fields appear.
2. Complete the fields using the information in Security Methods Fields on page
340 and click Next.
The Connect dialog box appears.
3. To try to connect to the Remote Access VPN Server, select the Try to Connect to
the VPN Gateway check box.
This allows you to test the VPN connection.
336
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
Warning: If you try to connect to the VPN site before completing the wizard, all
existing tunnels will be terminated.
4. Click Next.
• If you selected Try to Connect to the VPN Gateway, the following things
happen:
The Connecting… screen appears.
• The Contacting VPN Site screen appears.
• The Site Name dialog box appears.
5. Enter a name for the VPN site.
You may choose any name.
6. To keep the tunnel to the VPN site alive even if there is no network traffic
between the Safe@Office appliance and the VPN site, select Keep this site alive.
7. Click Next.
Chapter 12: Working With VPNs
337
Adding and Editing VPN Sites
• If you selected Keep this site alive, and previously you chose Download
Configuration, the "Keep Alive" Configuration dialog box appears.
Do the following:
1) Type up to three IP addresses which the Safe@Office appliance
should ping in order to keep the tunnel to the VPN site alive.
2) Click Next.
• The VPN Site Created screen appears.
8. Click Finish.
The VPN Sites page reappears. If you added a VPN site, the new site appears in
the VPN Sites list. If you edited a VPN site, the modifications are reflected in the
VPN Sites list.
338
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
Table 66: VPN Gateway Address Fields
In this field…
Do this…
Gateway Address
Type the IP address of the Site-to-Site VPN Gateway to which you want
to connect, as given to you by the network administrator.
Bypass NAT
Select this option to allow the VPN site to bypass NAT when connecting
to your internal network.
This option is selected by default.
Bypass the
Select this option to allow the VPN site to bypass the firewall and access
firewall
your internal network without restriction.
Table 67: Route Based VPN Fields
In this field…
Do this…
Tunnel Local IP
Type a local IP address for this end of the VPN tunnel.
Tunnel Remote IP
Type the IP address of the remote end of the VPN tunnel.
OSPF Cost
Type the cost of this link for dynamic routing purposes.
The default value is 10.
If OSPF is not enabled, this setting is not used. OSPF is enabled using
the Safe@Office command line interface (CLI). For information on using
CLI, see Controlling the Appliance via the Command Line on page
388. For information on the relevant commands for OSPF, refer to the
Embedded NGX CLI Reference Guide.
Chapter 12: Working With VPNs
339
Adding and Editing VPN Sites
Table 68: Authentication Methods Fields
In this field…
Do this…
Shared Secret
Select this option to use a shared secret for VPN authentication.
A shared secret is a string used to identify VPN sites to each other.
Certificate
Select this option to use a certificate for VPN authentication.
If you select this option, a certificate must have been installed. (Refer to
Installing a Certificate on page 348 for more information about
certificates and instructions on how to install a certificate.)
Table 69: VPN Authentication Fields
In this field…
Do this…
Topology User
Type the topology user’s user name.
Topology
Type the topology user’s password.
Password
Use Shared
Type the shared secret to use for secure communications with the VPN
Secret
site.
This shared secret is a string used to identify the VPN sites to each other.
The secret can contain spaces and special characters.
340
Check Point Safe@Office User Guide
Adding and Editing VPN Sites
Table 70: Security Methods Fields
In this field…
Do this…
Phase 1
Security Methods
Select the encryption and integrity algorithm to use for IKE negotiations:
•
Automatic. The Safe@Office appliance automatically selects
the best security methods supported by the site. This is the
default.
•
A specific algorithm
Diffie-Hellman
Select the Diffie-Hellman group to use:
group
•
Automatic. The Safe@Office appliance automatically selects a
group. This is the default.
•
A specific group
A group with more bits ensures a stronger key but lowers performance.
Renegotiate every
Type the interval in minutes between IKE Phase-1 key negotiations. This
is the IKE Phase-1 SA lifetime.
A shorter interval ensures higher security, but impacts heavily on
performance. Therefore, it is recommended to keep the SA lifetime
around its default value.
The default value is 1440 minutes (one day).
Phase 2
Security Methods
Select the encryption and integrity algorithm to use for VPN traffic:
•
Automatic. The Safe@Office appliance automatically selects
the best security methods supported by the site. This is the
default.
•
A specific algorithm
Chapter 12: Working With VPNs
341
Adding and Editing VPN Sites
In this field…
Do this…
Perfect Forward
Specify whether to enable Perfect Forward Secrecy (PFS), by selecting
Secrecy
one of the following:
•
Enabled. PFS is enabled. The Diffie-Hellman group field is
enabled.
•
Disabled. PFS is disabled. This is the default.
Enabling PFS will generate a new Diffie-Hellman key during IKE Phase 2
and renew the key for each key exchange.
PFS increases security but lowers performance. It is recommended to
enable PFS only in situations where extreme security is required.
Diffie-Hellman
Select the Diffie-Hellman group to use:
group
•
Automatic. The Safe@Office appliance automatically selects a
group. This is the default.
•
A specific group
A group with more bits ensures a stronger key but lowers performance.
Renegotiate every
Type the interval in seconds between IPSec SA key negotiations. This is
the IKE Phase-2 SA lifetime.
A shorter interval ensures higher security.
The default value is 3600 seconds (one hour).
342
Check Point Safe@Office User Guide
Deleting a VPN Site
Deleting a VPN Site
To delete a VPN site
1. Click VPN in the main menu, and click the VPN Sites tab.
The VPN Sites page appears, with a list of VPN sites.
2. In the desired VPN site’s row, click the Erase
icon.
A confirmation message appears.
3. Click OK.
The VPN site is deleted.
Enabling/Disabling a VPN Site
You can only connect to VPN sites that are enabled.
To enable/disable a VPN site
1. Click VPN in the main menu, and click the VPN Sites tab.
The VPN Sites page appears, with a list of VPN sites.
2. To enable a VPN site, do the following:
a. Click the
icon in the desired VPN site’s row.
A confirmation message appears.
b. Click OK.
The icon changes to
Chapter 12: Working With VPNs
, and the VPN site is enabled.
343
Logging on to a Remote Access VPN Site
3. To disable a VPN site, do the following:
Note: Disabling a VPN site eliminates the tunnel and erases the network topology.
a. Click the
icon in the desired VPN site’s row.
A confirmation message appears.
b. Click OK.
The icon changes to
, and the VPN site is disabled.
Logging on to a Remote Access VPN Site
You need to manually log on to Remote Access VPN Servers configured for
Manual Login. You do not need to manually log on to a Remote Access VPN
Server configured for Automatic Login or a Site-to-Site VPN Gateway: all the
computers on your network have constant access to it.
Manual Login can be done through either the Safe@Office Portal or the my.vpn
page. When you log on and traffic is sent to the VPN site, a VPN tunnel is
established. Only the computer from which you logged on can use the tunnel. To
share the tunnel with other computers in your home network, you must log on to
the VPN site from those computers, using the same user name and password.
Note: You must use a single user name and password for each VPN destination
gateway.
344
Check Point Safe@Office User Guide
Logging on to a Remote Access VPN Site
Logging on through the Safe@Office Portal
Note: You can only login to sites that are configured for Manual Login.
To manually log on to a VPN site through the Safe@Office Portal
1. Click VPN in the main menu, and click the VPN Login tab.
The VPN Login page appears.
2. From the Site Name list, select the site to which you want to log on.
Note: Disabled VPN sites will not appear in the Site Name list.
3. Type your user name and password in the appropriate fields.
4. Click Login.
Chapter 12: Working With VPNs
345
Logging on to a Remote Access VPN Site
• If the Safe@Office appliance is configured to automatically download the
network configuration, the Safe@Office appliance downloads the
network configuration.
• If when adding the VPN site you specified a network configuration, the
Safe@Office appliance attempts to create a tunnel to the VPN site.
• Once the Safe@Office appliance has finished connecting, the VPN Login
Status box appears. The Status field displays “Connected”.
• The VPN Login Status box remains open until you manually log off the
VPN site.
Logging on through the my.vpn page
Note: You don’t need to know the my.firewall page administrator’s password in order
to use the my.vpn page.
To manually log on to a VPN site through the my.vpn page
1. Direct your Web browser to http://my.vpn
346
Check Point Safe@Office User Guide
Logging on to a Remote Access VPN Site
The VPN Login screen appears.
2. In the Site Name list, select the site to which you want to log on.
3. Enter your user name and password in the appropriate fields.
4. Click Login.
• If the Safe@Office appliance is configured to automatically download the
network configuration, the Safe@Office appliance downloads the
network configuration.
• If when adding the VPN site you specified a network configuration, the
Safe@Office appliance attempts to create a tunnel to the VPN site.
• The VPN Login Status box appears. The Status field tracks the
connection’s progress.
• Once the Safe@Office appliance has finished connecting, the Status field
changes to “Connected”.
• The VPN Login Status box remains open until you manually log off of the
VPN site.
Chapter 12: Working With VPNs
347
Logging off a Remote Access VPN Site
Logging off a Remote Access VPN Site
You need to manually log off a VPN site, if it is a Remote Access VPN site
configured for Manual Login.
To log off a VPN site
• In the VPN Login Status box, click Logout.
All open tunnels from the Safe@Office appliance to the VPN site are closed,
and the VPN Login Status box closes.
Note: Closing the browser or dismissing the VPN Login Status box will also terminate
the VPN session within a short time.
Installing a Certificate
A digital certificate is a secure means of authenticating the Safe@Office appliance
to other Site-to-Site VPN Gateways. The certificate is issued by the Certificate
Authority (CA) to entities such as gateways, users, or computers. The entity then
uses the certificate to identify itself and provide verifiable information.
For instance, the certificate includes the Distinguished Name (DN) (identifying
information) of the entity, as well as the public key (information about itself). After
two entities exchange and validate each other's certificates, they can begin
encrypting information between themselves using the public keys in the
certificates.
The certificate also includes a fingerprint, a unique text used to identify the
certificate. You can email your certificate's fingerprint to the remote user. Upon
connecting to the Safe@Office VPN Server for the first time, the entity should
check that the VPN peer's fingerprint displayed in the SecuRemote VPN Client is
identical to the fingerprint received.
348
Check Point Safe@Office User Guide
Installing a Certificate
The Safe@Office appliance supports certificates encoded in the PKCS#12
(Personal Information Exchange Syntax Standard) format, and enables you to
install such certificates in the following ways:
• By generating a self-signed certificate.
See Generating a Self-Signed Certificate on page 349.
• By importing a certificate.
The PKCS#12 file you import must have a ".p12" file extension. If you do not
have such a PKCS#12 file, obtain one from your network security administrator.
See Importing a Certificate on page 353.
Note: To use certificates authentication, each Safe@Office appliance should have a
unique certificate. Do not use the same certificate for more than one gateway.
Note: If your Safe@Office appliance is centrally managed, a certificate is
automatically generated and downloaded to your appliance. In this case, there is no
need to generate a self-signed certificate.
Generating a Self-Signed Certificate
To generate a self-signed certificate
1. Click VPN in the main menu, and click the Certificate tab.
Chapter 12: Working With VPNs
349
Installing a Certificate
The Certificate page appears.
2. Click Install Certificate.
The Safe@Office Certificate Wizard opens, with the Certificate Wizard dialog box
displayed.
3. Click Generate a self-signed security certificate for this gateway.
350
Check Point Safe@Office User Guide
Installing a Certificate
The Create Self-Signed Certificate dialog box appears.
4. Complete the fields using the information in the table below.
5. Click Next.
The Safe@Office appliance generates the certificate. This may take a few
seconds.
The Done dialog box appears, displaying the certificate's details.
6. Click Finish.
Chapter 12: Working With VPNs
351
Installing a Certificate
The Safe@Office appliance installs the certificate. If a certificate is already
installed, it is overwritten.
The Certificate Wizard closes.
The Certificates page displays the following information:
• The gateway's certificate
• The gateway's name
• The gateway certificate's fingerprint
• The CA's certificate
• The name of the CA that issued the certificate (in this case, the
Safe@Office gateway)
• The CA certificate's fingerprint
• The starting and ending dates between which the gateway's certificate and
the CA's certificate are valid
352
Check Point Safe@Office User Guide
Installing a Certificate
Table 71: Certificate Fields
In this field…
Do this…
Country
Select your country from the drop-down list.
Organization
Type the name of your organization.
Name
Organizational Unit
Gateway Name
Type the name of your division.
Type the gateway's name. This name will appear on the certificate, and will
be visible to remote users inspecting the certificate.
This field is filled in automatically with the gateway's MAC address. If
desired, you can change this to a more descriptive name.
Valid Until
Use the drop-down lists to specify the month, day, and year when this
certificate should expire.
Note: You must renew the certificate when it expires.
Importing a Certificate
To install a certificate
1. Click VPN in the main menu, and click the Certificate tab.
The Certificate page appears.
2. Click Install Certificate.
The Safe@Office Certificate Wizard opens, with the Certificate Wizard dialog box
displayed.
3. Click Import a security certificate in PKCS#12 format.
Chapter 12: Working With VPNs
353
Installing a Certificate
The Import Certificate dialog box appears.
4. Click Browse to open a file browser from which to locate and select the file.
The filename that you selected is displayed.
5. Click Next.
The Import-Certificate Passphrase dialog box appears. This may take a few
moments.
6. Type the pass-phrase you received from the network security administrator.
354
Check Point Safe@Office User Guide
Uninstalling a Certificate
7. Click Next.
The Done dialog box appears, displaying the certificate's details.
