StoneOS WebUI User Guide E
StoneOS WebUI User Guide E
Contact Information:
US Headquarters:
Hillstone Networks
292 Gibraltar Drive, Suite 105
Sunnyvale, CA 94089
Phone: 1-408-508-6750
http://www.hillstonenet.com/about-us/contact/
Contents 1
Welcome 1
Chapter 1 Getting Started Guide 2
Initial Visit to Web Interface 3
Preparing the StoneOS System 4
Installing Licenses 4
Creating a System Administrator 4
Adding Trust Hosts 5
Upgrading StoneOS Firmware 6
Updating Signature Database 6
Connecting to Internet Under Routing Mode 7
Restoring to Factory Settings 11
Restoring using a pin 11
Restoring via WebUI 11
Chapter 2 Deploy Your Device 12
How a Firewall Works 13
StoneOS System Architecture 13
General Rules of Security Policy 14
Packet Processing Rule 14
Forwarding Rule in Layer 2 14
Forwarding Rule in Layer 3 16
Deploying Transparent Mode 18
Deploying Routing Mode 22
Deploying Mix Mode 26
Deploying Tap Mode 27
Chapter 3 Dashboard 29
Customize 29
Threats 30
Threatscape 30
User 30
Application 30
Total Traffic 31
Physical Interface 31
System Information 31
Specified Period 32
Chapter 4 iCenter 33
TOC - 1
Threat 33
Chapter 5 Network 34
Security Zone 35
Configuring a Security Zone 35
Interface 37
Configuring an Interface 38
Creating a PPPoE Interface 38
Creating a Tunnel Interface 41
Creating a Virtual Forward Interface 44
Creating a Loopback Interface 47
Creating an Aggregate Interface 50
Creating a Redundant Interface 54
Creating an Ethernet Sub-interface/an Aggregate Sub-interface/a Redundant Sub-interface 55
Creating a VSwitch Interface/a VLAN Interface 57
Editing an Interface 58
MGT Interface 64
Configuring a MGT Interface 64
VLAN 65
Configuring a VLAN 65
DNS 66
Configuring a DNS Server 66
Configuring a DNS Proxy 66
Configuring a Analysis 67
Configuring a DNS Cache 67
NBT Cache 68
DHCP 70
Configuring a DHCP Server 70
Configuring a DHCP Relay Proxy 73
DDNS 74
Configuring a DDNS 74
PPPoE 76
Configuring PPPoE 76
Virtual Wire 78
Configuring a Virtual-Wire 78
Configuring the Virtual Wire Mode 78
Virtual Router 80
Creating a Virtual Router 80
Global Configuration 80
Virtual Switch 82
TOC - 2
Creating a VSwitch 82
Port Mirroring 83
WLAN 84
Creating a WLAN 84
Advanced Settings 85
3G 86
Configuring 3G Settings 86
Managing Data Card 87
Automatically Verifying the PIN Code 87
Enabling/Disabling the PIN Code Protection 87
Modifying the PIN Code 88
Manually Verifying the PIN Code 88
Unlocking the PIN Code 88
Link Load Balancing 89
Configuring Outbound LLB 89
Configuring LLB Profile 89
Configuring LLB Rule 91
Configuring DNS Balance 91
Configuring Inbound LLB 92
Creating a SmartDNS Rule Table 92
Application Layer Gateway (ALG) 94
Enabling ALG 94
Global Network Parameters 95
Configuring Global Network Parameters 95
Configuring Protection Mode 96
Chapter 6 Advanced Routing 98
Destination Route 99
Creating a Destination Route 99
Destination-Interface Route 100
Creating a Destination-Interface Route 100
Source Route 102
Creating a Source Route 102
Source-Interface Route 103
Creating a Source-Interface Route 103
ISP Profile 105
Creating an ISP Profile 105
Uploading an ISP Profile 105
Saving an ISP Profile 106
ISP Route 107
TOC - 3
Creating an ISP Route 107
Policy-based Route 109
Creating a Policy-based Route 109
Creating a Policy-based Route Rule 109
Adjusting Priority of a PBR Rule 112
Applying a Policy-based Route 113
DNS Redirect 114
Configuring the Global Match Order 114
WAP Traffic Distribution 114
Enabling WAP Traffic Distribution 115
Configuring a DNS Server 115
Creating Host Book 115
Creating a Policy-based Route Rule 115
Viewing WAP Traffic Distribution Statistics 115
Video Streaming Redirection 116
RIP 117
Creating RIP 117
Chapter 7 Authentication 120
Authentication Process 120
Web Authentication 121
Using WebAuth Wizard 121
Configuring Global Parameters for WebAuth 122
Modifying WebAuth Page Background Picture 124
Single Sign-On 126
Using AD Agent Software for SSO 126
Using Secure Agent Software for SSO 128
Using a Script for SSO 128
Using SSO-NTLM 131
SSO Agent 133
Configuring SSO Agent 133
802.1x 134
Configuring 802.1x 134
Creating 802.1x Profile 134
802.1x Global Configuration 135
Viewing Online Users 136
PKI 137
Creating a PKI Key 137
Creating a Trust Domain 138
Importing/Exporting Trust Domain 139
TOC - 4
Importing Trust Certification 140
Online Users 141
Chapter 8 VPN 142
IPSec VPN 143
Basic Concepts 143
Security Association (SA) 143
Encapsulation Modes 143
Establishing SA 143
Using IPSec VPN 143
Configuring an IKE VPN 145
Configuring a Phase 1 Proposal 145
Configuring a Phase 2 Proposal 146
Configuring a VPN Peer 148
Configuring an IKE VPN 150
Configuring a Manual Key VPN 153
Viewing IPSec VPN Monitoring Information 156
Configuring PnPVPN 158
PnPVPN Workflow 158
Configuring a PnPVPN Client 158
Configuring IPSec-XAUTH Address Pool 160
SSL VPN 162
Configuring an SSL VPN 162
Configuring Resource List 168
Configuring an SSL VPN Address Pool 170
Configuring SSL VPN Login Page 172
Host Binding 173
Configuring Host Binding 173
Configuring Host Binding and Unbinding 173
Configuring a Super User 173
Configuring a Shared Host 174
Importing/Exporting Host Binding List 175
Host Checking 176
Role Based Access Control and Host Checking Procedure 176
Configuring a Host Checking Profile 177
SSL VPN Client for Windows 180
Downloading and Installing Secure Connect 180
Using Username/Password Authentication 180
Using Username/Password + Digital Certificate Authentication 182
Using Digital Certificate Only 182
TOC - 5
Starting Secure Connect 183
Starting via Web 183
Using Username/Password Authentication 183
Using Username/Password + USB Key Certificate Authentication 184
Using Username/Password + File Certificate Authentication 185
Using USB Key Certificate Only Authentication 186
Using File Certificate Only Authentication 186
TOC - 6
Connection Status 207
Connection Log 207
About US 207
SSL VPN Client for Mac OS 207
Downloading and Installing Client 207
Starting Client and Establishing Connection 207
GUI 208
Toolbar 208
Connection List 209
Connection Information 209
Status Bar 209
Menu 209
SSL VPN Client for Linux 210
Downloading and Installing Client 210
Starting Client and Establishing Connection 211
Upgrading and Uninstalling Client 213
GUI 215
Toolbar 215
Connection List 215
Connection Information 215
Status Bar 216
Menu 216
L2TP VPN 217
Configuring an L2TP VPN 217
Configuring an L2TP VPN Address Pool 219
Viewing L2TP VPN Online Users 221
Chapter 9 Object 222
Address 223
Creating an Address Book 223
Viewing Details 224
Host Book 225
Creating a Host Book 225
Service Book 226
Predefined Service/Service Group 226
User-defined Service 226
User-defined Service Group 226
Configuring a Service Book 226
Configuring a User-defined Service 227
Configuring a User-defined Service Group 228
TOC - 7
Viewing Details 229
Application Book 230
Editing a Predefined Application 230
Creating a User-defined Application 230
Creating a User-defined Application Group 231
Creating an Application Filter Group 231
Creating a Signature Rule 231
Viewing Details 233
SLB Server Pool 234
Configuring SLB Server Pool and Track Rule 234
Viewing Details of SLB Pool Entries 235
Schedule 236
Periodic Schedule 236
Absolute Schedule 236
Creating a Schedule 236
AAA Server 238
Configuring a Local AAA Server 238
Configuring Radius Server 239
Configuring Active Directory Server 240
Configuring LDAP Server 243
Configuring TACACS+ Server 246
Connectivity Test 247
User 248
Configuring a Local User 248
Creating a Local User 248
Creating a User Group 249
Configuring a LDAP User 250
Configuring a LDAP Server 250
Synchronizing Users 252
Configuring an Active Directory User 252
Configuring an AD Server 252
Synchronizing Users 254
Configuring a IP-User Binding 254
Role 256
Creating a Role 256
Creating a Role Mapping Rule 256
Creating a Role Combination 257
Track Object 259
Creating a Track Object 259
TOC - 8
URL Filter 261
Configuring URL Filter 261
Viewing URL Hit Statistics 265
Viewing Web Surfing Records 265
Configuring URL Filter Objects 265
Predefined URL DB 265
Configuring Predefined URL Database Update Parameters 266
Upgrading Predefined URL Database Online 266
Upgrading Predefined URL Database from Local 266
User-defined URL DB 266
Configuring User-defined URL DB 267
Importing User-defined URL 267
Clearing User-defined URL 268
URL Lookup 268
Inquiring URL Information 268
Configuring URL Lookup Servers 268
Keyword Category 269
Configuring a Keyword Category 269
Warning Page 270
Configuring Block Warning 270
Configuring Audit Warning 271
Chapter 10 Policy 273
Security Policy 274
Configuring a Security Policy Rule 274
Viewing and Searching Security Policy Rules 278
Managing Security Policy Rules 280
Enabling/Disabling a Policy Rule 280
Cloning a Policy Rule 280
Adjusting Security Policy Rule Position 280
Configuring Default Action 280
Viewing and Clearing Policy Hit Count 281
Hit Count Check 282
Rule Redundancy Check 282
User Online Notification 283
Configuring User Online Notification 283
Configuring the Parameters of User Online Notification 283
Viewing Online Users 284
iQoS 285
Implement Mechanism 285
TOC - 9
Pipes and Traffic Control Levels 285
Pipes 285
Traffic Control Levels 287
Enabling iQoS 287
Pipes 288
Basic Operations 288
Configuring a Pipe 288
Viewing Statistics of Pipe Monitor 293
NAT 294
Basic Translation Process of NAT 294
Implementing NAT 294
Configuring SNAT 295
Enabling/Disabling a SNAT Rule 297
Adjusting Priority 297
Exporting NAT444 Static Mapping Entries 298
Configuring DNAT 299
Configuring an IP Mapping Rule 299
Configuring a Port Mapping Rule 299
Configuring an Advanced NAT Rule 300
Enabling/Disabling a DNAT Rule 302
Adjusting Priority 302
SLB Server 304
Viewing SLB Server Status 304
Viewing SLB Server Pool Status 304
Session Limit 305
Configuring a Session Limit Rule 305
Clearing Statistic Information 306
ARP Defense 307
Configuring ARP Defense 308
Configuring Binding Settings 308
Adding a Static IP-MAC-Port Binding 308
Obtaining a Dynamic IP-MAC-Port Bindings 308
Bind the IP-MAC-Port Binding Item 309
Importing/Exporting Binding Information 310
Configuring Authenticated ARP 310
Configuring ARP Inspection 311
Configuring DHCP Snooping 312
Viewing DHCP Snooping List 313
Configuring Host Defense 313
TOC - 10
SSL Proxy 315
Work Mode 315
Working as Gateway of Web Clients 316
Configuring SSL Proxy Parameters 316
Specifying the PKI Trust Domain of Device Certificate 316
Obtaining the CN Value 316
Configuring a Trusted SSL Certificate List 317
Importing Device Certificate to Client Browser 317
Configuring a SSL Proxy Profile 317
Working as Gateway of Web Servers 319
Configuring a SSL Proxy Profile 319
Binding a SSL Proxy Profile to a Policy Rule 320
Internet Behavior Control 321
Configuring Internet Behavior Control Objects 322
Predefined URL DB 322
Configuring Predefined URL Database Update Parameters 322
Upgrading Predefined URL Database Online 323
Upgrading Predefined URL Database from Local 323
User-defined URL DB 323
Configuring User-defined URL DB 323
Importing User-defined URL 324
Clearing User-defined URL 324
URL Lookup 325
Inquiring URL Information 325
Configuring URL Lookup Servers 325
Keyword Category 326
Configuring a Keyword Category 326
Warning Page 327
Configuring Block Warning 327
Configuring Audit Warning 328
Bypass Domain 328
User Exception 329
Web Content 330
Creating a Web Content Rule 330
Enabling/Disabling a Rule 333
Prioritizing Rules 333
Viewing Monitored Results of Keyword Blocking in Web Content 333
Viewing Logs of Keyword Blocking in Web Content 333
Web Posting 334
TOC - 11
Creating Web Posting Rule 334
Enabling/Disabling a Rule 337
Prioritizing Rules 337
Viewing Monitored Results of Keyword Blocking in Web Posts 337
Viewing Logs of Keyword Blocking in Web Posts 337
Email Filter 338
Creating Email Filter Rule 338
Enabling/Disabling a Rule 341
Prioritizing Rules 341
Viewing Monitored Results of Email Keyword Blocking 341
Viewing Logs of Emails Keyword Blocking 341
IM Control 342
Creating IM Control Rule 342
Enabling/Disabling a Rule 345
Prioritizing Rules 345
Viewing Logs of IM Chatting 345
HTTP/FTP Control 346
Creating HTTP/FTP Control Rule 346
Enabling/Disabling a Rule 348
Prioritizing Rules 348
Viewing Logs of HTTP/FTP Behavior Control 349
Global Blacklist 350
Configuring IP Block Settings 350
Configuring Service Block Settings 350
Chapter 11 Threat Prevention 352
Threat Protection Signature Database 352
Anti Virus 353
Configuring Anti-Virus 354
Preparing 354
Configuring Anti-Virus Function 354
Configuring an Anti-Virus Rule 355
Configuring Anti-Virus Global Parameters 357
Intrusion Prevention System 358
Signatures 358
Configuring IPS 359
Preparation 359
Configuring IPS Function 359
Configuring an IPS Rule 360
IPS Global Configuration 371
TOC - 12
Signature List 372
Searching Signatures 372
Managing Signatures 372
Sandbox 374
Configuring Sandbox 375
Preparation 375
Configuring Sandbox 375
Configuring a Sandbox Rule 376
Sandbox Global Configurations 377
Attack-Defense 379
ICMP Flood and UDP Flood 379
ARP Spoofing 379
SYN Flood 379
WinNuke Attack 379
IP Address Spoofing 379
IP Address Sweep and Port Scan 379
Ping of Death Attack 379
Teardrop Attack 380
Smurf Attack 380
Fraggle Attack 380
Land Attack 380
IP Fragment Attack 380
IP Option Attack 380
Huge ICMP Packet Attack 380
TCP Flag Attack 380
DNS Query Flood Attack 380
TCP Split Handshake Attack 380
Configuring Attack Defense 381
Perimeter Traffic Filtering 388
Enabling Perimeter Traffic Filtering 388
Configuring User-defined Black/White List 388
Configuring Third-party Black List 389
Searching Black/White List 389
Chapter 12 Monitor 391
Monitor 392
User Monitor 393
Summary 393
User Details 393
Address Book Details 394
TOC - 13
Monitor Address Book 395
Statistical Period 396
Application Monitor 397
Summary 397
Application Details 398
Group Details 398
Select Application Group 399
Statistical Period 400
Cloud Application Monitor 401
Summary 401
Cloud Application Details 401
Statistical Period 402
Share Access Detect 403
Device Monitor 404
Summary 404
Statistical Period 405
Detailed Information 405
Online IP 407
URL Hit 408
Summary 408
User/IP 408
URL 409
URL Category 409
Statistical Period 410
Application Block 411
Summary 411
Application 411
User/IP 412
Statistical Period 412
Keyword Block 413
Summary 413
Web Content 413
Email Content 414
Web Posting 414
User/IP 414
Statistical Period 415
Authentication User 416
Monitor Configuration 417
User-defined Monitor 418
TOC - 14
Creating a User-defined Stat-set 423
Viewing User-defined Monitor Statistics 424
WAP Traffic Distribution 425
Reporting 426
Report File 427
User-defined Task 428
Creating a User-defined Task 428
Enabling/Disabling the User-defined Task 429
Viewing Report Files 430
Predefined Task 431
Generating Report Tasks 431
Viewing Report Files 432
Logging 433
Log Severity 433
Destination of Exported Logs 433
Log Format 434
Event Logs 435
Network Logs 436
Configuration Logs 437
Threat Logs 438
Session Logs 439
PBR Logs 439
NAT Logs 440
URL Logs 441
NBC Logs 442
CloudSandBox Logs 442
Log Configuration 443
Creating a Log Server 443
Adding Email Address to Receive Logs 443
Specifying a Unix Server 444
Specifying a Mobile Phone 444
Managing Logs 445
Configuring Logs 445
Option Descriptions of Various Log Types 445
Chapter 13 Diagnostic Tool 451
Test Tools 452
DNS Query 452
Ping 452
Traceroute 452
TOC - 15
Chapter 14 High Availability 453
Basic Concepts 453
HA Cluster 453
HA Group 453
HA Node 453
Virtual Forward Interface and MAC 454
HA Selection 454
HA Synchronization 454
Configuring HA 455
Chapter 15 System Management 457
System Information 458
Viewing System Information 458
Device Management 460
Administrators 460
VSYS Administrator 460
Creating an Administrator Account 461
Admin Roles 462
Trust Host 463
Creating a Trust Host 463
Management Interface 464
System Time 465
Configuring the System Time Manually 465
Configuring NTP 466
NTP Key 466
Creating a NTP Key 467
Option 467
Rebooting the System 469
System Debug Information 469
Data collection 469
Configuration File Management 470
Managing Configuration File 470
Viewing the Current Configuration 471
SNMP 472
SNMP Agent 472
SNMP Host 473
Trap Host 474
V3 User Group 474
V3 User 475
Upgrading System 477
TOC - 16
Upgrading Firmware 477
Updating Signature Database 477
License 479
Viewing License List 480
Applying for a License 480
Installing a License 481
Mail Server 482
Creating a Mail Server 482
SMS Parameters 483
SMS Modem Devices 483
Configuring SMS Parameters 483
Testing SMS 483
Connecting to HSM 484
HSM Deployment Scenarios 484
Connecting to HSM 484
Connecting to Hillstone Cloud·View 485
Cloud·View Deployment Scenarios 485
Connecting to Hillstone Cloud·View 486
VSYS (Virtual System) 487
VSYS Objects 487
Root VSYS and Non-root VSYS 487
VRouter, VSwitch, Zone and Interface 488
Shared VRouter 488
Shared VSwitch 488
Shared Zone 488
Shared Interface 488
Interface Configuration 488
Creating Non-root VSYS 489
Configuring Dedicated and Shared Objects for Non-root VSYS 489
Configuring VSYS Quota 490
TOC - 17
Welcome
l Webiste: www.hillstonenet.com
Welcome 1
Chapter 1 Getting Started Guide
This guide helps you to go through initial configuration and basic set-up of Hillstone devices. The intended reader is
your company's network administrator.
