ZoneAlarm Z100G Guide de l'utilisateur

Naviguer en ligne ou télécharger Guide de l'utilisateur pour Routeurs ZoneAlarm Z100G. ZoneAlarm Z100G User guide Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 428
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - Check Point ZoneAlarm

Check Point ZoneAlarm Secure Wireless Router Z100G User Guide Version 7.5 August 2007

Page 2 - GNU GENERAL PUBLIC LICENSE

Contents iv Check Point ZoneAlarm User Guide Email Filtering ...

Page 3

Configuring Network Settings 86 Check Point ZoneAlarm User Guide Configuring a DHCP Server By default, the ZoneAlarm router operates as a DHCP (

Page 4 - SAFETY PRECAUTIONS

Configuring Network Settings Chapter 6: Managing Your Network 87 A warning message appears. 5. Click OK. A success message appears 6. If your c

Page 5 - SECURITY DISCLAIMER

Configuring Network Settings 88 Check Point ZoneAlarm User Guide 3. Do one of the following: • To allow the DHCP server to set the IP address r

Page 6

Configuring Network Settings Chapter 6: Managing Your Network 89 Configuring DHCP Relay You can configure DHCP relay for internal networks.

Page 7

Configuring Network Settings 90 Check Point ZoneAlarm User Guide 5. In the Secondary DHCP Server IP field, type the IP address of the DHCP serve

Page 8

Configuring Network Settings Chapter 6: Managing Your Network 91 The DHCP Server Options page appears. 4. Complete the fields using the relevan

Page 9 - Contents iii

Configuring Network Settings 92 Check Point ZoneAlarm User Guide New fields appear, depending on the check boxes you selected. 5. Click Apply.

Page 10 - Contents

Configuring Network Settings Chapter 6: Managing Your Network 93 Table 16: DHCP Server Options Fields In this field… Do this… Domain Name Type

Page 11 - Contents v

Configuring Network Settings 94 Check Point ZoneAlarm User Guide In this field… Do this… Automatically assign default gateway Clear this option

Page 12

Using Network Objects Chapter 6: Managing Your Network 95 In this field… Do this… Nortel IP Phone To enable Nortel IP phones to receive their c

Page 13 - About This Guide

Contents Contents v Configuring HTTPS...

Page 14

Using Network Objects 96 Check Point ZoneAlarm User Guide • Assign the network object's IP address to a MAC address Normally, the ZoneAlar

Page 15 - Introduction

Using Network Objects Chapter 6: Managing Your Network 97 Adding and Editing Network Objects You can add or edit network objects via: • The Net

Page 16 - Product Features

Using Network Objects 98 Check Point ZoneAlarm User Guide The ZoneAlarm Network Object Wizard opens, with the Step 1: Network Object Type dialog

Page 17 - Chapter 1: Introduction 3

Using Network Objects Chapter 6: Managing Your Network 99 The Step 2: Computer Details dialog box appears. If you chose Single Computer, the dial

Page 18

Using Network Objects 100 Check Point ZoneAlarm User Guide The Step 3: Save dialog box appears. 7. Type a name for the network object in the fi

Page 19 - Optional Security Services

Using Network Objects Chapter 6: Managing Your Network 101 The My Computers page appears. If a computer has not yet been added as a network obje

Page 20 - Software Requirements

Using Network Objects 102 Check Point ZoneAlarm User Guide 4. Click Next. The Step 2: Computer Details dialog box appears. The computer's

Page 21 - Rear Panel

Using Network Objects Chapter 6: Managing Your Network 103 In this field… Do this… External IP Type the Internet IP address to which you want t

Page 22 - Label Description

Configuring Network Service Objects 104 Check Point ZoneAlarm User Guide Viewing and Deleting Network Objects To view or delete a network object

Page 23 - Front Panel

Configuring Network Service Objects Chapter 6: Managing Your Network 105 The Network Services page appears with a list of network service objects

Page 25 - The ZoneAlarm Firewall

Configuring Network Service Objects 106 Check Point ZoneAlarm User Guide The ZoneAlarm Network Service Wizard opens, with the Step 1: Network Ser

Page 26 - Old Firewall Technologies

Configuring Network Service Objects Chapter 6: Managing Your Network 107 6. Click Finish. Table 19: Network Service Fields In this field… Do th

Page 27 - Application-Layer Gateways

Managing Ports 108 Check Point ZoneAlarm User Guide Managing Ports The ZoneAlarm router allows you to restrict the LAN1-4 ports and the WAN port

Page 28

Managing Ports Chapter 6: Managing Your Network 109 Table 20: Ports Fields This field… Displays… Assign To The port's current assignment.

Page 29 - Example

Managing Ports 110 Check Point ZoneAlarm User Guide The Port Setup page appears. 3. In the Assign to Network drop-down list, do one of the foll

Page 30

Managing Ports Chapter 6: Managing Your Network 111 Modifying Link Configurations By default, the ZoneAlarm router automatically detects the lin

Page 31 - Firewall Technology Action

Managing Ports 112 Check Point ZoneAlarm User Guide Resetting Ports to Defaults You can reset the ZoneAlarm router's ports to their default

Page 32

Overview Chapter 7: Configuring a Wireless Network 113 Chapter 7 This chapter describes how to configure a wireless internal network. This chapte

Page 33 - Chapter 3

Overview 114 Check Point ZoneAlarm User Guide About the Wireless Hardware in Your ZoneAlarm Wireless Router Your ZoneAlarm wireless router featur

Page 34 - Windows Vista

Overview Chapter 7: Configuring a Wireless Network 115 Security Protocol Description WEP encryption In the WEP (Wired Equivalent Privacy) encryp

Page 35

About Your Check Point ZoneAlarm Router Chapter 1: About This Guide vii To make finding information in this manual easier, some types of informat

Page 36

Using the Wireless Configuration Wizard 116 Check Point ZoneAlarm User Guide Using the Wireless Configuration Wizard The Wireless Configuration W

Page 37 - TCP/IP Settings

Using the Wireless Configuration Wizard Chapter 7: Configuring a Wireless Network 117 7. Click Next. 8. The Wireless Security dialog box appear

Page 38 - Windows 2000/XP

Using the Wireless Configuration Wizard 118 Check Point ZoneAlarm User Guide 10. Do one of the following: • To bridge the LAN and WLAN networks

Page 39

Using the Wireless Configuration Wizard Chapter 7: Configuring a Wireless Network 119 WPA-Personal If you chose WPA-Personal, the Wireless Config

Page 40

Using the Wireless Configuration Wizard 120 Check Point ZoneAlarm User Guide The Wireless Security Confirmation dialog box appears. 3. Click Ne

Page 41 - Installing TCP/IP Protocol

Using the Wireless Configuration Wizard Chapter 7: Configuring a Wireless Network 121 WEP If you chose WEP, the Wireless Configuration-WEP dialog

Page 42

Manually Configuring a WLAN 122 Check Point ZoneAlarm User Guide 4. Click Next. The Wireless Security Complete dialog box appears. 5. Click Fin

Page 43

Manually Configuring a WLAN Chapter 7: Configuring a Wireless Network 123 The Edit Network Settings page appears. 4. In the Mode drop-down list

Page 44 - Mac OS-X

Manually Configuring a WLAN 124 Check Point ZoneAlarm User Guide 7. If desired, enable or disable Hide NAT. See Enabling/Disabling Hide NAT on

Page 45 - 3. Click Configure

Manually Configuring a WLAN Chapter 7: Configuring a Wireless Network 125 New fields appear. 11. Click Apply. A warning message appears, telli

Page 47

Manually Configuring a WLAN 126 Check Point ZoneAlarm User Guide A success message appears. Note: Some wireless cards have "Infrastructure

Page 48

Manually Configuring a WLAN Chapter 7: Configuring a Wireless Network 127 In this field… Do this… Operation Mode Select an operation mode: • 8

Page 49

Manually Configuring a WLAN 128 Check Point ZoneAlarm User Guide In this field… Do this… Channel Select the radio frequency to use for the wire

Page 50 - Router Installation

Manually Configuring a WLAN Chapter 7: Configuring a Wireless Network 129 In this field… Do this… Require WPA2 (802.11i) Specify whether you wan

Page 51 - Router Installation

Manually Configuring a WLAN 130 Check Point ZoneAlarm User Guide In this field… Do this… Key 1, 2, 3, 4 length Select the WEP key length from th

Page 52 - Cascading Your Router

Manually Configuring a WLAN Chapter 7: Configuring a Wireless Network 131 Table 23: Advanced Wireless Settings Fields In this field… Do this… Ad

Page 53 - To connect network printers

Manually Configuring a WLAN 132 Check Point ZoneAlarm User Guide In this field… Do this… Wireless Transmitter Transmission Rate Select the tra