8. Click Finish.
The Safe@Office appliance installs the certificate. If a certificate is already
installed, it is overwritten.
The Certificate Wizard closes.
The Certificates page displays the following information:
• The gateway's certificate
• The gateway's name
• The gateway certificate's fingerprint
• The CA's certificate
• The name of the CA that issued the certificate
• The CA certificate's fingerprint
• The starting and ending dates between which the gateway's certificate and
the CA's certificate are valid
Uninstalling a Certificate
If you uninstall the certificate, no certificate will exist on the Safe@Office
appliance, and you will not be able to connect to the VPN if a certificate is
required.
You cannot uninstall the certificate if there is a VPN site currently defined to use
certificate authentication.
Note: If you want to replace a currently-installed certificate, there is no need to
uninstall the certificate first. When you install the new certificate, the old certificate
will be overwritten.
Chapter 12: Working With VPNs
355
Viewing VPN Tunnels
To uninstall a certificate
1. Click VPN in the main menu, and click the Certificate tab.
The Certificate page appears with the name of the currently installed certificate.
2. Click Uninstall.
A confirmation message appears.
3. Click OK.
The certificate is uninstalled.
A success message appears.
4. Click OK.
Viewing VPN Tunnels
You can view a list of currently established VPN tunnels. VPN tunnels are created
and closed as follows:
• Remote Access VPN sites configured for Automatic Login and Site-to-Site
VPN Gateways
A tunnel is created whenever your computer attempts any kind of
communication with a computer at the VPN site. The tunnel is closed when not
in use for a period of time.
Note: Although the VPN tunnel is automatically closed, the site remains open, and if
you attempt to communicate with the site, the tunnel will be reestablished.
• Remote Access VPN sites configured for Manual Login
A tunnel is created whenever your computer attempts any kind of
communication with a computer at the VPN site, after you have manually
logged on to the site. All open tunnels connecting to the site are closed when
you manually log off.
356
Check Point Safe@Office User Guide
Viewing VPN Tunnels
To view VPN tunnels
1. Click Reports in the main menu, and click the VPN Tunnels tab.
The VPN Tunnels page appears with a table of open tunnels to VPN sites.
The VPN Tunnels page includes the information described in the table below.
2. To refresh the table, click Refresh.
Table 72: VPN Tunnels Page Fields
This field…
Displays…
Type
The currently active security protocol (IPSEC).
Source
The IP address or address range of the entity from which the tunnel
originates.
The entity's type is indicated by an icon. See VPN Tunnel Icons on page
358.
Chapter 12: Working With VPNs
357
Viewing VPN Tunnels
This field…
Displays…
Destination
The IP address or address range of the entity to which the tunnel is
connected.
The entity's type is indicated by an icon. See VPN Tunnel Icons on page
358.
Security
The type of encryption used to secure the connection, and the type of
Message Authentication Code (MAC) used to verify the integrity of the
message. This information is presented in the following format: Encryption
type/Authentication type
Note: All VPN settings are automatically negotiated between the two sites.
The encryption and authentication schemes used for the connection are the
strongest of those used at the two sites.
Your Safe@Office appliance supports AES, 3DES, and DES encryption
schemes, and MD5 and SHA authentication schemes.
Established
The time at which the tunnel was established.
This information is presented in the format hh:mm:ss, where:
hh=hours
mm=minutes
ss=seconds
Table 73: VPN Tunnels Icons
This icon…
Represents…
This gateway
358
Check Point Safe@Office User Guide
Viewing IKE Traces for VPN Connections
This icon…
Represents…
A network for which an IKE Phase-2 tunnel was negotiated
A Remote Access VPN Server
A Site-to-Site VPN Gateway
A remote access VPN user
Viewing IKE Traces for VPN Connections
If you are experiencing VPN connection problems, you can save a trace of IKE
(Internet Key Exchange) negotiations to a file, and then use the free IKE View tool
to view the file.
The IKE View tool is available for the Windows platform.
Note: Before viewing IKE traces, it is recommended to do the following:
•
The Safe@Office appliance stores traces for all recent IKE
negotiations. If you want to view only new IKE trace data, clear all IKE
trace data currently stored on the Safe@Office appliance.
•
Close all existing VPN tunnels except for the problematic tunnel, so as
to make it easier to locate the problematic tunnel's IKE negotiation
trace in the exported file.
To clear all currently-stored IKE traces
1. Click Reports in the main menu, and click the VPN Tunnels tab.
The VPN Tunnels page appears with a table of open tunnels to VPN sites.
2. Click Clear IKE Trace.
All IKE trace data currently stored on the Safe@Office appliance is cleared.
Chapter 12: Working With VPNs
359
Viewing IKE Traces for VPN Connections
To view the IKE trace for a connection
1. Establish a VPN tunnel to the VPN site with which you are experiencing
connection problems.
For information on when and how VPN tunnels are established, see Viewing
VPN Tunnels on page 356.
2. Click Reports in the main menu, and click the VPN Tunnels tab.
The VPN Tunnels page appears with a table of open tunnels to VPN sites.
3. Click Save IKE Trace.
A standard File Download dialog box appears.
4. Click Save.
The Save As dialog box appears.
5. Browse to a destination directory of your choice.
6. Type a name for the *.elg file and click Save.
The *.elg file is created and saved to the specified directory. This file contains
the IKE traces of all currently-established VPN tunnels.
7. Use the IKE View tool to open and view the *.elg file, or send the file to
technical support.
360
Check Point Safe@Office User Guide
Changing Your Password
Chapter 13
Managing Users
This chapter describes how to manage Safe@Office appliance users. You can
define multiple users, set their passwords, and assign them various permissions.
This chapter includes the following topics:
Changing Your Password .........................................................................361
Adding and Editing Users ........................................................................363
Adding Quick Guest HotSpot Users.........................................................367
Viewing and Deleting Users.....................................................................369
Setting Up Remote VPN Access for Users...............................................369
Using RADIUS Authentication ................................................................370
Configuring the RADIUS Vendor-Specific Attribute ..............................374
Changing Your Password
You can change your password at any time.
To change your password
1. Click Users in the main menu, and click the Internal Users tab.
Chapter 13: Managing Users
361
Changing Your Password
The Internal Users page appears.
2. In the row of your username, click Edit.
The Account Wizard opens displaying the Set User Details dialog box.
3. Edit the Password and Confirm password fields.
362
Check Point Safe@Office User Guide
Adding and Editing Users
Note: Use 5 to 25 characters (letters or numbers) for the new password.
4. Click Next.
The Set User Permissions dialog box appears.
5. Click Finish.
Your changes are saved.
Adding and Editing Users
This procedure explains how to add and edit users.
For information on quickly adding guest HotSpot users via a shortcut that the
Safe@Office appliance provides, see Adding Quick Guest HotSpot Users on page
367.
To add or edit a user
1. Click Users in the main menu, and click the Internal Users tab.
Chapter 13: Managing Users
363
Adding and Editing Users
The Internal Users page appears.
2. Do one of the following:
• To create a new user, click New User.
• To edit an existing user, click Edit next to the desire user.
The Account Wizard opens displaying the Set User Details dialog box.
3. Complete the fields using the information in Set User Details Fields on page
365.
4. Click Next.
364
Check Point Safe@Office User Guide
Adding and Editing Users
The Set User Permissions dialog box appears.
The options that appear on the page are dependant on the software and services
you are using.
5. Complete the fields using the information in Set User Permissions Fields on
page 366.
6. Click Finish.
The user is saved.
Table 74: Set User Details Fields
In this field…
Do this…
Username
Enter a username for the user.
Password
Enter a password for the user. Use five to 25 characters (letters or
numbers) for the new password.
Confirm Password
Re-enter the user’s password.
Chapter 13: Managing Users
365
Adding and Editing Users
In this field…
Do this…
Expires On
To specify an expiration time for the user, select this option and specify
the expiration date and time in the fields provided.
When the user account expires, it is locked, and the user can no longer
log on to the Safe@Office appliance.
If you do not select this option, the user will not expire.
Table 75: Set User Permissions Fields
In this field...
Do this...
Administrator Level
Select the user’s level of access to the Safe@Office Portal.
The levels are:
•
No Access: The user cannot access the Safe@Office Portal.
•
Read/Write: The user can log on to the Safe@Office Portal
and modify system settings.
•
Read Only: The user can log on to the Safe@Office Portal,
but cannot modify system settings or export the appliance
configuration via the Setup>Tools page. For example, you
could assign this administrator level to technical support
personnel who need to view the Event Log.
The default level is No Access.
The “admin” user’s Administrator Level (Read/Write) cannot be
changed.
VPN Remote
Select this option to allow the user to connect to this Safe@Office
Access
appliance using their VPN client.
For further information on setting up VPN remote access, see Setting
Up Remote VPN Access for Users on page 369.
366
Check Point Safe@Office User Guide
Adding Quick Guest HotSpot Users
Web Filtering
Select this option to allow the user to override Web Filtering.
Override
This option only appears if the Web Filtering service is defined.
This option cannot be changed for the “admin” user.
HotSpot Access
Select this option to allow the user to log on to the My HotSpot page.
For information on Secure HotSpot, see Configuring Secure HotSpot
on page 256.
This option only appears in Safe@Office 500 with Power Pack.
Adding Quick Guest HotSpot Users
The Safe@Office appliance provides a shortcut for quickly adding a guest HotSpot
user. This is useful in situations where you want to grant temporary network access
to guests, for example in an Internet café. The shortcut also enables printing the
guest user's details in one click.
By default, the quick guest user has the following characteristics:
• Username in the format guest, where  is a unique
three-digit number.
For example: guest123
• Randomly generated password
• Expires in 24 hours
• Administration Level: No Access
• Permissions: HotSpot Access only
For information on configuring Secure HotSpot, see Using Secure HotSpot on
page 256.
Chapter 13: Managing Users
367
Adding Quick Guest HotSpot Users
To quickly create a guest user
1. Click Users in the main menu, and click the Internal Users tab.
The Internal Users page appears.
2. Click Quick Guest.
The Account Wizard opens displaying the Save Quick Guest dialog box.
3. In the Expires field, click on the arrows to specify the expiration date and time.
4. To print the user details, click Print.
5. Click Finish.
The guest user is saved.
You can edit the guest user's details and permissions using the procedure
Adding and Editing Users on page 363.
368
Check Point Safe@Office User Guide
Viewing and Deleting Users
Viewing and Deleting Users
Note: The “admin” user cannot be deleted.
To view or delete users
1. Click Users in the main menu, and click the Internal Users tab.
The Internal Users page appears with a list of all users and their permissions.
The expiration time of expired users appears in red.
2. To delete a user, do the following:
a) In the desired user’s row, click the Erase
icon.
A confirmation message appears.
b) Click OK.
The user is deleted.
3. To delete all expired users, do the following:
a) Click Clear Expired.
A confirmation message appears.
b) Click OK.
The expired users are deleted.
Setting Up Remote VPN Access for Users
If you are using your Safe@Office appliance as a Remote Access VPN Server or as
an internal VPN Server, you can allow users to access it remotely through their
Chapter 13: Managing Users
369
Using RADIUS Authentication
Remote Access VPN Clients (a Check Point SecureClient, Check Point
SecuRemote, or another Embedded NGX appliance).
To set up remote VPN access for a user
1. Enable your VPN Server, using the procedure Setting Up Your Safe@Office
Appliance as a VPN Server on page 307.
2. Add or edit the user, using the procedure Adding and Editing Users on page
363.
You must select the VPN Remote Access option.
Using RADIUS Authentication
You can use Remote Authentication Dial-In User Service (RADIUS) to
authenticate both Safe@Office appliance users and Remote Access VPN Clients
trying to connect to the Safe@Office appliance.
Note: When RADIUS authentication is in use, Remote Access VPN Clients must
have a certificate.
When a user tries to log on to the Safe@Office Portal, the Safe@Office appliance
sends the entered user name and password to the RADIUS server. The server then
checks whether the RADIUS database contains a matching user name and
password pair. If so, then the user is logged on.
By default, all RADIUS-authenticated users are assigned the set of permissions
specified in the Safe@Office Portal's RADIUS page. However, you can configure
the RADIUS server to pass the Safe@Office appliance a specific set of permissions
to grant the authenticated user, instead of these default permissions. This is done by
configuring the RADIUS Vendor-Specific Attribute (VSA) with a set of attributes
containing permission information for specific users. If the VSA is configured for a
user, then the RADIUS server passes the VSA to the Embedded NGX gateway as
part of the response to the authentication request, and the gateway assigns the user
permissions as specified in the VSA. If the VSA is not returned by the RADIUS
370
Check Point Safe@Office User Guide
Using RADIUS Authentication
server for a specific user, the gateway will use the default permission set for this
user.
To use RADIUS authentication
1. Click Users in the main menu, and click the RADIUS tab.
The RADIUS page appears.
2. Complete the fields using the table below.
3. Click Apply.
4. To restore the default RADIUS settings, do the following:
a) Click Default.
Chapter 13: Managing Users
371
Using RADIUS Authentication
A confirmation message appears.
b) Click OK.
The RADIUS settings are reset to their defaults. For information on the
default values, refer to the table below.
5. To use the RADIUS VSA to assign permissions to users, configure the VSA.
See Configuring the RADIUS Vendor-Specific Attribute on page 374.
Table 76: RADIUS Page Fields
In this field…
Do this…
Primary/Secondary
Configure the primary and secondary RADIUS servers.
