Check Point ZoneAlarm Secure Wireless Router Z100G User Guide Version 7.5 August 2007
Contents iv Check Point ZoneAlarm User Guide Email Filtering ...
Configuring Network Settings 86 Check Point ZoneAlarm User Guide Configuring a DHCP Server By default, the ZoneAlarm router operates as a DHCP (
Configuring Network Settings Chapter 6: Managing Your Network 87 A warning message appears. 5. Click OK. A success message appears 6. If your c
Configuring Network Settings 88 Check Point ZoneAlarm User Guide 3. Do one of the following: • To allow the DHCP server to set the IP address r
Configuring Network Settings Chapter 6: Managing Your Network 89 Configuring DHCP Relay You can configure DHCP relay for internal networks.
Configuring Network Settings 90 Check Point ZoneAlarm User Guide 5. In the Secondary DHCP Server IP field, type the IP address of the DHCP serve
Configuring Network Settings Chapter 6: Managing Your Network 91 The DHCP Server Options page appears. 4. Complete the fields using the relevan
Configuring Network Settings 92 Check Point ZoneAlarm User Guide New fields appear, depending on the check boxes you selected. 5. Click Apply.
Configuring Network Settings Chapter 6: Managing Your Network 93 Table 16: DHCP Server Options Fields In this field… Do this… Domain Name Type
Configuring Network Settings 94 Check Point ZoneAlarm User Guide In this field… Do this… Automatically assign default gateway Clear this option
Using Network Objects Chapter 6: Managing Your Network 95 In this field… Do this… Nortel IP Phone To enable Nortel IP phones to receive their c
Contents Contents v Configuring HTTPS...
Using Network Objects 96 Check Point ZoneAlarm User Guide • Assign the network object's IP address to a MAC address Normally, the ZoneAlar
Using Network Objects Chapter 6: Managing Your Network 97 Adding and Editing Network Objects You can add or edit network objects via: • The Net
Using Network Objects 98 Check Point ZoneAlarm User Guide The ZoneAlarm Network Object Wizard opens, with the Step 1: Network Object Type dialog
Using Network Objects Chapter 6: Managing Your Network 99 The Step 2: Computer Details dialog box appears. If you chose Single Computer, the dial
Using Network Objects 100 Check Point ZoneAlarm User Guide The Step 3: Save dialog box appears. 7. Type a name for the network object in the fi
Using Network Objects Chapter 6: Managing Your Network 101 The My Computers page appears. If a computer has not yet been added as a network obje
Using Network Objects 102 Check Point ZoneAlarm User Guide 4. Click Next. The Step 2: Computer Details dialog box appears. The computer's
Using Network Objects Chapter 6: Managing Your Network 103 In this field… Do this… External IP Type the Internet IP address to which you want t
Configuring Network Service Objects 104 Check Point ZoneAlarm User Guide Viewing and Deleting Network Objects To view or delete a network object
Configuring Network Service Objects Chapter 6: Managing Your Network 105 The Network Services page appears with a list of network service objects
Configuring Network Service Objects 106 Check Point ZoneAlarm User Guide The ZoneAlarm Network Service Wizard opens, with the Step 1: Network Ser
Configuring Network Service Objects Chapter 6: Managing Your Network 107 6. Click Finish. Table 19: Network Service Fields In this field… Do th
Managing Ports 108 Check Point ZoneAlarm User Guide Managing Ports The ZoneAlarm router allows you to restrict the LAN1-4 ports and the WAN port
Managing Ports Chapter 6: Managing Your Network 109 Table 20: Ports Fields This field… Displays… Assign To The port's current assignment.
Managing Ports 110 Check Point ZoneAlarm User Guide The Port Setup page appears. 3. In the Assign to Network drop-down list, do one of the foll
Managing Ports Chapter 6: Managing Your Network 111 Modifying Link Configurations By default, the ZoneAlarm router automatically detects the lin
Managing Ports 112 Check Point ZoneAlarm User Guide Resetting Ports to Defaults You can reset the ZoneAlarm router's ports to their default
Overview Chapter 7: Configuring a Wireless Network 113 Chapter 7 This chapter describes how to configure a wireless internal network. This chapte
Overview 114 Check Point ZoneAlarm User Guide About the Wireless Hardware in Your ZoneAlarm Wireless Router Your ZoneAlarm wireless router featur
Overview Chapter 7: Configuring a Wireless Network 115 Security Protocol Description WEP encryption In the WEP (Wired Equivalent Privacy) encryp
About Your Check Point ZoneAlarm Router Chapter 1: About This Guide vii To make finding information in this manual easier, some types of informat
Using the Wireless Configuration Wizard 116 Check Point ZoneAlarm User Guide Using the Wireless Configuration Wizard The Wireless Configuration W
Using the Wireless Configuration Wizard Chapter 7: Configuring a Wireless Network 117 7. Click Next. 8. The Wireless Security dialog box appear
Using the Wireless Configuration Wizard 118 Check Point ZoneAlarm User Guide 10. Do one of the following: • To bridge the LAN and WLAN networks
Using the Wireless Configuration Wizard Chapter 7: Configuring a Wireless Network 119 WPA-Personal If you chose WPA-Personal, the Wireless Config
Using the Wireless Configuration Wizard 120 Check Point ZoneAlarm User Guide The Wireless Security Confirmation dialog box appears. 3. Click Ne
Using the Wireless Configuration Wizard Chapter 7: Configuring a Wireless Network 121 WEP If you chose WEP, the Wireless Configuration-WEP dialog
Manually Configuring a WLAN 122 Check Point ZoneAlarm User Guide 4. Click Next. The Wireless Security Complete dialog box appears. 5. Click Fin
Manually Configuring a WLAN Chapter 7: Configuring a Wireless Network 123 The Edit Network Settings page appears. 4. In the Mode drop-down list
Manually Configuring a WLAN 124 Check Point ZoneAlarm User Guide 7. If desired, enable or disable Hide NAT. See Enabling/Disabling Hide NAT on
Manually Configuring a WLAN Chapter 7: Configuring a Wireless Network 125 New fields appear. 11. Click Apply. A warning message appears, telli
Manually Configuring a WLAN 126 Check Point ZoneAlarm User Guide A success message appears. Note: Some wireless cards have "Infrastructure
Manually Configuring a WLAN Chapter 7: Configuring a Wireless Network 127 In this field… Do this… Operation Mode Select an operation mode: • 8
Manually Configuring a WLAN 128 Check Point ZoneAlarm User Guide In this field… Do this… Channel Select the radio frequency to use for the wire
Manually Configuring a WLAN Chapter 7: Configuring a Wireless Network 129 In this field… Do this… Require WPA2 (802.11i) Specify whether you wan
Manually Configuring a WLAN 130 Check Point ZoneAlarm User Guide In this field… Do this… Key 1, 2, 3, 4 length Select the WEP key length from th
Manually Configuring a WLAN Chapter 7: Configuring a Wireless Network 131 Table 23: Advanced Wireless Settings Fields In this field… Do this… Ad
Manually Configuring a WLAN 132 Check Point ZoneAlarm User Guide In this field… Do this… Wireless Transmitter Transmission Rate Select the tra
Manually Configuring a WLAN Chapter 7: Configuring a Wireless Network 133 In this field… Do this… Fragmentation Threshold Type the smallest IP p
Manually Configuring a WLAN 134 Check Point ZoneAlarm User Guide In this field… Do this… Extended Range Mode (XR) Specify whether to use Extende
Troubleshooting Wireless Connectivity Chapter 7: Configuring a Wireless Network 135 Troubleshooting Wireless Connectivity I cannot connect to the
About Your Check Point ZoneAlarm Router Chapter 1: Introduction 1 Chapter 1 This chapter introduces the Check Point ZoneAlarm Secure Wireless Rou
Troubleshooting Wireless Connectivity 136 Check Point ZoneAlarm User Guide • Check the Transmission Power parameter in the WLAN's advanced
Troubleshooting Wireless Connectivity Chapter 7: Configuring a Wireless Network 137 Note: Reducing the RTS Threshold and the Fragmentation Thre
Overview Chapter 8: Using Bridges 139 Chapter 8 This chapter describes how to connect multiple network segments at the data-link layer, using a b
Workflow 140 Check Point ZoneAlarm User Guide • If a host with an IP address outside of the allowed IP address range tries to connect from the L
Adding and Editing Bridges Chapter 8: Using Bridges 141 Adding and Editing Bridges To add or edit a bridge 1. Click Network in the main menu, a
Adding and Editing Bridges 142 Check Point ZoneAlarm User Guide The Bridge Configuration page appears. 3. Complete the fields using the followi
Adding and Editing Bridges Chapter 8: Using Bridges 143 Table 24: Bridge Configuration Fields In this field… Do this… Network Name Type a name
Adding and Editing Bridges 144 Check Point ZoneAlarm User Guide In this field… Do this… Bridge Priority Select this bridge's priority. Th
Adding Internal Networks to Bridges Chapter 8: Using Bridges 145 Adding Internal Networks to Bridges To add an internal network to a bridge 1.