Page 54

Manually Configuring a WLAN Chapter 7: Configuring a Wireless Network 133 In this field… Do this… Fragmentation Threshold Type the smallest IP p

Page 55

Manually Configuring a WLAN 134 Check Point ZoneAlarm User Guide In this field… Do this… Extended Range Mode (XR) Specify whether to use Extende

Page 56

Troubleshooting Wireless Connectivity Chapter 7: Configuring a Wireless Network 135 Troubleshooting Wireless Connectivity I cannot connect to the

Page 57 - Getting Started

About Your Check Point ZoneAlarm Router Chapter 1: Introduction 1 Chapter 1 This chapter introduces the Check Point ZoneAlarm Secure Wireless Rou

Page 58 - 3. Click OK

Troubleshooting Wireless Connectivity 136 Check Point ZoneAlarm User Guide • Check the Transmission Power parameter in the WLAN's advanced

Page 59

Troubleshooting Wireless Connectivity Chapter 7: Configuring a Wireless Network 137 Note: Reducing the RTS Threshold and the Fragmentation Thre

Page 61

Overview Chapter 8: Using Bridges 139 Chapter 8 This chapter describes how to connect multiple network segments at the data-link layer, using a b

Page 62

Workflow 140 Check Point ZoneAlarm User Guide • If a host with an IP address outside of the allowed IP address range tries to connect from the L

Page 63 - Using the ZoneAlarm Portal

Adding and Editing Bridges Chapter 8: Using Bridges 141 Adding and Editing Bridges To add or edit a bridge 1. Click Network in the main menu, a

Page 64 - Main Menu

Adding and Editing Bridges 142 Check Point ZoneAlarm User Guide The Bridge Configuration page appears. 3. Complete the fields using the followi

Page 65 - Main Frame

Adding and Editing Bridges Chapter 8: Using Bridges 143 Table 24: Bridge Configuration Fields In this field… Do this… Network Name Type a name

Page 66 - Status Bar

Adding and Editing Bridges 144 Check Point ZoneAlarm User Guide In this field… Do this… Bridge Priority Select this bridge's priority. Th

Page 67 - Logging off

Adding Internal Networks to Bridges Chapter 8: Using Bridges 145 Adding Internal Networks to Bridges To add an internal network to a bridge 1.

Page 68

Product Features 2 Check Point ZoneAlarm User Guide Product Features Table 1: ZoneAlarm Z100G Features Feature ZoneAlarm Z100G Concurrent Users

Page 69

Adding Internal Networks to Bridges 146 Check Point ZoneAlarm User Guide If the assigned bridge uses STP, additional fields appear. 5. Click Ap

Page 70 - Using the Internet Wizard

Adding Internal Networks to Bridges Chapter 8: Using Bridges 147 In the My Network page, the internal network appears indented under the bridge.

Page 71 - Using the Internet Wizard

Adding Internal Networks to Bridges 148 Check Point ZoneAlarm User Guide In this field… Do this… Allowed IP Range Type the range of IP addresse

Page 72 - Using a PPPoE Connection

Adding Internal Networks to Bridges Chapter 8: Using Bridges 149 In this field… Do this… Spanning Tree Protocol - Port Priority Select the port&

Page 73

Deleting Bridges 150 Check Point ZoneAlarm User Guide Deleting Bridges To delete a bridge 1. Remove all internal networks from the bridge, by do

Page 74 - Using a PPTP Connection

Viewing the Event Log Chapter 9: Viewing Reports 151 Chapter 9 This chapter describes the ZoneAlarm Portal reports. This chapter includes the fo

Page 75

Viewing the Event Log 152 Check Point ZoneAlarm User Guide An event marked in this color… Indicates… Green Traffic accepted by the firewall. By

Page 76 - Using a Static IP Connection

Viewing the Event Log Chapter 9: Viewing Reports 153 To view the event log 1. Click Reports in the main menu, and click the Event Log tab. The

Page 77 - Using a DHCP Connection

Using the Traffic Monitor 154 Check Point ZoneAlarm User Guide A standard File Download dialog box appears. b. Click Save. The Save As dialog bo

Page 78 - Using Internet Setup

Using the Traffic Monitor Chapter 9: Viewing Reports 155 You can export a detailed traffic report for all enabled networks, using the procedure E

Page 79 - Using Internet Setup

Product Features Chapter 1: Introduction 3 Four Preset Security Policies Anti-spoofing Voice over IP (H.323) Support INSPECT Engine Instant M

Page 80 - Using a LAN Connection

Using the Traffic Monitor 156 Check Point ZoneAlarm User Guide Note: The firewall blocks broadcast packets used during the normal operation of

Page 81

Using the Traffic Monitor Chapter 9: Viewing Reports 157 4. Click Apply. Exporting General Traffic Reports You can export a general traffic re

Page 82

Viewing Computers 158 Check Point ZoneAlarm User Guide Viewing Computers This option allows you to view the currently active computers on your n

Page 83

Viewing Computers Chapter 9: Viewing Reports 159 These computers are still protected, but they are blocked from accessing the Internet through th

Page 84

Viewing Connections 160 Check Point ZoneAlarm User Guide Viewing Connections This option allows you to view currently active connections between

Page 85

Viewing Wireless Statistics Chapter 9: Viewing Reports 161 Table 28: Connections Fields This field… Displays… Protocol The protocol used (TCP,

Page 86

Viewing Wireless Statistics 162 Check Point ZoneAlarm User Guide The Wireless page appears. The page displays the information in the following t

Page 87

Viewing Wireless Statistics Chapter 9: Viewing Reports 163 This field… Displays… Statistics for WLAN This information is displayed for the WLAN.

Page 88 - Configuring No Connection

Viewing Wireless Statistics 164 Check Point ZoneAlarm User Guide To view statistics for a wireless station 1. Click Reports in the main menu, a

Page 89

Viewing Wireless Statistics Chapter 9: Viewing Reports 165 This field… Displays… XR Indicates whether the wireless client supports Extended Ran

Page 90

Product Features 4 Check Point ZoneAlarm User Guide Spanning Tree Protocol (STP) Traffic Monitoring DHCP Server, Client, and Relay MAC Clonin

Page 92

The ZoneAlarm Firewall Security Policy Chapter 10: Setting Your Security Policy 167 Chapter 10 This chapter describes how to set up your ZoneAlar

Page 93 - Field Description

Default Security Policy 168 Check Point ZoneAlarm User Guide Security Policy Implementation The key to implementing a network security policy is

Page 94

Setting the Firewall Security Level Chapter 10: Setting Your Security Policy 169 • Access from the WAN to network printers is blocked. These rul

Page 95 - Managing Your Network

Setting the Firewall Security Level 170 Check Point ZoneAlarm User Guide This level… Does this… Further Details High Enforces strict control on

Page 96

Setting the Firewall Security Level Chapter 10: Setting Your Security Policy 171 To change the firewall security level 1. Click Security in the

Page 97 - Changing IP Addresses

Using Firewall Rules 172 Check Point ZoneAlarm User Guide Using Firewall Rules The ZoneAlarm router checks the protocol used, the ports range,

Page 98

Using Firewall Rules Chapter 10: Setting Your Security Policy 173 For example, if you want to block all outgoing FTP traffic, except traffic from

Page 99 - Enabling/Disabling Hide NAT

Using Firewall Rules 174 Check Point ZoneAlarm User Guide The following rule types exist: Table 32: Firewall Rule Types Rule Description Allow a

Page 100 - Configuring a DHCP Server

Using Firewall Rules Chapter 10: Setting Your Security Policy 175 Rule Description Allow This rule type enables you to do the following: • Perm

Page 101

Optional Security Services Chapter 1: Introduction 5 Local Diagnostics Tools Ping, WHOIS, Packet Sniffer, VPN Tunnel Monitor, Connection Table M

Page 102

Using Firewall Rules 176 Check Point ZoneAlarm User Guide Adding and Editing Firewall Rules To add or edit a firewall rule 1. Click Security in

Page 103 - Configuring DHCP Relay

Using Firewall Rules Chapter 10: Setting Your Security Policy 177 The ZoneAlarm Firewall Rule wizard opens, with the Step 1: Rule Type dialog box

Page 104 - To configure DHCP options

Using Firewall Rules 178 Check Point ZoneAlarm User Guide 5. Complete the fields using the relevant information in the following table. 6. Clic

Page 105

Using Firewall Rules Chapter 10: Setting Your Security Policy 179 8. Complete the fields using the relevant information in the following table.