This guide is used when you have finished mounting your device. After following the steps in this guide, your private
network will be able to access Internet. For security functions, you will need to read the User Guide (WebUI User
Guide or CLI User Guide).
You may configure your firewall in the following sequence:
2. Connect an RJ-45 Ethernet cable from your computer to the eth0/0 of the device.
4. In the login interface, type the default username and password: hillstone/hillstone.
5. At the first sign of address, the user needs to read and accept the EULA ( end-user license agreements ), click
EULA to view the details of EULA.
l Upload License file: Select the radio button, click Browse, and select the license file (a .txt file).
l Manual Input: Select the radio button, and paste the license code into the text box.
l Online Install:Select the Online Install radio button and click the Online Install button, your pur-
chased licenses will be automatically installed. It should be noted that the licenses must be in activated status
in the Hillstone Online Registration Platform(http://onlinelic.hillstonenet.com/reqlicense). (To activate the
license, you need to log into the platform using your username and password of the platform.The username
is the same as your mailbox which was provided when placing an order. Hillstone will send the password by
e-mail.Then activate the licenses that need to be installed. If you purchased the device from the Hillstone
agent, please contact the agent to activate the licenses.)
3. Click OK.
4. To make the license take effect, reboot the system. Go to System > Device Management > Options, click
Reboot.
2. Click New,
Name Admin
Role Administrator
Password 123456
Confirm Pass- 123456
word
Login Type Select Telnet, SSH , HTTP and HTTPS.
3. Click OK.
Note: The system has a default administrator "hillstone" , which cannot be deleted or
renamed.
3. Click OK.
2. Select Browse and choose the new image from your local computer.
3. Click Reboot to make new firmware take effect, and then click Apply.
4. The system will automatically reboot when it finishes installing new firmware.
1. Go to System > Upgrade Management, and click the <Signature Database Update> tab.
2. Find your intended database, and choose one of the following two ways to upgrade.
l Remote Update: Click Update , the system will automatically update the database.
l Local Update: Select Browse to open file explorer, and select your local signature file to import it into the
system.
1. Connect one port (e.g. eth0/1) of Hillstone device to your ISP network. In this way, "eth0/1" is in the untrust
zone.
2. Connect your internal network to another Ethernet interfaces (e.g. eth0/0) of the device. This means "eth0/0" is
connected to the trust zone.
4. If one of the internal interfaces already has been configured with an IP address, use a browser to visit that
address from one of your internal PCs.
If it is a new device, use the methods in "Initial Visit to Web Interface" on Page 3 to visit.
Type Static IP
IP Address 202.10.1.2 (public IP address provided by your ISP)
Netmask 255.255.255.0
Management Select protocols that you want to use to access the device.
3. Click OK.
Step 3: Creating a NAT rule to translate internal IP to public IP
2. Select New
3. Click OK.
Step 4: Creating a security policy to allow internal users access Internet.
2. Click New.
3. Click OK.
Step 5: Configuring a default route
3. Click OK.
Note: Resetting your device will erase all configurations, including the settings that have been
saved. Please be cautious!
To restore to factory's default settings, you may use one of the following two ways:
2. Use a pin to press the CLR pinhole on the front panel; keep pressing and power on the devcie.
3. Keep pressing until the STA and ALM indicators on the front panel turn constant red; release the pin. The system
will start to reset itself.
4. Click OK to confirm.
This chapter introduces how a firewall works and its most commonly used scenarios. Understanding the system struc-
ture, basic elements and flow chart will help you in better organizing your network and making the most of the firewall
product.
l Zone: Zones divide network into multiple segments, for example, trust (usually refers to the trusted segments
such as the Intranet), untrust (usually refers to the untrusted segments where security treats exist), and so on.
l Interface: Interface is the inlet and outlet for traffic going through security zones. An interface must be bound to
a security zone so that traffic can flow into and from the security zone. Furthermore, for the Layer 3 security zone,
an IP address should be configured for the interface and the corresponding policy rules should also be configured
to allow traffic transmission between different security zones. Multiple interfaces can be bound to one security
zone, but one interface cannot be bound to multiple security zones.
l VSwitch: VSwitch is short for Virtual Switch. A VSwitch functions as a switch in Layer 2. After binding a Layer 2
zone to a VSwitch, all the interfaces in the zone are also bound to the VSwitch. There is a default VSwitch named
VSwitch1. By default, all Layer 2 zones will be bound to VSwitch1. You can create new VSwitches and bind Layer 2
zones to VSwitches. Each VSwitch is a Layer 2 forwarding zone with its own MAC address table which supports
the Layer 2 traffic transmission for the device. Furthermore, the VSwitchIF helps on the traffic transmission
between Layer 2 and Layer 3.
l VRouter: VRouter is Virtual Router and also abbreviated as VR. A VRouter functions as a router with its own rout-
ing table. There is a default VR named trust-vr. By default, all the Layer 3 zones will be bound to trust-vr auto-
matically. The system supports the multi-VR function and the max VR number varies from different platforms.
Multiple VRs make the device work as multiple virtual routers, and each virtual router uses and maintains its own
routing table. The multi-VR function allow a device to achieve the effects of the address isolation between different
route zones and address overlapping between different VRs, as well as to avoid route leaking to some extent,
enhancing route security of network.
l Policy: Policy is to control the traffic forwarding between security zones/segments. By default Hillstone devices
will deny all traffic between security zones/segments, while the policy can identify which flow between security
zones or segments will be permitted, and which will be denied, specifically based on policy rules
For the relationship between interface, security zone, VSwitch and VRouter, see the following diagram:
l Interfaces are bound to security zones. Interfaces bound to Layer 2 security zones and Layer 3 security zones are
known as Layer 2 interfaces and Layer 3 interfaces respectively. One interface can be only bound to one security
zone; interface and its sub interface can belong to different security zones.
Note: To allow bidirectional traffic, you need to set up two policies: one is from source to des-
tination, the other is from destination to source. If there is only one-direction initiative access,
the responsive direction only need to respond to that visit, you will need to create only one-way
policy (from source to destination).
This part explain what policy is needed to allow interfaces in different zones, VSwtiches or Vrouteres to communicate.
The rules are:
1. Receive a packet.
2. Learn the source address and update the MAC address table.
3. If the destination MAC address is a unicast address, the system will look up the egress interface according to the
destination MAC address. And in this case, two situations may occur:
l If the destination MAC address is the MAC address of the VSwitchIF with an IP configured, the system will for-
ward the packet according to the related routes; if the destination MAC address is the MAC address of the
VSwitchIF with no IP configured, the system will drop the packet.
l Figure out the egress interface according to the destination MAC address. And if the egress interface is the
source interface of the packet, the system will drop the packet; otherwise, forward the packet from the
egress interface.
If no egress interfaces (unknown unicast) is found in the MAC address table, jump to Step 6 directly.
4. Figure out the source zone and destination zone according to the ingress and egress interfaces.
5. Look up the policy rules and forward or drop the packet according to the matched policy rules.
6. If no egress interface (unknown unicast) is found in the MAC address table, the system will send the packet to all
the other L2 interfaces. The sending procedure is: take each L2 interface as the egress interface and each L2
zone as the destination zone to look up the policy rules, and then forward or drop the packet according to the
matched policy rule. In a word, forwarding of unknown unicast is the policy-controlled broadcasting. Process of
broadcasting packets and multicasting packets is similar to the unknown unicast packets, and the only difference
is the broadcast packets and multicast packets will be copied and handled in Layer 3 at the same time.
For the ARP packets, the broadcast packet and unknown unicast packet are forwarded to all the other interfaces in the
VSwitch, and at the same time, the system sends a copy of the broadcast packet and unknown unicast packet to the
ARP module to handle.
0. Identify the logical ingress interface of the packet to determine the source zone of the packet. The logical ingress
interface may be a common interface or a sub-interface.
1. The system performs sanity check to the packet. If the attack defense function is enabled on the source zone, the
system will perform AD check simultaneously.
2. Session lookup. If the packet belongs to an existing session, the system will perform Step 11 directly.
3. DNAT operation. If a DNAT rule is matched, the system will mark the packet. The DNAT translated address is
needed in the step of route lookup.
4. Route lookup. The route lookup order from high to low is: PBR > SIBR > SBR > DBR > ISP route.
Till now, the system knows the logical egress and destination zone of the packet.
6. VR next hop check. If the next hop is a VR, the system will check whether it is beyond the maximum VR number
(current version allows the packet traverse up to three VRs). If it is beyond the maximum number, the system will
drop the packet; and if it is within the maximum number, return to Step 4. If the next hop is not a VR, go on with
policy lookup.
7. Policy lookup. The system looks up the policy rules according to the packet’s source/destination zones,
source/destination IP and port, and protocol. If no policy rule is matched, the system will drop the packet; if any
policy rule is matched, the system will deal with the packet as the rule specified. And the actions can be one of the
followings:
l Fromtunnel: Checks whether the packet originates from the specified tunnel. The system will forward the
packet from the specified tunnel and drop other packets.
10. If necessary, the system will perform the second time application identification. It is a precise identification based
on the packet contents and traffic action.
11. Application behavior control. After knowing the type of the application, the system will deal with the packet accord-
ing to the configured profiles and ALG.
12. Perform operations according to the records in the session, for example, the NAT mark.
4. In the login interface, type the default username and password: hillstone/hillstone.
3. Click OK.
3. Click OK.
2. Click New.
3. Click OK.
2. Click New.
3. Click OK.
3. Click OK.
4. In any PC of private network, enter the IP address of vswtichif1, you will visit the firewall Web user interface.
1. Connect one port (e.g. eth0/1) of Hillstone device to your ISP network. In this way, "eth0/1" is in the untrust
zone.
2. Connect your internal network to another Ethernet interfaces (e.g. eth0/0) of the device. This means "eth0/0" is
connected to the trust zone.
4. If one of the internal interfaces already has been configured with an IP address, use a browser to visit that
address from one of your internal PCs.
If it is a new device, use the methods in "Initial Visit to Web Interface" on Page 3 to visit.
Type Static IP
IP Address 202.10.1.1 (public IP address provided by your ISP)
Netmask 255.255.255.0
Management Select protocols that you want to use to access the device.
3. Click OK.
Step 3: Creating a NAT rule to translate internal IP to public IP
2. Select New
3. Click OK.
Step 4: Creating a security policy to allow internal users access Internet.
2. Click New.
3. Click OK.
Step 5: Configuring a default route
2. Click New.
To configure a mix mode, you need to combine the deployment methods of routing mode and transparent mode. Please
refer the these two modes.
The bypass mode is realized by binding a physical interface to Tap zone, then the interface becomes a bypass inter-
face. The device will monitor, scan, or record the traffic received in the bypass interface.
Use an Ethernet cable to connect e0 of Switch and e1 of the Hillstone device. The interface e1 is the bypass interface
and e2 is the bypass control interface. The interface e0 is the mirror interface of the switch.The switch mirrors the
traffic to e1 and Hillstone device will monitor, scan, and log the traffic received from e1. After configuring IPS, AV, or
network behavior control on the Hillstone device, if the device detects network intrusions, virus, or illegal network
behaviors, it will send TCP RST packet from e2 to the switch to tell it to reset the connections.
Note: Before configuring tap mode in the device, you need to set up interface mirroring in your
primary switch. Mirror the traffic of the switch from e0 to e1, and the device can scan, monitor
and count the mirrored traffic.
2. Click OK.
2. Click New.
1. Select Network > Zone, and double-click the tap zone created in step 1.
2. In the Treat Prevention tab, enable IPS and select the IPS rule just created.
3. Click OK.
This feature may vary slightly on different platforms. If there is a conflict between this guide and the actual page, the
latter shall prevail.
The dashboard shows the system and threat information. The layout of the dashboard is shown as below:
Customize
You can customize the dashboard displayed function or modify the function area location as needed.
2. When appears, press and hold the mouse functional area , you can drag it to the regional location to be
displayed .
Chapter 3 Dashboard 29
Threats
Display the top 10 threats information within the specified period.
l Click to specify the type of display: Destination IP, Source IP or Threat Name.
Threatscape
The threat information statistic chart are displayed within the specified period.
l Click the column to jump to the iCenter page, and the list will display with the corresponding threat level.
User
Display the top 10 user traffic information within the specified period.
l Specify the type of display: by Traffic or by Concurrent Sessions from the drop-down menu.
l Click and , switch between the table and the bar chart.
l Hover your mouse over a bar, to view users' upstream traffic, downstream traffic, total traffic or concurrent ses-
sions.
Application
Display the top 10 application traffic information within the specified period.