Product Features 2 Check Point ZoneAlarm User Guide Product Features Table 1: ZoneAlarm Z100G Features Feature ZoneAlarm Z100G Concurrent Users
Adding Internal Networks to Bridges 146 Check Point ZoneAlarm User Guide If the assigned bridge uses STP, additional fields appear. 5. Click Ap
Adding Internal Networks to Bridges Chapter 8: Using Bridges 147 In the My Network page, the internal network appears indented under the bridge.
Adding Internal Networks to Bridges 148 Check Point ZoneAlarm User Guide In this field… Do this… Allowed IP Range Type the range of IP addresse
Adding Internal Networks to Bridges Chapter 8: Using Bridges 149 In this field… Do this… Spanning Tree Protocol - Port Priority Select the port&
Deleting Bridges 150 Check Point ZoneAlarm User Guide Deleting Bridges To delete a bridge 1. Remove all internal networks from the bridge, by do
Viewing the Event Log Chapter 9: Viewing Reports 151 Chapter 9 This chapter describes the ZoneAlarm Portal reports. This chapter includes the fo
Viewing the Event Log 152 Check Point ZoneAlarm User Guide An event marked in this color… Indicates… Green Traffic accepted by the firewall. By
Viewing the Event Log Chapter 9: Viewing Reports 153 To view the event log 1. Click Reports in the main menu, and click the Event Log tab. The
Using the Traffic Monitor 154 Check Point ZoneAlarm User Guide A standard File Download dialog box appears. b. Click Save. The Save As dialog bo
Using the Traffic Monitor Chapter 9: Viewing Reports 155 You can export a detailed traffic report for all enabled networks, using the procedure E
Product Features Chapter 1: Introduction 3 Four Preset Security Policies Anti-spoofing Voice over IP (H.323) Support INSPECT Engine Instant M
Using the Traffic Monitor 156 Check Point ZoneAlarm User Guide Note: The firewall blocks broadcast packets used during the normal operation of
Using the Traffic Monitor Chapter 9: Viewing Reports 157 4. Click Apply. Exporting General Traffic Reports You can export a general traffic re
Viewing Computers 158 Check Point ZoneAlarm User Guide Viewing Computers This option allows you to view the currently active computers on your n
Viewing Computers Chapter 9: Viewing Reports 159 These computers are still protected, but they are blocked from accessing the Internet through th
Viewing Connections 160 Check Point ZoneAlarm User Guide Viewing Connections This option allows you to view currently active connections between
Viewing Wireless Statistics Chapter 9: Viewing Reports 161 Table 28: Connections Fields This field… Displays… Protocol The protocol used (TCP,
Viewing Wireless Statistics 162 Check Point ZoneAlarm User Guide The Wireless page appears. The page displays the information in the following t
Viewing Wireless Statistics Chapter 9: Viewing Reports 163 This field… Displays… Statistics for WLAN This information is displayed for the WLAN.
Viewing Wireless Statistics 164 Check Point ZoneAlarm User Guide To view statistics for a wireless station 1. Click Reports in the main menu, a
Viewing Wireless Statistics Chapter 9: Viewing Reports 165 This field… Displays… XR Indicates whether the wireless client supports Extended Ran
Product Features 4 Check Point ZoneAlarm User Guide Spanning Tree Protocol (STP) Traffic Monitoring DHCP Server, Client, and Relay MAC Clonin
The ZoneAlarm Firewall Security Policy Chapter 10: Setting Your Security Policy 167 Chapter 10 This chapter describes how to set up your ZoneAlar
Default Security Policy 168 Check Point ZoneAlarm User Guide Security Policy Implementation The key to implementing a network security policy is
Setting the Firewall Security Level Chapter 10: Setting Your Security Policy 169 • Access from the WAN to network printers is blocked. These rul
Setting the Firewall Security Level 170 Check Point ZoneAlarm User Guide This level… Does this… Further Details High Enforces strict control on
Setting the Firewall Security Level Chapter 10: Setting Your Security Policy 171 To change the firewall security level 1. Click Security in the
Using Firewall Rules 172 Check Point ZoneAlarm User Guide Using Firewall Rules The ZoneAlarm router checks the protocol used, the ports range,
Using Firewall Rules Chapter 10: Setting Your Security Policy 173 For example, if you want to block all outgoing FTP traffic, except traffic from
Using Firewall Rules 174 Check Point ZoneAlarm User Guide The following rule types exist: Table 32: Firewall Rule Types Rule Description Allow a
Using Firewall Rules Chapter 10: Setting Your Security Policy 175 Rule Description Allow This rule type enables you to do the following: • Perm
Optional Security Services Chapter 1: Introduction 5 Local Diagnostics Tools Ping, WHOIS, Packet Sniffer, VPN Tunnel Monitor, Connection Table M
Using Firewall Rules 176 Check Point ZoneAlarm User Guide Adding and Editing Firewall Rules To add or edit a firewall rule 1. Click Security in
Using Firewall Rules Chapter 10: Setting Your Security Policy 177 The ZoneAlarm Firewall Rule wizard opens, with the Step 1: Rule Type dialog box
Using Firewall Rules 178 Check Point ZoneAlarm User Guide 5. Complete the fields using the relevant information in the following table. 6. Clic
Using Firewall Rules Chapter 10: Setting Your Security Policy 179 8. Complete the fields using the relevant information in the following table.