Page 106

Using Firewall Rules 180 Check Point ZoneAlarm User Guide The Step 5: Done dialog box appears. 12. If desired, type a description of the rule i

Page 107 - In this field… Do this…

Using Firewall Rules Chapter 10: Setting Your Security Policy 181 In this field… Do this… Protocol Select the protocol for which the rule shoul

Page 108

Using Firewall Rules 182 Check Point ZoneAlarm User Guide In this field… Do this… Destination Select the destination of the connections you wan

Page 109 - Using Network Objects

Using Firewall Rules Chapter 10: Setting Your Security Policy 183 In this field… Do this… Log accepted connections / Log blocked connections Se

Page 110

Using Firewall Rules 184 Check Point ZoneAlarm User Guide Changing Firewall Rules' Priority To change a firewall rule's priority 1. C

Page 111 - Using Network Objects

Configuring Servers Chapter 10: Setting Your Security Policy 185 Configuring Servers Note: If you do not intend to host any public Internet se

Page 112

COPYRIGHT & TRADEMARKS Copyright © 2007 SofaWare, All Rights Reserved. No part of this document may be reproduced in any form or by any means wi

Page 113

Software Requirements 6 Check Point ZoneAlarm User Guide These services require an additional purchase of subscription. For more information, go

Page 114 - 8. Click Finish

Configuring Servers 186 Check Point ZoneAlarm User Guide To allow services to be run on a specific host 1. Click Security in the main menu, and

Page 115

Using Web Rules Chapter 10: Setting Your Security Policy 187 In this column… Do this… Host IP Type the IP address of the computer that will run

Page 116

Using Web Rules 188 Check Point ZoneAlarm User Guide Note: Web rules differ from the Web Filtering subscription service in the following ways:

Page 117

Using Web Rules Chapter 10: Setting Your Security Policy 189 For example, if you want to block all the pages of a particular Web site, except a s

Page 118

Using Web Rules 190 Check Point ZoneAlarm User Guide Adding and Editing Web Rules To add or edit a Web rule 1. Click Security in the main menu,

Page 119

Using Web Rules Chapter 10: Setting Your Security Policy 191 The ZoneAlarm Web Rule Wizard opens, with the Step 1: Rule Type dialog box displayed

Page 120

Using Web Rules 192 Check Point ZoneAlarm User Guide 5. Complete the fields using the relevant information in the following table. 6. Click Nex

Page 121

Using Web Rules Chapter 10: Setting Your Security Policy 193 Table 36: Web Rules Fields In this field… Do this… Block/Allow access to the follow

Page 122 - Managing Ports

Using Web Rules 194 Check Point ZoneAlarm User Guide Changing Web Rules' Priority To change a Web rule's priority 1. Click Security i

Page 123 - Enabling/Disabling Ports

Using Web Rules Chapter 10: Setting Your Security Policy 195 Customizing the Access Denied Page The Access Denied page appears when a user attem

Page 124

Getting to Know Your ZoneAlarm Z100G Router Chapter 1: Introduction 7 Network Requirements • 10BaseT or 100BaseT Network Interface Card instal

Page 125 - Managing Ports

Using Web Rules 196 Check Point ZoneAlarm User Guide You can use HTML tags as needed. 4. To display the Access Denied page using HTTPS, select

Page 126 - Resetting Ports to Defaults

Overview Chapter 11: Using SmartDefense 197 Chapter 11 This chapter explains how to use Check Point SmartDefense Services. This chapter includes

Page 127 - Overview

Configuring SmartDefense 198 Check Point ZoneAlarm User Guide Configuring SmartDefense You can configure SmartDefense using the following tools:

Page 128 - Wireless Security Protocols

Configuring SmartDefense Chapter 11: Using SmartDefense 199 The SmartDefense page appears. 2. Click SmartDefense Wizard. The SmartDefense Wizar

Page 129 - Description

Configuring SmartDefense 200 Check Point ZoneAlarm User Guide For information on the levels, see the following table. 4. Click Next. The Step 2:

Page 130

Configuring SmartDefense Chapter 11: Using SmartDefense 201 7. Select the check boxes next to the types of applications you want to block from r

Page 131

Configuring SmartDefense 202 Check Point ZoneAlarm User Guide Table 37: SmartDefense Security Levels This level… Does this… Minimal Disables a

Page 132

Configuring SmartDefense Chapter 11: Using SmartDefense 203 Using the SmartDefense Tree For convenience, SmartDefense is organized as a tree, in

Page 133 - WPA-Personal

Configuring SmartDefense 204 Check Point ZoneAlarm User Guide To configure a SmartDefense node 1. Click Security in the main menu, and click th

Page 134

SmartDefense Categories Chapter 11: Using SmartDefense 205 a) Click Default. A confirmation message appears. b) Click OK. The fields are reset

Page 135

Getting to Know Your ZoneAlarm Z100G Router 8 Check Point ZoneAlarm User Guide Table 2: ZoneAlarm Z100G Router Rear Panel Elements Label Descri

Page 136 - Manually Configuring a WLAN

SmartDefense Categories 206 Check Point ZoneAlarm User Guide Teardrop In a Teardrop attack, the attacker sends two IP fragments, the latter entir

Page 137

SmartDefense Categories Chapter 11: Using SmartDefense 207 Ping of Death In a Ping of Death attack, the attacker sends a fragmented PING request

Page 138

SmartDefense Categories 208 Check Point ZoneAlarm User Guide LAND In a LAND attack, the attacker sends a SYN packet, in which the source address

Page 139 - 12. Click OK

SmartDefense Categories Chapter 11: Using SmartDefense 209 Non-TCP Flooding Advanced firewalls maintain state information about connections in a

Page 140 - A success message appears

SmartDefense Categories 210 Check Point ZoneAlarm User Guide In this field… Do this… Max. Percent Non-TCP Traffic Type the maximum percentage of

Page 141

SmartDefense Categories Chapter 11: Using SmartDefense 211 Table 42: Distributed Denial of Service Fields In this field… Do this… Action Specif

Page 142

SmartDefense Categories 212 Check Point ZoneAlarm User Guide Packet Sanity Packet Sanity performs several Layer 3 and Layer 4 sanity checks. Thes

Page 143

SmartDefense Categories Chapter 11: Using SmartDefense 213 In this field… Do this… Disable relaxed UDP length verification The UDP length verifi

Page 144

SmartDefense Categories 214 Check Point ZoneAlarm User Guide Max Ping Size PING (ICMP echo request) is a program that uses ICMP protocol to check

Page 145

SmartDefense Categories Chapter 11: Using SmartDefense 215 In this field… Do this… Max Ping Size Specify the maximum data size for ICMP echo re

Page 146

Getting to Know Your ZoneAlarm Z100G Router Chapter 1: Introduction 9 Front Panel The ZoneAlarm Z100G router includes several status LEDs that en

Page 147

SmartDefense Categories 216 Check Point ZoneAlarm User Guide Table 45: IP Fragments Fields In this field… Do this… Forbid IP Fragments Specify

Page 148

SmartDefense Categories Chapter 11: Using SmartDefense 217 Network Quota An attacker may try to overload a server in your network by establishing

Page 149

SmartDefense Categories 218 Check Point ZoneAlarm User Guide In this field… Do this… Max. Connections/Second from Same Source IP Type the maximu

Page 150

SmartDefense Categories Chapter 11: Using SmartDefense 219 Table 47: Welchia Fields In this field… Do this… Action Specify what action to take

Page 151

SmartDefense Categories 220 Check Point ZoneAlarm User Guide Table 48: Cisco IOS DOS In this field… Do this… Action Specify what action to tak

Page 152

SmartDefense Categories Chapter 11: Using SmartDefense 221 Null Payload Some worms, such as Sasser, use ICMP echo request packets with null paylo

Page 153 - Using Bridges

SmartDefense Categories 222 Check Point ZoneAlarm User Guide Checksum Verification SmartDefense identifies any IP, TCP, or UDP packets with incor

Page 154 - Workflow

SmartDefense Categories Chapter 11: Using SmartDefense 223 TCP This category allows you to configure various protections related to the TCP proto

Page 155 - Adding and Editing Bridges

SmartDefense Categories 224 Check Point ZoneAlarm User Guide Table 51: Strict TCP In this field… Do this… Action Specify what action to take w

Page 156 - 4. Click Apply

SmartDefense Categories Chapter 11: Using SmartDefense 225 Table 52: Small PMTU Fields In this field… Do this… Action Specify what action to ta

Page 157

Contacting Technical Support 10 Check Point ZoneAlarm User Guide LED State Explanation LNK/ACT Flashing Data is being transmitted/received VPN

Page 158

SmartDefense Categories 226 Check Point ZoneAlarm User Guide SynDefender In a SYN attack, the attacker sends many SYN packets without finishing t