RADIUS Server
By default, the Safe@Office appliance sends a request to the primary
RADIUS server first. If the primary RADIUS server does not respond
after three attempts, the Safe@Office appliance will send the request to
the secondary RADIUS server.
Address
Type the IP address of the computer that will run the RADIUS service
(one of your network computers) or click the corresponding This
Computer button to allow your computer to host the service.
To clear the text box, click Clear.
Port
Type the port number on the RADIUS server’s host computer.
The default port number is 1812.
Shared Secret
Type the shared secret to use for secure communication with the
RADIUS server.
372
Check Point Safe@Office User Guide
Using RADIUS Authentication
In this field…
Do this…
Realm
If your organization uses RADIUS realms, type the realm to append to
RADIUS requests. The realm will be appended to the username as
follows: @
For example, if you set the realm to “myrealm”, and the user "JohnS"
attempts to log on to the Safe@Office Portal, the Safe@Office
appliance will send the RADIUS server an authentication request with
the username “JohnS@myrealm”.
This field is optional.
Timeout
Type the interval of time in seconds between attempts to communicate
with the RADIUS server.
The default value is 3 seconds.
RADIUS User
If the RADIUS VSA (Vendor-Specific Attribute) is configured for a user,
Permissions
the fields in this area will have no effect, and the user will be granted
the permissions specified in the VSA.
If the VSA is not configured for the user, the permissions configured in
this area will be used.
Administrator Level
Select the level of access to the Safe@Office Portal to assign to all
users authenticated by the RADIUS server.
The levels are:
•
No Access: The user cannot access the Safe@Office Portal
•
Read/Write: The user can log on to the Safe@Office Portal
and modify system settings.
•
Read Only: The user can log on to the Safe@Office Portal,
but cannot modify system settings.
The default level is No Access.
Chapter 13: Managing Users
373
Configuring the RADIUS Vendor-Specific Attribute
In this field…
Do this…
Web Filtering
Select this option to allow all users authenticated by the RADIUS server
Override
to override Web Filtering.
This option only appears if the Web Filtering service is defined.
HotSpot Access
Select this option to allow the user to access the My HotSpot page.
This option only appears in Safe@Office 500 with Power Pack.
Configuring the RADIUS Vendor-Specific Attribute
For detailed instructions and examples, refer to the "Configuring the RADIUS
Vendor-Specific Attribute" white paper.
To assign permissions to specific RADIUS-authenticated users
1. Create a remote access policy as follows:
a) Assign the policy’s VSA (attribute 26) the SofaWare vendor code
(6983).
b) For each permission you want to grant, configure the relevant attribute
of the VSA with the desired value, as described in the table below.
For example, to assign the user VPN access permissions, set attribute number 2
to “true”.
2. Assign the policy to the desired user or user group.
374
Check Point Safe@Office User Guide
Configuring the RADIUS Vendor-Specific Attribute
Table 77: VSA Syntax
Permission
Description
Attribute
Number
Attribute
Format
Attribute Values
Admin
Indicates the
String
none. The user
administrator’s
cannot access the
level of access to
Safe@Office
the Embedded
Portal.
NGX Portal
Notes
readonly. The user
can log on to the
Safe@Office
Portal, but cannot
modify system
settings.
readwrite. The user
can log on to the
Safe@Office
Portal and modify
system settings.
VPN
true. The user can
This permission
the user can
remotely access
is only relevant if
access the
the network via
the Safe@Office
network from a
VPN.
Remote Access
Indicates whether
Remote Access
VPN Client.
String
false. The user
cannot remotely
access the
network via VPN.
Chapter 13: Managing Users
VPN Server is
enabled. The
gateway must
have a
certificate.
375
Configuring the RADIUS Vendor-Specific Attribute
Permission
Description
Attribute
Number
Attribute
Format
Attribute Values
Notes
Hotspot
Indicates whether
String
true. The user can
This permission
the user can log
access the Internet
is only relevant if
on via the My
via My HotSpot.
the Secure
HotSpot page.
false. The user
HotSpot feature
is enabled.
cannot access the
Internet via My
HotSpot.
UFP
true. The user can
This permission is
the user can
override Web
only relevant if
override Web
Filtering.
the Web Filtering
Indicates whether
Filtering.
String
false. The user
service is
enabled.
cannot override
Web Filtering.
376
Check Point Safe@Office User Guide
Viewing Firmware Status
Chapter 14
Maintenance
This chapter describes the tasks required for maintenance and diagnosis of your
Safe@Office appliance.
This chapter includes the following topics:
Viewing Firmware Status .........................................................................377
Updating the Firmware.............................................................................379
Upgrading Your Software Product ...........................................................381
Registering Your Safe@Office Appliance ...............................................385
Configuring Syslog Logging ....................................................................386
Controlling the Appliance via the Command Line ...................................388
Configuring HTTPS .................................................................................392
Configuring SSH ......................................................................................394
Configuring SNMP...................................................................................396
Setting the Time on the Appliance ...........................................................399
Using Diagnostic Tools ............................................................................403
Backing Up the Safe@Office Appliance Configuration...........................417
Resetting the Safe@Office Appliance to Defaults ...................................420
Running Diagnostics ................................................................................423
Rebooting the Safe@Office Appliance ....................................................424
Viewing Firmware Status
The firmware is the software program embedded in the Safe@Office appliance.
You can view your current firmware version and additional details.
Chapter 14: Maintenance
377
Viewing Firmware Status
To view the firmware status
• Click Setup in the main menu, and click the Firmware tab.
The Firmware page appears.
The Firmware page displays the following information:
Table 78: Firmware Status Fields
This field…
Displays…
For example…
WAN MAC Address
The MAC address used for
00:80:11:22:33:44
the Internet connection
Firmware Version
The current version of the
6.0
firmware
Installed Product
The licensed software and
Safe@Office 500 unlimited nodes
the number of allowed
nodes
378
Check Point Safe@Office User Guide
Updating the Firmware
This field…
Displays…
For example…
Uptime
The time that elapsed from
01:21:15
the moment the unit was
turned on
Hardware Type
The type of the current
Sbox-500
Safe@Office appliance
hardware
Hardware Version
The current hardware
1.0
version of the Safe@Office
appliance
Updating the Firmware
If you are subscribed to Software Updates, firmware updates are performed
automatically. These updates include new product features and protection against
new security threats. Check with your reseller for the availability of Software
Updates and other services. For information on subscribing to services, see
Connecting to a Service Center on page 281.
If you are not subscribed to the Software Updates service, you must update your
firmware manually.
To update your Safe@Office firmware manually
1. Click Setup in the main menu, and click the Firmware tab.
The Firmware page appears.
2. Click Firmware Update.
Chapter 14: Maintenance
379
Updating the Firmware
The Firmware Update page appears.
3. Click Browse.
A browse window appears.
4. Select the image file and click Open.
The Firmware Update page reappears. The path to the firmware update image file
appears in the Browse text box.
5. Click Upload.
Your Safe@Office appliance firmware is updated.
Updating may take a few minutes, during which time the PWR/SEC LED may
start flashing red or orange. Do not power off the appliance.
At the end of the process the Safe@Office appliance restarts automatically.
380
Check Point Safe@Office User Guide
Upgrading Your Software Product
Upgrading Your Software Product
You can upgrade your Safe@Office 500 appliance by adding the Safe@Office 500
Power Pack. After purchasing the Power Pack, you will receive a new Product Key
that enables you to use the Power Pack on the same Safe@Office appliance you
have today. There is no need to replace your hardware. You can also purchase node
upgrades, as needed.
Note: To purchase the Power Pack or node upgrades, contact your Safe@Office
appliance provider.
To upgrade your product, you must install the new Product Key.
To install a Product Key
1. Click Setup in the main menu, and click the Firmware tab.
The Firmware page appears.
2. Click Upgrade Product.
Chapter 14: Maintenance
381
Upgrading Your Software Product
The Safe@Office Licensing Wizard opens, with the Install Product Key dialog box
displayed.
3. Click Enter a different Product Key.
4. In the Product Key field, enter the new Product Key.
5. Click Next.
The Installed New Product Key dialog box appears.
6. Click Next.
382
Check Point Safe@Office User Guide
Upgrading Your Software Product
The first Registration dialog box appears.
7. Do one of the following:
• To register your Safe@Office appliance later on, clear the I want to
register my product check box and then click Next.
• To register your Safe@Office appliance now, do the following:
1) Click Next.
Chapter 14: Maintenance
383
Upgrading Your Software Product
A second Registration dialog box appears.
2) Enter your contact information in the appropriate fields.
3) To receive email notifications regarding new firmware versions
and services, select the check box.
4) Click Next.
The Registration… screen appears.
The third Registration dialog box appears.
384
Check Point Safe@Office User Guide
Registering Your Safe@Office Appliance
8. Click Finish.
Your Safe@Office appliance is restarted and the Welcome page appears.
Registering Your Safe@Office Appliance
If you want to activate your warranty and optionally receive notifications of new
firmware versions and services, you must register your Safe@Office appliance.
Privacy Statement: Check Point is committed to protecting your privacy. We use
the information we collect about you to process orders and to improve our ability to
serve your needs. We will under no circumstances sell, lease, or otherwise disclose
any of your personal or contact details without your explicit permission.
To register your Safe@Office appliance
1. Click Setup in the main menu, and click the Firmware tab.
The Firmware page appears.
2. Click Upgrade Product.
The Safe@Office Licensing Wizard opens, with the Install Product Key dialog box
displayed.
3. Select Keep these settings.
4. Click Next.
The first Registration dialog box appears.
5. Verify that the I want to register my product check box is selected.
6. Click Next.
A second Registration dialog box appears.
7. Enter your contact information in the appropriate fields.
8. To receive email notifications regarding new firmware versions and services,
select the check box.
Chapter 14: Maintenance
385
Configuring Syslog Logging
9. Click Next.
The Registration… screen appears.
The third Registration dialog box appears.
10.
Click Finish.
Your Safe@Office appliance is restarted and the Welcome page appears.
Configuring Syslog Logging
You can configure the Safe@Office appliance to send event logs to a Syslog server
residing in your internal network or on the Internet. The logs detail the date and the
time each event occurred. If the event is a communication attempt that was rejected
by the firewall, the event details include the source and destination IP address, the
destination port, and the protocol used for the communication attempt (for
example, TCP or UDP).
This same information is also available in the Event Log page (see Viewing the
Event Log on page 187). However, while the Event Log can display hundreds of
logs, a Syslog server can store an unlimited number of logs. Furthermore, Syslog
servers can provide useful tools for managing your logs.
Note: Kiwi Syslog Daemon is freeware and can be downloaded from
http://www.kiwisyslog.com. For technical support, contact Kiwi Enterprises.
To configure Syslog logging
1. Click Setup in the main menu, and click the Logging tab.
386
Check Point Safe@Office User Guide
Configuring Syslog Logging
The Logging page appears.
2. Complete the fields using the information in the table below.
3. Click Apply.
Table 79: Logging Page Fields
In this field…
Do this…
Syslog Server
Type the IP address of the computer that will run the Syslog service
(one of your network computers), or click This Computer to allow your
computer to host the service.
Clear
Click to clear the Syslog Server field.
Syslog Port
Type the port number of the Syslog server.
Default
Click to reset the Syslog Port field to the default (port 514 UDP).
Chapter 14: Maintenance
387
Controlling the Appliance via the Command Line
Controlling the Appliance via the Command Line
Depending on your Safe@Office model, you can control your appliance via the
command line in the following ways:
• Using the Safe@Office Portal's command line interface.
See Using the Safe@Office Portal on page 388.
• Using a console connected to the Safe@Office appliance.
For information, see Using the Serial Console on page 390.
• Using an SSH client.
See Configuring SSH on page 394.
Using the Safe@Office Portal
You can control your appliance via the Safe@Office Portal's command line
interface.
To control the appliance via the Safe@Office Portal
1. Click Setup in the main menu, and click the Tools tab.
388
Check Point Safe@Office User Guide
Controlling the Appliance via the Command Line
The Tools page appears.
2. Click Command.
The Command Line page appears.
Chapter 14: Maintenance
389
Controlling the Appliance via the Command Line
3. In the upper field, type a command.
You can view a list of supported commands using the command help.
For information on all commands, refer to the Embedded NGX CLI Reference
Guide.
4. Click Go.
The command is implemented.
Using the Serial Console
You can connect a console to the Safe@Office appliance, and use the console to
control the appliance via the command line.
Note: Your terminal emulation software must be set to 57600 bps, N-8-1.
To control the appliance via a console
1. Connect the serial console to your Safe@Office appliance's serial port, using an
RS-232 Null modem cable.
For information on locating the serial port, see Rear Panel.
2. Click Network in the main menu, and click the Ports tab.
390
Check Point Safe@Office User Guide
Controlling the Appliance via the Command Line
The Ports page appears.
3. In the RS232 drop-down list, select Console.
4. Click Apply.
You can now control the Safe@Office appliance from the serial console.
For information on all supported commands, refer to the Embedded NGX CLI
Reference Guide.
Chapter 14: Maintenance
391
Configuring HTTPS
Configuring HTTPS
You can enable Safe@Office appliance users to access the Safe@Office Portal
from the Internet. To do so, you must first configure HTTPS.
To configure HTTPS
1. Click Setup in the main menu, and click the Management tab.
The Management page appears.
2. Specify from where HTTPS access to the Safe@Office Portal should be granted.
See Access Options on page 393 for information.
Warning: If remote HTTPS is enabled, your Safe@Office appliance settings can be
changed remotely, so it is especially important to make sure all Safe@Office
appliance users’ passwords are difficult to guess.