Using Firewall Rules 180 Check Point ZoneAlarm User Guide The Step 5: Done dialog box appears. 12. If desired, type a description of the rule i
Using Firewall Rules Chapter 10: Setting Your Security Policy 181 In this field… Do this… Protocol Select the protocol for which the rule shoul
Using Firewall Rules 182 Check Point ZoneAlarm User Guide In this field… Do this… Destination Select the destination of the connections you wan
Using Firewall Rules Chapter 10: Setting Your Security Policy 183 In this field… Do this… Log accepted connections / Log blocked connections Se
Using Firewall Rules 184 Check Point ZoneAlarm User Guide Changing Firewall Rules' Priority To change a firewall rule's priority 1. C
Configuring Servers Chapter 10: Setting Your Security Policy 185 Configuring Servers Note: If you do not intend to host any public Internet se
COPYRIGHT & TRADEMARKS Copyright © 2007 SofaWare, All Rights Reserved. No part of this document may be reproduced in any form or by any means wi
Software Requirements 6 Check Point ZoneAlarm User Guide These services require an additional purchase of subscription. For more information, go
Configuring Servers 186 Check Point ZoneAlarm User Guide To allow services to be run on a specific host 1. Click Security in the main menu, and
Using Web Rules Chapter 10: Setting Your Security Policy 187 In this column… Do this… Host IP Type the IP address of the computer that will run
Using Web Rules 188 Check Point ZoneAlarm User Guide Note: Web rules differ from the Web Filtering subscription service in the following ways:
Using Web Rules Chapter 10: Setting Your Security Policy 189 For example, if you want to block all the pages of a particular Web site, except a s
Using Web Rules 190 Check Point ZoneAlarm User Guide Adding and Editing Web Rules To add or edit a Web rule 1. Click Security in the main menu,
Using Web Rules Chapter 10: Setting Your Security Policy 191 The ZoneAlarm Web Rule Wizard opens, with the Step 1: Rule Type dialog box displayed
Using Web Rules 192 Check Point ZoneAlarm User Guide 5. Complete the fields using the relevant information in the following table. 6. Click Nex
Using Web Rules Chapter 10: Setting Your Security Policy 193 Table 36: Web Rules Fields In this field… Do this… Block/Allow access to the follow
Using Web Rules 194 Check Point ZoneAlarm User Guide Changing Web Rules' Priority To change a Web rule's priority 1. Click Security i
Using Web Rules Chapter 10: Setting Your Security Policy 195 Customizing the Access Denied Page The Access Denied page appears when a user attem
Getting to Know Your ZoneAlarm Z100G Router Chapter 1: Introduction 7 Network Requirements • 10BaseT or 100BaseT Network Interface Card instal
Using Web Rules 196 Check Point ZoneAlarm User Guide You can use HTML tags as needed. 4. To display the Access Denied page using HTTPS, select
Overview Chapter 11: Using SmartDefense 197 Chapter 11 This chapter explains how to use Check Point SmartDefense Services. This chapter includes
Configuring SmartDefense 198 Check Point ZoneAlarm User Guide Configuring SmartDefense You can configure SmartDefense using the following tools:
Configuring SmartDefense Chapter 11: Using SmartDefense 199 The SmartDefense page appears. 2. Click SmartDefense Wizard. The SmartDefense Wizar
Configuring SmartDefense 200 Check Point ZoneAlarm User Guide For information on the levels, see the following table. 4. Click Next. The Step 2:
Configuring SmartDefense Chapter 11: Using SmartDefense 201 7. Select the check boxes next to the types of applications you want to block from r
Configuring SmartDefense 202 Check Point ZoneAlarm User Guide Table 37: SmartDefense Security Levels This level… Does this… Minimal Disables a
Configuring SmartDefense Chapter 11: Using SmartDefense 203 Using the SmartDefense Tree For convenience, SmartDefense is organized as a tree, in
Configuring SmartDefense 204 Check Point ZoneAlarm User Guide To configure a SmartDefense node 1. Click Security in the main menu, and click th
SmartDefense Categories Chapter 11: Using SmartDefense 205 a) Click Default. A confirmation message appears. b) Click OK. The fields are reset
Getting to Know Your ZoneAlarm Z100G Router 8 Check Point ZoneAlarm User Guide Table 2: ZoneAlarm Z100G Router Rear Panel Elements Label Descri
SmartDefense Categories 206 Check Point ZoneAlarm User Guide Teardrop In a Teardrop attack, the attacker sends two IP fragments, the latter entir
SmartDefense Categories Chapter 11: Using SmartDefense 207 Ping of Death In a Ping of Death attack, the attacker sends a fragmented PING request
SmartDefense Categories 208 Check Point ZoneAlarm User Guide LAND In a LAND attack, the attacker sends a SYN packet, in which the source address
SmartDefense Categories Chapter 11: Using SmartDefense 209 Non-TCP Flooding Advanced firewalls maintain state information about connections in a
SmartDefense Categories 210 Check Point ZoneAlarm User Guide In this field… Do this… Max. Percent Non-TCP Traffic Type the maximum percentage of
SmartDefense Categories Chapter 11: Using SmartDefense 211 Table 42: Distributed Denial of Service Fields In this field… Do this… Action Specif
SmartDefense Categories 212 Check Point ZoneAlarm User Guide Packet Sanity Packet Sanity performs several Layer 3 and Layer 4 sanity checks. Thes
SmartDefense Categories Chapter 11: Using SmartDefense 213 In this field… Do this… Disable relaxed UDP length verification The UDP length verifi
SmartDefense Categories 214 Check Point ZoneAlarm User Guide Max Ping Size PING (ICMP echo request) is a program that uses ICMP protocol to check
SmartDefense Categories Chapter 11: Using SmartDefense 215 In this field… Do this… Max Ping Size Specify the maximum data size for ICMP echo re
Getting to Know Your ZoneAlarm Z100G Router Chapter 1: Introduction 9 Front Panel The ZoneAlarm Z100G router includes several status LEDs that en
SmartDefense Categories 216 Check Point ZoneAlarm User Guide Table 45: IP Fragments Fields In this field… Do this… Forbid IP Fragments Specify
SmartDefense Categories Chapter 11: Using SmartDefense 217 Network Quota An attacker may try to overload a server in your network by establishing
SmartDefense Categories 218 Check Point ZoneAlarm User Guide In this field… Do this… Max. Connections/Second from Same Source IP Type the maximu
SmartDefense Categories Chapter 11: Using SmartDefense 219 Table 47: Welchia Fields In this field… Do this… Action Specify what action to take
SmartDefense Categories 220 Check Point ZoneAlarm User Guide Table 48: Cisco IOS DOS In this field… Do this… Action Specify what action to tak
SmartDefense Categories Chapter 11: Using SmartDefense 221 Null Payload Some worms, such as Sasser, use ICMP echo request packets with null paylo
SmartDefense Categories 222 Check Point ZoneAlarm User Guide Checksum Verification SmartDefense identifies any IP, TCP, or UDP packets with incor
SmartDefense Categories Chapter 11: Using SmartDefense 223 TCP This category allows you to configure various protections related to the TCP proto
SmartDefense Categories 224 Check Point ZoneAlarm User Guide Table 51: Strict TCP In this field… Do this… Action Specify what action to take w
SmartDefense Categories Chapter 11: Using SmartDefense 225 Table 52: Small PMTU Fields In this field… Do this… Action Specify what action to ta