Page 159

SmartDefense Categories Chapter 11: Using SmartDefense 227 In this field… Do this… Log Mode Specify upon which events logs should be issued, by

Page 160

SmartDefense Categories 228 Check Point ZoneAlarm User Guide Sequence Verifier The ZoneAlarm router examines each TCP packet's sequence numb

Page 161

SmartDefense Categories Chapter 11: Using SmartDefense 229 Flags The URG flag is used to indicate that there is urgent data in the TCP stream, an

Page 162

SmartDefense Categories 230 Check Point ZoneAlarm User Guide Port Scan An attacker can perform a port scan to determine whether ports are open an

Page 163

SmartDefense Categories Chapter 11: Using SmartDefense 231 Table 56: Port Scan Fields In this field… Do this… Number of ports accessed SmartDef

Page 164 - Deleting Bridges

SmartDefense Categories 232 Check Point ZoneAlarm User Guide In this field… Do this… Track Specify whether to issue logs for scans, by selectin

Page 165 - Viewing Reports

SmartDefense Categories Chapter 11: Using SmartDefense 233 FTP Bounce When connecting to an FTP server, the client sends a PORT command specifyin

Page 166 - Indicates…

SmartDefense Categories 234 Check Point ZoneAlarm User Guide Block Known Ports You can choose to block the FTP server from connecting to well-kno

Page 167 - To view the event log

SmartDefense Categories Chapter 11: Using SmartDefense 235 Block Port Overflow FTP clients send PORT commands when connecting to the FTP sever. A

Page 168 - Using the Traffic Monitor

What Is a Firewall? Chapter 2: The ZoneAlarm Firewall 11 Chapter 2 This chapter introduces the ZoneAlarm firewall and its advantages. This chapte

Page 169 - Viewing Traffic Reports

SmartDefense Categories 236 Check Point ZoneAlarm User Guide Blocked FTP Commands Some seldom-used FTP commands may compromise FTP server securit

Page 170

SmartDefense Categories Chapter 11: Using SmartDefense 237 To allow a specific FTP command 1. In the Blocked Commands box, select the desired FT

Page 171 - Using the Traffic Monitor

SmartDefense Categories 238 Check Point ZoneAlarm User Guide Table 60: Header Rejection Fields In this field… Do this… Action Specify what acti

Page 172 - Viewing Computers

SmartDefense Categories Chapter 11: Using SmartDefense 239 Table 61: Worm Catcher Fields In this field… Do this… Action Specify what action to

Page 173 - Viewing Computers

SmartDefense Categories 240 Check Point ZoneAlarm User Guide In each node, you can configure how peer-to-peer connections of the selected type sh

Page 174 - Viewing Connections

SmartDefense Categories Chapter 11: Using SmartDefense 241 In this field… Do this… Block masquerading over HTTP protocol Specify whether to bloc

Page 175 - Viewing Wireless Statistics

SmartDefense Categories 242 Check Point ZoneAlarm User Guide Table 63: File Print and Sharing Fields In this field… Do this… Action Specify wha

Page 176 - The Wireless page appears

SmartDefense Categories Chapter 11: Using SmartDefense 243 IGMP This category includes the IGMP protocol. IGMP is used by hosts and routers to dy

Page 177 - This field… Displays…

SmartDefense Categories 244 Check Point ZoneAlarm User Guide In this field… Do this… Enforce IGMP to multicast addresses According to the IGMP s

Page 178

SmartDefense Categories Chapter 11: Using SmartDefense 245 Note: SmartDefense can detect instant messaging traffic regardless of the TCP port

Page 179

Security Requirements 12 Check Point ZoneAlarm User Guide Security Requirements In order to make control decisions for new communication attempts

Page 180

Resetting SmartDefense to its Defaults 246 Check Point ZoneAlarm User Guide In this field… Do this… Block proprietary protocol / Block propriet

Page 181 - Setting Your Security Policy

Overview Chapter 12: Using VStream Antivirus 247 Chapter 12 This chapter explains how to use the VStream Antivirus engine to block security threa

Page 182 - Default Security Policy

Overview 248 Check Point ZoneAlarm User Guide Table 66: VStream Antivirus Actions If a virus if found in this protocol... VStream Antivirus does

Page 183 - Does this… Further Details

Enabling/Disabling VStream Antivirus Chapter 12: Using VStream Antivirus 249 If you are subscribed to the VStream Antivirus subscription service,

Page 184

Viewing VStream Antivirus Signature Database Information 250 Check Point ZoneAlarm User Guide 2. Drag the On/Off lever upwards or downwards. VSt

Page 185 - The Firewall page appears

Configuring VStream Antivirus Chapter 12: Using VStream Antivirus 251 Configuring VStream Antivirus You can configure VStream Antivirus in the fo

Page 186 - Using Firewall Rules

Configuring VStream Antivirus 252 Check Point ZoneAlarm User Guide The ZoneAlarm router will process rule 1 first, passing outgoing SMTP traffic

Page 187 - Using Firewall Rules

Configuring VStream Antivirus Chapter 12: Using VStream Antivirus 253 The Antivirus Policy page appears. 2. Do one of the following: • To add

Page 188 - Rule Description

Configuring VStream Antivirus 254 Check Point ZoneAlarm User Guide 3. Select the type of rule you want to create. 4. Click Next. The Step 2: Se

Page 189

Configuring VStream Antivirus Chapter 12: Using VStream Antivirus 255 The Step 3: Destination & Source dialog box appears. 7. To configure

Page 190

Old Firewall Technologies Chapter 2: The ZoneAlarm Firewall 13 Table 4: Packet Filter Advantages and Disadvantages Advantages Disadvantages Appl

Page 191

Configuring VStream Antivirus 256 Check Point ZoneAlarm User Guide The Step 4: Done dialog box appears. 10. If desired, type a description of t

Page 192

Configuring VStream Antivirus Chapter 12: Using VStream Antivirus 257 In this field… Do this… Protocol Select the protocol (TCP, UDP, or ANY) f

Page 193

Configuring VStream Antivirus 258 Check Point ZoneAlarm User Guide In this field… Do this… Data Direction Select the direction of connections t

Page 194 - 13. Click Finish

Configuring VStream Antivirus Chapter 12: Using VStream Antivirus 259 Enabling/Disabling VStream Antivirus Rules You can temporarily disable a V

Page 195

Configuring VStream Antivirus 260 Check Point ZoneAlarm User Guide Viewing and Deleting VStream Antivirus Rules To view or delete an existing VS

Page 196

Configuring VStream Antivirus Chapter 12: Using VStream Antivirus 261 Configuring VStream Antivirus Advanced Settings To configure VStream Antiv

Page 197

Configuring VStream Antivirus 262 Check Point ZoneAlarm User Guide Table 70: Advanced Antivirus Settings Fields In this field… Do this… File Typ

Page 198

Configuring VStream Antivirus Chapter 12: Using VStream Antivirus 263 In this field… Do this… Pass safe file types without scanning Select this

Page 199 - Configuring Servers

Configuring VStream Antivirus 264 Check Point ZoneAlarm User Guide In this field… Do this… Archive File Handling Maximum Nesting Level Type th

Page 200 - Do this…

Updating VStream Antivirus Chapter 12: Using VStream Antivirus 265 In this field… Do this… When a password-protected file is found in archive VS

Page 201 - Using Web Rules

Check Point Stateful Inspection Technology 14 Check Point ZoneAlarm User Guide Check Point Stateful Inspection Technology Invented by Check Point

Page 203 - Table 35: Web Rule Types

Connecting to a Service Center Chapter 13: Using Subscription Services 267 Chapter 13 This chapter explains how to start subscription services, a

Page 204 - Adding and Editing Web Rules

Connecting to a Service Center 268 Check Point ZoneAlarm User Guide The Account page appears. 2. In the Service Account area, click Connect.

Page 205 - Using Web Rules

Connecting to a Service Center Chapter 13: Using Subscription Services 269 The ZoneAlarm Services Wizard opens, with the Service Center dialog bo

Page 206

Connecting to a Service Center 270 Check Point ZoneAlarm User Guide • If the Service Center requires authentication, the Service Center Login di

Page 207 - Table 36: Web Rules Fields

Connecting to a Service Center Chapter 13: Using Subscription Services 271 6. Click Next. The Done screen appears with a success message. 7.