392
Check Point Safe@Office User Guide
Configuring HTTPS
Note: You can use HTTPS to access the Safe@Office Portal from your internal
network, by surfing to https://my.firewall.
If you selected IP Address Range, additional fields appear.
3. If you selected IP Address Range, enter the desired IP address range in the fields
provided.
4. Click Apply.
The HTTPS configuration is saved. If you configured remote HTTPS, you can
now access the Safe@Office Portal through the Internet, using the procedure
Accessing the Safe@Office Portal Remotely on page 44.
Table 80: Access Options
Select this
To allow access from…
Internal Network
The internal network only.
option…
This disables remote access capability.
Chapter 14: Maintenance
393
Configuring SSH
Select this
To allow access from…
Internal Network and
The internal network and your VPN.
option…
VPN
IP Address Range
A particular range of IP addresses.
Additional fields appear, in which you can enter the desired IP address
range.
ANY
Any IP address.
Disabled
Nowhere.
This completely disables access. This option is only available for
SNMP.
Configuring SSH
Safe@Office appliance users can control the appliance via the command line, using
the SSH (Secure Shell) management protocol. You can enable users to do so via
the Internet, by configuring remote SSH access. You can also integrate the
Safe@Office appliance with SSH-based management systems.
Note: The Safe@Office appliance supports SSHv2 clients only. The SSHv1 protocol
contains security vulnerabilities and is not supported.
To configure SSH
1. Click Setup in the main menu, and click the Management tab.
The Management page appears.
2. Specify from where SSH access should be granted.
394
Check Point Safe@Office User Guide
Configuring SSH
See Access Options on page 393 for information.
Warning: If remote SSH is enabled, your Safe@Office appliance settings can be
changed remotely, so it is especially important to make sure all Safe@Office
appliance users’ passwords are difficult to guess.
If you selected IP Address Range, additional fields appear.
3. If you selected IP Address Range, enter the desired IP address range in the fields
provided.
4. Click Apply.
The SSH configuration is saved. If you configured remote SSH access, you can
now control the Safe@Office appliance from the Internet, using an SSHv2
client.
For information on all supported commands, refer to the Embedded NGX CLI
Reference Guide.
Chapter 14: Maintenance
395
Configuring SNMP
Configuring SNMP
The Safe@Office appliance users can monitor the Safe@Office appliance, using
tools that support SNMP (Simple Network Management Protocol). You can enable
users can do so via the Internet, by configuring remote SNMP access.
The Safe@Office appliance supports the following SNMP MIBs:
• SNMPv2-MIB
• RFC1213-MIB
• IF-MIB
• IP-MIB
All SNMP access is read-only.
To configure SNMP
1. Click Setup in the main menu, and click the Management tab.
The Management page appears.
2. Specify from where SNMP access should be granted.
See Access Options on page 393 for information.
If you selected IP Address Range, additional fields appear.
396
Check Point Safe@Office User Guide
Configuring SNMP
The Community field and the Advanced link are enabled.
3. If you selected IP Address Range, enter the desired IP address range in the fields
provided.
4. In the Community field, type the name of the SNMP community string.
SNMP clients uses the SNMP community string as a password, when
connecting to the Safe@Office appliance.
The default value is "public". It is recommended to change this string.
5. To configure advanced SNMP settings, click Advanced.
Chapter 14: Maintenance
397
Configuring SNMP
The SNMP Configuration page appears.
6. Complete the fields using the table below.
7. Click Apply.
The SNMP configuration is saved.
8. Configure the SNMP clients with the SNMP community string.
Table 81: Advanced SNMP Settings
In this field...
Do this…
System Location
Type a description of the appliance's location.
This information will be visible to SNMP clients, and is useful for
administrative purposes.
System Contact
Type the name of the contact person.
This information will be visible to SNMP clients, and is useful for
administrative purposes.
398
Check Point Safe@Office User Guide
Setting the Time on the Appliance
In this field...
Do this…
SNMP Port
Type the port to use for SNMP.
The default port is 161.
Setting the Time on the Appliance
You set the time displayed in the Safe@Office Portal during initial appliance setup.
If desired, you can change the date and time using the procedure below.
To set the time
1. Click Setup in the main menu, and click the Tools tab.
The Tools page appears.
2. Click Set Time.
The Safe@Office Set Time Wizard opens displaying the Set the Safe@Office Time
dialog box.
Chapter 14: Maintenance
399
Setting the Time on the Appliance
3. Complete the fields using the information in Set Time Wizard Fields on page
402.
4. Click Next.
The following things happen in the order below:
• If you selected Specify date and time, the Specify Date and Time dialog
box appears.
Set the date, time, and time zone in the fields provided, then click Next.
400
Check Point Safe@Office User Guide
Setting the Time on the Appliance
• If you selected Use a Time Server, the Time Servers dialog box appears.
Complete the fields using the information in Time Servers Fields on page
402, then click Next.
• The Date and Time Updated screen appears.
5. Click Finish.
Chapter 14: Maintenance
401
Setting the Time on the Appliance
Table 82: Set Time Wizard Fields
Select this option…
To do the following…
Your computer's clock
Set the appliance time to your computer’s system time.
Your computer’s system time is displayed to the right of this
option.
Keep the current time
Do not change the appliance’s time.
The current appliance time is displayed to the right of this option.
Use a Time Server
Synchronize the appliance time with a Network Time Protocol
(NTP) server.
Specify date and time
Set the appliance to a specific date and time.
Table 83: Time Servers Fields
In this field…
Do this…
Primary Server
Type the IP address of the Primary NTP server.
Secondary Server
Type the IP address of the Secondary NTP server.
This field is optional.
Clear
Clear the field.
Select your time zone
Select the time zone in which you are located.
402
Check Point Safe@Office User Guide
Using Diagnostic Tools
Using Diagnostic Tools
The Safe@Office appliance is equipped with a set of diagnostic tools that are
useful for troubleshooting Internet connectivity.
Table 84: Diagnostic Tools
Use this
tool…
Ping
To do this…
For information, see...
Check that a specific IP address or DNS
Using IP Tools on page 404
name can be reached via the Internet.
Traceroute
Display a list of all routers used to
Using IP Tools on page 404
connect from the Safe@Office appliance
to a specific IP address or DNS name.
WHOIS
Display the name and contact information
Using IP Tools on page 404
of the entity to which a specific IP address
or DNS name is registered. This
information is useful in tracking down
hackers.
Packet Sniffer
Capture network traffic. This information is
Using Packet Sniffer on page
useful troubleshooting network problems.
406
Chapter 14: Maintenance
403
Using Diagnostic Tools
Using IP Tools
To use an IP tool
1. Click Setup in the main menu, and click the Tools tab.
The Tools page appears.
2. In the IP Tools drop-down list, select the desired tool.
3. In the Address field, type the IP address or DNS name for which to run the tool.
4. Click Go.
• If you selected Ping, the following things happen:
The Safe@Office appliance sends packets to the specified the IP address or
DNS name.
The IP Tools window opens and displays the percentage of packet loss and
the amount of time it each packet took to reach the specified host and return
(round-trip) in milliseconds.
• If you selected Traceroute, the following things happen:
The Safe@Office appliance connects to the specified IP address or DNS
name.
404
Check Point Safe@Office User Guide
Using Diagnostic Tools
The IP Tools window opens and displays a list of routers used to make the
connection.
• If you selected WHOIS, the following things happen:
The Safe@Office appliance queries the Internet WHOIS server.
A window displays the name of the entity to which the IP address or DNS
name is registered and their contact information.
Chapter 14: Maintenance
405
Using Diagnostic Tools
Using Packet Sniffer
The Safe@Office appliance includes the Packet Sniffer tool, which enables you to
capture packets from any internal network or Safe@Office port. This is useful for
troubleshooting network problems and for collecting data about network behavior.
The Safe@Office appliance saves the captured packets to a file on your computer.
You can use a free protocol analyzer, such as Ethereal, to analyze the file, or you
can send it to technical support. Ethereal runs on all popular computing platforms
and can be downloaded from http://www.ethereal.com.
To use Packet Sniffer
1. Click Setup in the main menu, and click the Tools tab.
The Tools page appears.
2. Click Sniffer.
The Packet Sniffer window opens.
3. Complete the fields using the information in the table below.
4. Click Start.
406
Check Point Safe@Office User Guide
Using Diagnostic Tools
The Packet Sniffer window displays the name of the interface, the number of
packets collected, and the percentage of storage space remaining on the
appliance for storing the packets.
5. Click Stop to stop collecting packets.
A standard File Download dialog box appears.
6. Click Save.
The Save As dialog box appears.
7. Browse to a destination directory of your choice.
8. Type a name for the configuration file and click Save.
The *.cap file is created and saved to the specified directory.
9. Click Cancel to close the Packet Sniffer window.
Chapter 14: Maintenance
407
Using Diagnostic Tools
Table 85: Packet Sniffer Fields
In this field…
Do this…
Interface
Select the interface from which to collect packets.
The list includes the primary Internet connection, the Safe@Office
appliance ports, and all defined networks.
Filter String
Type the filter string to use for filtering the captured packets. Only
packets that match the filter condition will be saved.
For a list of basic filter strings elements, see Filter String Syntax on
page 409.
For detailed information on filter syntax, go to
http://www.tcpdump.org/tcpdump_man.html.
Note: Do not enclose the filter string in quotation marks.
If you do not specify a filter string, Packet Sniffer will save all packets on
the selected interface.
Capture only traffic
Select this option to capture incoming and outgoing packets for this
to/from this gateway
gateway only.
If this option is not selected, Packet Sniffer will collect packets for all
traffic on the interface.
408
Check Point Safe@Office User Guide
Using Diagnostic Tools
Filter String Syntax
The following represents a list of basic filter string elements:
• and on page 409
• dst on page 410
• dst port on page 410
• ether proto on page 411
• host on page 412
• not on page 412
• or on page 413
• port on page 413
• src on page 414
• src port on page 414
• tcp on page 415
• udp on page 416
For detailed information on filter syntax, refer to http://www.tcpdump.org.
and
PURPOSE
The and element is used to concatenate filter string elements. The filtered packets
must match all concatenated filter string elements.
SYNTAX
element and element [and element...]
element && element [&& element...]
Chapter 14: Maintenance
409
Using Diagnostic Tools
PARAMETERS
element
String. A filter string element.
EXAMPLE
The following filter string saves packets that both originate from IP address is
192.168.10.1 and are destined for port 80:
src 192.168.10.1 and dst port 80
dst
PURPOSE
The dst element captures all packets with a specific destination.
SYNTAX
dst destination
PARAMETERS
destination
IP Address or String. The computer to which the packet is
sent. This can be the following:
•
An IP address
•
A host name
EXAMPLE
The following filter string saves packets that are destined for the IP address
192.168.10.1:
dst 192.168.10.1
dst port
PURPOSE
The dst port element captures all packets destined for a specific port.
SYNTAX
dst port port
410
Check Point Safe@Office User Guide
Using Diagnostic Tools
Note: This element can be prepended by tcp or udp. For information, see tcp on
page 415 and udp on page 416.
PARAMETERS
port
Integer. The port to which the packet is sent.
EXAMPLE
The following filter string saves packets that are destined for port 80:
dst port 80
ether proto
PURPOSE
The ether proto element is used to capture packets of a specific ether protocol
type.
SYNTAX
ether proto \protocol
PARAMETERS
protocol
String. The protocol type of the packet.
This can be the following: ip,
ip6, arp, rarp,
atalk, aarp, dec net, sca, lat,
mopdl, moprc, iso, stp, ipx, or
netbeui.
EXAMPLE
The following filter string saves ARP packets:
ether proto arp
Chapter 14: Maintenance
411
Using Diagnostic Tools
host
PURPOSE
The host element captures all incoming and outgoing packets for a specific
computer.
SYNTAX
host host
PARAMETERS
host
IP Address or String. The computer to/from which the packet
is sent. This can be the following:
•
An IP address
•
A host name
EXAMPLE
The following filter string saves all packets that either originated from IP address
192.168.10.1, or are destined for that same IP address:
host 192.168.10.1
not
PURPOSE
The not element is used to negate filter string elements.
SYNTAX
not element
! element
PARAMETERS
element
412
String. A filter string element.
Check Point Safe@Office User Guide
Using Diagnostic Tools
EXAMPLE
The following filter string saves packets that are not destined for port 80:
not dst port 80
or
PURPOSE
The or element is used to alternate between string elements. The filtered packets
must match at least one of the filter string elements.
SYNTAX
element or element [or element...]
element || element [|| element...]
PARAMETERS
element
String. A filter string element.
EXAMPLE
The following filter string saves packets that either originate from IP address
192.168.10.1 or IP address 192.168.10.10:
src 192.168.10.1 or src 192.168.10.10
port
PURPOSE
The port element captures all packets originating from or destined for a specific
port.
SYNTAX
port port
Note: This element can be prepended by tcp or udp. For information, see tcp on
page 415 and udp on page 416.
Chapter 14: Maintenance
413
Using Diagnostic Tools
PARAMETERS
port
Integer. The port from/to which the packet is sent.
EXAMPLE
The following filter string saves all packets that either originated from port 80, or
are destined for port 80:
port 80
src
PURPOSE
The src element captures all packets with a specific source.
SYNTAX
src source
PARAMETERS
source
IP Address or String. The computer from which the packet is
sent. This can be the following:
•
An IP address
•
A host name
EXAMPLE
The following filter string saves packets that originated from IP address
192.168.10.1:
src 192.168.10.1
src port
PURPOSE
The src port element captures all packets originating from a specific port.