Contacting Technical Support 10 Check Point ZoneAlarm User Guide LED State Explanation LNK/ACT Flashing Data is being transmitted/received VPN
SmartDefense Categories 226 Check Point ZoneAlarm User Guide SynDefender In a SYN attack, the attacker sends many SYN packets without finishing t
SmartDefense Categories Chapter 11: Using SmartDefense 227 In this field… Do this… Log Mode Specify upon which events logs should be issued, by
SmartDefense Categories 228 Check Point ZoneAlarm User Guide Sequence Verifier The ZoneAlarm router examines each TCP packet's sequence numb
SmartDefense Categories Chapter 11: Using SmartDefense 229 Flags The URG flag is used to indicate that there is urgent data in the TCP stream, an
SmartDefense Categories 230 Check Point ZoneAlarm User Guide Port Scan An attacker can perform a port scan to determine whether ports are open an
SmartDefense Categories Chapter 11: Using SmartDefense 231 Table 56: Port Scan Fields In this field… Do this… Number of ports accessed SmartDef
SmartDefense Categories 232 Check Point ZoneAlarm User Guide In this field… Do this… Track Specify whether to issue logs for scans, by selectin
SmartDefense Categories Chapter 11: Using SmartDefense 233 FTP Bounce When connecting to an FTP server, the client sends a PORT command specifyin
SmartDefense Categories 234 Check Point ZoneAlarm User Guide Block Known Ports You can choose to block the FTP server from connecting to well-kno
SmartDefense Categories Chapter 11: Using SmartDefense 235 Block Port Overflow FTP clients send PORT commands when connecting to the FTP sever. A
What Is a Firewall? Chapter 2: The ZoneAlarm Firewall 11 Chapter 2 This chapter introduces the ZoneAlarm firewall and its advantages. This chapte
SmartDefense Categories 236 Check Point ZoneAlarm User Guide Blocked FTP Commands Some seldom-used FTP commands may compromise FTP server securit
SmartDefense Categories Chapter 11: Using SmartDefense 237 To allow a specific FTP command 1. In the Blocked Commands box, select the desired FT
SmartDefense Categories 238 Check Point ZoneAlarm User Guide Table 60: Header Rejection Fields In this field… Do this… Action Specify what acti
SmartDefense Categories Chapter 11: Using SmartDefense 239 Table 61: Worm Catcher Fields In this field… Do this… Action Specify what action to
SmartDefense Categories 240 Check Point ZoneAlarm User Guide In each node, you can configure how peer-to-peer connections of the selected type sh
SmartDefense Categories Chapter 11: Using SmartDefense 241 In this field… Do this… Block masquerading over HTTP protocol Specify whether to bloc
SmartDefense Categories 242 Check Point ZoneAlarm User Guide Table 63: File Print and Sharing Fields In this field… Do this… Action Specify wha
SmartDefense Categories Chapter 11: Using SmartDefense 243 IGMP This category includes the IGMP protocol. IGMP is used by hosts and routers to dy
SmartDefense Categories 244 Check Point ZoneAlarm User Guide In this field… Do this… Enforce IGMP to multicast addresses According to the IGMP s
SmartDefense Categories Chapter 11: Using SmartDefense 245 Note: SmartDefense can detect instant messaging traffic regardless of the TCP port
Security Requirements 12 Check Point ZoneAlarm User Guide Security Requirements In order to make control decisions for new communication attempts
Resetting SmartDefense to its Defaults 246 Check Point ZoneAlarm User Guide In this field… Do this… Block proprietary protocol / Block propriet
Overview Chapter 12: Using VStream Antivirus 247 Chapter 12 This chapter explains how to use the VStream Antivirus engine to block security threa
Overview 248 Check Point ZoneAlarm User Guide Table 66: VStream Antivirus Actions If a virus if found in this protocol... VStream Antivirus does
Enabling/Disabling VStream Antivirus Chapter 12: Using VStream Antivirus 249 If you are subscribed to the VStream Antivirus subscription service,
Viewing VStream Antivirus Signature Database Information 250 Check Point ZoneAlarm User Guide 2. Drag the On/Off lever upwards or downwards. VSt
Configuring VStream Antivirus Chapter 12: Using VStream Antivirus 251 Configuring VStream Antivirus You can configure VStream Antivirus in the fo
Configuring VStream Antivirus 252 Check Point ZoneAlarm User Guide The ZoneAlarm router will process rule 1 first, passing outgoing SMTP traffic
Configuring VStream Antivirus Chapter 12: Using VStream Antivirus 253 The Antivirus Policy page appears. 2. Do one of the following: • To add
Configuring VStream Antivirus 254 Check Point ZoneAlarm User Guide 3. Select the type of rule you want to create. 4. Click Next. The Step 2: Se
Configuring VStream Antivirus Chapter 12: Using VStream Antivirus 255 The Step 3: Destination & Source dialog box appears. 7. To configure
Old Firewall Technologies Chapter 2: The ZoneAlarm Firewall 13 Table 4: Packet Filter Advantages and Disadvantages Advantages Disadvantages Appl
Configuring VStream Antivirus 256 Check Point ZoneAlarm User Guide The Step 4: Done dialog box appears. 10. If desired, type a description of t
Configuring VStream Antivirus Chapter 12: Using VStream Antivirus 257 In this field… Do this… Protocol Select the protocol (TCP, UDP, or ANY) f
Configuring VStream Antivirus 258 Check Point ZoneAlarm User Guide In this field… Do this… Data Direction Select the direction of connections t
Configuring VStream Antivirus Chapter 12: Using VStream Antivirus 259 Enabling/Disabling VStream Antivirus Rules You can temporarily disable a V
Configuring VStream Antivirus 260 Check Point ZoneAlarm User Guide Viewing and Deleting VStream Antivirus Rules To view or delete an existing VS
Configuring VStream Antivirus Chapter 12: Using VStream Antivirus 261 Configuring VStream Antivirus Advanced Settings To configure VStream Antiv
Configuring VStream Antivirus 262 Check Point ZoneAlarm User Guide Table 70: Advanced Antivirus Settings Fields In this field… Do this… File Typ
Configuring VStream Antivirus Chapter 12: Using VStream Antivirus 263 In this field… Do this… Pass safe file types without scanning Select this
Configuring VStream Antivirus 264 Check Point ZoneAlarm User Guide In this field… Do this… Archive File Handling Maximum Nesting Level Type th
Updating VStream Antivirus Chapter 12: Using VStream Antivirus 265 In this field… Do this… When a password-protected file is found in archive VS
Check Point Stateful Inspection Technology 14 Check Point ZoneAlarm User Guide Check Point Stateful Inspection Technology Invented by Check Point
Connecting to a Service Center Chapter 13: Using Subscription Services 267 Chapter 13 This chapter explains how to start subscription services, a
Connecting to a Service Center 268 Check Point ZoneAlarm User Guide The Account page appears. 2. In the Service Account area, click Connect.
Connecting to a Service Center Chapter 13: Using Subscription Services 269 The ZoneAlarm Services Wizard opens, with the Service Center dialog bo
Connecting to a Service Center 270 Check Point ZoneAlarm User Guide • If the Service Center requires authentication, the Service Center Login di
Connecting to a Service Center Chapter 13: Using Subscription Services 271 6. Click Next. The Done screen appears with a success message. 7.