Page 208

Connecting to a Service Center 272 Check Point ZoneAlarm User Guide • The services to which you are subscribed are now available on your ZoneAla

Page 209

Viewing Services Information Chapter 13: Using Subscription Services 273 Viewing Services Information The Account page displays the following

Page 210

Refreshing Your Service Center Connection 274 Check Point ZoneAlarm User Guide Refreshing Your Service Center Connection This option restarts yo

Page 211 - Using SmartDefense

Configuring Your Account Chapter 13: Using Subscription Services 275 Configuring Your Account This option allows you to access your Service Cent

Page 212 - Configuring SmartDefense

Check Point Stateful Inspection Technology Chapter 2: The ZoneAlarm Firewall 15 • Date and time of packet arrival or departure The ZoneAlarm fir

Page 213 - Configuring SmartDefense

Web Filtering 276 Check Point ZoneAlarm User Guide 5. Click Finish. The following things happen: • You are disconnected from the Service Center

Page 214

Web Filtering Chapter 13: Using Subscription Services 277 Note: The Web Filtering subscription service differs from Web rules in the following

Page 215

Web Filtering 278 Check Point ZoneAlarm User Guide The Web Filtering page appears. 2. Drag the On/Off lever upwards or downwards. Web Filtering

Page 216 - This level… Does this…

Web Filtering Chapter 13: Using Subscription Services 279 Selecting Categories for Blocking You can define which types of Web sites should be co

Page 217 - Using the SmartDefense Tree

Web Filtering 280 Check Point ZoneAlarm User Guide This ensures that users will not gain access to undesirable Web sites, even when the Service C

Page 218

Web Filtering Chapter 13: Using Subscription Services 281 • The Snooze button changes to Resume. • The Web Filtering Off popup window opens.

Page 219 - SmartDefense Categories

Email Filtering 282 Check Point ZoneAlarm User Guide • If you clicked Resume in the Web Filtering Off popup window, the popup window closes. Em

Page 220 - Teardrop

Email Filtering Chapter 13: Using Subscription Services 283 Enabling/Disabling Email Filtering To enable/disable Email Filtering 1. Click Servi

Page 221 - Ping of Death

Email Filtering 284 Check Point ZoneAlarm User Guide Note: If the ZoneAlarm router is remotely managed, contact your Service Center administrat

Page 222 - Table 40: LAND Fields

Email Filtering Chapter 13: Using Subscription Services 285 Temporarily Disabling Email Filtering If you are having problems sending or receivi

Page 223 - Non-TCP Flooding

1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuou

Page 224 - DDoS Attack

Check Point Stateful Inspection Technology 16 Check Point ZoneAlarm User Guide Step Channel Type Description Source TCP Source Port Destinatio

Page 225 - IP and ICMP

Email Filtering 286 Check Point ZoneAlarm User Guide • The Email Filtering Off popup window opens. 3. To re-enable Email Antivirus and Email

Page 226 - Packet Sanity

Automatic and Manual Updates Chapter 13: Using Subscription Services 287 Automatic and Manual Updates The Software Updates service enables you to

Page 227

Automatic and Manual Updates 288 Check Point ZoneAlarm User Guide Checking for Software Updates when Locally Managed If your ZoneAlarm router is

Page 228 - Max Ping Size

Automatic and Manual Updates Chapter 13: Using Subscription Services 289 3. To set the ZoneAlarm router so that software updates must be checked

Page 230

Overview Chapter 14: Secure Remote Access 291 Chapter 14 This chapter describes how to use your ZoneAlarm router as a Remote Access VPN Server. T

Page 231 - Network Quota

Overview 292 Check Point ZoneAlarm User Guide ZoneAlarm allows a single VPN user to connect. If you need to allow VPN remote access to multiple u

Page 232 - Welchia

Configuring a Remote Access VPN Chapter 14: Secure Remote Access 293 Configuring a Remote Access VPN To create a Remote Access VPN with one user

Page 233 - Cisco IOS DOS

Configuring the SecuRemote Remote Access VPN Server 294 Check Point ZoneAlarm User Guide Configuring the SecuRemote Remote Access VPN Server To

Page 234 - Table 48: Cisco IOS DOS

Configuring the SecuRemote Remote Access VPN Server Chapter 14: Secure Remote Access 295 New check boxes appear. 3. To allow authenticated user

Page 235 - Null Payload

Check Point Stateful Inspection Technology Chapter 2: The ZoneAlarm Firewall 17 The fact that both of the channels are established by the client

Page 236 - Checksum Verification

Installing SecuRemote 296 Check Point ZoneAlarm User Guide Installing SecuRemote If you configured the ZoneAlarm SecuRemote VPN Server, then aut

Page 237 - Strict TCP

Installing a Certificate Chapter 14: Secure Remote Access 297 Installing a Certificate A digital certificate is a secure means of authenticating

Page 238 - Small PMTU

Installing a Certificate 298 Check Point ZoneAlarm User Guide Generating a Self-Signed Certificate To generate a self-signed certificate 1. Cli

Page 239 - Table 52: Small PMTU Fields

Installing a Certificate Chapter 14: Secure Remote Access 299 The ZoneAlarm Certificate Wizard opens, with the Certificate Wizard dialog box disp

Page 240 - SynDefender

Installing a Certificate 300 Check Point ZoneAlarm User Guide The Done dialog box appears, displaying the certificate's details. 6. Click

Page 241

Installing a Certificate Chapter 14: Secure Remote Access 301 • The starting and ending dates between which the gateway's certificate and t

Page 242 - Sequence Verifier

Installing a Certificate 302 Check Point ZoneAlarm User Guide In this field… Do this… Valid Until Use the drop-down lists to specify the month,

Page 243 - Table 55: Flags Fields

Installing a Certificate Chapter 14: Secure Remote Access 303 5. Click Next. The Import-Certificate Passphrase dialog box appears. This may take

Page 244 - Port Scan

Uninstalling a Certificate 304 Check Point ZoneAlarm User Guide • The starting and ending dates between which the gateway's certificate and

Page 245 - Table 56: Port Scan Fields

Viewing VPN Tunnels Chapter 14: Secure Remote Access 305 Viewing VPN Tunnels You can view a list of currently established VPN tunnels. To view

Page 246

Check Point Stateful Inspection Technology 18 Check Point ZoneAlarm User Guide Firewall Technology Action Stateful Inspection Firewall A Statefu

Page 247 - FTP Bounce

Viewing VPN Tunnels 306 Check Point ZoneAlarm User Guide Table 73: VPN Tunnels Page Fields This field… Displays… Type The currently active sec

Page 248 - Block Known Ports

Viewing VPN Tunnels Chapter 14: Secure Remote Access 307 This field… Displays… Established The time at which the tunnel was established. This

Page 249 - Block Port Overflow

Viewing IKE Traces for VPN Connections 308 Check Point ZoneAlarm User Guide Viewing IKE Traces for VPN Connections If you are experiencing VPN c

Page 250 - Blocked FTP Commands

Viewing IKE Traces for VPN Connections Chapter 14: Secure Remote Access 309 5. Browse to a destination directory of your choice. 6. Type a name

Page 252 - Worm Catcher

Changing Your Login Credentials Chapter 15: Managing Users 311 Chapter 15 This chapter describes how to manage ZoneAlarm router users. You can de

Page 253 - Peer-to-Peer

Changing Your Login Credentials 312 Check Point ZoneAlarm User Guide The Internal Users page appears. 2. In the row of your username, click Edi

Page 254

Adding and Editing Users Chapter 15: Managing Users 313 Note: Use 5 to 25 characters (letters or numbers) for the new password. 5. Click Next.

Page 255 - Microsoft Networks

Adding and Editing Users 314 Check Point ZoneAlarm User Guide • To edit an existing user, click Edit next to the desired user. The Account Wiza

Page 256

Adding and Editing Users Chapter 15: Managing Users 315 The options that appear on the page are dependant on the software and services you are us

Page 257 - Table 64: IGMP Fields

Before You Install the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 19 Chapter 3 This chapter describes how to properly set up

Page 258 - Instant Messaging Traffic

Adding and Editing Users 316 Check Point ZoneAlarm User Guide Table 76: Set User Permissions Fields In this field... Do this... Administrator Le

Page 259

Viewing and Deleting Users Chapter 15: Managing Users 317 Remote Desktop Access Select this option to allow the user to log on to the my.firewall

Page 260

Setting Up Remote VPN Access for Users 318 Check Point ZoneAlarm User Guide Setting Up Remote VPN Access for Users If you are using your ZoneAla

Page 261 - Using VStream Antivirus

Overview Chapter 16: Using Remote Desktop 319 Chapter 16 This chapter describes how to remotely access the desktop of each of your computers, usi

Page 262 - If a virus if found in

Workflow 320 Check Point ZoneAlarm User Guide Workflow To use Remote Desktop 1. Configure Remote Desktop. See Configuring Remote Desktop on pag

Page 263

Configuring Remote Desktop Chapter 16: Using Remote Desktop 321 Configuring Remote Desktop To configure Remote Desktop 1. Click Setup in the ma