30 Chapter 3 Dashboard
l Specify the type of display: by Traffic or by New Sessions from the drop-down menu.
l Click and , switch between the table and the bar chart.
l Hover your mouse over a bar, to view users' total traffic or new sessions.
Total Traffic
Shows the Total Traffic within the specified period .
Physical Interface
Display the Interfaces statistics information, including interface name, IP address, upstream speed, downstream
speed and total speed.
System Information
The system information include.
Chapter 3 Dashboard 31
l System Uptime: The running time of the system.
l Hello: Negotiation state. That represents the device is consulte the relationship between master and backup.
l Firmware: The version number of and version time of the firmware running on the device.
l Anti Virus Signature: The version number and time of the anti virus signature database.
l IPS Signature: The version number and time of the IPS signature database.
l URL Category Database: The version number and time of the URL category database.
l Application Signature: The version number and time of the application signature database.
l IP Reputation Database: The version number and time of the IP reputation database.
Specified Period
The system supports the predefined time cycle and the custom time cycle. Click ( ) on the
top right corner of each tab to set the time cycle.
l Last Hour: Displays the statistical information within the latest 1 hour.
l Last Day: Displays the statistical information within the latest 1 day.
l Last Month: Displays the statistical information within the latest 1 month.
32 Chapter 3 Dashboard
Chapter 4 iCenter
This feature may not be available on all platforms. Please check your system's actual page to see if your device delivers
this feature.
Multi-dimensional , in-depth shows the threats of the whole network.
Threat
Threats tab statistics and displays the all threats information of the whole network within the specified period. Click
iCenter.
Click a threat name link in the list , to view detailed information , source/destination, knowledge base and history about
threat.
l Threat Analysis: Depending on the threats of the different detection engine , Threat Analysis tab content is also
different.
About Anti Virus/IPS function introduction, see "Anti Virus" on Page 353/" Intrusion Prevention System" on
Page 358.
About Attack Defense/Perimeter Traffic Filtering function introduction, see "Attack-Defense" on Page
379/"Perimeter Traffic Filtering" on Page 388.
l Sandbox Threat Detection: Display the threat detailed information of the suspicious file.
l Knowledge Base: About the threats detected by IPS, display the specified threat description, solution etc.
l Threat History: Display the selected threat historical information of the whole network .
Chapter 4 iCenter 33
Chapter 5 Network
This chapter describes factors and configurations related to network connection, including:
l Security Zone: The security zone divides network into different sections, for example, trust zone or untrust zone.
The device can control the traffic from and to security zones once the configured policy rules have been applied.
l Interface: The interface allows inbound and outbound traffic to security zones. An interface must be bound to a
security zone so that traffic can flow into and from the security zone.
l MGT Interface: To facilitate the management to the device and meet the requirement of separating the man-
agement traffic from the data traffic, system has an independent management interface(MGT Interface).
l Virtual-Wire: The virtual wire allows direct Layer 2 communications between sub networks.
l Virtual Router: Virtual Routerouter (Virtual Router for short) acts as a router. Different Virtual Routers have their
own independent routing tables.
l Virtual Switch: Running on Layer 2, VSwitch acts as a switch. Once a Layer 2 security zone is bound to a VSwitch,
all the interfaces bound to that zone will also be bound to the VSwitch.
l Port Mirroring: Allows users to mirror the traffic of one interface to another interface (analytic interface) for ana-
lysis and monitoring.
l WLAN: WLAN represents the local area network that uses the wireless channel as the medial. By configuring the
WLAN function, you can establish the wireless local area network and allow the users to access LAN through wire-
less mode.
l 3G: By configuring the 3G function, users can access Internet through wireless mode.
l Link Load Balancing: It takes advantage of dynamic link detection technique to assign traffic to different links
appropriately, thus making full use of all available link resources.
l Application Layer Gate: ALG can assure the data trasmission for the applications that uss multi-channels, and
assure the proper operation of VoIP applications in the strictest NAT mode.
l Global Network Parameters: These parameters mainly include IP packet's processing options, like IP fragmention,
TCP MSS value, etc.
Chapter 5 Network 34
Security Zone
Security zone is a logical entity. One or more interfaces can be bound to one zone. A zone with policy applied is known
as a security zone, while a zone created for a specific function is known as a functional zone. Zones have the following
features:
l An interface should be bound to a zone. A Layer 2 zone will be bound to a VSwitch, while a Layer 3 zone will be
bound to a VRouter. Therefore, the VSwitch to which a Layer 2 zone is bound decides which VSwitch the inter-
faces belong to in that Layer 2 zone, and the VRouter to which a Layer 3 zone is bound decides which VRouter the
interfaces belong to in that Layer 3 zone.
l Interfaces in Layer 2 and Layer 3 are working in Layer 2 mode and Layer 3 mode respectively.
Co nfiguring a Security Z o ne
To create a security zone:
2. Click New.
3. In the Zone Configuration dialog, type the name for the zone into the Zone box.
5. Specify a type for the security zone. For a Layer 2 zone, select a VSwitch for the zone from the VSwitch drop-down
list below; for a Layer-3 zone, select a VRouter from the Virtual Router drop-down list. If TAP is selected, the zone
created is a tap zone, which is used in Bypass mode.
6. Bind interfaces to the zone. Select an interface from the Binding Interface drop-down list.
7. If needed, select the Enable check box to enable APP identification for the zone.
35 Chapter 5 Network
8. If needed, select the Enable check box to set the zone to a WAN zone, assuring the accuracy of the statistic ana-
lysis sets that are based on IP data.
9. If needed, select the Enable check box to enable NetBIOS host query for the zone. For detailed instructions, see
"DNS" on Page 66.
10. If needed, select the Enable check box to enable share access detect for the zone. It is a share access detect
method based on the application characteristic, which is used to detect the users’ private behavior of shared
access to Internet. For detailed instructions, see "Share Access Detect" on Page 403.
11. If needed, select Threat Protection tab and configure the parameters for Threat Protection function. For detailed
instructions, see "Chapter 11 Threat Prevention" on Page 352.
Note:
l Pre-defined zones cannot be deleted.
l When changing the VSwitch to which a zone belong, make sure there is no binding inter-
face in the zone.
Chapter 5 Network 36
Interface
Interfaces allow inbound and outbound traffic to security zones. An interface must be bound to a security zone so that
traffic can flow into and from the security zone. Furthermore, for the Layer 3 security zone, an IP address should be
configured for the interface, and the corresponding policy rules should also be configured to allow traffic transmission
between different security zones. Multiple interfaces can be bound to one security zone, but one interface cannot be
bound to multiple security zones.
The security devices support various types of interfaces which are basically divided into physical and logical interfaces
based on the nature.
l Physical Interface: Each Ethernet interface on devices represents a physical interface. The name of a physical
interface, consisting of media type, slot number and location parameter, is pre-defined, like ethernet2/1 or eth-
ernet0/2.
l Logical Interface: Includes sub-interface, VSwitch interface, VLAN interface, loopback interface, tunnel interface,
aggregate interface, redundant interface, PPPoE interface and Virtual Forward interface.
Interfaces can also be divided into Layer 2 interface and Layer 3 interface based on their security zones.
l Layer 3 Interface: Any interface in Layer 3 zone. Only Layer 3 interfaces can operate in NAT/routing mode.
Different types of interfaces provide different functions, as described in the table below.
Type Description
37 Chapter 5 Network
Co nfiguring an I nterface
The configuration options for different types of interfaces may vary. For more information, see the following instruc-
tions.
Both IPv4 and IPv6 address can be configured for the interface, but IPv6 address is not supported for the PPPoE inter-
face.
Chapter 5 Network 38
Option Description
ing:
DDNS In the DDNS Configuration dialog, configure DDNS options for the inter-
face. For detailed instructions, see "DDNS" on Page 74.
Management Select one or more management method check boxes to configure the
interface management method.
Reverse Route Enable or Disable reverse route as needed:
l Close: Reverse route will not be used. When reaching the interface
the reverse data stream will be returned to its original route without
any reverse route check. That is, reverse packets will be sent from the
ingress interface that initializes the packets.
39 Chapter 5 Network
Option Description
MTU Specifies a MTU for the interface. The value range is 1280 to 1500/1800
bytes. The default value is 1500. The max MTU may vary from different
Hillstone platforms.
Shutdown System supports interface shutdown. You can not only enforce to shut
down a specific interface, but also control the time of shutdown by sched-
ule, or control the shutdown according to the link status of tracked
objects. Configure the options as below:
2. Select an action:
Authentication Specifies a packet authentication mode for the system, including plain
mode
Chapter 5 Network 40
Option Description
text (the default) and MD5. The plain text authentication, during which
unencrypted string is transmitted together with the RIP packet, cannot
assure security, so it cannot be applied to the scenarios that require high
security.
Authentication Specifies a RIP authentication string for the interface.
string
Transmit version Specifies a RIP information version number transmitted by the interface.
By default V1&V2 RIP information will be transmitted.
Receive version Specifies a RIP information version number transmitted by the interface.
By default V1&V2 RIP information will be transmitted.
Split horizon Select the Enable checkbox to enable split horizon. With this function
enabled, routes learned from an interface will not be sent from the same
interface, in order to avoid routing loop and assure correct broadcasting
to some extent.
3. Click OK.
41 Chapter 5 Network
Option Description
HA sync Select this check box to enable HA Sync function, which means disable
Local property and use virtual MAC, and the primary device will syn-
chronize its information with the backup device; don’t select this check
box to disable HA Sync function, which means enable Local property and
use original MAC, and the primary device will not synchronize its inform-
ation with the backup device.
IP Configuration
l When the general DNS proxy is in use, the client in the network
still gets DNS replies from the DNS server configured on itself. If
the DNS server address is configured as an interface address of
Hillstone device, the device will work as a DNS server;
l When the transparent DNS proxy is in use, all DNS requests are
replied by the Hillstone device. In such a case, there is no need to
edit DNS configuration on each client. DNS service can be easily con-
trolled by modifying the device's DNS configuration.
Enable DNS Bypass: Select this check box to enable DNS bypass for the
interface.
Advanced:
l Secondary IP: Specifies secondary IPs for the interface. You can
specify up to 6 secondary IP addresses.
DHCP: In the DHCP Configuration dialog, configure DHCP options for
the interface. For detailed instructions, see "DHCP" on Page 70.
DDNS: In the DDNS Configuration dialog, configure DDNS options for
the interface. For detailed instructions, see "DDNS" on Page 74.
Auto-obtain Set gateway information from DHCP server as the default gateway route:
With this check box selected, system will set the gateway information
provided by the DHCP server as the default gateway route.
Advanced:
Chapter 5 Network 42
Option Description
priority is. The priority of static DNS servers is 20.
l Close: Reverse route will not be used. When reaching the interface
the reverse data stream will be returned to its original route without
any reverse route check. That is, reverse packets will be sent from the
ingress interface that initializes the packets.
l IPSec VPN: Select IPSec VPN radio button. Specifies a name for the
IPSec VPN tunnel that is bound to the interface. And then select a
next-hop address for the tunnel, which can be either the IP address
or the egress IP address of the peering tunnel interface. This para-
meter, which is 0.0.0.0 by default, is only valid when multiple IPSec
VPN tunnels should be bound to the tunnel interface.
l SSL VPN: Select SSL VPN radio button. Specifies a name for the SSL
VPN tunnel that is bound to the interface.
Static Click Add button to add several IPv6 address, at most 5 IPv6 address.
Click Delete button to delete IPv6 address.
Dynamic Shows IPv6 address which is dynamic.
43 Chapter 5 Network
Option Description
between hosts when there is no router on the link. By default the system
will generate a link-local address for the interface automatically if the
interface is enabled with IPv6 (in the interface configuration mode, use
the command ipv6 enable). You can also specify a link-local address for
the interface as needed, and the specified link-local address will replace
the automatically generated one.
MTU Specifies an IPv6 MTU for an interface.
DAD Attempts Specifies NS packet attempts times. The value range is 0 to 20. Value 0
indicates DAD is not enabled on the interface. If the system does not
receive any NA response packet after sending NS packets for the
attempts times, it will verify the IPv6 address is the unique available
address.
DAD (Duplicate Address Detection) is designed to verify the uniqueness
of IPv6 addresses. This function is implemented by sending NS (Neigh-
bor Solicitation) requests. After receiving an NS packet, if any other host
on the link finds the address of the NS requester is duplicated, it will
send an NA (Neighbor Advertisement) packet advertising the address is
already in use, and then the NS requester will mark the address as Duplic-
ate, indicating the address is an invalid IPv6 address.
4. "In the Properties tab, configure properties for the interface." on Page 39
5. "In the Advanced tab, configure advanced options for the interface." on Page 40
6. "In the RIP tab, configure RIP for the interface." on Page 40
7. Click OK.
Chapter 5 Network 44
In the Basic tab, configure the followings.
Option Description
45 Chapter 5 Network
Option Description
l When the general DNS proxy is in use, the client in the network
still gets DNS replies from the DNS server configured on itself. If
the DNS server address is configured as an interface address of
Hillstone device, the device will work as a DNS server;
l When the transparent DNS proxy is in use, all DNS requests are
replied by the Hillstone device. In such a case, there is no need to
edit DNS configuration on each client. DNS service can be easily con-
trolled by modifying the device's DNS configuration.
Enable DNS Bypass: Select this check box to enable DNS bypass for the
interface.
Advanced:
l Secondary IP: Specifies secondary IPs for the interface. You can
specify up to 6 secondary IP addresses.
DHCP: In the DHCP Configuration dialog, configure DHCP options for
the interface. For detailed instructions, see "DHCP" on Page 70.
DDNS: In the DDNS Configuration dialog, configure DDNS options for
the interface. For detailed instructions, see "DDNS" on Page 74.
Auto-obtain Set gateway information from DHCP server as the default gateway route:
With this check box selected, system will set the gateway information
provided by the DHCP server as the default gateway route.
Advanced:
Chapter 5 Network 46
Option Description
l Enable: Enforces to use a reverse route. If the reverse route is not
available, packets will be dropped. This option is enabled by
default.
l Close: Reverse route will not be used. When reaching the interface
the reverse data stream will be returned to its original route without
any reverse route check. That is, reverse packets will be sent from the
ingress interface that initializes the packets.
4. "In the Properties tab, configure properties for the interface." on Page 39
5. "In the Advanced tab, configure advanced options for the interface." on Page 40
6. "In the RIP tab, configure RIP for the interface." on Page 40
7. Click OK.
47 Chapter 5 Network
In the Basic tab, configure the followings.
Option Description
Chapter 5 Network 48
Option Description
l When the general DNS proxy is in use, the client in the network
still gets DNS replies from the DNS server configured on itself. If
the DNS server address is configured as an interface address of
Hillstone device, the device will work as a DNS server;
l When the transparent DNS proxy is in use, all DNS requests are
replied by the Hillstone device. In such a case, there is no need to
edit DNS configuration on each client. DNS service can be easily con-
trolled by modifying the device's DNS configuration.
Enable DNS Bypass: Select this check box to enable DNS bypass for the
interface.
Advanced:
l Secondary IP: Specifies secondary IPs for the interface. You can
specify up to 6 secondary IP addresses.
DHCP: In the DHCP Configuration dialog, configure DHCP options for
the interface. For detailed instructions, see "DHCP" on Page 70.
DDNS: In the DDNS Configuration dialog, configure DDNS options for
the interface. For detailed instructions, see "DDNS" on Page 74.
Auto-obtain Set gateway information from DHCP server as the default gateway route:
With this check box selected, system will set the gateway information
provided by the DHCP server as the default gateway route.
Advanced:
49 Chapter 5 Network
Option Description
l Enable: Enforces to use a reverse route. If the reverse route is not
available, packets will be dropped. This option is enabled by
default.
l Close: Reverse route will not be used. When reaching the interface
the reverse data stream will be returned to its original route
without any reverse route check. That is, reverse packets will be
sent from the ingress interface that initializes the packets.