Connecting to a Service Center 272 Check Point ZoneAlarm User Guide • The services to which you are subscribed are now available on your ZoneAla
Viewing Services Information Chapter 13: Using Subscription Services 273 Viewing Services Information The Account page displays the following
Refreshing Your Service Center Connection 274 Check Point ZoneAlarm User Guide Refreshing Your Service Center Connection This option restarts yo
Configuring Your Account Chapter 13: Using Subscription Services 275 Configuring Your Account This option allows you to access your Service Cent
Check Point Stateful Inspection Technology Chapter 2: The ZoneAlarm Firewall 15 • Date and time of packet arrival or departure The ZoneAlarm fir
Web Filtering 276 Check Point ZoneAlarm User Guide 5. Click Finish. The following things happen: • You are disconnected from the Service Center
Web Filtering Chapter 13: Using Subscription Services 277 Note: The Web Filtering subscription service differs from Web rules in the following
Web Filtering 278 Check Point ZoneAlarm User Guide The Web Filtering page appears. 2. Drag the On/Off lever upwards or downwards. Web Filtering
Web Filtering Chapter 13: Using Subscription Services 279 Selecting Categories for Blocking You can define which types of Web sites should be co
Web Filtering 280 Check Point ZoneAlarm User Guide This ensures that users will not gain access to undesirable Web sites, even when the Service C
Web Filtering Chapter 13: Using Subscription Services 281 • The Snooze button changes to Resume. • The Web Filtering Off popup window opens.
Email Filtering 282 Check Point ZoneAlarm User Guide • If you clicked Resume in the Web Filtering Off popup window, the popup window closes. Em
Email Filtering Chapter 13: Using Subscription Services 283 Enabling/Disabling Email Filtering To enable/disable Email Filtering 1. Click Servi
Email Filtering 284 Check Point ZoneAlarm User Guide Note: If the ZoneAlarm router is remotely managed, contact your Service Center administrat
Email Filtering Chapter 13: Using Subscription Services 285 Temporarily Disabling Email Filtering If you are having problems sending or receivi
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuou
Check Point Stateful Inspection Technology 16 Check Point ZoneAlarm User Guide Step Channel Type Description Source TCP Source Port Destinatio
Email Filtering 286 Check Point ZoneAlarm User Guide • The Email Filtering Off popup window opens. 3. To re-enable Email Antivirus and Email
Automatic and Manual Updates Chapter 13: Using Subscription Services 287 Automatic and Manual Updates The Software Updates service enables you to
Automatic and Manual Updates 288 Check Point ZoneAlarm User Guide Checking for Software Updates when Locally Managed If your ZoneAlarm router is
Automatic and Manual Updates Chapter 13: Using Subscription Services 289 3. To set the ZoneAlarm router so that software updates must be checked
Overview Chapter 14: Secure Remote Access 291 Chapter 14 This chapter describes how to use your ZoneAlarm router as a Remote Access VPN Server. T
Overview 292 Check Point ZoneAlarm User Guide ZoneAlarm allows a single VPN user to connect. If you need to allow VPN remote access to multiple u
Configuring a Remote Access VPN Chapter 14: Secure Remote Access 293 Configuring a Remote Access VPN To create a Remote Access VPN with one user
Configuring the SecuRemote Remote Access VPN Server 294 Check Point ZoneAlarm User Guide Configuring the SecuRemote Remote Access VPN Server To
Configuring the SecuRemote Remote Access VPN Server Chapter 14: Secure Remote Access 295 New check boxes appear. 3. To allow authenticated user
Check Point Stateful Inspection Technology Chapter 2: The ZoneAlarm Firewall 17 The fact that both of the channels are established by the client
Installing SecuRemote 296 Check Point ZoneAlarm User Guide Installing SecuRemote If you configured the ZoneAlarm SecuRemote VPN Server, then aut
Installing a Certificate Chapter 14: Secure Remote Access 297 Installing a Certificate A digital certificate is a secure means of authenticating
Installing a Certificate 298 Check Point ZoneAlarm User Guide Generating a Self-Signed Certificate To generate a self-signed certificate 1. Cli
Installing a Certificate Chapter 14: Secure Remote Access 299 The ZoneAlarm Certificate Wizard opens, with the Certificate Wizard dialog box disp
Installing a Certificate 300 Check Point ZoneAlarm User Guide The Done dialog box appears, displaying the certificate's details. 6. Click
Installing a Certificate Chapter 14: Secure Remote Access 301 • The starting and ending dates between which the gateway's certificate and t
Installing a Certificate 302 Check Point ZoneAlarm User Guide In this field… Do this… Valid Until Use the drop-down lists to specify the month,
Installing a Certificate Chapter 14: Secure Remote Access 303 5. Click Next. The Import-Certificate Passphrase dialog box appears. This may take
Uninstalling a Certificate 304 Check Point ZoneAlarm User Guide • The starting and ending dates between which the gateway's certificate and
Viewing VPN Tunnels Chapter 14: Secure Remote Access 305 Viewing VPN Tunnels You can view a list of currently established VPN tunnels. To view
Check Point Stateful Inspection Technology 18 Check Point ZoneAlarm User Guide Firewall Technology Action Stateful Inspection Firewall A Statefu
Viewing VPN Tunnels 306 Check Point ZoneAlarm User Guide Table 73: VPN Tunnels Page Fields This field… Displays… Type The currently active sec
Viewing VPN Tunnels Chapter 14: Secure Remote Access 307 This field… Displays… Established The time at which the tunnel was established. This
Viewing IKE Traces for VPN Connections 308 Check Point ZoneAlarm User Guide Viewing IKE Traces for VPN Connections If you are experiencing VPN c
Viewing IKE Traces for VPN Connections Chapter 14: Secure Remote Access 309 5. Browse to a destination directory of your choice. 6. Type a name
Changing Your Login Credentials Chapter 15: Managing Users 311 Chapter 15 This chapter describes how to manage ZoneAlarm router users. You can de
Changing Your Login Credentials 312 Check Point ZoneAlarm User Guide The Internal Users page appears. 2. In the row of your username, click Edi
Adding and Editing Users Chapter 15: Managing Users 313 Note: Use 5 to 25 characters (letters or numbers) for the new password. 5. Click Next.