SYNTAX
src port port
414
Check Point Safe@Office User Guide
Using Diagnostic Tools
Note: This element can be prepended by tcp or udp. For information, see tcp on
page 415 and udp on page 416.
PARAMETERS
port
Integer. The port to which the packet is sent.
EXAMPLE
The following filter string saves packets that originated from port 80:
src port 80
tcp
PURPOSE
The tcp element captures all TCP packets. This element can be prepended to portrelated elements.
Note: When not prepended to other elements, the tcp element is the equivalent of
ip proto tcp.
SYNTAX
tcp
tcp element
PARAMETERS
element
String. A port-related filter string element that should be
restricted to saving only TCP packets. This can be the
following:
Chapter 14: Maintenance
•
dst port - Capture all TCP packets destined
for a specific port.
•
port - Captures all TCP packets originating
from or destined for a specific port.
•
src port - Capture all TCP packets originating
from a specific port.
415
Using Diagnostic Tools
EXAMPLE 1
The following filter string captures all TCP packets:
tcp
EXAMPLE 2
The following filter string captures all TCP packets destined for port 80:
tcp dst port 80
udp
PURPOSE
The udp element captures all UDP packets. This element can be prepended to portrelated elements.
Note: When not prepended to other elements, the udp element is the equivalent of
ip proto udp.
SYNTAX
udp
udp element
PARAMETERS
element
String. A port-related filter string element that should be
restricted to saving only UDP packets. This can be the
following:
•
dst port - Capture all UDP packets destined
for a specific port.
•
port - Captures all UDP packets originating
from or destined for a specific port.
•
src port - Capture all UDP packets
originating from a specific port.
EXAMPLE 1
The following filter string captures all UDP packets:
416
Check Point Safe@Office User Guide
Backing Up the Safe@Office Appliance Configuration
udp
EXAMPLE 2
The following filter string captures all UDP packets destined for port 80:
udp dst port 80
Backing Up the Safe@Office Appliance
Configuration
You can export the Safe@Office appliance configuration to a *.cfg file, and use
this file to backup and restore Safe@Office appliance settings, as needed. The file
includes all your settings.
The configuration file is saved as a textual CLI script. If desired, you can edit the
file. For a full explanation of the CLI script format and the supported CLI
commands, see the Embedded NGX CLI Reference Guide.
Exporting the Safe@Office Appliance Configuration
Exporting the Safe@Office appliance configuration creates a configuration file.
To export the Safe@Office appliance configuration
1. Click Setup in the main menu, and click the Tools tab.
The Tools page appears.
2. Click Export.
A standard File Download dialog box appears.
3. Click Save.
The Save As dialog box appears.
Chapter 14: Maintenance
417
Backing Up the Safe@Office Appliance Configuration
4. Browse to a destination directory of your choice.
5. Type a name for the configuration file and click Save.
The *.cfg configuration file is created and saved to the specified directory.
Importing the Safe@Office Appliance Configuration
In order to restore your Safe@Office appliance’s configuration from a
configuration file, you must import the file.
To import the Safe@Office appliance configuration
1. Click Setup in the main menu, and click the Tools tab.
The Tools page appears.
2. Click Import.
The Import Settings page appears.
3. Do one of the following:
418
Check Point Safe@Office User Guide
Backing Up the Safe@Office Appliance Configuration
• In the Import Settings field, type the full path to the configuration file.
Or
• Click Browse, and browse to the configuration file.
4. Click Upload.
A confirmation message appears.
5. Click OK.
The Safe@Office appliance settings are imported.
The Import Settings page displays the configuration file's content and the result
of implementing each configuration command.
Note: If the appliance's IP address changed as a result of the configuration import,
your computer may be disconnected from the network; therefore you may not be
able to see the results.
Chapter 14: Maintenance
419
Resetting the Safe@Office Appliance to Defaults
Resetting the Safe@Office Appliance to Defaults
You can reset the Safe@Office appliance to its default settings. When you reset
your Safe@Office appliance, it reverts to the state it was originally in when you
purchased it. You can choose to keep the current firmware or to revert to the
firmware version that shipped with the Safe@Office appliance.
Warning: This operation erases all your settings and password information. You will
have to set a new password and reconfigure your Safe@Office appliance for Internet
connection. For information on performing these tasks, see Setting Up the
Safe@Office Appliance.
You can reset the Safe@Office appliance to defaults via the Web management
interface (software) or by manually pressing the Reset button (hardware) located at
the back of the Safe@Office appliance.
To reset the Safe@Office appliance to factory defaults via the Web interface
1. Click Setup in the main menu, and click the Tools tab.
The Tools page appears.
2. Click Factory Settings.
420
Check Point Safe@Office User Guide
Resetting the Safe@Office Appliance to Defaults
A confirmation message appears.
3. To revert to the firmware version that shipped with the appliance, select the
check box.
4. Click OK.
• The Please Wait screen appears.
• The Safe@Office appliance returns to its factory defaults.
• The Safe@Office appliance is restarted (the PWR/SEC LED flashes
quickly).
This may take a few minutes.
• The Login page appears.
Chapter 14: Maintenance
421
Resetting the Safe@Office Appliance to Defaults
To reset the Safe@Office appliance to factory defaults using the Reset button
1. Make sure the Safe@Office appliance is powered on.
2. Using a pointed object, press the RESET button on the back of the Safe@Office
appliance steadily for seven seconds and then release it.
3. Allow the Safe@Office appliance to boot-up until the system is ready
(PWR/SEC LED flashes slowly or illuminates steadily in green light).
For information on the appliance's front and rear panels, see the relevant Getting
to Know Your Appliance section in Introduction on page 1.
Warning: If you choose to reset the Safe@Office appliance by disconnecting the
power cable and then reconnecting it, be sure to leave the Safe@Office appliance
disconnected for at least three seconds, or the Safe@Office appliance might not
function properly until you reboot it as described below.
422
Check Point Safe@Office User Guide
Running Diagnostics
Running Diagnostics
You can view technical information about your Safe@Office appliance’s hardware,
firmware, license, network status, and Service Center.
This information is useful for troubleshooting. You can export it to an *.html file
and send it to technical support.
To view diagnostic information
1. Click Setup in the main menu, and click the Tools tab.
The Tools page appears.
2. Click Diagnostics.
Technical information about your Safe@Office appliance appears in a new
window.
3. To save the displayed information to an *.html file:
a. Click Save.
A standard File Download dialog box appears.
b. Click Save.
The Save As dialog box appears.
c. Browse to a destination directory of your choice.
d. Type a name for the configuration file and click Save.
The *.html file is created and saved to the specified directory.
4. To refresh the contents of the window, click Refresh.
The contents are refreshed.
5. To close the window, click Close.
Chapter 14: Maintenance
423
Rebooting the Safe@Office Appliance
Rebooting the Safe@Office Appliance
If your Safe@Office appliance is not functioning properly, rebooting it may solve
the problem.
To reboot the Safe@Office appliance
1. Click Setup in the main menu, and click the Firmware tab.
The Firmware page appears.
2. Click Restart.
A confirmation message appears.
3. Click OK.
• The Please Wait screen appears.
• The Safe@Office appliance is restarted (the PWR/SEC LED flashes
quickly).
This may take a few minutes.
• The Login page appears.
424
Check Point Safe@Office User Guide
Overview
Chapter 15
Using Network Printers
This chapter describes how to set up and use network printers.
This chapter includes the following topics:
Overview ..................................................................................................425
Setting Up Network Printers.....................................................................426
Configuring Computers to Use Network Printers.....................................427
Viewing Network Printers ........................................................................437
Changing Network Printer Ports...............................................................437
Resetting Network Printers.......................................................................438
Overview
The Safe@Office 500W includes a built-in print server, enabling you to connect
USB-based printers to the appliance and share them across the network.
Note: When using computers with a Windows 2000/XP operating system, the
Safe@Office appliance supports connecting up to four USB-based printers to the
appliance. When using computers with a MAC OS-X operating system, the
Safe@Office appliance supports connecting one printer.
The appliance automatically detects printers as they are plugged in, and they
immediately become available for printing. Usually, no special configuration is
required on the Safe@Office appliance.
Note: The Safe@Office print server supports printing via "all-in-one" printers.
Copying and scanning functions are not supported.
Chapter 15: Using Network Printers
425
Setting Up Network Printers
Setting Up Network Printers
To set up a network printer
1. Connect the network printer to the Safe@Office appliance.
See Network Installation on page 35.
2. Turn the printer on.
3. In the Safe@Office Portal, click Setup in the main menu, and click the Printers
tab.
The Printers page appears. If the Safe@Office appliance detected the printer, the
printer is listed on the page.
4. If the printer is not listed, check that you connected the printer correctly, then
click Refresh to refresh the page.
5. Write down the port number allocated to the printer.
426
Check Point Safe@Office User Guide
Configuring Computers to Use Network Printers
The port number appears in the Printer Server TCP Port field. You will need this
number later, when configuring computers to use the network printer.
6. To change the port number, do the following:
a. Type the desired port number in the Printer Server TCP Port field.
Note: Printer port numbers may not overlap, and must be high ports.
b. Click Apply.
You may want to change the port number if, for example, the printer you are
setting up is intended to replace another printer. In this case, you should change
the replacement printer's port number to the old printer's port number, and you
can skip the next step.
7. Configure each computer from which you want to enable printing to the network
printer.
See Configuring Computers to Use Network Printers on page 427.
Configuring Computers to Use Network Printers
Perform the relevant procedure on each computer from which you want to enable
printing via the Safe@Office print server to a network printer.
Windows 2000/XP
This procedure is relevant for computers with a Windows 2000/XP operating
system.
To configure a computer to use a network printer
1. If the computer for which you want to enable printing is located on the WAN,
create an Allow rule for connections from the computer to This Gateway.
See Adding and Editing Rules on page 213.
Chapter 15: Using Network Printers
427
Configuring Computers to Use Network Printers
2. Click Start > Settings > Control Panel.
The Control Panel window opens.
3. Click Printers and Faxes.
The Printers and Faxes window opens.
4. Right-click in the window, and click Add Printer in the popup menu.
The Add Printer Wizard opens with the Welcome dialog box displayed.
5. Click Next.
The Local or Network Printer dialog box appears.
6. Click Local printer attached to this computer.
428
Check Point Safe@Office User Guide
Configuring Computers to Use Network Printers
Note: Do not select the Automatically detect and install my Plug and Play printer check
box.
7. Click Next.
The Select a Printer Port dialog box appears.
8. Click Create a new port.
9. In the Type of port drop-down list, select Standard TCP/IP Port.
10.
Click Next.
The Add Standard TCP/IP Port Wizard opens with the Welcome dialog box
displayed.
11.
Click Next.
Chapter 15: Using Network Printers
429
Configuring Computers to Use Network Printers
The Add Port dialog box appears.
12. In the Printer Name or IP Address field, type the Safe@Office appliance's
LAN IP address, or "my.firewall".
You can find the LAN IP address in the Safe@Office Portal, under Network >
My Network.
The Port Name field is filled in automatically.
13.
Click Next.
The Add Standard TCP/IP Printer Port Wizard opens, with the Additional Port
Information Required dialog box displayed.
14.
Click Custom.
15.
Click Settings.
430
Check Point Safe@Office User Guide
Configuring Computers to Use Network Printers
The Configure Standard TCP/IP Port Monitor dialog box opens.
16. In the Port Number field, type the printer's port number, as shown in the
Printers page.
17.
In the Protocol area, make sure that Raw is selected.
18.
Click OK.
The Add Standard TCP/IP Printer Port Wizard reappears.
19.
Click Next.
The Completing the Add Standard TCP/IP Printer Port Wizard dialog box appears.
20.
Click Finish.
Chapter 15: Using Network Printers
431
Configuring Computers to Use Network Printers
The Add Printer Wizard reappears, with the Install Printer Software dialog box
displayed.
21.
Do one of the following:
• Use the lists to select the printer's manufacturer and model.
• If your printer does not appear in the lists, insert the CD that came with
your printer in the computer's CD-ROM drive, and click Have Disk.
22. Click Next.
23. Complete the remaining dialog boxes in the wizard as desired, and click
Finish.
The printer appears in the Printers and Faxes window.
24.
Right-click the printer and click Properties in the popup menu.
The printer's Properties dialog box opens.
25.
432
In the Ports tab, in the list box, select the port you added.
Check Point Safe@Office User Guide
Configuring Computers to Use Network Printers
The port's name is IP_.
26.
Click OK.
MAC OS-X
This procedure is relevant for computers with the latest version of the MAC OS-X
operating system.
Note: This procedure may not apply to earlier MAC OS-X versions.
To configure a computer to use a network printer
1. If the computer for which you want to enable printing is located on the WAN,
create an Allow rule for connections from the computer to This Gateway.
See Adding and Editing Rules on page 213.
2. Choose Apple -> System Preferences.
Chapter 15: Using Network Printers
433
Configuring Computers to Use Network Printers
The System Preferences window appears.
3. Click Show All to display all categories.
4. In the Hardware area, click Print & Fax.
The Print & Fax window appears.
5. In the Printing tab, click Set Up Printers.
434
Check Point Safe@Office User Guide
Configuring Computers to Use Network Printers
The Printer List window appears.
6. Click Add.
New fields appear.