Page 264 - Information

Configuring Remote Desktop 322 Check Point ZoneAlarm User Guide New fields appear. • To disable Remote Desktop, clear the Allow remote desktop

Page 265

Configuring Remote Desktop Chapter 16: Using Remote Desktop 323 In this field… Do this… Share local printers Select this option to allow the ho

Page 266

Configuring the Host Computer 324 Check Point ZoneAlarm User Guide Configuring the Host Computer To enable remote users to connect to a computer,

Page 267

Configuring the Host Computer Chapter 16: Using Remote Desktop 325 The Remote tab appears. 5. Select the Allow users to connect remotely to thi

Page 268

Before You Install the ZoneAlarm Router 20 Check Point ZoneAlarm User Guide Windows Vista Checking the TCP/IP Installation 1. Click Start >

Page 269

Configuring the Host Computer 326 Check Point ZoneAlarm User Guide The Select Users dialog box appears. b. Type the desired user's usernam

Page 270 - 11. Click Finish

Accessing a Remote Computer's Desktop Chapter 16: Using Remote Desktop 327 Accessing a Remote Computer's Desktop Note: The client co

Page 271

Accessing a Remote Computer's Desktop 328 Check Point ZoneAlarm User Guide • The Remote Desktop Connection Security Warning dialog box appe

Page 272

Accessing a Remote Computer's Desktop Chapter 16: Using Remote Desktop 329 Table 78: Remote Desktop Keyboard Shortcuts This shortcut… Does

Page 274

Accessing a Remote Computer's Desktop Chapter 17: Maintenance 331 Chapter 17 This chapter describes the tasks required for maintenance and d

Page 275

Viewing Firmware Status 332 Check Point ZoneAlarm User Guide Viewing Firmware Status The firmware is the software program embedded in the ZoneAl

Page 276

Updating the Firmware Chapter 17: Maintenance 333 This field… Displays… For example… Installed Product The licensed software and the number of

Page 277

Updating the Firmware 334 Check Point ZoneAlarm User Guide The Firmware Update page appears. 3. Click Browse. A browse window appears. 4. Se

Page 278

Upgrading Your License Chapter 17: Maintenance 335 Upgrading Your License If product upgrades are available, you can upgrade the ZoneAlarm prod

Page 279 - Updating VStream Antivirus

Before You Install the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 21 The Network Sharing Center screen appears. 3. In the

Page 280

Configuring Syslog Logging 336 Check Point ZoneAlarm User Guide 4. In the Product Key field, enter the new Product Key. 5. Click Next. The Inst

Page 281 - Using Subscription Services

Configuring Syslog Logging Chapter 17: Maintenance 337 To configure Syslog logging 1. Click Setup in the main menu, and click the Logging tab. T

Page 282 - The Account page appears

Configuring HTTPS 338 Check Point ZoneAlarm User Guide Configuring HTTPS You can enable ZoneAlarm router users to access the ZoneAlarm Portal fr

Page 283

Configuring HTTPS Chapter 17: Maintenance 339 Note: You can use HTTPS to access the ZoneAlarm Portal from your internal network, by surfing to

Page 284

Configuring HTTPS 340 Check Point ZoneAlarm User Guide Table 81: Access Options Select this option… To allow access from… Internal Networks The

Page 285

Setting the Time on the Router Chapter 17: Maintenance 341 Setting the Time on the Router You set the time displayed in the ZoneAlarm Portal dur

Page 286

Setting the Time on the Router 342 Check Point ZoneAlarm User Guide The following things happen in the order below: • If you selected Specify da

Page 287 - Viewing Services Information

Setting the Time on the Router Chapter 17: Maintenance 343 Complete the fields using the information in Time Servers Fields on page 344, then cli

Page 288

Using Diagnostic Tools 344 Check Point ZoneAlarm User Guide Table 83: Time Servers Fields In this field… Do this… Primary Server Type the IP ad

Page 289 - Configuring Your Account

Using Diagnostic Tools Chapter 17: Maintenance 345 Use this tool… To do this… For information, see... Packet Sniffer Capture network traffic. T

Page 290 - Web Filtering

Before You Install the ZoneAlarm Router 22 Check Point ZoneAlarm User Guide The Network Connections screen appears. 4. Double-click the Local A

Page 291 - Web Filtering

Using Diagnostic Tools 346 Check Point ZoneAlarm User Guide • If you selected Traceroute, the following things happen: The ZoneAlarm router conn

Page 292

Using Diagnostic Tools Chapter 17: Maintenance 347 Using Packet Sniffer The ZoneAlarm router includes the Packet Sniffer tool, which enables you

Page 293 - To allow/block a category

Using Diagnostic Tools 348 Check Point ZoneAlarm User Guide The Packet Sniffer window displays the name of the interface, the number of packets c

Page 294

Using Diagnostic Tools Chapter 17: Maintenance 349 Table 85: Packet Sniffer Fields In this field… Do this… Interface Select the interface from

Page 295

Using Diagnostic Tools 350 Check Point ZoneAlarm User Guide Filter String Syntax The following represents a list of basic filter string elements:

Page 296 - Email Filtering

Using Diagnostic Tools Chapter 17: Maintenance 351 EXAMPLE The following filter string saves packets that both originate from IP address is 192.1

Page 297 - Email Filtering

Using Diagnostic Tools 352 Check Point ZoneAlarm User Guide PARAMETERS port Integer. The port to which the packet is sent. EXAMPLE The following

Page 298

Using Diagnostic Tools Chapter 17: Maintenance 353 host PURPOSE The host element captures all incoming and outgoing packets for a specific comput

Page 299

Using Diagnostic Tools 354 Check Point ZoneAlarm User Guide or PURPOSE The or element is used to alternate between string elements. The filtered

Page 300

Using Diagnostic Tools Chapter 17: Maintenance 355 EXAMPLE The following filter string saves all packets that either originated from port 80, or

Page 301 - Automatic and Manual Updates

Before You Install the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 23 The Local Area Connection Properties window opens. 6.

Page 302

Using Diagnostic Tools 356 Check Point ZoneAlarm User Guide PARAMETERS port Integer. The port from which the packet is sent. EXAMPLE The followi

Page 303

Using Diagnostic Tools Chapter 17: Maintenance 357 EXAMPLE 1 The following filter string captures all TCP packets: tcp EXAMPLE 2 The following f

Page 304

Backing Up the ZoneAlarm Router Configuration 358 Check Point ZoneAlarm User Guide EXAMPLE 1 The following filter string captures all UDP packet

Page 305 - Secure Remote Access

Backing Up the ZoneAlarm Router Configuration Chapter 17: Maintenance 359 Importing the ZoneAlarm Router Configuration In order to restore your

Page 306 - Figure 8: Remote Access VPN

Backing Up the ZoneAlarm Router Configuration 360 Check Point ZoneAlarm User Guide The ZoneAlarm router settings are imported. The Import Setting

Page 307

Resetting the ZoneAlarm Router to Defaults Chapter 17: Maintenance 361 Resetting the ZoneAlarm Router to Defaults You can reset the ZoneAlarm ro

Page 308

Resetting the ZoneAlarm Router to Defaults 362 Check Point ZoneAlarm User Guide A confirmation message appears. 3. To revert to the firmware ve

Page 309

Resetting the ZoneAlarm Router to Defaults Chapter 17: Maintenance 363 To reset the ZoneAlarm router to factory defaults using the Reset button

Page 310 - Installing SecuRemote

Running Diagnostics 364 Check Point ZoneAlarm User Guide Running Diagnostics You can view technical information about your ZoneAlarm router’s

Page 311 - Installing a Certificate

Rebooting the ZoneAlarm Router Chapter 17: Maintenance 365 Rebooting the ZoneAlarm Router If your ZoneAlarm router is not functioning properly,

Page 312

Before You Install the ZoneAlarm Router 24 Check Point ZoneAlarm User Guide Note: Normally, it is not recommended to assign a static IP address

Page 314

Overview Chapter 18: Using Network Printers 367 Chapter 18 This chapter describes how to set up and use network printers. This chapter includes t

Page 315 - Table 72: Certificate Fields

Setting Up Network Printers 368 Check Point ZoneAlarm User Guide Setting Up Network Printers To set up a network printer 1. Connect the network

Page 316 - Importing a Certificate

Setting Up Network Printers Chapter 18: Using Network Printers 369 The USB Devices page appears. If the ZoneAlarm router detected the printer, th

Page 317

Setting Up Network Printers 370 Check Point ZoneAlarm User Guide 6. Write down the port number allocated to the printer. The port number appears

Page 318 - Uninstalling a Certificate

Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 371 Configuring Computers to Use Network Printers Perform the r

Page 319 - Viewing VPN Tunnels

Configuring Computers to Use Network Printers 372 Check Point ZoneAlarm User Guide The Printers screen appears. 4. Click Add a printer. The Add

Page 320

Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 373 The Choose a printer port dialog box appears. 7. Click Cre

Page 321 - This icon… Represents…

Configuring Computers to Use Network Printers 374 Check Point ZoneAlarm User Guide 12. In the Port name field, type the port name. 13. Select t

Page 322

Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 375 The Configure Standard TCP/IP Port Monitor dialog box opens.