4. "In the Properties tab, configure properties for the interface." on Page 39
5. "In the Advanced tab, configure advanced options for the interface." on Page 40
6. "In the RIP tab, configure RIP for the interface." on Page 40
7. Click OK.
Chapter 5 Network 50
3. In the Basic tab, configure the followings.
Option Description
Belong to Description
VLAN Acess mode The interface in Access mode is designed for
(one VLAN) terminal users and only allows packets from
one VLAN to pass through.
Trunk mode The interface in Trunk mode is typically used
(multiple for inter-connections between devices, and
VLANs) allows packets from multiple VLANs to pass
through. When Native VLAN is configured,
the interface will delete the tag of the Native
VLAN packets being transmitted, and add a
Native VLAN tag to the received packets with
no tag set.
Aggregate The interface you specified belongs to an aggregate inter-
Interface face. Choose an aggregate interface which the aggregate
interface belongs to from the Interface Group drop-down
list.
Redundant This interface belongs to an aggregate interface. Select
Interface that aggregate interface from the Interface Group drop-
down list.
None This interface does not belong to any object.
51 Chapter 5 Network
Option Description
HA sync Select this check box to enable HA sync function. The primary device will
synchronize its information with the backup device.
IP Configuration
Chapter 5 Network 52
Option Description
l When the general DNS proxy is in use, the client in the network still
gets DNS replies from the DNS server configured on itself. If the DNS
server address is configured as an interface address of Hillstone
device, the device will work as a DNS server;
l When the transparent DNS proxy is in use, all DNS requests are replied
by the Hillstone device. In such a case, there is no need to edit DNS con-
figuration on each client. DNS service can be easily controlled by modi-
fying the device's DNS configuration.
Enable DNS Bypass: Select this check box to enable DNS bypass for the inter-
face.
Advanced:
l Secondary IP: Specifies secondary IPs for the interface. You can spe-
cify up to 6 secondary IP addresses.
DHCP: In the DHCP Configuration dialog, configure DHCP options for the
interface. For detailed instructions, see "DHCP" on Page 70.
DDNS: In the DDNS Configuration dialog, configure DDNS options for the
interface. For detailed instructions, see "DDNS" on Page 74.
Auto-obtain Set gateway information from DHCP server as the default gateway route:
With this check box selected, system will set the gateway information
provided by the DHCP server as the default gateway route.
Advanced:
l Management Priority: Specifies a priority for the DNS server. Except for
static DNS servers, system can also learn DNS servers dynamically via
DHCP or PPPoE. Therefore, you need to configure priorities for the
DNS servers, so that the system can choose a DNS server according to
its priority during DNS resolution. The priority is represented in num-
bers from 1 to 255. The larger the number is, the higher the priority is.
The priority of static DNS servers is 20.
DDNS: In the DDNS Configuration dialog, configure DDNS options for the
interface. For detailed instructions, see "DDNS" on Page 74.
PPPoE Obtain IP through PPPoE。Configure the following options:
53 Chapter 5 Network
Option Description
l Confirm password - Enter the password again to make confirmation.
l Idle interval - If the PPPoE interface has been idling (no traffic) for a cer-
tain period, i.e., the specified idle interval, system will disconnect the
Internet connection; if the interface requires Internet access, system will
connect to Internet automatically. The value range is 0 to 10000
minutes. The default value is 30.
Management Select one or more management method check boxes to configure the inter-
face management method.
Reverse Route Enable or Disable reverse route as needed:
l Close: Reverse route will not be used. When reaching the interface the
reverse data stream will be returned to its original route without any
reverse route check. That is, reverse packets will be sent from the
ingress interface that initializes the packets.
5. "In the Properties tab, configure properties for the interface." on Page 39
6. "In the Advanced tab, configure advanced options for the interface." on Page 40
7. "In the RIP tab, configure RIP for the interface." on Page 40
8. In the Load Balance tab, configure a load balance mode for the interface. "Flow-based" means enabling automatic
load balance based on the flow. This is the default mode. "Tuple" means enabling load based on the source/des-
tination IP, source/destination MAC, source/destination interface or protocol type of packet, or the combination of
the selected items.
9. Click OK.
Chapter 5 Network 54
1. Select Network > Interface.
5. "In the Properties tab, configure properties for the interface." on Page 39
6. "In the Advanced tab, configure advanced options for the interface." on Page 40
7. "In the RIP tab, configure RIP for the interface." on Page 40
8. Click OK.
55 Chapter 5 Network
Option Description
l When the general DNS proxy is in use, the client in the network
still gets DNS replies from the DNS server configured on itself. If
the DNS server address is configured as an interface address of
Hillstone device, the device will work as a DNS server;
l When the transparent DNS proxy is in use, all DNS requests are
replied by the Hillstone device. In such a case, there is no need to
edit DNS configuration on each client. DNS service can be easily con-
trolled by modifying the device's DNS configuration.
Enable DNS Bypass: Select this check box to enable DNS bypass for the
interface.
Advanced:
l Secondary IP: Specifies secondary IPs for the interface. You can
specify up to 6 secondary IP addresses.
DHCP: In the DHCP Configuration dialog, configure DHCP options for
the interface. For detailed instructions, see "DHCP" on Page 70.
DDNS: In the DDNS Configuration dialog, configure DDNS options for
the interface. For detailed instructions, see "DDNS" on Page 74.
Auto-obtain Set gateway information from DHCP server as the default gateway route:
With this check box selected, system will set the gateway information
provided by the DHCP server as the default gateway route.
Advanced:
Chapter 5 Network 56
Option Description
l Password - Specifies PPPoE user's password.
l Idle interval - If the PPPoE interface has been idling (no traffic) for a
certain period, i.e., the specified idle interval, system will disconnect
the Internet connection; if the interface requires Internet access, sys-
tem will connect to Internet automatically. The value range is 0 to
10000 minutes. The default value is 30.
Management Select one or more management method check boxes to configure the
interface management method.
Reverse Route Enable or Disable reverse route as needed:
l Close: Reverse route will not be used. When reaching the interface
the reverse data stream will be returned to its original route without
any reverse route check. That is, reverse packets will be sent from the
ingress interface that initializes the packets.
5. "In the Properties tab, configure properties for the interface." on Page 39
6. "In the Advanced tab, configure advanced options for the interface." on Page 40
7. "In the RIP tab, configure RIP for the interface." on Page 40
8. Click OK.
57 Chapter 5 Network
1. Select Network > Interface.
5. "In the Properties tab, configure properties for the interface." on Page 39
6. "In the Advanced tab, configure advanced options for the interface." on Page 40
7. "In the RIP tab, configure RIP for the interface." on Page 40
8. Click OK.
Editing a n Interfa c e
To edit an interface:
2. Select the interface you want to edit from the interface list and click Edit.
Belong to Description
VLAN Acess The interface in Access mode is designed for
mode(one terminal users and only allows packets from
VLAN) one VLAN to pass through.
Trunk The interface in Trunk mode is typically
mode(mul- used for inter-connections between devices,
tiple and allows packets from multiple VLANs to
VLANs) pass through. When Native VLAN is con-
figured, the interface will delete the tag of
the Native VLAN packets being transmitted,
and add a Native VLAN tag to the received
packets with no tag set.
Aggregate The interface you specified belongs to a aggregate inter-
Interface face. Choose an aggregate interface which the aggreg-
ate interface belongs to from Interface Group drop-down
list.
Redundant This interface belongs to an aggregate interface. Select
Interface that aggregate interface from the Interface Group drop-
down list.
None This interface does not belong to any object.
Chapter 5 Network 58
Option Description
ate interface. These physical interfaces will share the traffic passing
through the aggregate interface averagely.
59 Chapter 5 Network
Option Description
l When the general DNS proxy is in use, the client in the network
still gets DNS replies from the DNS server configured on itself. If
the DNS server address is configured as an interface address of
Hillstone device, the device will work as a DNS server;
l When the transparent DNS proxy is in use, all DNS requests are
replied by the Hillstone device. In such a case, there is no need to
edit DNS configuration on each client. DNS service can be easily con-
trolled by modifying the device's DNS configuration.
Enable DNS Bypass: Select this check box to enable DNS bypass for the
interface.
Advanced:
l Secondary IP: Specifies secondary IPs for the interface. You can
specify up to 6 secondary IP addresses.
DHCP: In the DHCP Configuration dialog, configure DHCP options for
the interface. For detailed instructions, see "DHCP" on Page 70.
DDNS: In the DDNS Configuration dialog, configure DDNS options for
the interface. For detailed instructions, see "DDNS" on Page 74.
Auto-obtain Set gateway information from DHCP server as the default gateway route:
With this check box selected, system will set the gateway information
provided by the DHCP server as the default gateway route.
Advanced:
Chapter 5 Network 60
Option Description
Idle Interval: If the PPPoE interface has been idling (no traffic) for a cer-
tain period, i.e., the specified idle interval, system will disconnect the
Internet connection; if the interface requires Internet access, system
will connect to Internet automatically. The value range is 0 to 10000
minutes. The default value is 30.
Re-connect Interval: Specifies a re-connect interval (i.e., system will
try to re-connect automatically after being disconnected for the inter-
val). The value range is 0 to 10000 seconds. The default value is 0,
which means the function is disabled.
Set gateway information from PPPoE server as the default gateway
route: With this check box selected, system will set the gateway inform-
ation provided by PPPoE server as the default gateway route.
Advanced Access concentrator: Specifies a name for the con-
centrator.
Authentication: The devices will have to pass PPPoE
authentication when trying to connect to a PPPoE
server. The supported authentication methods include
CHAP, PAP and Any (the default, anyone between CHAP
and PAP). Click an authentication method.
Netmask: Specifies a netmask for the IP address
obtained via PPPoE.
Static IP: You can specify a static IP address and nego-
tiate to use this address to avoid IP change. To specify a
static IP address, type it into the box.
Service: Specifies allowed service. The specified ser-
vice must be the same with that provided by the PPPoE
server. If no service is specified, Hillstone will accept
any service returned from the server automatically.
Distance: Specifies a route distance. The value range is
1 to 255. The default value is 1.
Weight: Specifies a route weight. The value range is 1
to 255. The default value is 1.
DDNS: In the DDNS Configuration dialog, configure DDNS options for
the interface. For detailed instructions, see "DDNS" on Page 74.
Management Select one or more management method check boxes to configure the
interface management method.
Reverse Route Enable or Disable reverse route as needed:
l Close: Reverse route will not be used. When reaching the interface
the reverse data stream will be returned to its original route without
any reverse route check. That is, reverse packets will be sent from the
ingress interface that initializes the packets.
61 Chapter 5 Network
Option Description
l Destination IP Replacement: Select the Enable check box, and spe-
cify the logs you need to record. If All is selected in WAP Log
Record section, system will record all the traffic logs; while if
Destination IP Replacement radio button is selected, system will
record logs for the translated traffic.
Duplex Specifies a duplex working mode for the interface. Options include auto,
full duplex and half duplex. Auto is the default working mode, in which
the system will select the most appropriate duplex working mode auto-
matically. 1000M half duplex is not supported.
Rate Specifies a working rate for the interface. Options include Auto, 10M,
100M and 1000M. Auto is the default working mode, in which the system
will detect and select the most appropriate working mode automatically.
1000M half duplex is not supported.
Combo type This option is applicable to the Combo port of copper port + fiber port. If
both the copper port and the fiber port are plugged with cable, the fiber
port will be prioritized by default; if the copper port is used at first, and
then the cable is plugged into the fiber port, after reboot the fiber port
will be used for data transmission. You can specify how to use a copper
port or fiber port. For detailed options, see the following instructions:
l Fiber preferred: The fiber port is prioritized. With this option con-
figured, the device will migrate the traffic on the copper port to the
fiber port automatically without reboot.
MTU Specifies a MTU for the interface. The value range is 1280 to 1500/1800
bytes. The default value is 1500. The max MTU may vary from different
Hillstone models.
ARP Learning Select the Enable checkbox to enable ARP learning.
ARP Timeout Specifies an ARP timeout for the interface. The value range is 5 to 65535
seconds. The default value is 1200.
Keep-alive IP Specifies an IP address that receives the interface's keep-alive packets.
MAC clone Select the MAC clone check box to enable the MAC clone funtion. The
system clones a MAC address to the Ethernet sub-interface. If the user
click "Restore Default MAC", the Ethernet sub-interface will retore the
default MAC address.
6. "In the Advanced tab, configure advanced options for the interface." on Page 40
7. "In the RIP tab, configure RIP for the interface." on Page 40
8. Click OK.
Chapter 5 Network 62
Note:
l Before deleting an aggregate/redundant interface, you must cancel other interfaces' bind-
ings to it, aggregate/redundant sub-interface's configuration, its IP address configuration
and its binding to the security zone.
l When a VSwitch interface is deleted, the corresponding VSwitch will be deleted as well.
63 Chapter 5 Network
MGT Interface
This feature may not be available on all platforms. Please check your system's actual page to see if your device delivers
this feature.
To facilitate the management to the device and meet the requirement of separating the management traffic from the
data traffic, system has an independent management interface(MGT Interface). By default, the management interface
belongs to the trust zone and the trust-vr virtual router. To separate the traffic of the management interface from the
traffic of other interfaces completely, you can add the management interface to the mgt zone. The mgt zone belongs to
the mgt-vr virtual router, the information of routing, ARP table are independent.
2. Specify the zone for the management interface in the Zone drop-down list. You can only select a Lay 3 zone.
3. Specify the method of obtaining IP address in the IP Configuration section. "Static IP" means specifying a static IP
address and the netmask. Click Advanced to specify the secondary IP address into the text box. You can specify
up to 6 secondary IP addresses. "Auto-obtain" means obtaining the IP address through DHCP.
4. Specify the management methods by selecting the "Telnet/SSH/Ping/HTTP/HTTPS/SNMP" check boxes of the
desired management methods.
5. Specify the mode and rate of the management interface. If you select the Auto duplex transmission mode , you can
only select the Auto rate.
6. Select the Shut Down check box to shut down the management interface.
7. Click OK.
Chapter 5 Network 64
VLAN
This feature may not be available on all platforms. Please check your system's actual page to see if your device delivers
this feature.
VLAN, the abbreviation for Virtual Local Area Network, is defined in IEEE 802.1Q. VLAN has the following features:
l A physical LAN can be divided into multiple VLANs, and a VLAN might include devices from multiple physical net-
works.
l A VLAN is virtually a broadcast domain. Layer 2 packets between VLANs are isolated. Communications between
VLANs can only be implemented by Layer 3 route technique (through routers, Layer 3 switches or other Layer 3
network devices).
VLANs are differentiated by VLAN numbers. The value range is 1 to 4094. System reserves 32 VLAN numbers (224 to
255) for BGroup, but the unused numbers within the range are also available to VLANs.
Co nfiguring a V LAN
To create a VLAN:
2. Click New.
In the VLAN Configuration dialog, type a number in the VLAN ID text box, the value range is from 1 to 4094.
3. Click OK.
65 Chapter 5 Network
DNS
DNS, the abbreviation for Domain Name System, is a computer and network service naming system in form of domain
hierarchy. DNS is designed for TCP/IP network to query for Internet domain names (e.g., www.xxxx.com) and trans-
late them into IP addresses (e.g., 10.1.1.1) to locate related computers and services.
The security device's DNS provides the following functions:
l Server: Configures DNS servers and default domain names for the security device.
l Proxy: The security device acts as a DNS proxy server and provides proxy service for the connected PCs and other
clients. Besides, the security device can also choose different DNS servers according to domain names.
l Analysis: Sets retry times and timeout for device's DNS service.
l Cache: DNS mappings to cache to speed up query. You can create, edit and delete DNS mappings.
Co nfiguring a D NS Server
You can configure a DNS server for system to implement DNS resolution. To create a DNS server:
3. In the DNS Server Configuration dialog, type the IP address for the DNS server into the Server IP box.
4. Select a VRouter from the VR drop-down list. The default VRouter is trust-vr.
5. Select an interface from the Egress Interface drop-down list. This parameter is mainly used for multi-egress DNS
agent. If only for the device's DNS, you can keep the default "----".