7. In the first drop-down list, select IP Printing.
8. In the Printer Type drop-down list, select Socket/HP Jet Direct.
9. In the Printer Address field, type the Safe@Office appliance's LAN IP address,
or "my.firewall".
You can find the LAN IP address in the Safe@Office Portal, under Network >
My Network.
10.
In the Queue Name field, type the name of the required printer queue.
For example, the printer queue name for HP printers is RAW.
Chapter 15: Using Network Printers
435
Configuring Computers to Use Network Printers
11.
In the Printer Model list, select the desired printer type.
A list of models appears.
12.
In the Model Name list, select the desired model.
13.
Click Add.
The new printer appears in the Printer List window.
14. In the Printer List window, select the newly added printer, and click Make
Default.
436
Check Point Safe@Office User Guide
Viewing Network Printers
Viewing Network Printers
To view network printers
1. Click Setup in the main menu, and click the Printers tab.
The Printers page appears, displaying a list of connected printers.
For each printer, the model, serial number, port, and status is displayed.
A printer can have the following statuses:
• Initialize. The printer is initializing.
• Ready. The printer is ready.
• Not Ready. The printer is not ready. For example, it may be out of paper.
• Printing. The printer is processing a print job.
• Restarting. The printer server is restarting.
• Fail. An error occurred. See the Event Log for details (Viewing the Event
Log on page 187).
2. To refresh the display, click Refresh.
Changing Network Printer Ports
When you set up a new network printer, the Safe@Office appliance automatically
assigns a port number to the printer. If you want to use a different port number, you
can easily change it, as described in Setting up Network Printers on page 426.
However, you may sometimes need to change the port number after completing
printer setup. For example, you may want to replace a malfunctioning network
printer, with another existing network printer, without reconfiguring the client
Chapter 15: Using Network Printers
437
Resetting Network Printers
computers. To do this, you must change the replacement printer's port number to
the malfunctioning printer's port number, as described below.
Note: Each printer port number must be different, and must be a high port.
To change a printer's port
1. Click Setup in the main menu, and click the Printers tab.
The Printers page appears.
2. In the printer's Printer Server TCP Port field, type the desired port number.
3. Click Apply.
Resetting Network Printers
You can cause a network printer to restart the current print job, by resetting the
network printer. You may want to do this if the print job has stalled.
To reset a network printer
1. Click Setup in the main menu, and click the Printers tab.
The Printers page appears.
2. Next to the desired printer, click Reset.
The network printer's current print job is restarted.
438
Check Point Safe@Office User Guide
Resetting Network Printers
Chapter 16
Troubleshooting
This chapter provides solutions to common problems you may encounter while
using the Safe@Office appliance.
Note: For information on troubleshooting wireless connectivity, see
Troubleshooting Wireless Connectivity on page 183.
This chapter includes the following topics:
Connectivity ............................................................................................ 440
Service Center and Upgrades................................................................... 444
Other Problems ........................................................................................ 445
Chapter 16: Troubleshooting
439
Connectivity
Connectivity
I cannot access the Internet. What should I do?
• Check if the PWR/SEC LED is green. If not, check the power connection
to the Safe@Office appliance.
• Check if the WAN LINK/ACT LED is green. If not, check the network
cable to the modem and make sure the modem is turned on.
• Check if the LAN LINK/ACT LED for the port used by your computer is
green. If not, check if the network cable linking your computer to the
Safe@Office appliance is connected properly. Try replacing the cable or
connecting it to a different LAN port.
• Using your Web browser, go to http://my.firewall and see whether
"Connected" appears on the Status Bar. Make sure that your Safe@Office
appliance network settings are configured as per your ISP directions.
• Check your TCP/IP configuration according to Installing and Setting up
the Safe@Office Appliance on page 15.
• If Web Filtering or Email Filtering are on, try turning them off.
• Check if you have defined firewall rules which block your Internet
connectivity.
• Check with your ISP for possible service outage.
• Check whether you are exceeding the maximum number of computers
allowed by your license, by viewing the Active Computers page.
I cannot access my DSL broadband connection. What should I do?
DSL equipment comes in two flavors: bridges (commonly known as DSL modems)
and routers. Some DSL equipment can be configured to work both ways.
440
Check Point Safe@Office User Guide
Connectivity
• If you connect to your ISP using a PPPoE or PPTP dialer defined in your
operating system, your equipment is most likely configured as a DSL
bridge. Configure a PPPoE or PPTP type DSL connection.
• If you were not instructed to configure a dialer in your operating system,
your equipment is most likely configured as a DSL router. Configure a
LAN connection, even if you are using a DSL connection.
For instructions, see Configuring the Internet Connection on page 53.
I cannot access my Cable broadband connection. What should I do?
• Some cable ISPs require you to register the MAC address of the device
behind the cable modem. You may need to clone your Ethernet adapter
MAC address onto the Safe@Office appliance. For instructions, see
Configuring the Internet Connection on page 53.
• Some cable ISPs require using a hostname for the connection. Try
reconfiguring your Internet connection and specifying a hostname. For
further information, see Configuring the Internet Connection on page 53.
I cannot access http://my.firewall or http://my.vpn. What should I do?
• Verify that the Safe@Office appliance is operating (PWR/SEC LED is
active)
• Check if the LAN LINK/ACT LED for the port used by your computer is
on. If not, check if the network cable linking your computer to the
Safe@Office appliance is connected properly.
Note: You may need to use a crossed cable when connecting the Safe@Office
appliance to another hub/switch.
• Try surfing to 192.168.10.1 instead of to my.firewall.
Note: 192.168.10 is the default value, and it may vary if you changed it in the My
Network page.
Chapter 16: Troubleshooting
441
Connectivity
• Check your TCP/IP configuration according to Installing and Setting up
the Safe@Office Appliance on page 15.
• Restart your Safe@Office appliance and your broadband modem by
disconnecting the power and reconnecting after 5 seconds.
• If your Web browser is configured to use an HTTP proxy to access the
Internet, add "my.firewall" or "my.vpn" to your proxy exceptions list.
My network seems extremely slow. What should I do?
• The Ethernet cables may be faulty. For proper operation, the Safe@Office
appliance requires STP CAT5 (Shielded Twisted Pair Category 5) Ethernet
cables. Make sure that this specification is printed on your cables.
• Your Ethernet card may be faulty or incorrectly configured. Try replacing
your Ethernet card.
• There may be an IP address conflict in your network. Check that the
TCP/IP settings of all your computers are configured to obtain an IP
address automatically.
I changed the network settings to incorrect values and am unable to correct my error. What
should I do?
Reset the network to its default settings using the button on the back of the
Safe@Office appliance unit. See Resetting the Safe@Office Appliance to Defaults
on page 420.
I am using the Safe@Office appliance behind another NAT device, and I am having problems
with some applications. What should I do?
By default, the Safe@Office appliance performs Network Address Translation
(NAT). It is possible to use the Safe@Office appliance behind another device that
performs NAT, such as a DSL router or Wireless router, but the device will block
all incoming connections from reaching your Safe@Office appliance.
To fix this problem, do ONE of the following. (The solutions are listed in order of
preference.)
442
Check Point Safe@Office User Guide
Connectivity
• Consider whether you really need the router. The Safe@Office appliance
can be used as a replacement for your router, unless you need it for some
additional functionality that it provides, such as Wireless access.
• If possible, disable NAT in the router. Refer to the router’s documentation
for instructions on how to do this.
• If the router has a “DMZ Computer” or “Exposed Host” option, set it to the
Safe@Office appliance’s external IP address.
• Open the following ports in the NAT device:
• UDP 9281/9282
• UDP 500
• TCP 256
• TCP 264
• ESP IP protocol 50
• TCP 981
I cannot receive audio or video calls through the Safe@Office appliance. What should I do?
To enable audio/video, you must configure an IP Telephony (H.323) virtual server.
For instructions, see Configuring Servers on page 207.
I run a public Web server at home but it cannot be accessed from the Internet. What should I
do?
Configure a virtual Web Server. For instructions, see Configuring Servers on page
207.
I cannot connect to the LAN network from the DMZ or WLAN network. What should I do?
By default, connections from the DMZ or WLAN network to the LAN network are
blocked. To allow traffic from the DMZ or WLAN to the LAN, configure
appropriate firewall rules. For instructions, see Using Rules on page 209.
Chapter 16: Troubleshooting
443
Service Center and Upgrades
Service Center and Upgrades
I purchased an advanced Safe@Office model, but I only have the functionality of a simpler
Safe@Office model. What should I do?
Your have not installed your product key. For further information, see Upgrading
Your Software Product on page 381.
I have exceeded my node limit. What does this mean? What should I do?
Your Product Key specifies a maximum number of nodes that you may connect to
the Safe@Office appliance.
The Safe@Office appliance tracks the cumulative number of nodes on the internal
network that have communicated through the firewall. When the Safe@Office
appliance encounters an IP address that exceeds the licensed node limit, the Active
Computers page displays a warning message and marks nodes over the node limit
in red. These nodes will not be able to access the Internet through the Safe@Office
appliance, but will be protected. The Event Log page also warns you that you have
exceeded the node limit.
To upgrade your Safe@Office appliance to support more nodes, purchase a new
Product Key. Contact your reseller for upgrade information.
While trying to connect to a Service Center, I received the message “The Service Center did not
respond”. What should I do?
• If you are using a Service Center other than the Check Point Service
Center, check that the Service Center IP address is typed correctly.
• The Safe@Office appliance connects to the Service Center using UDP
ports 9281/9282. If the Safe@Office appliance is installed behind another
firewall, make sure that these ports are open.
444
Check Point Safe@Office User Guide
Other Problems
Other Problems
I have forgotten my password. What should I do?
Reset your Safe@Office appliance to factory defaults using the Reset button as
detailed in Resetting the Safe@Office Appliance to Defaults on page 420.
Why are the date and time displayed incorrectly?
You can adjust the time on the Setup page's Tools tab. For information, see Setting
the Time on the Appliance on page 399.
I cannot use a certain network application. What should I do?
Look at the Event Log page. If it lists blocked attacks, do the following:
• Set the Safe@Office appliance's firewall level to Low and try again.
• If the application still does not work, set the computer on which you want
to use the application to be the exposed host.
For instructions, see Defining an Exposed Host on page 261.
When you have finished using the application, make sure to clear the exposed host
setting, otherwise your security might be compromised.
Chapter 16: Troubleshooting
445
Technical Specifications
Chapter 17
Specifications
This chapter includes the following topics:
Technical Specifications.......................................................................... 447
CE Declaration of Conformity................................................................. 451
Federal Communications Commission Radio Frequency Interference
Statement ................................................................................................. 453
Technical Specifications
Table 86: Safe@Office Appliance Attributes
Attribute
Safe@Office 500
SBX-166LHGE-6
Safe@Office 500
SBX-166LHGE-6 /
Safe@Office 500W
SBXW-166LHGE-6
General
Dimensions
20.32 x 3.05 x 12.19 cm
20 x 3.1 x 15.5 cm
(width x height x depth)
(8 x 1.2 x 4.8 inches)
(7.9 x 1.2 x 6.1 inches)
Weight
0.7 kg (1.56 lbs)
0.69 kg (1.55 lbs)
Chapter 17: Specifications
447
Technical Specifications
Attribute
Safe@Office 500
SBX-166LHGE-6
Safe@Office 500
SBX-166LHGE-6 /
Safe@Office 500W
SBXW-166LHGE-6
Power supply nominal
US Model: 90~132 VAC,
All Models: 100~240VAC,
input voltage, frequency
50~60Hz
50~60Hz
Japan Model: 100VAC,
50~60Hz
EU Model: 200~265 VAC,
50~60Hz
Power supply nominal
All Models: 9VAC, 1.5A
All Models: 5VDC, 3A
7.5W
8W (1.6A w/o external USB
output voltage
Max. Power
Consumption
devices)
13W (2.6A w USB devices)
Retail box dimensions
31 x 10 x 16 cm
29 x 25 x 7.6 cm
(width x height x depth)
(12.4 x 4 x 6.4 inches)
(11.4 x 9.8 x 3 inches)
Retail box weight
1.3 kg (2.9 lbs)
1.35 kg (3 lbs)
- 20°C to +70°C
- 5°C to +70°C
+ 5°C to +45°C
- 5°C ~ 50°C
Environmental
Conditions
Temperature:
Storage/Transport
Temperature: Operation
448
Check Point Safe@Office User Guide
Technical Specifications
Attribute
Safe@Office 500
SBX-166LHGE-6
Safe@Office 500
SBX-166LHGE-6 /
Safe@Office 500W
SBXW-166LHGE-6
Humidity:
5%~90% at 25°C/
5%~90% at 25°C/
Storage/Operation
None condensed
None condensed
ETSI 300 019-2-3 CLASS 3.1
CNS1219 C6343
Applicable Standards
Shock & Vibration
& Bellcore GR 63 (NEBS)
Safety
Quality
EN60950/
EN60950/
IEC60950/
IEC60950/
UL60950
cTUVus 60950
ISO9001
ISO9001:2000
TL9000-HW R3.0
ISO14001
Ohsas18001:
1999
Mean Time Between
68,000 Hours at 30 ºC
68,000 Hours at 30 ºC
Failures (MTBF)
Chapter 17: Specifications
449
Technical Specifications
Table 87: Safe@Office Wireless Attributes
Attribute
Safe@Office 500W series
Operation Frequency
2.412-2.484 MHz
Transmission Power
79.4 mW
Modulation
OFDM, DSSS, 64QAM, 16QAM, QPSK, BPSK, CCK, DQPSK,
DBPSK
WPA Authentication
EAP-TLS, EAP-TTLS, PEAP (EAP-GTC), PEAP (EAP-MSCHAP
Modes
V2)
450
Check Point Safe@Office User Guide
CE Declaration of Conformity
CE Declaration of Conformity
SofaWare Technologies Ltd., 3 Hilazon St., Ramat-Gan Israel, hereby declares that
this equipment is in conformity with the essential requirements specified in Article
3.1 (a) and 3.1 (b) of:
• Directive 89/336/EEC (EMC Directive)
• Directive 73/23/EEC (Low Voltage Directive – LVD)
• Directive 99/05/EEC (Radio Equipment and Telecommunications
Terminal Equipment Directive)
In accordance with the following standards:
Table 88: Safe@Office Appliance Standards
Attribute
Safe@Office 500
SBX-166LHGE-6
Safe@Office 500
SBX-166LHGE-6 /
Safe@Office 500W SBXW166LHGE-6
EMC
EN 55022:1998
EN 50081-1:1992
EN 61000-3-2: 1995
EN 50082-1:1997
EN 61000-3-3: 1995
EN 61000-6-1:2001
EN 61000-4-2:1995
EN 61000-6-3:2001
EN 61000-4-3:1995
EN 55022:1998
EN 61000-4-4:1995
EN 55024:1998
EN 61000-4-5:1995
EN 61000-3-2: 1995
EN 61000-4-6:1996
EN 61000-3-3: 1995
Chapter 17: Specifications
451
CE Declaration of Conformity
Attribute
Safe@Office 500
SBX-166LHGE-6
Safe@Office 500
SBX-166LHGE-6 /
Safe@Office 500W SBXW166LHGE-6
EN 61000-4-8:1993
EN 61000-4-2:1995
EN 61000-4-11:1994
EN 61000-4-3:1996/A2:2001
ENV50204:1995
EN 61000-4-4:1995
EN 61000-4-5:1995
EN 61000-4-6:1996
EN 61000-4-7:1993
EN 61000-4-8:1993
EN 61000-4-9:1993
EN 61000-4-10:1993
EN 61000-4-11:1994
EN 61000-4-12:1995
Safety
EN 60950: 2000
EN 60950: 2000
IEC 60950:1999
IEC 60950:1999
The "CE" mark is affixed to this product to demonstrate conformance to the
R&TTE Directive 99/05/EEC (Radio Equipment and Telecommunications
Terminal Equipment Directive) and FCC Part 15 Class B.