Adding and Editing Users 314 Check Point ZoneAlarm User Guide • To edit an existing user, click Edit next to the desired user. The Account Wiza
Adding and Editing Users Chapter 15: Managing Users 315 The options that appear on the page are dependant on the software and services you are us
Before You Install the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 19 Chapter 3 This chapter describes how to properly set up
Adding and Editing Users 316 Check Point ZoneAlarm User Guide Table 76: Set User Permissions Fields In this field... Do this... Administrator Le
Viewing and Deleting Users Chapter 15: Managing Users 317 Remote Desktop Access Select this option to allow the user to log on to the my.firewall
Setting Up Remote VPN Access for Users 318 Check Point ZoneAlarm User Guide Setting Up Remote VPN Access for Users If you are using your ZoneAla
Overview Chapter 16: Using Remote Desktop 319 Chapter 16 This chapter describes how to remotely access the desktop of each of your computers, usi
Workflow 320 Check Point ZoneAlarm User Guide Workflow To use Remote Desktop 1. Configure Remote Desktop. See Configuring Remote Desktop on pag
Configuring Remote Desktop Chapter 16: Using Remote Desktop 321 Configuring Remote Desktop To configure Remote Desktop 1. Click Setup in the ma
Configuring Remote Desktop 322 Check Point ZoneAlarm User Guide New fields appear. • To disable Remote Desktop, clear the Allow remote desktop
Configuring Remote Desktop Chapter 16: Using Remote Desktop 323 In this field… Do this… Share local printers Select this option to allow the ho
Configuring the Host Computer 324 Check Point ZoneAlarm User Guide Configuring the Host Computer To enable remote users to connect to a computer,
Configuring the Host Computer Chapter 16: Using Remote Desktop 325 The Remote tab appears. 5. Select the Allow users to connect remotely to thi
Before You Install the ZoneAlarm Router 20 Check Point ZoneAlarm User Guide Windows Vista Checking the TCP/IP Installation 1. Click Start >
Configuring the Host Computer 326 Check Point ZoneAlarm User Guide The Select Users dialog box appears. b. Type the desired user's usernam
Accessing a Remote Computer's Desktop Chapter 16: Using Remote Desktop 327 Accessing a Remote Computer's Desktop Note: The client co
Accessing a Remote Computer's Desktop 328 Check Point ZoneAlarm User Guide • The Remote Desktop Connection Security Warning dialog box appe
Accessing a Remote Computer's Desktop Chapter 16: Using Remote Desktop 329 Table 78: Remote Desktop Keyboard Shortcuts This shortcut… Does
Accessing a Remote Computer's Desktop Chapter 17: Maintenance 331 Chapter 17 This chapter describes the tasks required for maintenance and d
Viewing Firmware Status 332 Check Point ZoneAlarm User Guide Viewing Firmware Status The firmware is the software program embedded in the ZoneAl
Updating the Firmware Chapter 17: Maintenance 333 This field… Displays… For example… Installed Product The licensed software and the number of
Updating the Firmware 334 Check Point ZoneAlarm User Guide The Firmware Update page appears. 3. Click Browse. A browse window appears. 4. Se
Upgrading Your License Chapter 17: Maintenance 335 Upgrading Your License If product upgrades are available, you can upgrade the ZoneAlarm prod
Before You Install the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 21 The Network Sharing Center screen appears. 3. In the
Configuring Syslog Logging 336 Check Point ZoneAlarm User Guide 4. In the Product Key field, enter the new Product Key. 5. Click Next. The Inst
Configuring Syslog Logging Chapter 17: Maintenance 337 To configure Syslog logging 1. Click Setup in the main menu, and click the Logging tab. T
Configuring HTTPS 338 Check Point ZoneAlarm User Guide Configuring HTTPS You can enable ZoneAlarm router users to access the ZoneAlarm Portal fr
Configuring HTTPS Chapter 17: Maintenance 339 Note: You can use HTTPS to access the ZoneAlarm Portal from your internal network, by surfing to
Configuring HTTPS 340 Check Point ZoneAlarm User Guide Table 81: Access Options Select this option… To allow access from… Internal Networks The
Setting the Time on the Router Chapter 17: Maintenance 341 Setting the Time on the Router You set the time displayed in the ZoneAlarm Portal dur
Setting the Time on the Router 342 Check Point ZoneAlarm User Guide The following things happen in the order below: • If you selected Specify da
Setting the Time on the Router Chapter 17: Maintenance 343 Complete the fields using the information in Time Servers Fields on page 344, then cli
Using Diagnostic Tools 344 Check Point ZoneAlarm User Guide Table 83: Time Servers Fields In this field… Do this… Primary Server Type the IP ad
Using Diagnostic Tools Chapter 17: Maintenance 345 Use this tool… To do this… For information, see... Packet Sniffer Capture network traffic. T
Before You Install the ZoneAlarm Router 22 Check Point ZoneAlarm User Guide The Network Connections screen appears. 4. Double-click the Local A
Using Diagnostic Tools 346 Check Point ZoneAlarm User Guide • If you selected Traceroute, the following things happen: The ZoneAlarm router conn
Using Diagnostic Tools Chapter 17: Maintenance 347 Using Packet Sniffer The ZoneAlarm router includes the Packet Sniffer tool, which enables you
Using Diagnostic Tools 348 Check Point ZoneAlarm User Guide The Packet Sniffer window displays the name of the interface, the number of packets c
Using Diagnostic Tools Chapter 17: Maintenance 349 Table 85: Packet Sniffer Fields In this field… Do this… Interface Select the interface from
Using Diagnostic Tools 350 Check Point ZoneAlarm User Guide Filter String Syntax The following represents a list of basic filter string elements:
Using Diagnostic Tools Chapter 17: Maintenance 351 EXAMPLE The following filter string saves packets that both originate from IP address is 192.1
Using Diagnostic Tools 352 Check Point ZoneAlarm User Guide PARAMETERS port Integer. The port to which the packet is sent. EXAMPLE The following
Using Diagnostic Tools Chapter 17: Maintenance 353 host PURPOSE The host element captures all incoming and outgoing packets for a specific comput
Using Diagnostic Tools 354 Check Point ZoneAlarm User Guide or PURPOSE The or element is used to alternate between string elements. The filtered
Using Diagnostic Tools Chapter 17: Maintenance 355 EXAMPLE The following filter string saves all packets that either originated from port 80, or
Before You Install the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 23 The Local Area Connection Properties window opens. 6.
Using Diagnostic Tools 356 Check Point ZoneAlarm User Guide PARAMETERS port Integer. The port from which the packet is sent. EXAMPLE The followi
Using Diagnostic Tools Chapter 17: Maintenance 357 EXAMPLE 1 The following filter string captures all TCP packets: tcp EXAMPLE 2 The following f
Backing Up the ZoneAlarm Router Configuration 358 Check Point ZoneAlarm User Guide EXAMPLE 1 The following filter string captures all UDP packet
Backing Up the ZoneAlarm Router Configuration Chapter 17: Maintenance 359 Importing the ZoneAlarm Router Configuration In order to restore your
Backing Up the ZoneAlarm Router Configuration 360 Check Point ZoneAlarm User Guide The ZoneAlarm router settings are imported. The Import Setting
Resetting the ZoneAlarm Router to Defaults Chapter 17: Maintenance 361 Resetting the ZoneAlarm Router to Defaults You can reset the ZoneAlarm ro
Resetting the ZoneAlarm Router to Defaults 362 Check Point ZoneAlarm User Guide A confirmation message appears. 3. To revert to the firmware ve
Resetting the ZoneAlarm Router to Defaults Chapter 17: Maintenance 363 To reset the ZoneAlarm router to factory defaults using the Reset button
Running Diagnostics 364 Check Point ZoneAlarm User Guide Running Diagnostics You can view technical information about your ZoneAlarm router’s
Rebooting the ZoneAlarm Router Chapter 17: Maintenance 365 Rebooting the ZoneAlarm Router If your ZoneAlarm router is not functioning properly,
Before You Install the ZoneAlarm Router 24 Check Point ZoneAlarm User Guide Note: Normally, it is not recommended to assign a static IP address
Overview Chapter 18: Using Network Printers 367 Chapter 18 This chapter describes how to set up and use network printers. This chapter includes t
Setting Up Network Printers 368 Check Point ZoneAlarm User Guide Setting Up Network Printers To set up a network printer 1. Connect the network
Setting Up Network Printers Chapter 18: Using Network Printers 369 The USB Devices page appears. If the ZoneAlarm router detected the printer, th
Setting Up Network Printers 370 Check Point ZoneAlarm User Guide 6. Write down the port number allocated to the printer. The port number appears
Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 371 Configuring Computers to Use Network Printers Perform the r
Configuring Computers to Use Network Printers 372 Check Point ZoneAlarm User Guide The Printers screen appears. 4. Click Add a printer. The Add
Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 373 The Choose a printer port dialog box appears. 7. Click Cre
Configuring Computers to Use Network Printers 374 Check Point ZoneAlarm User Guide 12. In the Port name field, type the port name. 13. Select t
Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 375 The Configure Standard TCP/IP Port Monitor dialog box opens.