6. Click OK.
Co nfiguring a D NS Pro xy
To enable a DNS proxy:
1. Configure a DNS proxy list that contains domain names and corresponding DNS servers.
2. Enable DNS proxy on an interface of the device (For more details, see "Configuring an Interface" on Page 38).
3. In the DNS Proxy Configuration dialog, specify a suffix for a domain name in the Domain Type section.
4. In the Domain Server section, specify a DNS server or servers. "Use system" means using the DNS server
bundled with system."User-defined" means defining IP address for the server. Click User-defined and select a
VRouter from the VR drop-down list, then type the IP address for the DNS servers into the boxes below (6 servers
at most).
5. Click OK.
The multi-egress DNS proxy supports DNS management , which provides load balancing for the configured egress
interfaces of DNS servers. Then system sends DNS request packets out from the egress interface with lower band-
width utilization . Enable " DNS Balance Configuration" to realize this function, for detailed information, refer to Con-
figuring outbound LLB.
Chapter 5 Network 66
Co nfiguring a Analysis
Analysis configuration includes DNS requests' retry times and timeout.
l Retry: If the DNS request is not responded after timeout, system will send the request again; if still not responded
after the specified retry times (i.e., the repetition times of the DNS request), System will send the request to the
next DNS server.
l Timeout: System will wait for DNS server's response after sending the DNS request, and will send the request
again if no response returns after a specified time. The period of waiting for response is known as timeout.
To configure the retry times and timeout for DNS requests:
4. Type the value in the TTL text box to specify the survival time of the response message for the device's DNS.
5. Click Apply.
Co nfiguring a D NS Cache
When using DNS, system might store the DNS mappings to its cache to speed up the query. There are three ways to
obtain DNS mappings:
l Register: DNS hosts specified by some modules of security devices, such as NTP, AAA, etc.
For convenient management , DNS static cache supports group function, which means users make the multiple
domain hosts with the same IP address and virtual router be a DNS static cache group.
To add a static DNS mapping to cache:
2. Click New.
67 Chapter 5 Network
Option Description
Hostname Specify the hostname of a DNS cache group. You can click to add or
add or click button to delete the specified IP. The maximum number
host IP address is 8, and the earlier configured IP will be matched first.
Virtual Router Select a VRouter.
3. Click OK.
Note:
l Only DNS static cache group can support new, edit and delete operation , while dynamic
and register cache cannot .
l The DNS dynamic cache can be deleted by command or the lifetime reset. For detailed
information , refer to StoneOS CLI User Guide and download PDF on website.
l User can clear the register cache only by deleting the defined hosts in function module.
l DNS static cache is superior to dynamic and register cache, which means the static cache
will cover the same existed dynamic or register cache.
NB T Cache
System supports NetBIOS name resolution. With this function enabled, system can automatically obtain all the
NetBIOS host names registered by the hosts within the managed network, and store them in the cache to provide IP
address to NetBIOS host name query service for other modules.
Enabling a NetBIOS name resolver is the pre-requisition for displaying host names in NAT logs. For more information
on how to display host names in the NAT logs, see "Log Configuration" on Page 443.
Chapter 5 Network 68
To enable NetBIOS for a zone, select the NBT cache check box when creating or editing the zone. For more details, see
"Security Zone" on Page 35. The security zone with NetBIOS enabled should not be the zone that is connected to WAN.
After NetBIOS is enabled, the query process might last for a while, and the query result will be added to the NetBIOS
cache table. System will perform the query again periodically and update the result.
Note: Only when PCs have NetBIOS enabled can their host names be queried. For more inform-
ation on how to enable NetBIOS, see the detailed instructions of your PC's Operating System.
2. Select a VRouter from the VR drop-down list to display NBT cache in that VRouter.
3. Select a NBT cache entry from the list and click Delete.
69 Chapter 5 Network
DHCP
DHCP, the abbreviation for Dynamic Host Configuration Protocol, is designed to allocate appropriate IP addresses and
related network parameters for subnetworks automatically, thus reducing requirement on network administration.
Besides, DHCP can avoid address conflict to assure the re-allocation of idle resources.
System supports DHCP client, DHCP server and DHCP relay proxy.
l DHCP client: The interface can be configured as a DHCP client and obtain IP addresses from the DHCP server. For
more information on configuring a DHCP client, see "Configuring an Interface" on Page 38.
l DHCP server: The interface can be configured as a DHCP server and allocate IP addresses chosen from the con-
figured address pool for the connected hosts.
l DHCP relay proxy: The interface can be configured as a DHCP relay proxy to obtain DHCP information from the
DHCP server and forward the information to connected hosts.
The security devices are designed with all the above three DHCP functions, but an individual interface can be only con-
figured with one of the above functions.
Co nfiguring a D H CP Server
To create a DHCP server:
Chapter 5 Network 70
Option Description
1. Type the start IP and end IP into the Start IP and End IP box respect-
ively.
4. Configure Reserved Address ( IP addresses in the Reserved Address, within the IP range of the address pool, are
reserved for the DHCP server and will not be allocated).
To configure a reserved address, click the Reserved Address tab, type the start and end IP for an IP range into
the Start IP and End IP box respectively, and then click Add. To delete an IP range, select the IP range you want to
delete from the list and then click Delete.
5. Configure IP-MAC Binding. If the IP is bound to a MAC address manually, the IP will only be allocated to the spe-
cified MAC address.
To configure an IP-MAC Binding, click the IP-MAC Binding tab and type the IP and MAC address into the IP
address and MAC box respectively, type the description in the Description text box if necessary, and then click
Add. Repeat the above steps to add multiple entries. To delete an IP-MAC Binding, select an entry from the list and
click Delete.
49 After you configure the option 49 settings, the DHCP client can obtain
the list of the IP addresses of systems that are running the X window Sys-
tem Display Manager.
To configure the option 49 settings:
3. Click Add.
2. Select the type of the VCI, ASCII or HEX. When selecting ASCII, the
VCI matching string must be enclosed in quotes if it contains spaces.
4. Click Add.
71 Chapter 5 Network
Option Description
1. Select 138 from the Option drop-down list.
3. Click Add.
You can add up to four AC IP addresses.
If you do not set the option 138 for the DHCP server or the DHCP client
does not request option 138, DHCP server will not offer the option 138
settings.
7. Click the Advanced tab to configure the DHCP server's advanced options.
Option Description
WINS1 Configures a primary WINS server for the client. Type the server's IP
address into the box.
WINS2 Configures an alternative WINS server for the client. Type the server's IP
address into the box.
SMTP server Configures a SMTP server for the client. Type the server's IP address into
the box.
POP3 server Configures a POP3 server for the client. Type the server's IP address into
the box.
News server Configures a news server for the client. Type the server's IP address into
the box.
Relay agent When the device1 with DHCP server enabled is connected to another
device2 with DHCP relay enabled, and the PC obtains device1's DHCP
information from device2, then only when the relay agent's IP address
and netmask are configured on device1 can the DHCP information be
transmitted to the PC successfully.
Relay agent: Type relay agent's IP address and netmask, i.e., the IP
address and netmask for the interface with relay agent enabled on
device2.
VCI-match-string The DHCP server can verify the VCI carried by option 60 in the client’s
DHCP packets. When the VCI in client’s DHCP packet matches the VCI
matching string you configured in the DHCP server, DHCP server will
offer the IP address and other corresponding information. If not, DHCP
Chapter 5 Network 72
Option Description
server will drop client’s DHCP packets and will not reply to the client. If
you do not configure a VCI matching string for the DHCP server, it will
ignore the VCI carried by option 60.
1. Select the type of the VCI matching string, ASCII or HEX. When
selecting ASCII, the VCI matching string must be enclosed in
quotes if it contains spaces.
8. Click OK.
3. In the DHCP Relay Proxy dialog, select an interface to which the DHCP Relay Proxy will be applied from the Inter-
face drop-down list.
4. Type the IP addresses of DHCP servers into the Server 1/Server 2/Server 3 boxes.
5. Click OK.
73 Chapter 5 Network
DDNS
DDNS (Dynamic Domain Name Server) is designed to resolve fixed domain names to dynamic IP addresses. Generally
you will be allocated with a dynamic IP address from ISP each time you connect to the Internet, i.e., the allocated IP
addresses for different Internet connections will vary. DDNS can bind the domain name to your dynamic IP address,
and the binding between them will be updated automatically each time you connect to Internet.
In order to enable DDNS, you will have to register in a DDNS provider to obtain a dynamic domain name. Hillstone
devices support the following 5 DDNS providers, and you can visit one of the following websites to complete regis-
tration:
l dyndns.org: http://dyndns.com/dns
l 3322.org: http://www.pubyun.com
l no-ip.com: http://www.noip.com
l Huagai.net: http://www.ddns.com.cn
l ZoneEdit.com: http://www.zoneedit.com
Co nfiguring a D D NS
To create a DDNS, take the following steps:
2. Click New.
Chapter 5 Network 74
3. In the DDNS Configuration dialog, configure as follows:
Option Description
Max update inter- On the condition that IP address has not changed, system will send an
val update request to the DDNS server at the max update interval. Type the
max update interval into the box. The value range is 24 to 8760 hours.
The default value is 24.
4. Click OK.
Note: The Server name and Server port in the configuration options must be the cor-
responding name and port of the DDNS server. Do not configure these options if the exact
information is unknown. The server will return the name and port information automatically
after connection to the DDNS server has been established successfully.
75 Chapter 5 Network
PPPoE
PPPoE, the abbreviation for Point-to-Point Protocol over Ethernet, combines PPP protocol and Ethernet to implement
access control, authentication and accounting on clients during IP address allocation.
The implementation of PPPoE protocol consists of two stages: discovery stage and PPP session stage.
l Discovery stage: The client discovers the access concentrator by identifying the Ethernet MAC address of the
access concentrator and establishing a PPPoE session ID.
l PPP session stage: The client and the access concentrator negotiate over PPP. The negotiation procedure is the
same with that of a standard PPP negotiation.
Interfaces can be configured as PPPoE clients to accept PPPoE connections.
Co nfiguring PPPo E
To create a PPPoE instance:
2. Click New.
Chapter 5 Network 76
Option Description
4. Click OK.
77 Chapter 5 Network
Virtual Wire
System supports VSwitch-based Virtual Wire. With this function enabled and Virtual Wire interface pair configured,
two Virtual Wire interfaces form a virtual wire that connects the two subnetworks attaching to Virtual Wire interface
pair together. The two connected subnetworks can communicate directly on Layer 2, without any requirement on MAC
address learning or other sub network's forwarding. Furthermore, controls of policy rules or other functions are still
available when Virtual Wire is used.
Virtual Wire operates in two modes, which are Strict and Non-Strict mode respectively, as detailed below:
l Strict Virtual Wire mode: Packets can only be transmitted between Virtual Wire interfaces, and the VSwitch
cannot operate in Hybrid mode. Any PC connected to Virtual Wire can neither manage devices nor access Internet
over this interface.
l Non-Strict Virtual Wire mode: Packets can be transmitted between Virtual Wire interfaces, and the VSwitch
also supports data forwarding in Hybrid mode. That is, this mode only restricts Layer 2 packets' transmission
between Virtual Wire interfaces, and does not affect Layer 3 packets' forwarding.
The table below lists packet transmission conditions in Strict Virtual Wire and Non-Strict Virtual Wire mode. You can
choose an appropriate Virtual Wire mode according to the actual requirement.
Egress and ingress are interfaces of one Virtual Wire interface pair Allow Allow
Ingress is not Virtual Wire's interface Deny Deny
Egress and ingress are interfaces of different Virtual Wire interface Deny Deny
pairs
Ingress of to-self packet is a Virtual Wire’s interface Deny Allow
Ingress is Virtual Wire's interface, and egress is a Layer 3 interface Deny Allow
Co nfiguring a V irtual-Wire
To create a Virtual-Wire:
2. Click New.
3. In the Virtual-Wire Configuration dialog, select a virtual switch from the VSwitch drop-down list.
4. In the Interface 1 drop-down list, specify an interface for virtual wire interface pair. The two interfaces of one
single virtual wire interface pair must be different, and one interface cannot belong to two virtual wire interface
pairs simultaneously.
5. In the Interface 2 drop-down list, specify an interface for virtual wire interface pair. The two interfaces of one
single virtual wire interface pair must be different, and one interface cannot belong to two virtual wire interface
pairs simultaneously.
6. Click OK.
3. In the Virtual-Wire Mode Configuration dialog, select a virtual switch from the VSwitch drop-down list.
Chapter 5 Network 78
4. Specify a virtual wire mode from one of the below options:
l Strict - Packets can only be transmitted between virtual wire interfaces, and the VSwitch cannot operate in
Hybrid mode. Any PC connected to the virtual wire can neither manage devices nor access Internet over this
interface.
l Non-strict - Packets can be transmitted between virtual wire interfaces, and the VSwitch also supports data
forwarding in Hybrid mode. That is, this mode only restricts Layer 2 packets' transmission between virtual
wire interfaces, and does not affect Layer 3 packets' forwarding.
5. Click OK.
79 Chapter 5 Network
Virtual Router
Virtual Router (VRouter) is known as VR in the system. VR acts as a router, and different VRs have their own inde-
pendent routing tables. A VR named "trust-vr" is bundled with the system, and by default all the Layer 3 security
zones are bound to trust-vr automatically. Hillstone devices support multiple VRs, and the max amount of supported
VRs may vary from different hardware platforms. Multiple VRs divide a device into multiple virtual routers, and each of
the routers utilizes and maintains their completely independent routing table. In such a case one single device is act-
ing as multiple routers. Multiple VRs allow a device to achieve the effects of the address isolation between different
route zones and address overlapping between different VRs, as well as to avoid route leaking to some extent, enhan-
cing route security of network. For more information about the relationship between interface, security zone, VSwitch
and VRouter, see the following diagram:
l Interfaces are bound to security zones. Those that are bound to Layer 2 security zones and Layer 3 security zones
are known as Layer 2 interfaces and Layer 3 interfaces respectively. One interface can be only bound to one secur-
ity zone; the primary interface and sub interface can belong to different security zones.
l Security zones are bound to a VSwitch or VRouter. Layer 2 security zones are bound to a VSwitch (by default the
pre-defined Layer 2 security zone is bound to the default VSwitch1), and Layer 3 security zones are bound to a
VRouter (by default the pre-defined Layer 3 security zone is bound to the default trust-vr), thus realizing the bind-
ing between the interfaces and VSwitch or VR. One security zone can be only bound to one VSwtich or VR.
2. Click New.
4. Select the Enable check box for Vsys Share to share the Virtual Router between different virtual systems.
5. Click OK.
3. Click Apply.
Chapter 5 Network 80
Note:
l After Multi-Virtual Router is enabled or disabled, the system must reboot to make it take
effect. After rebooting, system's max concurrent sessions will decrease by 15% if the func-
tion is enabled, or restore to normal if the function is disabled. When AV and Multi-Virtual
Router are enabled simultaneously, the max concurrent session will further decrease by
50% (with AV enabled, the max concurrent session will decrease by half). The formula is:
Actual max concurrent sessions = original max concurrent sessions*(1-0.15)*(1-0.5).
l If Multi-Virtual Router is enabled, traffic can traverse up to 3 Virtual Routers, and any
traffic that has to traverse more than 3 Virtual Routers will be dropped.
81 Chapter 5 Network
Virtual Switch
System might allow packets between some interfaces to be forwarded in Layer 2 (known as transparent mode), and
packets between some interfaces to be forwarded in Layer 3 (known as routing mode), specifically depending on
actual requirement. To facilitate a flexible configuration of hybrid mode of Layer 2 and Layer3, the system introduces
the concept of Virtual Switch (VSwitch). By default the system ships with a VSwitch known as VSwitch1. Each time you
create a VSwitch, the system will create a corresponding VSwitch interface (VSwitchIF) for the VSwitch automatically.