Page 323

Before You Install the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 25 2. Double-click the Network and Dial-up Connections ic

Page 324

Configuring Computers to Use Network Printers 376 Check Point ZoneAlarm User Guide 15. Do one of the following: • Use the lists to select the p

Page 325 - Managing Users

Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 377 Windows 2000/XP This procedure is relevant for computers wit

Page 326

Configuring Computers to Use Network Printers 378 Check Point ZoneAlarm User Guide The Local or Network Printer dialog box appears. 6. Click Lo

Page 327 - Adding and Editing Users

Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 379 The Add Standard TCP/IP Port Wizard opens with the Welcome d

Page 328

Configuring Computers to Use Network Printers 380 Check Point ZoneAlarm User Guide The Add Standard TCP/IP Printer Port Wizard opens, with the Ad

Page 329

Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 381 19. Click Next. The Completing the Add Standard TCP/IP Prin

Page 330 - In this field... Do this

Configuring Computers to Use Network Printers 382 Check Point ZoneAlarm User Guide 23. Complete the remaining dialog boxes in the wizard as desi

Page 331 - Viewing and Deleting Users

Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 383 MAC OS-X This procedure is relevant for computers with the l

Page 332

Configuring Computers to Use Network Printers 384 Check Point ZoneAlarm User Guide The Print & Fax window appears. 5. In the Printing tab,

Page 333 - Using Remote Desktop

Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 385 New fields appear. 7. In the first drop-down list, select

Page 334

you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those

Page 335 - Configuring Remote Desktop

Before You Install the ZoneAlarm Router 26 Check Point ZoneAlarm User Guide The Local Area Connection Properties window appears. 4. In the abov

Page 336

Configuring Computers to Use Network Printers 386 Check Point ZoneAlarm User Guide A list of models appears. 12. In the Model Name list, selec

Page 337

Viewing Network Printers Chapter 18: Using Network Printers 387 Viewing Network Printers To view network printers 1. Click Network in the main

Page 338

Resetting Network Printers 388 Check Point ZoneAlarm User Guide Note: Each printer port number must be different, and must be a high port. To

Page 339

Connectivity Chapter 19: Troubleshooting 389 Chapter 19 This chapter provides solutions to common problems you may encounter while using the Zone

Page 340

Connectivity 390 Check Point ZoneAlarm User Guide • Check if you have defined firewall rules which block your Internet connectivity. • Check wi

Page 341

Connectivity Chapter 19: Troubleshooting 391 Note: 192.168.10 is the default value, and it may vary if you changed it in the My Network page. •

Page 342

Connectivity 392 Check Point ZoneAlarm User Guide • If possible, disable NAT in the router. Refer to the router’s documentation for instructions

Page 343 - This shortcut… Does this…

Service Center and Upgrades Chapter 19: Troubleshooting 393 Service Center and Upgrades I have exceeded my node limit. What does this mean? What

Page 344

Other Problems 394 Check Point ZoneAlarm User Guide Other Problems I have forgotten my password. What should I do? Reset your ZoneAlarm router to

Page 345 - Maintenance

Technical Specifications Chapter 20: Specifications 395 Chapter 20 This chapter includes the following topics: Technical Specifications...

Page 346 - Viewing Firmware Status

Before You Install the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 27 Installing TCP/IP Protocol 1. In the Local Area Connec

Page 347 - Updating the Firmware

Technical Specifications 396 Check Point ZoneAlarm User Guide Table 86: ZoneAlarm Attributes Attribute ZoneAlarm Z100G SBXWZA-166LHGE-5 Physical

Page 348

Technical Specifications Chapter 20: Specifications 397 Applicable Standards Safety cULus, CB, LVD Quality IISO9001, ISO 14001, TL9000 EMC CE

Page 349 - Upgrading Your License

CE Declaration of Conformity 398 Check Point ZoneAlarm User Guide CE Declaration of Conformity SofaWare Technologies Ltd., 3 Hilazon St., Ramat-G

Page 350 - Configuring Syslog Logging

CE Declaration of Conformity Chapter 20: Specifications 399 Attribute ZoneAlarm Z100G SBXWZA-166LHGE-5 EN 61000-4-8 EN 61000-4-11 ENV50204 EN 6

Page 351 - To configure Syslog logging

Federal Communications Commission Radio Frequency Interference Statement 400 Check Point ZoneAlarm User Guide Federal Communications Commission R

Page 352 - Configuring HTTPS

Glossary of Terms Glossary of Terms 401 A ADSL Modem A device connecting a computer to the Internet via an existing phone line. ADSL (Asymmetric

Page 353 - Chapter 17: Maintenance 339

Glossary of Terms 402 Check Point ZoneAlarm User Guide D DHCP Any machine requires a unique IP address to connect to the Internet using Internet

Page 354 - To allow access from…

Glossary of Terms Glossary of Terms 403 HTTPS Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL. A protocol for accessing a

Page 355 - To set the time

Glossary of Terms 404 Check Point ZoneAlarm User Guide M MAC Address The MAC (Media Access Control) address is a computer's unique hardware

Page 356

Glossary of Terms Glossary of Terms 405 PPTP The Point-to-Point Tunneling Protocol (PPTP) allows extending a local network by establishing privat

Page 357 - Chapter 17: Maintenance 343

Before You Install the ZoneAlarm Router 28 Check Point ZoneAlarm User Guide TCP/IP Settings 1. In the Local Area Connection Properties window, d

Page 358 - Using Diagnostic Tools

Glossary of Terms 406 Check Point ZoneAlarm User Guide At the other end (the client program in your computer), TCP reassembles the individual pac

Page 359 - Using IP Tools

Index Index 407 A Access Denied page customizing • 195 account, configuring • 275 active computers, viewing • 158 active connections, viewing • 1

Page 360

Index 408 Check Point ZoneAlarm User Guide Ping • 344 Traceroute • 344 using • 344 WHOIS • 344 diagnostics • 364 DMZ explained • 402 DNS • 344, 4

Page 361 - Using Packet Sniffer

Index Index 409 explained • 85, 404 Host Port Scan • 230 HTTPS configuring • 338 explained • 402 using • 47 hub • 36, 389, 403 I IGMP • 243 IKE t

Page 362

Index 410 Check Point ZoneAlarm User Guide configuring • 81 configuring DHCP options • 90 configuring the WLAN • 113 enabling DHCP Server on • 86

Page 363

Index Index 411 R rebooting • 365 Remote Access VPN Clients • 291 Remote Access VPN Servers • 291 Remote Desktop accessing a remote desktop • 327

Page 364 - Filter String Syntax

Index 412 Check Point ZoneAlarm User Guide Setup Wizard • 43, 56 Small PMTU • 224 SmartDefense categories • 205 configuring • 198 using • 197 sof

Page 365 - Chapter 17: Maintenance 351

Index Index 413 V Vendor-Specific Attribute configuring • 251 VPN explained • 291, 406 tunnnels • 305 viewing IKE traces • 308 VPN tunnels creati

Page 366

Index 414 Check Point ZoneAlarm User Guide configuring • 113 defined • 406 Worm Catcher • 238 WPA-Personal • 113 Z ZoneAlarm network requirements

Page 367 - Chapter 17: Maintenance 353

Before You Install the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 29 Mac OS Use the following procedure for setting up the T

Page 368

Before You Install the ZoneAlarm Router 30 Check Point ZoneAlarm User Guide Mac OS-X Use the following procedure for setting up the TCP/IP Prot

Page 369 - Chapter 17: Maintenance 355

Before You Install the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 31 3. Click Configure.