The product has been tested in a typical configuration. For a copy of the Original
Signed Declaration (in full conformance with EN45014), please contact SofaWare
at the above address.
452
Check Point Safe@Office User Guide
Federal Communications Commission Radio Frequency Interference Statement
Federal Communications Commission Radio
Frequency Interference Statement
This
equipment
with
limits
for a Class
B digital
device,
pursuant
•This
equipment
has complies
been tested
andthe
found
to comply
with the
limits for
a Class
B digital to
device,
Part 15
the15FCC
Rules.
These limits
designed
to provide
reasonable
pursuant
to of
Part
of the
FCC Rules.
These are
limits
are designed
to provide
reasonable protection
protection
harmful
when the This
equipment
is operated
in uses
a and can
against
harmfulagainst
interference
in a interference
residential installation.
equipment
generates,
commercial
environment.
Thisifequipment
uses,
and can with
radiate
radio
radiate
radio frequency
energy and,
not installedgenerates,
and used in
accordance
the instructions,
may
cause harmful
interference
to installed
radio communications.
However, there
no instruction
guarantee that
frequency
energy
and, if not
and used in accordance
withisthe
interference
will not
occur
in a particular
installation.
If this
equipment does cause harmful
manual, may
cause
harmful
interference
to radio
communications.
interference to radio or television reception, which can be determined by turning the equipment off
Shielded cables must be used with this equipment to maintain compliance with
and on, the user is encouraged to try to correct the interference by one of the following measures:
FCC regulations.
•-•Reorient
or relocate
the receiving antenna.
Any changes
or modifications
to this product not explicitly approved by the
•-•Increase
the separation
between
the equipment
receiver.the equipment and any
manufacturer
could void
the user’s
authorityand
to operate
•-•Connect
the
equipment
into
an
outlet
on
circuit
different
that
assurances of Safety or Performance, and could resultfrom
in violation
of Part 15 of the
•to FCC
whichRules.
the receiver is connected.
•-•Consult the dealer or an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following
twomust
conditions:
(1) this
maytonot
causecompliance
harmful interference,
and
•Shielded
cables
be used with
this device
equipment
maintain
withFCC regulations.
(2) this device must accept any interference received, including interference that
may
cause
undesired
•This
device
complies
withoperation.
Part 15 of the FCC Rules. Operation is subject to the following two
conditions:
(1) This
deviceapparatus
may not cause
harmful
and (2) this device must accept
This Class
B digital
complies
withinterference,
Canadian ICES-003.
any interference received, including interference that may cause undesired operation.
SofaWare declares that SBXW-166LHGE-6, ( FCC ID: P6XSBXW-166LHGE-6 )
•FCC
Caution:inAny
changes orfor
modifications
notspecified
expresslyfirmware
approved controlled
by the partyinresponsible
is limited
CH1~CH11
2.4 GHz by
U.S.A. for
compliance could void the user's authority to operate this equipment.
FCC Radiation Exposure Statement for Wireless Models
•FCC
Exposure
Statement
for radiation
Wireless Models
This Radiation
equipment
complies
with FCC
exposure limits set forth for an
•This
equipment
complies
with
FCC
radiation
exposure
forth for an
uncontrolled
uncontrolled environment. The antenna(s) used forlimits
this set
equipment
must
be installed
environment.
The
antenna(s)
used
for
this
equipment
must
be
installed
to
provide
a separation
to provide a separation distance of at least eight inches (20 cm) from all persons.
distance
of at leastmust
eight not
inches
(20 cm) from
all persons. with any other antenna.
This equipment
be operated
in conjunction
•This equipment must not be operated in conjunction with any other antenna.
•SofaWare declares that US model of SBXW-166LHGE-6, ( FCC ID: P6XSBXW-166LHGE-6 ) is
limited in CH1~CH11 for 2.4 G band by specific firmware controlled by the manufacturer and is not
user changeable.
Chapter 17: Specifications
453
Glossary of Terms
Glossary of Terms
ADSL Modem
A device connecting a computer to
the Internet via an existing phone
line. ADSL (Asymmetric Digital
Subscriber Line) modems offer a
high-speed 'always-on' connection.
CA
The Certificate Authority (CA)
issues certificates to entities such as
gateways, users, or computers. The
entity later uses the certificate to
identify itself and provide verifiable
information. For instance, the
certificate includes the Distinguished
Name (DN) (identifying
information) of the entity, as well as
the public key (information about
itself), and possibly the IP address.
After two entities exchange and
validate each other's certificates,
they can begin encrypting
information between themselves
using the public keys in the
certificates.
Cable Modem
A device connecting a computer to
the Internet via the cable television
Glossary of Terms
network. Cable modems offer a
high-speed 'always-on' connection.
Certificate Authority
The Certificate Authority (CA)
issues certificates to entities such as
gateways, users, or computers. The
entity later uses the certificate to
identify itself and provide verifiable
information. For instance, the
certificate includes the Distinguished
Name (DN) (identifying
information) of the entity, as well as
the public key (information about
itself), and possibly the IP address.
After two entities exchange and
validate each other's certificates,
they can begin encrypting
information between themselves
using the public keys in the
certificates.
Cracking
An activity in which someone breaks
into someone else's computer
system, bypasses passwords or
licenses in computer programs; or in
other ways intentionally breaches
computer security. The end result is
that whatever resides on the
computer can be viewed and
sensitive data can be stolen without
455
Glossary of Terms
anyone knowing about it.
Sometimes, tiny programs are
'planted' on the computer that are
designed to watch out for, seize and
then transmit to another computer,
specific types of data.
Domain Name System
Domain Name System. The Domain
Name System (DNS) refers to the
Internet domain names, or easy-toremember "handles", that are
translated into IP addresses.
DHCP
Any machine requires a unique IP
address to connect to the Internet
using Internet Protocol. Dynamic
Host Configuration Protocol
(DHCP) is a communications
protocol that assigns Internet
Protocol (IP) addresses to computers
on the network.
DHCP uses the concept of a "lease"
or amount of time that a given IP
address will be valid for a computer.
DMZ
A DMZ (demilitarized zone) is an
internal network defined in addition
to the LAN network and protected
by the Safe@Office appliance.
DNS
The Domain Name System (DNS)
refers to the Internet domain names,
or easy-to-remember "handles", that
are translated into IP addresses.
An example of a Domain Name is
'www.sofaware.com'.
456
An example of a Domain Name is
'www.sofaware.com'.
Exposed Host
An exposed host allows one
computer to be exposed to the
Internet. An example of using an
exposed host would be exposing a
public server, while preventing
outside users from getting direct
access form this server back to the
private network.
Firmware
Software embedded in a device.
Gateway
A network point that acts as an
entrance to another network.
Hacking
An activity in which someone breaks
into someone else's computer
system, bypasses passwords or
licenses in computer programs; or in
Check Point Safe@Office User Guide
Glossary of Terms
other ways intentionally breaches
computer security. The end result is
that whatever resides on the
computer can be viewed and
sensitive data can be stolen without
anyone knowing about it.
Sometimes, tiny programs are
'planted' on the computer that are
designed to watch out for, seize and
then transmit to another computer,
specific types of data.
HTTPS
Hypertext Transfer Protocol over
Secure Socket Layer, or HTTP over
SSL.
A protocol for accessing a secure
Web server. It uses SSL as a
sublayer under the regular HTTP
application. This directs messages to
a secure port number rather than the
default Web port number, and uses a
public key to encrypt data
HTTPS is used to transfer
confidential user information.
Hub
A device with multiple ports,
connecting several PCs or network
devices on a network.
IP Address
receiving data packets across the
Internet. When you request an
HTML page or send e-mail, the
Internet Protocol part of TCP/IP
includes your IP address in the
message and sends it to the IP
address that is obtained by looking
up the domain name in the Uniform
Resource Locator you requested or
in the e-mail address you're sending
a note to. At the other end, the
recipient can see the IP address of
the Web page requestor or the e-mail
sender and can respond by sending
another message using the IP address
it received.
IP Spoofing
A technique where an attacker
attempts to gain unauthorized access
through a false source address to
make it appear as though
communications have originated in a
part of the network with higher
access privileges. For example, a
packet originating on the Internet
may be masquerading as a local
packet with the source IP address of
an internal host. The firewall can
protect against IP spoofing attacks
by limiting network access based on
the gateway interface from which
data is being received.
An IP address is a 32-bit number that
identifies each computer sending or
Glossary of Terms
457
Glossary of Terms
IPSEC
IPSEC is the leading Virtual Private
Networking (VPN) standard. IPSEC
enables individuals or offices to
establish secure communication
channels ('tunnels') over the Internet.
ISP
An ISP (Internet service provider) is
a company that provides access to
the Internet and other related
services.
LAN
A local area network (LAN) is a
group of computers and associated
devices that share a common
communications line and typically
share the resources of a single server
within a small geographic area.
MAC Address
The MAC (Media Access Control)
address is a computer's unique
hardware number. When connected
to the Internet from your computer, a
mapping relates your IP address to
your computer's physical (MAC)
address on the LAN.
Mbps
Megabits per second. Measurement
unit for the rate of data transmission.
458
MTU
The Maximum Transmission Unit
(MTU) is a parameter that
determines the largest datagram than
can be transmitted by an IP interface
(without it needing to be broken
down into smaller units). The MTU
should be larger than the largest
datagram you wish to transmit unfragmented. Note: This only
prevents fragmentation locally.
Some other link in the path may
have a smaller MTU - the datagram
will be fragmented at that point.
Typical values are 1500 bytes for an
Ethernet interface or 1452 for a PPP
interface.
NAT
Network Address Translation (NAT)
is the translation or mapping of an IP
address to a different IP address.
NAT can be used to map several
internal IP addresses to a single IP
address, thereby sharing a single IP
address assigned by the ISP among
several PCs.
Check Point FireWall-1's Stateful
Inspection Network Address
Translation (NAT) implementation
supports hundreds of pre-defined
applications, services, and protocols,
more than any other firewall vendor.
Check Point Safe@Office User Guide
Glossary of Terms
NetBIOS
NetBIOS is the networking protocol
used by DOS and Windows
machines.
Packet
A packet is the basic unit of data that
flows from one source on the
Internet to another destination on the
Internet. When any file (e-mail
message, HTML file, GIF file etc.) is
sent from one place to another on the
Internet, the file is divided into
"chunks" of an efficient size for
routing. Each of these packets is
separately numbered and includes
the Internet address of the
destination. The individual packets
for a given file may travel different
routes through the Internet. When
they have all arrived, they are
reassembled into the original file at
the receiving end.
PPPoE
PPPoE (Point-to-Point Protocol over
Ethernet) enables connecting
multiple computer users on an
Ethernet local area network to a
remote site or ISP, through common
customer premises equipment (e.g.
modem).
PPTP
The Point-to-Point Tunneling
Protocol (PPTP) allows extending a
local network by establishing private
“tunnels” over the Internet. This
protocol it is also used by some DSL
providers as an alternative for
PPPoE.
RJ-45
The RJ-45 is a connector for digital
transmission over ordinary phone
wire.
Router
A router is a device that determines
the next network point to which a
packet should be forwarded toward
its destination. The router is
connected to at least two networks.