You can bind an interface to a VSwitch by binding that interface to a security zone, and then binding the security zone
to the VSwitch.
A VSwitch acts as a Layer 2 forwarding zone, and each VSwitch has its own independent MAC address table, so the
packets of different interfaces in one VSwitch will be forwarded according to Layer 2 forwarding rules. You can con-
figure policy rules conveniently in a VSwitch. A VSwitchIF virtually acts as a switch uplink interface, allowing packets
forwarding between Layer 2 and Layer 3.
Creating a V Sw itch
To create a VSwitch:
2. Click New.
Drop Unknown Drops the packets sent to unknown multicast to save bandwidth.
Multicast Packets
3. Click OK.
Chapter 5 Network 82
Port Mirroring
Some low-end platforms do not support port mirroring.
The device is designed with port mirroring on Ethernet interfaces. This function allows users to mirror the traffic of
one interface to another interface (analytic interface) for analysis and monitoring.
To configure port mirroring:
1. Enable port mirroring on an Ethernet interface, and select the traffic type to be mirrored.
2. Select an interface from the Destination Interface drop-down list, and click OK. All the source and destination
interface will be listed in the table below.
83 Chapter 5 Network
WLAN
This feature may not be available on all platforms. Please check your system's actual page to see if your device delivers
this feature.
WLAN (Wireless Local Area Network) represents the local area network that uses the wireless channel as the medial.
WLAN is important supplements and extensions of the wired LAN. By configuring the WLAN function, you can estab-
lish the wireless local area network and allow the users to access LAN through wireless mode.
Creating a WLAN
To create a WLAN:
2. Click New.
Data Encryption When using the security mode except WEP, specifies the data encryp-
tion mode, including TKIP, CCMP, and TKIP-CCMP.
Key When using the WEP security mode, specifies the form and the value
of the key. The form of the key can be character string or hexadecimal
number. When using character string, you can specify 5 characters or
13 characters. When using hexadecimal number, you can specify 10
hexadecimal numbers or 26 hexadecimal numbers.
Chapter 5 Network 84
Option Description
security modes, specifies the form and the value of the pre-defined
key. The form of the key can be character string or hexadecimal num-
ber. When using character string, you can specify 8-63 characters.
When using hexadecimal number, you can specify 64 hexadecimal
numbers.
Maximum Users Specifies the allowed maximum number of users that can access this
WLAN. The value ranges from 1 to 128. The default value is 64.
User Isolation Select Enable to enable the user isolation function. After enabling the
user isolation, users within one WLAN cannot access each other. User
isolation enhances the security for different users.
AAA Server When specifying the security mode as WPA, WPA2, WPA-WPA2, or
MAC-PSK, you must select a configured AAA server as the authen-
tication server for user identification.
3. Click OK.
Advanced Settings
To configure the advanced settings for WLAN:
2. Click Advanced.
Countries & Regions Different countries or regions have different management and lim-
itations on RF use. The country/region code determines the avail-
able frequency range, channel, and legal level of transmit power.
The default value is United States.
Working Mode Configure the working mode.
Channel The available channels you can select vary with the country/region
code and RF type. The default value is auto, which represents to ask
the system to select the channel automatically. After the coun-
try/region code or the operation mode is changed, the system will
select the channel automatically.
Maximum Transmit The maximum transmit power varies with the country/region code
Power and RF type. By default, there are four levels: 12.5% of the max-
imum transmit power, 25% of the maximum transmit power, 50% of
the maximum transmit power, and 100% of the maximum transmit
power.
4. Click OK.
85 Chapter 5 Network
3G
This feature may not be available on all platforms. Please check your system's actual page to see if your device delivers
this feature.
The third generation of mobile telecommunications technology supports the high speed data transmission. There are
three standards of 3G: CDMA2000, WCDMA, and TD-SCDMA. By configuring the 3G function, users can access Inter-
net through wireless mode.
The 3G function needs the support of ISP. Before configuring the 3G function, you need to purchase the SIM card from
the ISP, enable the data connection service, and obtain the following 3G parameters: access point, username, pass-
word, dial-up string and install SIM card correctly.
Co nfiguring 3G Settings
To configure 3G settings:
2. In the 3G tab, you can view the 3G connection status in the Status section. Click Connect to connect to the 3G net-
work.
4. Enter the name of the access point in the Access point text box. You can enter up to 31 characters.
5. Specify the 3G user information. In the Username text box, enter the username of the 3G user. You can enter up
to 31 characters. In the Password text box, enter the corresponding password.
6. Configure the dial-up string. Ask your ISP to provide the dial-up string and enter the dial-up string in the Dial
number text box.
7. Specify the authentication mode. When 3G dial-up establishes the connection, it needs to pass the PPP protocol
verification. The device supports the following verification methods: CHAP, PAP, and Any. Select the desired
method by selecting the Authentication radio button.
8. Configure the IP address information for the 3G interface. Select Auto-obtain to make the 3G interface obtain the
IP address automatically. Select Static IP to enter the static IP address and the netmask.
9. Specify the online mode in Redialing options. 3G dial-up has two online modes as follows:
l Redial interval: when the 3G connection disconnects due to certain reasons and the disconnection time lasts
the specified length of time, the system will redial automatically. Specify the length of time in the Redial inter-
val text box.
l Idle time before hanging up: When the idle time of the 3G (cellular) interface reaches the specified value, the
Chapter 5 Network 86
system will disconnection the 3G connection. Specify the length of time in the Idle time before hanging up
text box.
Note: The above two modes cannot be used meanwhile. Without configuring the
schedule, the system will use the "Redial interval" mode by default.
Note: After installing the SIM card, the system can automatically configure the settings in the
3G tab based on the information of the 3G module. The settings include the name of the access
point, 3G user information, and dial-up string. You can modify the settings according to your
requirements.
3. Enter the PIN code in the PIN Code text box. The value ranges from 4 to 8 numbers.
Note: After three consecutive failed attempts at PIN code, the SIM card will be locked.
3. Click Enable PIN code protection in the PIN code management section to enable the PIN code protection function.
To disable the function, click Disable PIN code protection.
4. nter the PIN code in the PIN code text box. The PIN code consists of 4-8 decimal numbers.
5. Click Apply.
87 Chapter 5 Network
Modifying the PIN Code
To modify the PIN code:
4. Specify the current PIN code in the Current PIN code text box. The PIN code consists of 4-8 decimal numbers.
5. Specify a new PIN code in the New PIN code text box. The PIN code consists of 4-8 decimal numbers.
6. Confirm the new PIN code in the Confirm PIN code text box.
7. Click Apply.
4. Enter the PIN code in the PIN code text box. The PIN code consists of 4-8 decimal numbers.
5. Click Apply.
5. Specify a new PIN code in the New PIN code text box. The PIN code consists of 4-8 decimal numbers.
6. Confirm the new PIN code in the Confirm PIN code text box.
7. Click Apply.
Chapter 5 Network 88
Link Load Balancing
For users who rent multiple ISP links, Link Load Balancing(LLB) takes advantage of dynamic link detection technique to
assign traffic to different links appropriately, thus making full use of all available link resources.
You can enable LLB in inbound and outbound directions respectively. The two directions adopts two different dynamic
link detection techniques: network parameter detection and SmartDNS.
2. Click New.
89 Chapter 5 Network
3. In the LLB Profile Configurion, configure as follows:
Option Description
4. Click OK.
Chapter 5 Network 90
Configuring LLB Rule
LLB Profile and the route is bound to the formation of LLB rules, it can really take effect, currently support binding des-
tination routing (DBR) and policy-based routing (PBR).
2. Click New.
4. Click OK.
Configuring D NS Ba la nc e
When the LLB DNS balancing function is enabled, the system will load balance the outgoing interfaces of all the con-
figured DNS servers. The DNS request packets will be redirected to the link with lower load.
To enable DNS Balance:
91 Chapter 5 Network
Note: To enable LLB DNS equalization, you must first enable the DNS transparent proxy func-
tion.
1. Enable SmartDNS. This is the prerequisite for the implementation of inbound LLB.
2. Configure a SmartDNS rule table. The smart domain-to-IP resolution is implemented based on the rule table.
3. In the Domain Configuration dialog, type a domain table name into Domain Table text box.
4. Type a domain name into Domain text box. Separate multiple domain names with comma. Each rule table supports
up to 64 domain names (case insensitive).
5. Click OK.
6. In the Inbound LLB page, click the domain table name you already created and then click New > SmartDNS
Rule.
Chapter 5 Network 92
In the New SmartDNS Rule, configure as follows:
Option Description
ISP Static Select a predefined or user-defined ISP from the drop-down list. If the
Address source address matches any address entry of the ISP, system will return
the specified IP.
Return IP Specifies the return IP for different request sources. Options include:
l Weight - Specifies the weight of the return IP. The value range is 1
to 100. The default value is 1. In the SmartDNS rule table, one
domain name might correspond to multiple IPs. The system will
sort the IPs based on the weight and then return to the users.
ISP Link Specifies the proximity address to which the request source address will
be matched. If the source address matches any proximity address entry
of the interface,
system will return the specified IP. Options include:
l Track Object - Select a track object of interface type from the drop-
down list, or create a new track object. When the track object fails,
the proximity address on the corresponding interface will also fail.
7. Click OK.
Note:
l The priority of proximity address is lower than that of the ISP static address. The system
will not match the proximity address unless the matching of ISP static address fails.
l The ISP route being referenced by the SmartDNS rule table cannot be deleted.
l The status of the SmartDNS rule table can be active or inactive, specifically relying on the
configured interface and track object on the interface:
l If only ISP is configured while interface is not configured, then the rule status will
always be active;
l If interface is configured but it is not configured with track object, then the rule status
will be active when the protocol status of the interface is UP, and will be inactive when
the protocol status is DOWN;
l If interface is configured and it is configured with track object, then the rule status
will be active when track succeeds, and will be inactive when track fails.
93 Chapter 5 Network
Application Layer Gateway (ALG)
Some applications use multi-channels for data transmission, such as the commonly used FTP. In such a condition the
control channel and data channel are separated. Devices under strict security policy control may set strict limits on
each data channel, for example, only allow FTP data from internal network to external network to transfer on the well-
known port TCP 21. Once in the FTP active mode, if a FTP server in the public network tries to initiate a connection to a
random port of the host in the internal network, Devices will reject the connection and the FTP server will not work
properly in such a condition. This requires devices to be intelligent enough to properly handle the randomness of legit-
imate applications under strict security policies. In FTP instances, by analyzing the transmission information of the
FTP control channel, devices will be aware that the server and the client reached an agreement, and open up a tem-
porary communication channel when the server takes the initiative to connect to a port of the client, thus assuring the
proper operation of FTP.
The system adopts the strictest NAT mode. Some VoIP applications may work improperly after NAT due to the change
of IP address and port number. The ALG mechanism can ensure the normal communication of VoIP applications after
the NAT. Therefore, the ALG supports the following functions:
l Under strict security policy rules, ensures the normal communication of multi-channel applications.
l Ensures the proper operation of VoIP applications such as SIP and H.323 in NAT mode, and performs monitoring
and filtering according to policies.
Enabling ALG
The system allows you to enable or disable ALG for different applications. Devices support ALG for the following applic-
ations: FTP, HTTP, MSRPC, PPTP, Q.931, RAS, RSH, RTSP, SIP, SQLNetV2, SUNRPC, TFTP, DNS, and Auto. You can not
only enable ALG for applications, but also specify H323's session timeout.
To enable the ALG for applications:
2. In the Application Layer Gateway dialog, select the applications that require ALG.
3. To modify H323's session timeout, type the value into the H323 session timeout box. The value range is 60 to
1800 seconds. The default value is 60.
Chapter 5 Network 94
Global Network Parameters
Global network parameter configuration includes IP fragment, TCP packet processing methods and other options.
1. Select Network > Global Network Parameters > Global Network Parameters.
95 Chapter 5 Network
2. Configure the following parameters.
Option Description
IP Fragment
Maximum Frag- Specifies a maximum fragment number for every IP packet. The value
ment Number range is 1 to 1024. The default value is 48. Any IP packet that contains
more fragments than this number will be dropped.
Timeout Specifies a timeout period of fragment reassembling. The value range is
1 to 30. The default value is 2. If the Hillstone device has not received all
the fragments after the timeout, the packet will be dropped.
Long Duration Enables or disables long duration session. If this function is enabled, spe-
Session cify long duration session's percentage in the Percentage text box below.
The default value is 10, i.e., 10% of long duration session in the total ses-
sions.
TCP
TCP MSS Specifies a MSS value for all the TCP SYN/ACK packets. Select the Enable
check box, and type the value into the Maximum MSS text box below.
Maximum MSS Type the max MSS value into the Maximum MSS text box below. The
value range is 64 to 65535. The default value is 1448.
TCP MSS VPN Specifies a MSS value for IPSec VPN's TCP SYN packets. Select the Enable
check box, and type the value into the Maximum MSS text box below.
Maximum MSS Type the max MSS value for IPSEC VPN into the Maximum MSS text box
below. The value range is 64 to 65535. The default value is 1380.
TCP Sequence Configures if the TCP sequence number will be checked. When this func-
Number Check tion is enabled, if the TCP sequence number exceeds TCP window, that
TCP packet will be dropped.
TCP Three-way Configures if the timeout of TCP three-way handshaking will be checked.
Handshaking Select the Enable check box to enable this function, and specify a
timeout value in the Timeout text box below. The value range is 1 to 1800
seconds. The default value is 20. If the three-way handshaking has not
been completed after timeout, the connection will be dropped.
TCP SYN Packet Select the Enable check box to enable this function, and only when a
Check packet is a TCP SYN packet can a connection be established.
Others
Non-IP and Specifies how to process packets that are neither IP nor ARP.
Non-ARP Packet
3. Click OK.
l Log & reset - System not only generates protocol anomaly alarms and attacking behavior logs, but also blocks
attackers or resets connections.
Chapter 5 Network 96
l Log only - System only generates protocol anomaly alarms and attacking behavior logs, but will not block
attackers or reset connections.
Note: Log & reset mode is recommended. In this mode, the security performance of the device
can take effect normally. If log only mode is selected, system can only record logs, and func-
tions which can block traffic in system will be invalid, including policy, IPS, AV, QoS, etc.
97 Chapter 5 Network
Chapter 6 Advanced Routing
Routing is the process of forwarding packets from one network to the destination address in another network. Router,
a packet forwarding device between two networks, is designed to transmit packets based on the various routes stored
in routing tables. Each route is known as a routing entry.
Hillstone devices are designed with Layer 3 routing. This function allows you to configure routing options and forward
various packets via VRouter. the system ships with a default VRouter trust-vr, and also supports multiple VRouters
(multi-VR).
Hillstone devices support destination routing, ISP routing, Source-Based Routing (SBR), Source-Interface-Based Rout-
ing (SIBR), Destination-Interface-Based Routing (DIBR), Policy-Based Routing (PBR), dynamic routing (including RIP,
OSPF and BGP) and Equal Cost MultiPath Routing (ECMP).
l Destination Routing: A manually-configured route which determines the next routing hop according to the des-
tination IP address.
l DIBR: A manually-configured route which determines the next routing hop according to the destination IP address
and ingress interface.
l SBR: Source IP based route which selects router and forwards data according to the source IP address.
l ISP Routing: A kind of route which determines the next hop based on different ISPs.
l PBR: A route which forwards data based on the source IP, destination IP address and service type.
l Proximity Routing: Selects routers and forwards data according to the result of proximity detection.
l Dynamic Routing: Selects routers and forwards data according to the dynamic routing table generated by
dynamic routing protocols (RIP, OSPF or BGP).
l ECMP: Load balancing traffic destined to the same IP address or segment in multiple routes with equal man-
agement distance.
When forwarding the inbound packets, the device selects a route in the following sequence: PBR > SIBR > SBR > DIBR
> Destination routing/ISP routing/Proximity routing/Dynamic routing.