Before You Install the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 25 2. Double-click the Network and Dial-up Connections ic
Configuring Computers to Use Network Printers 376 Check Point ZoneAlarm User Guide 15. Do one of the following: • Use the lists to select the p
Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 377 Windows 2000/XP This procedure is relevant for computers wit
Configuring Computers to Use Network Printers 378 Check Point ZoneAlarm User Guide The Local or Network Printer dialog box appears. 6. Click Lo
Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 379 The Add Standard TCP/IP Port Wizard opens with the Welcome d
Configuring Computers to Use Network Printers 380 Check Point ZoneAlarm User Guide The Add Standard TCP/IP Printer Port Wizard opens, with the Ad
Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 381 19. Click Next. The Completing the Add Standard TCP/IP Prin
Configuring Computers to Use Network Printers 382 Check Point ZoneAlarm User Guide 23. Complete the remaining dialog boxes in the wizard as desi
Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 383 MAC OS-X This procedure is relevant for computers with the l
Configuring Computers to Use Network Printers 384 Check Point ZoneAlarm User Guide The Print & Fax window appears. 5. In the Printing tab,
Configuring Computers to Use Network Printers Chapter 18: Using Network Printers 385 New fields appear. 7. In the first drop-down list, select
you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those
Before You Install the ZoneAlarm Router 26 Check Point ZoneAlarm User Guide The Local Area Connection Properties window appears. 4. In the abov
Configuring Computers to Use Network Printers 386 Check Point ZoneAlarm User Guide A list of models appears. 12. In the Model Name list, selec
Viewing Network Printers Chapter 18: Using Network Printers 387 Viewing Network Printers To view network printers 1. Click Network in the main
Resetting Network Printers 388 Check Point ZoneAlarm User Guide Note: Each printer port number must be different, and must be a high port. To
Connectivity Chapter 19: Troubleshooting 389 Chapter 19 This chapter provides solutions to common problems you may encounter while using the Zone
Connectivity 390 Check Point ZoneAlarm User Guide • Check if you have defined firewall rules which block your Internet connectivity. • Check wi
Connectivity Chapter 19: Troubleshooting 391 Note: 192.168.10 is the default value, and it may vary if you changed it in the My Network page. •
Connectivity 392 Check Point ZoneAlarm User Guide • If possible, disable NAT in the router. Refer to the router’s documentation for instructions
Service Center and Upgrades Chapter 19: Troubleshooting 393 Service Center and Upgrades I have exceeded my node limit. What does this mean? What
Other Problems 394 Check Point ZoneAlarm User Guide Other Problems I have forgotten my password. What should I do? Reset your ZoneAlarm router to
Technical Specifications Chapter 20: Specifications 395 Chapter 20 This chapter includes the following topics: Technical Specifications...
Before You Install the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 27 Installing TCP/IP Protocol 1. In the Local Area Connec
Technical Specifications 396 Check Point ZoneAlarm User Guide Table 86: ZoneAlarm Attributes Attribute ZoneAlarm Z100G SBXWZA-166LHGE-5 Physical
Technical Specifications Chapter 20: Specifications 397 Applicable Standards Safety cULus, CB, LVD Quality IISO9001, ISO 14001, TL9000 EMC CE
CE Declaration of Conformity 398 Check Point ZoneAlarm User Guide CE Declaration of Conformity SofaWare Technologies Ltd., 3 Hilazon St., Ramat-G
CE Declaration of Conformity Chapter 20: Specifications 399 Attribute ZoneAlarm Z100G SBXWZA-166LHGE-5 EN 61000-4-8 EN 61000-4-11 ENV50204 EN 6
Federal Communications Commission Radio Frequency Interference Statement 400 Check Point ZoneAlarm User Guide Federal Communications Commission R
Glossary of Terms Glossary of Terms 401 A ADSL Modem A device connecting a computer to the Internet via an existing phone line. ADSL (Asymmetric
Glossary of Terms 402 Check Point ZoneAlarm User Guide D DHCP Any machine requires a unique IP address to connect to the Internet using Internet
Glossary of Terms Glossary of Terms 403 HTTPS Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL. A protocol for accessing a
Glossary of Terms 404 Check Point ZoneAlarm User Guide M MAC Address The MAC (Media Access Control) address is a computer's unique hardware
Glossary of Terms Glossary of Terms 405 PPTP The Point-to-Point Tunneling Protocol (PPTP) allows extending a local network by establishing privat
Before You Install the ZoneAlarm Router 28 Check Point ZoneAlarm User Guide TCP/IP Settings 1. In the Local Area Connection Properties window, d
Glossary of Terms 406 Check Point ZoneAlarm User Guide At the other end (the client program in your computer), TCP reassembles the individual pac
Index Index 407 A Access Denied page customizing • 195 account, configuring • 275 active computers, viewing • 158 active connections, viewing • 1
Index 408 Check Point ZoneAlarm User Guide Ping • 344 Traceroute • 344 using • 344 WHOIS • 344 diagnostics • 364 DMZ explained • 402 DNS • 344, 4
Index Index 409 explained • 85, 404 Host Port Scan • 230 HTTPS configuring • 338 explained • 402 using • 47 hub • 36, 389, 403 I IGMP • 243 IKE t
Index 410 Check Point ZoneAlarm User Guide configuring • 81 configuring DHCP options • 90 configuring the WLAN • 113 enabling DHCP Server on • 86
Index Index 411 R rebooting • 365 Remote Access VPN Clients • 291 Remote Access VPN Servers • 291 Remote Desktop accessing a remote desktop • 327
Index 412 Check Point ZoneAlarm User Guide Setup Wizard • 43, 56 Small PMTU • 224 SmartDefense categories • 205 configuring • 198 using • 197 sof
Index Index 413 V Vendor-Specific Attribute configuring • 251 VPN explained • 291, 406 tunnnels • 305 viewing IKE traces • 308 VPN tunnels creati
Index 414 Check Point ZoneAlarm User Guide configuring • 113 defined • 406 Worm Catcher • 238 WPA-Personal • 113 Z ZoneAlarm network requirements
Before You Install the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 29 Mac OS Use the following procedure for setting up the T
Before You Install the ZoneAlarm Router 30 Check Point ZoneAlarm User Guide Mac OS-X Use the following procedure for setting up the TCP/IP Prot
Before You Install the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 31 3. Click Configure.