Page 370

Wall Mounting the ZoneAlarm Router 32 Check Point ZoneAlarm User Guide TCP/IP configuration fields appear. 4. Click the Configure IPv4 drop-dow

Page 371 - Chapter 17: Maintenance 357

Wall Mounting the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 33 3. Mark two drill holes on the wall, in accordance with the

Page 372 - XAMPLE 2

Securing the ZoneAlarm Router against Theft 34 Check Point ZoneAlarm User Guide Securing the ZoneAlarm Router against Theft The ZoneAlarm route

Page 373 - Chapter 17: Maintenance 359

Securing the ZoneAlarm Router against Theft Chapter 3: Installing and Setting Up ZoneAlarm 35 While these parts may differ between devices, all l

Page 374

POWER ADAPTER  Operate this product only from the type of power source indicated on the product’s marking label. If you are not sure of the type

Page 375 - Chapter 17: Maintenance 361

Router Installation 36 Check Point ZoneAlarm User Guide 5. Thread the anti-theft device's pin through the bolt’s holes, and insert the pin

Page 376

Router Installation Chapter 3: Installing and Setting Up ZoneAlarm 37 Figure 6: Typical Connection Diagram

Page 377 - Chapter 17: Maintenance 363

Router Installation 38 Check Point ZoneAlarm User Guide Cascading Your Router The ZoneAlarm router protects all computers and network devices tha

Page 378 - Running Diagnostics

Setting Up the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 39 Connecting the Router to Network Printers You can connect netw

Page 379 - Chapter 17: Maintenance 365

Setting Up the ZoneAlarm Router 40 Check Point ZoneAlarm User Guide Logging on to the ZoneAlarm Portal and setting up your password Initial Lo

Page 380

Setting Up the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 41 The Firmware page appears. 2. Click ZoneAlarm Setup Wizard.

Page 382 - Setting Up Network Printers

Initial Login to the ZoneAlarm Portal Chapter 4: Getting Started 43 Chapter 4 This chapter contains all the information you need in order to get

Page 383

Initial Login to the ZoneAlarm Portal 44 Check Point ZoneAlarm User Guide The initial login page appears. 2. Type a password both in the Passw

Page 384

Initial Login to the ZoneAlarm Portal Chapter 4: Getting Started 45 The ZoneAlarm Setup Wizard opens, with the Welcome page displayed. 4. Confi

Page 386

Logging on to the ZoneAlarm Portal 46 Check Point ZoneAlarm User Guide Logging on to the ZoneAlarm Portal Note: By default, HTTP and HTTPS ac

Page 387

Accessing the ZoneAlarm Portal Remotely Using HTTPS Chapter 4: Getting Started 47 2. Type your username and password. 3. Click OK. The Welcome

Page 388

Accessing the ZoneAlarm Portal Remotely Using HTTPS 48 Check Point ZoneAlarm User Guide Note: Your browser must support 128-bit cipher strength.

Page 389

Using the ZoneAlarm Portal Chapter 4: Getting Started 49 The ZoneAlarm Portal appears. Using the ZoneAlarm Portal The ZoneAlarm Portal is a Web-

Page 390

Using the ZoneAlarm Portal 50 Check Point ZoneAlarm User Guide Main Menu The main menu includes the following submenus. Table 9: Main Menu Subm

Page 391

Using the ZoneAlarm Portal Chapter 4: Getting Started 51 This submenu… Does this… Antivirus Allows you to configure VStream Antivirus settings.

Page 392

Using the ZoneAlarm Portal 52 Check Point ZoneAlarm User Guide Status Bar The status bar is located at the bottom of each page. It displays the f

Page 393

Logging off Chapter 4: Getting Started 53 Logging off Logging off terminates your administration session. Any subsequent attempt to connect to t

Page 395

Overview Chapter 5: Configuring the Internet Connection 55 Chapter 5 This chapter describes how to configure and work with a ZoneAlarm Internet c

Page 396

Contents Contents i Contents About This Guide...

Page 397 - MAC OS-X

Using the Internet Wizard 56 Check Point ZoneAlarm User Guide Using the Internet Wizard The Internet Wizard allows you to configure your ZoneAla

Page 398

Using the Internet Wizard Chapter 5: Configuring the Internet Connection 57 The Internet Connection Method dialog box appears. 4. Select the In

Page 399

Using the Internet Wizard 58 Check Point ZoneAlarm User Guide Using a PPPoE Connection If you selected the PPPoE (PPP over Ethernet) connection m

Page 400

Using the Internet Wizard Chapter 5: Configuring the Internet Connection 59 The system attempts to connect to the Internet via the specified conn

Page 401 - Viewing Network Printers

Using the Internet Wizard 60 Check Point ZoneAlarm User Guide Using a PPTP Connection If you selected the PPTP connection method, the PPP Configu

Page 402 - Resetting Network Printers

Using the Internet Wizard Chapter 5: Configuring the Internet Connection 61 Table 12: PPTP Connection Fields In this field… Do this… Username

Page 403 - Troubleshooting

Using the Internet Wizard 62 Check Point ZoneAlarm User Guide Using a Static IP Connection If you selected the Static IP connection method, the S

Page 404 - Connectivity

Using the Internet Wizard Chapter 5: Configuring the Internet Connection 63 Table 13: PPPoE Connection Fields In this field… Do this… IP Addres

Page 405 - Network page

Using Internet Setup 64 Check Point ZoneAlarm User Guide Using Internet Setup Internet Setup allows you to manually configure your Internet co

Page 406

Using Internet Setup Chapter 5: Configuring the Internet Connection 65 The Internet Setup page appears. 3. Do one of the following: • To conf

Page 407 - Service Center and Upgrades

Contents ii Check Point ZoneAlarm User Guide Configuring the Internet Connection...

Page 408 - Other Problems

Using Internet Setup 66 Check Point ZoneAlarm User Guide Configuring an Ethernet-Based Connection 1. In the Port drop-down list, do one of the

Page 409 - Specifications

Using Internet Setup Chapter 5: Configuring the Internet Connection 67 New fields appear, depending on the check boxes you selected. 2. Click A

Page 410 - Technical Specifications

Using Internet Setup 68 Check Point ZoneAlarm User Guide Using a Cable Modem Connection 1. Complete the fields using the relevant information i

Page 411 - Technical Specifications

Using Internet Setup Chapter 5: Configuring the Internet Connection 69 Using a PPPoE Connection 1. Complete the fields using the relevant infor

Page 412 - CE Declaration of Conformity

Using Internet Setup 70 Check Point ZoneAlarm User Guide New fields appear, depending on the check boxes you selected. 2. Click Apply. The Zone

Page 413 - SBXWZA-166LHGE-5

Using Internet Setup Chapter 5: Configuring the Internet Connection 71 Using a PPTP Connection 1. Complete the fields using the relevant inform

Page 414

Using Internet Setup 72 Check Point ZoneAlarm User Guide New fields appear, depending on the check boxes you selected. 2. Click Apply. The Zone

Page 415 - Glossary of Terms

Using Internet Setup Chapter 5: Configuring the Internet Connection 73 Using a Telstra (BPA) Connection Use this Internet connection type only if

Page 416

Using Internet Setup 74 Check Point ZoneAlarm User Guide New fields appear, depending on the check boxes you selected. 2. Click Apply. The Zone

Page 417 - Glossary of Terms 403

Using Internet Setup Chapter 5: Configuring the Internet Connection 75 Table 14: Internet Setup Fields In this field… Do this… PPP Settings Use

Page 418

Contents Contents iii Viewing Connections...

Page 419 - Glossary of Terms 405

Using Internet Setup 76 Check Point ZoneAlarm User Guide In this field… Do this… On outgoing activity Select this option to specify that the rou

Page 420

Using Internet Setup Chapter 5: Configuring the Internet Connection 77 In this field… Do this… Secondary DNS Server Type the Secondary DNS serve

Page 421 - Index 407

Viewing Internet Connection Information 78 Check Point ZoneAlarm User Guide In this field… Do this… Cloned MAC Address Do one of the following:

Page 422 - Index

Viewing Internet Connection Information Chapter 5: Configuring the Internet Connection 79 A tooltip displays the number of bytes sent and receive

Page 423 - Index 409

Enabling/Disabling the Internet Connection 80 Check Point ZoneAlarm User Guide Enabling/Disabling the Internet Connection You can temporarily di

Page 424

Configuring Network Settings Chapter 6: Managing Your Network 81 Chapter 6 This chapter describes how to manage and configure your network connec

Page 425 - Index 411

Configuring Network Settings 82 Check Point ZoneAlarm User Guide The My Network page appears. 2. Click Edit in the LAN network’s row. The Edit

Page 426

Configuring Network Settings Chapter 6: Managing Your Network 83 The fields are enabled. 4. If desired, change your ZoneAlarm router’s internal

Page 427 - Index 413

Configuring Network Settings 84 Check Point ZoneAlarm User Guide Note: The internal network range is defined both by the ZoneAlarm router’s int

Page 428

Configuring Network Settings Chapter 6: Managing Your Network 85 Enabling/Disabling Hide NAT Hide Network Address Translation (Hide NAT) enables

Commentaires sur ces manuels

Pas de commentaire