Routing supports IPv4 and IPv6 address. If IPv6 is enabled, you can configure IPv6 address entry for the routing rule.
Related Topics:
2. Click New.
Option Description
Virtual Router From the Virtual Router drop-down list, select the Virtual Routerouter for
the new route. The default value is "trust-vr".
Destination Type the IP address for the route into the text box.
Subnet Mask Type the corresponding subnet mask into the text box.
Next Hop To specify the type of next hop, click Gateway, Current VRouter, Inter-
face, or Other VRouter.
l Other VRouter: Select a name from the Vsys drop-down list. Select
a name from the Virtual Router drop-down list.
Precedence Type the route precedence into the text box. The smaller the parameter
is, the higher the precedence is. If multiple routes are available, the route
with higher precedence will be prioritized. The value range is 1 to 255.
The default value is 1. When the value is set to 255, the route is invalid.
Weight Type the weight for the route into the text box. This parameter is used to
determine the weight of traffic forwarding in load balance. The value
range is 1 to 255. The default value is 1.
Description Type the description information into the Description text box if neces-
sary.
Destination-Interface Route
Destination interface route is designed to select a route and forward data based on the Destination IP address and
ingress interface of a packet.
2. Click New.
Option Description
Virtual Router From the Virtual Router drop-down list, select the Virtual Routerouter for
the new route. The default value is "trust-vr".
Ingress Interface Select an interface for the route from the drop-down list.
Destination IP Type the Destination IP for the route into the textbox.
Subnet Mask Type the corresponding subnet mask into the textbox.
Next Hop To specify the type of next hop, click Gateway, Virtual Router in current
Vsys, Interface, or Virtual Router in other Vsys.
l Virtual Router in other Vsys: Select a name from the Vsys drop-
down list. Select a name from the Virtual Router drop-down list.
Precedence Type the route precedence into the textbox. The smaller the parameter is,
the higher the precedence is. If multiple routes are available, the route
with higher precedence will be prioritized. The value range is 1 to 255.
The default value is 1. When the value is set to 255, the route is invalid.
Weight Type the weight for the DIBR into the textbox. This parameter is used to
determine the weight of traffic forwarding in load balance. The value
3. Click OK.
2. Click New.
Option Description
Virtual Router From the Virtual Router drop-down list, select the Virtual Routerouter for
the new route. The default value is "trust-vr".
Source IP type the source IP for the route into the box.
Subnet Mask Type the corresponding subnet mask into the box.
Next Hop To specify the type of next hop, click Gateway, Virtual Router in current
Vsys, Interface, or Virtual Router in other Vsys.
l Virtual Router in other Vsys: Select a name from the Vsys drop-
down list. Select a name from the Virtual Router drop-down list.
Precedence Type the route precedence into the box. The smaller the parameter is, the
higher the precedence is. If multiple routes are available, the route with
higher precedence will be prioritized. The value range is 1 to 255. The
default value is 1. When the value is set to 255, the route is invalid.
Weight Type the weight for the route into the box. This parameter is used to
determine the weight of traffic forwarding in load balance. The value
range is 1 to 255. The default value is 1.
Description Type the description information into the Description text box if neces-
sary.
3. Click OK.
2. Click New.
Option Description
Virtual Router From the Virtual Router drop-down list, select the Virtual Routerouter for
the new route. The default value is "trust-vr".
Ingress Interface Select an interface for the route from the drop-down list.
Source IP Type the source IP for the route into the textbox.
Subnet Mask Type the corresponding subnet mask into the textbox.
Next Hop To specify the type of next hop, click Gateway, Virtual Router in current
Vsys, Interface, or Virtual Router in other Vsys.
l Virtual Router in other Vsys: Select a name from the Vsys drop-
down list. Select a name from the Virtual Router drop-down list.
Precedence Type the route precedence into the textbox. The smaller the parameter is,
the higher the precedence is. If multiple routes are available, the route
with higher precedence will be prioritized. The value range is 1 to 255.
The default value is 1. When the value is set to 255, the route is invalid.
Weight Type the weight for the ISP route into the textbox. This parameter is used
to determine the weight of traffic forwarding in load balance. The value
range is 1 to 255. The default value is 1.
Description Type the description information into the Description text box if neces-
sary.
3. Click OK.
2. Click New.
Option Description
ISP Profile Type the name for the new ISP profile into the textbox.
Subnet Prefix Type the IP address for the subnet into the textbox.
Subnet Mask Type the subnet mask into the textbox.
Add Add the subnet to the ISP profile. The subnet will be displayed in the ISP
subnet list below. If needed, repeat the steps to add multiple subnets for
the ISP profile.
Delete Delete the selected ISP profiles.
3. Click OK.
2. Click Upload.
2. Click Save.
3. In the Save User-defined ISP Configuration dialog box, select an ISP profile from the ISP profile drop-down list.
Creating an I SP Ro ute
To create an ISP route:
2. Click New.
Option Description
ISP Profile Select an ISP profile name from the drop-down list.
Virtual Router From the Virtual Router drop-down list, select the Virtual Router for the
new route. The default value is "trust-vr".
Next hop To specify the type of next hop, click Gateway, Current VRouter, Inter-
face, or Other VRouter.
l Other VRouter: Select a name from the Vsys drop-down list. Select
a name from the Virtual Router drop-down list.
Precedence Type the route precedence into the textbox. The smaller the parameter is,
the higher the precedence is. If multiple routes are available, the route
with higher precedence will be prioritized. The value range is 1 to 255.
The default value is 10. When the value is set to 255, the route is invalid.
Weight Type the weight for the ISP route into the textbox. This parameter is used
to determine the weight of traffic forwarding in load balance. The value
range is 1 to 255. The default value is 1.
Description Type the description information into the Description text box if neces-
sary.
3. Click OK.
Option Description
l Zone: Click this option button and select a zone from the Zone
drop-down list.
l Virtual Router: Click this option button and show the virtual router
that the policy-based route bind to.
l Interface: Click this option button and select a interface from the
Interface drop-down list.
3. Click OK.
4. After adding the desired addresses, click the blank area in this dia-
log to complete the source address configuration.
You can also perform other operations:
l When selecting the Address Book type, you can click Add to cre-
ate a new address entry.
1. From the User drop-down menu, select the AAA server where the
users and user groups reside. To specify a role, select Role from
the AAA Server drop-down list.
4. After adding the desired objects, click the blank area in this dialog
to complete the user configuration.
4. After adding the desired addresses, click the blank area in this dia-
log to complete the destination address configuration.
You can also perform other operations:
l When selecting the Address Book type, you can click Add to cre-
ate a new address entry.
Host Book Specifies the Host-book of PBR rule. Select an Host-book from the Host
Book drop-down list.
2. You can search the desired service/service group, expand the ser-
vice/service group list.
4. After adding the desired objects, click the blank area in this dialog
to complete the service configuration.
You can also perform other operations:
3. After adding the desired objects, click the blank area in this dialog
to complete the application configuration.
You can also perform other operations:
Schedule Specifies a schedule when the PBR rule will take effect. Select a desired
schedule from the Schedule drop-down list. After selecting the desired
schedules, click the blank area in this dialog to complete the schedule
configuration.
To create a new schedule, click New Schedule.
Record log select the Enable check box to enable the logging function for PBR rules.
Set Nest-hop To specify the type of next hop, click IP Address, Virtual Router in cur-
rent Vsys, Interface, or Virtual Router in other Vsys.
l IP Address: Type IP address into the IP address text box and spe-
cify the weight into the Weight text box. When more than one next
hops are available, the traffic will be allocated to the different next
hops according to the weight value.
l Virtual Router in other Vsys: Check the radio button to specify a vir-
tual router in the current VSYS as the next hop. Select a virtual
router from the Virtual Router drop-down list and specify the
weight into the Weight text box. When more than one next hops
are available, the traffic will be allocated to the different next hops
according to the weight value.
Track Object Select the tarck object from the drop-down list. See "Track Object" on
Page 259.
Weight Specifies the weight for the next hop. The value range is 1 to 255. The
default value is 1. If a PBR rule is configured with multiple next hops, the
system will distribute the traffic in proportion to the corresponding
weight.
2. From the Virtual Router drop-down list, select the Virtual Router for the new route.
3. Select the rule you want to adjust priority from the list below, click Priority.
Top Click this option button to move the PBR rule to the top.
Bottom Click this option button to move the PBR rule to the bottom.
Before ID Click this option button and type the ID into the box behind to move the
PBR rule to the position before the ID.
After ID Click this option button and type the ID into the box behind to move the
PBR rule to the position after the ID.
Note: Each PBR rule is labeled with a unique ID. When traffic flows into a Hillstone device,
the device will query for PBR rules by turn, and processes the traffic according to the first
matched rule. However, the PBR rule ID is not related to the matching sequence during the
query. You can move a PBR rule's location up or down at your own choice to adjust the
matching sequence accordingly.
2. From the Virtual Router drop-down list, select the Virtual Router for the new route.
Option Description
PBR Name Select a route from the PBR name drop-down list.
Virtual Router From the Virtual Router drop-down list, select the Virtual Router for the
new route. The default value is "trust-vr".
Type Specifies the object type that the policy-based route binds to. You can
l Zone: Click this option button and select a zone from the Zone
drop-down list.
l Virtual Router: Click this option button and show the virtual router
that the policy-based route bind to.
l Interface: Click this option button and select a interface from the
Interface drop-down list.
4. Click OK.
D NS Redirect
The system supports the DNS redirect funtion, which redirects the DNS requests to a specified DNS server. For more
informaiton about specifying IP addresses of the DNS server, see Configuring a DNS Server. Currently, the DNS redir-
ect function is mainly used to redirect the video traffic for load balancing. With the policy based route working
together, the system can redirect the Web video traffic to different links, improving the user experience.
To enable the DNS redirect function:
5. Click OK.
l Creating Host-book
1. Select Network > Interface, double click the interface you want.
2. Under the Basic tab, select the check box of WAP traffic distribution. For more information about Host-book,
see "Configuring an Interface" on Page 38.
Configuring a D NS Server
DNS server can be used to analyze the real destination IP address. For more information about DNS server, see "DNS"
on Page 66.A domain name can be corresponded to multiple IP address, so the system only support the first IP
address that had been analyzed.
1. Configuring application identification: set up traffic control based on the data type.
2. Enabling video streaming redirection: enable WAP traffic distribution and assign the port number used for certain
website's HTTP video. IP replacement is not needed.
3. Configuring PBR: Creating a policy based route and add the APP or services for video streaming, then bind this
route rule to the interface which enabled video streaming redirection.
Creating RI P
To create RIP:
2. From the Virtual Router drop-down list, select the Virtual Router for the new route.
3. Click New.
Version Specifies a RIP version. Hillstone devices support RIP-1 and RIP-2. RIP-1
transmits packets by broadcasting, while RIP-2 transmits packet by mul-
ticasting. Select a version from the drop-down list. The default version is
RIP-2.
Metric Specifies a default metric. The value range is 1 to 15. If no value is spe-
cified, the value of 1 will be used. RIP measures the distance to the des-
tination network by hops. This distance is known as metric. The metric
from a router to a directly connected network is 1, and increments by 1
for every additional router between them. The max metric is 15, and the
network with metric larger than 15 is not reachable. The default metric
will take effect when the route is redistributed.
Distance Specifies a default distance. The value range is 1 to 255. If no value is spe-
cified, the value of 120 will be used.
Information ori- Specifies if the default route will be redistributed to other routers with
ginat RIP enabled. By default RIP will not redistribute the default route. Select
the check box to redistribute the default route.
Update interval Specifies an interval in which all RIP routes will be sent to all the neigh-
bors. The value range is 0 to 16777215 seconds. The default value is 30.
Invalid time If a route has not been updated for the invalid time, its metric will be set
to 16, indicating an unreachable route. The value range is 1 to 16777215
seconds. The default value is 180.
Holddown time If the metric becomes larger (e.g., from 2 to 4) after a route has been
updated, the route will be assigned with a holddown time. During the
holddown time, the route will not accept any update. The value range is
1 to 16777215 seconds. The default value is 180.
Flush time System will keep on sending the unreachable routes (metric set to 16) to
other routers during the flush time. If the route still has not been
updated after the flush time ends, it will be deleted from the RIP inform-
ation database. The value range is 1 to 16777215 seconds. The default
value is 240.
Protocol Select a protocol type for the route from the Protocol drop-down list.
The type can be Connected, Static, OSPF or BGP.
Metric Type the metric for the route into the Metric box. If no value is specified,
system will use the default metric value.
Add Click Add to add the Redistribute route entry. All the entries that have
been added will be displayed in the Redistribute Route list below.
Delete Repeat the above steps to add more Redistribute route entries. To delete
a Redistribute route entry, select the entry you want to delete from the
list, and click Delete.
Network(IP/net- Type the IP address and netmask into the Network(IP/netmask) box.
mask)
Add Click Add to add the network. All the networks that have been added will
be displayed in the list below.
Delete Repeat the above steps to add more networks. To delete a network,
select the entry you want to delete from the list, and click Delete.
Distance Type the distance into the Distance box. The priority of the specified dis-
tance is higher than than the default distance.
Network(IP/net- Type the IP prefix and netmask into the Network(IP/netmask) box.
mask)
Add Click Add to add the distance. All the distances that have been added will
be displayed in the list below.
Delete Repeat the above steps to add more distances. To delete a distance,
select the entry you want to delete from the list, and click Delete.
4. Click OK.
Note: Configuration for RIP on Hillstone device's interfaces includes: RIP version, split horizon
and authentication mode. For more information on how to configure RIP on an interface, see
"Configuring an Interface" on Page 38.
Authentication is a behavior to identify a user or a host. Authentication is one the key features for a security product.
When a security product enables authentication, users or hosts can be denied or allowed to access certain networks.
From a user's point of view, authentication is divided into the following categories:
l If you are a user from internal network who wants to access Internet, you can use:
l If you are a user from Internet who wants to visit an internal network (usually with VPN), you can use:
Authentication Process
A user uses his/her terminal to connect the firewall. The firewall calls user data from AAA server to check the user's
identity.
l User: authentication applicant. The applicant initiate an authentication request, and enters his/her username and
password to prove his/her identity.
l Authentication system (i.e. the firewall in this case): Firewall receives username and password and send the
request to AAA server. It is an agent between applicant and AAA server.
l "AAA Server" on Page 238: authentication server. This server stores user information like username and pass-
word, etc. When AAA server receives a legitimate request, it checks if the applicant has the right to user network
services, and sends back the decision. For more information, refer to "AAA Server" on Page 238. AAA server has
the following four types:
l Local server
l Radius server
l LDAP server
l AD server
l TACACS+server
l General Web authentication (WebAuth): a general Web authentication means that an authentication page will
appear to check your information.
l "Single Sign-On" on Page 126: Single Sign On is a simplified WebAuth method. The authentication applicant will
not be required to open an authentication page. When a user is a legitimate applicant in the AAA server, he/she
can pass the identification automatically. For SSO, the AAA server type must be Active Directory server.
There are three different methods to achieve SSO. The three methods are independent from each other, and all of
them do not require usernmae/password input.
l Security Agent
l If you select SSO-NTLM, auth user will not need to open an authen-
tication page. The system gets the user's PC login credential and
send it to AAA server. Refer to "Single Sign-On" on Page 126.
Auth User
AAA Server Specify the AAA server. Make sure that your selected AAA server has
already set up all user's credentials and the server has been added in
StoneOS system. Refer to "AAA Server" on Page 238.
Policy
Src Zone Specify the source zone where auth users are from.
Dst Zone Specify the destination zone where the auth users will visit.
DNS Zone Specify the DNS zone.
When you click OK, the system will automatically generates three security policies which are
used for web auth. If you wish to customize some parts of this authentication process, like
limit accessing time, you can go to modify the security policies. Refer to "Security Policy" on
Page 274 .
4. Click OK.
After WebAuth is configured, the users who matched WebAuth policy is recommended to input the correct username
and password, and then users can access to the network. The system supports to take actions for brute-force to avoid
the illegal users getting username and password by force. If failed to log in through the same host for three times in
two minutes, the host that attempts to log in will be blocked for 2 minutes.