Server
A server is a program (or host) that
awaits and requests from client
programs across the network. For
example, a Web server is the
computer program, running on a
specific host, that serves requested
HTML pages or files. Your browser
is the client program, in this case.
Stateful Inspection
Stateful Inspection was invented by
Check Point to provide the highest
Glossary of Terms
459
Glossary of Terms
level of security by examining every
layer within a packet, unlike other
systems of inspection. Stateful
Inspection extracts information
required for security decisions from
all application layers and retains this
information in dynamic state tables
for evaluating subsequent connection
attempts. In other words, it learns!
Subnet Mask
A 32-bit identifier indicating how
the network is split into subnets. The
subnet mask indicates which part of
the IP address is the host ID and
which indicates the subnet.
TCP
TCP (Transmission Control
Protocol) is a set of rules (protocol)
used along with the Internet Protocol
(IP) to send data in the form of
message units between computers
over the Internet. While IP takes care
of handling the actual delivery of the
data, TCP takes care of keeping
track of the individual units of data
(called packets) that a message is
divided into for efficient routing
through the Internet.
For example, when an HTML file is
sent to you from a Web server, the
Transmission Control Protocol
(TCP) program layer in that server
460
divides the file into one or more
packets, numbers the packets, and
then forwards them individually to
the IP program layer. Although each
packet has the same destination IP
address, it may get routed differently
through the network.
At the other end (the client program
in your computer), TCP reassembles
the individual packets and waits until
they have arrived to forward them to
you as a single file.
TCP/IP
TCP/IP (Transmission Control
Protocol/Internet Protocol) is the
underlying communication protocol
of the Internet.
UDP
UDP (User Datagram Protocol) is a
communications protocol that offers
a limited amount of service when
messages are exchanged between
computers in a network that uses the
Internet Protocol (IP). UDP is an
alternative to the Transmission
Control Protocol (TCP) and, together
with IP, is sometimes referred to as
UDP/IP. Like the Transmission
Control Protocol, UDP uses the
Internet Protocol to actually get a
data unit (called a datagram) from
one computer to another. Unlike
Check Point Safe@Office User Guide
Glossary of Terms
TCP, however, UDP does not
provide the service of dividing a
message into packets (datagrams)
and reassembling it at the other end.
UDP is often used for applications
such as streaming data.
WLAN
A WLAN is a wireless local area
network protected by the
Safe@Office appliance.
URL
A URL (Uniform Resource Locator)
is the address of a file (resource)
accessible on the Internet. The type
of resource depends on the Internet
application protocol. On the Web
(which uses the Hypertext Transfer
Protocol), an example of a URL is
'http://www.sofaware.com'.
VPN
A virtual private network (VPN) is a
private data network that makes use
of the public telecommunication
infrastructure, maintaining privacy
through the use of a tunneling
protocol and security procedures.
VPN tunnel
A secure connection between a
Remote Access VPN Client and a
Remote Access VPN Server.
Glossary of Terms
461
Index
Index
802.1x • 161, 163
cable type • 35
certificate
explained • 348
generating self-signed • 349
account, configuring • 288
importing • 353
active computers, viewing • 194
installing • 348
active connections, viewing • 197
uninstalling • 355
Allow and Forward rules, explained • 213
Cisco IOS DOS • 236
Allow rules, explained • 213
command line interface
Automatic login • 344
backup connection
controlling the appliance via • 388
DHCP
configuring • 90
configuring • 94
dialup • 92
explained • 456
LAN or broadband • 91
options • 101
Block Known Ports • 246
DHCP Server
Block Port Overflow • 247
enabling/disabling • 94
Block rules, explained • 213
explained • 94
Blocked FTP Commands • 248
CA, explained • 348, 455
cable modem
connection • 58, 67
explained • 455
Index
diagnostic tools
Packet Sniffer • 406
Ping • 403
Traceroute • 403
using • 403
WHOIS • 403
463
Index
diagnostics • 423
dialup
connection • 75, 92
modem • 84
File and Print Sharing • 249
firewall
levels • 204
dialup modem, setting up • 84
rule types • 211
DMZ
setting security level • 204
configuring • 108
firmware
configuring High Availability for • 119
explained • 377, 456
explained • 108, 456
updating manually • 379
DNS • 90, 403, 456
Dynamic DNS • 5, 287
Email Antispam, see Email Filtering • 294
viewing status • 377
FTP Bounce • 245
gateways
Email Antivirus, see Email Filtering • 294
backup • 119
Email Filtering
default • 108, 119, 139
Email Antispam • 294
explained • 456
Email Antivirus • 294
ID • 287
enabling/disabling • 295
master • 119
selecting protocols for • 296
Site-to-Site VPN • 301
snoozing • 296
temporarily disabling • 296
event log, viewing • 187
exposed host
defining a computer as • 261
explained • 261, 456
Hide NAT
enabling/disabling • 107
explained • 107, 458
high availability
configuring • 119
explained • 119
464
Check Point Safe@Office User Guide
Index
Host Port Scan • 242
HTTPS
IP address
changing • 105
configuring • 392
explained • 457
explained • 457
hiding • 107
using • 44
hub • 35, 90, 119, 440, 457
IP Fragments • 232
IPSEC
VPN mode • 457
IGMP • 251
IKE traces, viewing • 359
initial login • 39
installation
ISP, explained • 458
LAN
cable • 35
cable type • 35
configuring High Availability for • 119
network • 35
connection • 54, 56, 65
Instant Messengers • 254
explained • 458
internal VPN Server
ports • 35
configuring • 310
LAND • 226
explained • 306
licenses • 194, 377, 423, 440
Internet connection
upgrading • 381
configuring • 53
link configurations, modifying • 149
configuring backup • 90
logs
enabling/disabling • 88
exporting • 187
establishing quick • 88
viewing • 187
terminating • 90
troubleshooting • 440
viewing information • 87
Internet Setup • 63
MAC address • 458
Manual Login • 344
Max Ping Size • 231
Internet Wizard • 54
Index
465
Index
MTU, explained • 77, 458
NetBIOS, explained • 458
network
changing internal range of • 105
OfficeMode
about • 110
configuring • 110
configuring • 93
packet • 87, 139, 403, 457, 459
configuring a DMZ • 108
Packet Sanity • 229
configuring a VLAN • 111
Packet Sniffer
configuring a WLAN • 161
filter string syntax • 409
configuring DHCP options • 101
using • 406
configuring high availability • 119
Pass rules, explained • 268
configuring the OfficeMode network •
110
password
enabling DHCP Server on • 94
enabling Hide NAT • 107
installation on • 35
managing • 93
objects • 129
network objects
adding and editing • 130
using • 129
viewing and deleting • 138
Network Quota • 234
node limit, viewing • 194
Non-TCP Flooding • 227
Null Payload • 238
changing • 361
setting up • 39
Peer to Peer • 252
Ping • 403
Ping of Death • 225
Port-based VLAN
about • 111
adding and editing • 114
ports
managing • 145
modifying assignments • 147
modifying link configurations • 149
resetting to defaults • 150
viewing statuses • 146
PPTP
466
Check Point Safe@Office User Guide
Index
connection • 61, 71
rebooting • 424
explained • 459
registering • 385
print server • 425
printers
changing ports • 437
configuring computers to use • 427
resetting • 438
setting up • 426
using • 425
viewing • 437
Remote Access VPN Clients, explained •
301
Remote Access VPN Servers
configuring • 307, 309
explained • 301
Remote Access VPN sites • 314
reports
active computers • 194
active connections • 197
QoS
event log • 187
node limit • 194
classes • 151
traffic • 191
explained • 151
viewing • 187
QoS classes
wireless statistics • 198
adding and editing • 155
routers • 90, 119, 403, 440, 459
assigning services to • 209
rules
built-in • 154, 160
security • 209
deleting • 159
VStream Antivirus • 267
explained • 151
restoring defaults • 160
Safe@Office series
RADIUS
rear panel • 11
Safe@Office 500
configuring VSA • 374
front panel • 10
explained • 370
rear panel • 8
using • 370
Index
Safe@Office 500 series
467
Index
about • 1
Secure HotSpot
features • 2
customizing • 259
product family • 2
enabling/disabling • 258
Safe@Office 500W
quick guest users • 367
front panel • 13
setting up • 257
rear panel • 11
using • 256
Safe@Office appliance
SecuRemote
backing up • 417
explained • 306
changing internal IP address of • 105
installing • 311
configuring Internet connection • 53
security
exporting configuration • 417
configuring servers • 207
importing configuration • 418
creating rules • 209
installing • 15, 35
defining a computer as an exposed host •
261
maintenance • 377
mounting • 30
rebooting • 424
registering • 385
resetting to factory defaults • 420
setting the time • 399
setting up • 36
Safe@Office Portal
elements • 46
initial login • 39
logging on • 42
remotely accessing • 44
using • 46
Scan rules, explained • 268
firewall • 204
Secure HotSpot • 256
SmartDefense • 220
security policy
default • 203
setting up • 203
security rules
adding and editing • 213
changing priority • 219
deleting • 219
enabling/disabling • 218
types • 213
using • 209
serial console • 11
468
Check Point Safe@Office User Guide
Index
controlling appliance via • 390
using • 390
servers
configuring • 207
explained • 396
software updates
checking for manually • 298
explained • 298
explained • 459
source routing, about • 139
Remote Access VPN • 301, 307
SSH
Web • 129, 207, 440
Service Center
configuring • 394
explained • 394
connecting to • 281
Stateful Inspection • 458, 459
disconnecting from • 289
Static NAT
refreshing a connection to • 288
services
Email Filtering • 294
explained • 129
using • 130
static routes
software updates • 298
adding and editing • 139
Web Filtering • 290
explained • 139
Setup Wizard • 39, 54
using • 139
Site-to-Site VPN gateways • 312
viewing and deleting • 144
explained • 301
Strict TCP • 239
installing a certificate • 348
subnet masks, explained • 460
PPPoE tunnels • 312
subscription services
Small PMTU • 241
explained • 281
SmartDefense
starting • 281
categories • 224
viewing information • 287
configuring • 221
Sweep Scan • 242
using • 220
Syslog logging
SNMP
configuring • 396
Index
configuring • 386
explained • 386
469
Index
Tag-based VLAN
about • 111
adding and editing • 116
TCP, explained • 460
TCP/IP
explained • 460
setting up for MAC OS • 26
setting up for Windows 95/98 • 21
setting up for Windows XP/2000 • 16
Teardrop • 224
technical support • 14
Telstra • 73
setting up • 153
simplified • 151
using • 151
troubleshooting • 439
UDP, explained • 460
URL, explained • 461
users
adding and editing • 363
adding quick guest HotSpot • 367
managing • 361
setting up remote VPN access for • 369
viewing and deleting • 369
Traceroute • 403
Traffic Monitor
configuring • 193
Vendor-Specific Attribute
exporting reports • 194
about • 370
using • 191
configuring • 267
viewing reports • 191
traffic reports
VLAN
adding and editing • 114, 116
exporting • 194
deleting • 118
viewing • 191
port-based • 111, 114
Traffic Shaper
advanced • 151
tag-based • 111, 116
VPN
enabling • 63, 151
explained • 301, 461
explained • 151
Remote Access • 305, 312
restoring defaults • 160
sites • 301, 343, 344
470
Check Point Safe@Office User Guide
Index
Site-to-Site • 302, 312
tunnnels • 301, 344, 356
viewing IKE traces • 359
VPN sites
types • 268
WAN
cable • 35
adding and editing using Safe@Office •
312
connections • 209
deleting • 343
ports • 35, 90
enabling/disabling • 343
logging on • 344
VPN tunnels
Web Filtering
enabling/disabling • 290
selecting categories for • 291
creation and closing of • 356
snoozing • 292
establishing • 344
temporarily disabling • 292
explained • 301, 461
Welchia • 235
viewing • 356
WEP • 161, 163
VStream Antivirus
WHOIS • 403
about • 263
wireless hardware • 162
configuring • 267
wireless protocols • 163
configuring advanced settings • 275
wireless stations
configuring policy • 267
preparing • 182
enabling/disabling • 265
viewing • 198
rules • 268
WLAN
updating • 279
configuring • 161
viewing database information • 266
defined • 461
VStream Antivirus rules
preparing stations for • 182
adding and editing • 269
troubleshooting connectivity • 183
changing priority • 274
viewing statistics for • 198
deleting • 274
WPA • 161, 163
enabling/disabling • 273
WPA2 • 163
Index
471
Index
WPA-PSK • 161, 163
472
Check Point Safe@Office User Guide

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Copy, Extract, Print high-res
XMP Toolkit                     : 3.1-702
Modify Date                     : 2006:08:17 09:19:50-07:00
Create Date                     : 2006:08:17 09:18:38-07:00
Metadata Date                   : 2006:08:17 09:19:50-07:00
Creator Tool                    : Acrobat PDFMaker 7.0.5 for Word
Format                          : application/pdf
Title                           : Check Point Safe@Office User Guide
Document ID                     : uuid:b7b83040-0297-4113-b6f4-591e97f3e12e
Instance ID                     : uuid:afa9296d-b9bc-452c-8086-8451ffd8a6e6
Producer                        : Acrobat Distiller 7.0.5 (Windows)
Has XFA                         : No
Page Count                      : 238
Creator                         : Acrobat PDFMaker 7.0.5 for Word
EXIF Metadata provided by EXIF.tools
FCC ID Filing: P6XSBXW-166LHGE-6

Navigation menu