Wall Mounting the ZoneAlarm Router 32 Check Point ZoneAlarm User Guide TCP/IP configuration fields appear. 4. Click the Configure IPv4 drop-dow
Wall Mounting the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 33 3. Mark two drill holes on the wall, in accordance with the
Securing the ZoneAlarm Router against Theft 34 Check Point ZoneAlarm User Guide Securing the ZoneAlarm Router against Theft The ZoneAlarm route
Securing the ZoneAlarm Router against Theft Chapter 3: Installing and Setting Up ZoneAlarm 35 While these parts may differ between devices, all l
POWER ADAPTER Operate this product only from the type of power source indicated on the product’s marking label. If you are not sure of the type
Router Installation 36 Check Point ZoneAlarm User Guide 5. Thread the anti-theft device's pin through the bolt’s holes, and insert the pin
Router Installation Chapter 3: Installing and Setting Up ZoneAlarm 37 Figure 6: Typical Connection Diagram
Router Installation 38 Check Point ZoneAlarm User Guide Cascading Your Router The ZoneAlarm router protects all computers and network devices tha
Setting Up the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 39 Connecting the Router to Network Printers You can connect netw
Setting Up the ZoneAlarm Router 40 Check Point ZoneAlarm User Guide Logging on to the ZoneAlarm Portal and setting up your password Initial Lo
Setting Up the ZoneAlarm Router Chapter 3: Installing and Setting Up ZoneAlarm 41 The Firmware page appears. 2. Click ZoneAlarm Setup Wizard.
Initial Login to the ZoneAlarm Portal Chapter 4: Getting Started 43 Chapter 4 This chapter contains all the information you need in order to get
Initial Login to the ZoneAlarm Portal 44 Check Point ZoneAlarm User Guide The initial login page appears. 2. Type a password both in the Passw
Initial Login to the ZoneAlarm Portal Chapter 4: Getting Started 45 The ZoneAlarm Setup Wizard opens, with the Welcome page displayed. 4. Confi
Logging on to the ZoneAlarm Portal 46 Check Point ZoneAlarm User Guide Logging on to the ZoneAlarm Portal Note: By default, HTTP and HTTPS ac
Accessing the ZoneAlarm Portal Remotely Using HTTPS Chapter 4: Getting Started 47 2. Type your username and password. 3. Click OK. The Welcome
Accessing the ZoneAlarm Portal Remotely Using HTTPS 48 Check Point ZoneAlarm User Guide Note: Your browser must support 128-bit cipher strength.
Using the ZoneAlarm Portal Chapter 4: Getting Started 49 The ZoneAlarm Portal appears. Using the ZoneAlarm Portal The ZoneAlarm Portal is a Web-
Using the ZoneAlarm Portal 50 Check Point ZoneAlarm User Guide Main Menu The main menu includes the following submenus. Table 9: Main Menu Subm
Using the ZoneAlarm Portal Chapter 4: Getting Started 51 This submenu… Does this… Antivirus Allows you to configure VStream Antivirus settings.
Using the ZoneAlarm Portal 52 Check Point ZoneAlarm User Guide Status Bar The status bar is located at the bottom of each page. It displays the f
Logging off Chapter 4: Getting Started 53 Logging off Logging off terminates your administration session. Any subsequent attempt to connect to t
Overview Chapter 5: Configuring the Internet Connection 55 Chapter 5 This chapter describes how to configure and work with a ZoneAlarm Internet c
Contents Contents i Contents About This Guide...
Using the Internet Wizard 56 Check Point ZoneAlarm User Guide Using the Internet Wizard The Internet Wizard allows you to configure your ZoneAla
Using the Internet Wizard Chapter 5: Configuring the Internet Connection 57 The Internet Connection Method dialog box appears. 4. Select the In
Using the Internet Wizard 58 Check Point ZoneAlarm User Guide Using a PPPoE Connection If you selected the PPPoE (PPP over Ethernet) connection m
Using the Internet Wizard Chapter 5: Configuring the Internet Connection 59 The system attempts to connect to the Internet via the specified conn
Using the Internet Wizard 60 Check Point ZoneAlarm User Guide Using a PPTP Connection If you selected the PPTP connection method, the PPP Configu
Using the Internet Wizard Chapter 5: Configuring the Internet Connection 61 Table 12: PPTP Connection Fields In this field… Do this… Username
Using the Internet Wizard 62 Check Point ZoneAlarm User Guide Using a Static IP Connection If you selected the Static IP connection method, the S
Using the Internet Wizard Chapter 5: Configuring the Internet Connection 63 Table 13: PPPoE Connection Fields In this field… Do this… IP Addres
Using Internet Setup 64 Check Point ZoneAlarm User Guide Using Internet Setup Internet Setup allows you to manually configure your Internet co
Using Internet Setup Chapter 5: Configuring the Internet Connection 65 The Internet Setup page appears. 3. Do one of the following: • To conf
Contents ii Check Point ZoneAlarm User Guide Configuring the Internet Connection...
Using Internet Setup 66 Check Point ZoneAlarm User Guide Configuring an Ethernet-Based Connection 1. In the Port drop-down list, do one of the
Using Internet Setup Chapter 5: Configuring the Internet Connection 67 New fields appear, depending on the check boxes you selected. 2. Click A
Using Internet Setup 68 Check Point ZoneAlarm User Guide Using a Cable Modem Connection 1. Complete the fields using the relevant information i
Using Internet Setup Chapter 5: Configuring the Internet Connection 69 Using a PPPoE Connection 1. Complete the fields using the relevant infor
Using Internet Setup 70 Check Point ZoneAlarm User Guide New fields appear, depending on the check boxes you selected. 2. Click Apply. The Zone
Using Internet Setup Chapter 5: Configuring the Internet Connection 71 Using a PPTP Connection 1. Complete the fields using the relevant inform
Using Internet Setup 72 Check Point ZoneAlarm User Guide New fields appear, depending on the check boxes you selected. 2. Click Apply. The Zone
Using Internet Setup Chapter 5: Configuring the Internet Connection 73 Using a Telstra (BPA) Connection Use this Internet connection type only if
Using Internet Setup 74 Check Point ZoneAlarm User Guide New fields appear, depending on the check boxes you selected. 2. Click Apply. The Zone
Using Internet Setup Chapter 5: Configuring the Internet Connection 75 Table 14: Internet Setup Fields In this field… Do this… PPP Settings Use
Contents Contents iii Viewing Connections...
Using Internet Setup 76 Check Point ZoneAlarm User Guide In this field… Do this… On outgoing activity Select this option to specify that the rou
Using Internet Setup Chapter 5: Configuring the Internet Connection 77 In this field… Do this… Secondary DNS Server Type the Secondary DNS serve
Viewing Internet Connection Information 78 Check Point ZoneAlarm User Guide In this field… Do this… Cloned MAC Address Do one of the following:
Viewing Internet Connection Information Chapter 5: Configuring the Internet Connection 79 A tooltip displays the number of bytes sent and receive
Enabling/Disabling the Internet Connection 80 Check Point ZoneAlarm User Guide Enabling/Disabling the Internet Connection You can temporarily di
Configuring Network Settings Chapter 6: Managing Your Network 81 Chapter 6 This chapter describes how to manage and configure your network connec
Configuring Network Settings 82 Check Point ZoneAlarm User Guide The My Network page appears. 2. Click Edit in the LAN network’s row. The Edit
Configuring Network Settings Chapter 6: Managing Your Network 83 The fields are enabled. 4. If desired, change your ZoneAlarm router’s internal
Configuring Network Settings 84 Check Point ZoneAlarm User Guide Note: The internal network range is defined both by the ZoneAlarm router’s int
Configuring Network Settings Chapter 6: Managing Your Network 85 Enabling/Disabling Hide NAT Hide Network Address Translation (Hide NAT) enables
Commentaires sur ces manuels