2. Under the WebAuth tab, select the radio button of the authentication method you want.
l If you select SSO-NTLM, auth user will not need to open an authen-
tication page. The system gets the user's PC login credential and
send it to AAA server. Refer to "Single Sign-On" on Page 126.
User Login
Multiple login If you disable multiple login, one account cannot login elsewhere if he
has already logged in. You can choose to kick out the first login visitor or
you can disable second login.
If you allow multiple login, more than one clients can login with the
same account. But you can still set up the maximum number of clients
using one account.
Advanced
Idle interval The maximum time length of an inactive account after it has login.
Client Heartbeat When the authenticator sends a request to ask the client to submit its
Timeout username, the client need to responds within a specified period. If client
does not respond until timeout, the system will resend the authen-
tication request message.
Re-Auth Interval When the client is authorized to access network, the authenticator can
re-authenticate the client.
Forced Re-login If the forced re-login function is enabled, users must re-login after the
Interval configured interval ends.
Proxy Port Specify the port number for HTTPS, HTTPS and SSO proxy server. The
port number applies to all. It it changes in any page, other modes also
use the new port. The range is 1 to 65535.
Redirect URL The redirect URL function redirects the client to the specified URL after
successful authentication. You need to turn off the pop-up blocker of
your web browser to ensure this function can work properly. The format
of URL should be "http://www.abc.com" or "https://www.abc.com".
l If the WebAuth success page is closed, you can log out not only by timeout, but also by vis-
iting the WebAuth status page (displays online users, online times and logout button). You
can visit it through "http(https):// IP-Address: Port-Number". In the URL, IP-Address
refers to the IP address of the WebAuth interface, and Port-Number refers to HTTP/HTTPS
port. By default, the HTTP port is 8181, the HTTPS port is 44433. The WebAuth status
page will be invalid if there is no online users on the client or the WebAuth is disabled.
l You can specify the username and password in the URL address. When the specified redir-
ect URL is the application system page with the authentication needed in the intranet, you
do not need the repeat authentication and can access the application system. The cor-
responding keywords are $USER, $PWD, or $HASHPWD. Generally, you can select one
keyword between $PWD and $HASHPWD. The formart of the URL is "URL" +"user-
name=$USER&password=$PWD".
l When entering the redirect URL in CLI, add double quotations to the URL address if the
URL address contains question mark. For example, "http://192.10.5.201/oa/-
login.do?username=$USER&password=$HASHPWD"
3. Click Apply.
1. Select Network > Authentication Management > WebAuth, and click Customize on the right top corner.
2. In the prompt, specify the directory where you stores the background pictures.
Note: The backgound pictures must comply with the following requirements:
l The picture name must be "login_page_bg_en.gif" (for English login page) or "login_
page_bg_cn.gif" (for Chinese login page)
l The pictures must be compressed as a zip file before uploading. The two pictures (Chinese
and English) can be zipped in one file, or two separate files.
l Installing AD Agent Software: This methods needs to install software on the AD server or a connected PC. The
software is responsible to send user login information to StoneOS. If you do not want to change your AD server,
you are suggested to choose this method.
l Installing a script on AD Server: A script installed on AD server can also send login user's information to
StoneOS. This method is best if you do not mind editing your AD server and you want accurate monitor results.
l SSO-NTLM: This method still needs to trigger a browser, but users do not input user information. The SSO-
NTLM uses browser to send user identity to AAA server. This method can be used with WebAuth: when SSO fails,
you can configure to initiate a second authentication of WebAuth to require manually inputting of username and
password.
2. Double click to open ADAgentSetup.exe. Click Next all the way down until the wizard finishes its installation.
l Click Start menu, and select All app > Hillstone AD Agent >AD Agent Configuration Tool.
Agent Port Enter agent port number. The firewall communicates to AD Agent using this port. The
range is 1025 to 65535. The default value is 6666. This port must be the same port number
as it was configured in StoneOS, otherwise, agent and StoneOS cannot communicate with
each other.
AD User Name Enter the user name to log into AD server. This user must have right to query logs.
5. On the <Discovered Server> tab, click Auto Discover to start auto scanning of AD servers in the domain. Or, if
your intended server is not scanned, you can click Add to input IP address of server to add it.
When there are two or more AD servers, the order of authenticating a use is from top to bottom in the list.
7. On the <SSO Agent> tab, click Get SSO Agent to get a script which can be installed on AD server. (For intro-
duction and set up of this script, refer to "Using a Script for SSO" on Page 128) .
8. Click Commit to submit all settings and start AD Agent service in the mean time.
Note: After you have committed, AD Agent service will be running in the background all the
time. If you want to modify settings, you can edit in the AD Agent Configuration Tool and
click Commit. The new settings can take effect immediately.
1. Copy the software Security Agent to a local internal PC, and double click Setup.exe.
l Double click the Security Agent Configuration Tool shortcut on the desktop;
l Click Start menu, and choose All Programs > Security Agent > Security Agent Configuration Tool.
4. (Optional) Under the General tab, enter port number of the agent port. Firewall contacts this port to connect to
Security Agent. This port must be the one specified in the firewall settings.
5. (Optional) Click <Exception User List>,<Exception IP List> or <Exception Host List> tab to configure users/IP
addresses?hosts who are not monitored.
2. In AD server, go to Start menu, select Mangement Tools > Active Directory User and Computer.
3. In the prompt, right click the domain of SSO, and select Properties, then click Group Properties tab.
4. Double click the group policy of SSO, and in the prompt, select User Configuration > Windows > Script
(Logon/Logout).
6. In the prompt, click Browse and select the logon script (RepotLogon.exe), and then enter IP address of StoneOS
for authentication, followed by a space and text "logon".
7. Click OK.
8. Similarly, import the script into the logout setting, repeat 5 - 7, and use logoff in the step 6.
Using SSO-NTLM
SSO-NTLM creates a situation that visitor will also need to open a brower, but no need to enter identity information.
The browser triggers authenticating and sends user's PC login credentials to AD server.
The configuration of SSO-NTLM is the same as WebAuth, please refer to WebAuth.
After using WebAuth wizard, you still need to configure the following two steps for SSO-NTLM.
Step 1: Changing setting in StoneOS
When SSO- If you select Use HTTP Mode, when a user fails SSO authentication, he
NTLM fails still has a second chance to input username and password.
User Login
Multiple login If you disable multiple login, one account cannot login elsewhere if he
has already logged in. You can choose to kick out the first login visitor or
you can disable second login.
If you allow multiple login, more than one clients can login with the
same account. But you can still set up the maximum number of clients
using one account.
Advanced
Idle interval The maximum time length of an inactive account after it has login.
Force Re-login The time interval to force the login account to enter login credential
Interval again.
Proxy port Specifies the proxy port number of SSO proxy server. The range is 1 to
65535.
3. Click Apply.
Step 2: Changing settings of User's Browser
4. In the prompt, find User Authentication and select Automatic logon with current user name and password.
5. Click OK.
1. Click Network > Authentication Management > SSO Agent to visit the SSO agent page. The SSO agent func-
tion is disabled by default.
3. Select the AAA server that sends the login/log off script from the AAA server drop-down list.
4. Specify the idle interval. It is the interval that the authentication page keeps online without any traffic. After wait-
ing for the idle interval, the connection will disconnect. The value range is 0 to 1440 minutes. 0 means always
online.
5. Configure the multiple login. This function permits one user to sign in at more than one place simultaneously.
Co nfiguring 802.1x
A complete configuration for 802.1x authentication includes the following points:
l Prerequisite: Before configuration, you should already have the AAA server you want (only local or Radius server
is supported for 802.1x). The AAA server has been added in the firewall system (refer to AAA server), and the
interface or VLAN for authentication has been bound to a security zone (refer to interface or vlan).
l In the user's PC, modify the network adapter's properties: If computer is connected to the 802.1x interface, this
computer should enable its authentication function on its LAN port (right click LAN and select Properties, in the
prompt, under the <Authentication> tab, select MD5-Challenge or Microsoft: Protected EAP (PEAP), and
click OK to confirm.)
Note: Early versions of Windows have enabled 802.1x by default, but Windows 7 and Window
8 do not have this feature enabled. To enable 802.1x, please search online for a solution that
suits your system.
Re-auth period Enter a time period as the re-authentication time. After a user has suc-
cessfully connected to network, the system will automatically re-auth the
user's credentials. The range is from 0 to 65535 seconds. If the values is
set to 0, this function is disabled.
Quiet period If the authentication fails, it takes a moment before the system can pro-
cess the authenticating request from the same client again. The range is
0 to 65535 seconds, and the default value is 60 seconds. If this value is
set to 0, the system will not wait, and will immediately process the
request from the same client.
Retry times Specify a number for retry times. If the authentication system does not
receive any response from client, the system will try to require user's cre-
dential again. When the system has tries for the specified times, it will
stop trying. The range is 1 to 10 times, the default is 2 times.
Sever timeout Specify a server timeout value. The authenticator transmits the client's
credentials to the authentication server. If the server does not answer the
authenticator within a specified time, the authenticator will resend
request to the authentication server. The range is 1 to 65535 seconds, the
default value is 30 seconds.
Client timeout When the authenticator sends a request to ask the client to submit its
username, the client need to responds within a specified period. If client
does not respond until timeout, the system will resend the authen-
tication request message. The range is 1 to 65535 seconds, the default
value is 30 seconds.
3. Click OK.
In the Global Configuration dialog box, specify the parameters that will be applicable for all 802.1x
profiles.
Option Description
Max user num- The maximum user client number for a authentication port.
ber
Multiple login You may choose to allow or disable one account to login from different
clients.
l Disable: If you select Disable, one account can only login from one
client simultaneously.
Then, when you want to kick off the old login user, you should
select Replace; if you want to disallow new login user, select
Refuse.
2. Click OK.
2. The page will show all online users. You can set up filters to view results that match your conditions.
l Public Key Cryptography: A technology used to generate a key pair that consists of a public key and a private key.
The public key is widely distributed, while the private key is known only to the recipient. The two keys in the key
pair complement each other, and the data encrypted by one key can only be decrypted by another key of the key
pair.
l CA: A trusted entity that issues digital certificates to individuals, computers or any other entities. CA accepts
requests for certificates and verifies the information provided by the applicants based on certificate management
policy. If the information is legal, CA will sign the certificates with its private key and issue them to the applicants.
l RA: The extension to CA. RA forwards requests for a certificate to CA, and also forwards the digital certificate and
CRL issued by CA to directory servers in order to provide directory browsing and query services.
l CRL: Each certificate is designed with expiration. However, CA might revoke a certificate before the date of expir-
ation due to key leakage, business termination or other reasons. Once a certificate is revoked, CA will issue a CRL
to announce the certificate is invalid, and list the series number of the invalid certificate.
PKI is used in the following two situations:
l HTTPS/SSH: PKI applies to the situation when a user accesses a Hillstone device over HTTPS or SSH.
l "Sandbox" on Page 374: Support the verification for the trust certification of PE files.
2. Click New.
Label Specifies the name of the PKI key. The name must be unique.
Key con- Specifies the generation mode of keys, which includes Generate and
figuration mode Import.
Key Pair Type Specifies the type of key pair, either RSA or DSA.
Key modulus Specifies the modulus of the key pair. The options are 1024 (the default
value), 2048, 512 and 768 bits.
Import Key Browse your local file system and import the key file.
3. Click OK.
2. Click New.
l Select Manual Input, and click Browse to find the certificate and
click Import to import it into the system.
5. When you receive the certificate sent from CA. Click Browse to import the certificate.
Check l No Check - The system does not check CRL. This is the default
option.
l Force - The system only accepts certificating from pper when CRL
is available.
URL 1-3 The URL address for receiving CRL. At most 3 URLs are allowed, and their
priority is from 1 to 3.
l If you use LDAP to receive CRL, you need to enter the login-DN of
LDAP server and password. If not login-DN or password is added,
transmission will be anonymous.
Auto Update Update frequency of CRL list
Manual Update Get the CRL immediately by clicking Obtaining CRL .
7. Click OK.
1. Log in the other device, select System > PKI > Trust Domain Certificate.
3. Select the radio button of the item you want to import, and click Import.
If you choose PKCS, you need to enter the password when it was exported.
2. The page will show all online users. You can set up filters to view results that match your conditions.
l "IPSec VPN" on Page 143: IPSec is a security framework defined by the Internet Engineering Task Force (IETF) for
securing IP communications. It is a Layer 3 virtual private network (VPN) technology that transmits data in a
secure tunnel established between two endpoints.
l "SSL VPN" on Page 162: SSL provides secure connection services for TCP-based application layer protocols by
using data encryption, identity authentication, and integrity authentication mechanisms.
l "L2TP VPN" on Page 217: L2TP is one protocol for VPDN tunneling. VPDN technology uses a tunneling protocol to
build secure VPNs for enterprises across public networks. Branch offices and traveling staff can remotely access
the headquarters’ Intranet resources through a virtual tunnel over public networks.
B asic Co ncepts
l Security association
l Encapsulation modes
l Establishing SA
l Tunnel mode - IPSec protects the entire IP packet, including both the IP header and the payload. It uses the entire
IP packet to calculate an AH or ESP header, and then encapsulates the original IP packet and the AH or ESP header
with a new IP header. If you use ESP, an ESP trailer is also encapsulated. Tunnel mode is typically used for pro-
tecting gateway-to-gateway communications.
l Transport mode - IPSec protects only the IP payload. It uses only the IP payload to calculate the AH or ESP header,
and inserts the calculated header between the original IP header and payload. If you use ESP, an ESP trailer is also
encapsulated. The transport mode is typically used for protecting host-to-host or host-to-gateway com-
munications.
Es ta blis hing SA
There are two ways to establish SA: manual and IKE auto negotiation (ISAKMP).
l Manually configuring SA is complicated as all the information will be configured by yourself and some advanced
features of IPSec are not supported (e.g. timed refreshing), but the advantage is that manually configured SA can
independently fulfill IPSec features without relying on IKE. This method applies to a small number of devices con-
dition, or an environment of static IP addresses.
l IKE auto negotiation method is comparatively simple. You only need to configure information of IKE negotiation
and leave the rest jobs of creating and maintaining SA to the IKE auto negotiation function. This method is for
medium and large dynamic network. Establishing SA by IKE auto negotiation consists of two phases. The Phase 1
negotiates and creates a communication channel (ISAKMP SA) and authenticates the channel to provide con-
fidentiality, data integrity and data source authentication services for further IKE communication; the Phase 2 cre-
ates IPSec SA using the established ISAKMP. Establishing SA in two phases can speed up key exchanging.
l Route-based VPN - Binds the configured VPN tunnel to the tunnel interface and define the next hop of static route
as the tunnel interface.
l DES – Uses DES as the encryption algorithm. The key length is 64-
bit.
l Null – No authentication.
Encryption Specifies the encryption algorithm for Phase2.
l DES – Uses DES as the encryption algorithm. The key length is 64-
bit.
l Null – No authentication.
Compression Specifies the compression algorithm for Phase2. By default, no com-
pression algorithm is used.
PFS Group Specifies the PFS function for Phase2. PFS is used to protect DH
algorithm.
Type Specifies the type of the peer IP. If the peer IP is static, type the IP
address into the Peer IP box; if the peer IP type is user group, select the
AAA server you need from the AAA Server drop-down list.
Local ID Specifies the local ID. The system supports five types of ID: FQDN, U-
FQDN, Asn1dn (only for license), KEY-ID and IP. Select the ID type you
want, and then type the content for this ID into the Local ID box or the
Local IP box.
Peer ID Specifies the peer ID. The system supports five types of ID: FQDN, U-
Proposal1/2/3/4 Specifies a P1 proposal for ISAKMP gateway. Select the suitable P1 pro-
posal from the Proposal1 drop-down list. You can define up to four P1
proposals for an ISAKMP gateway
Pre-shared Key If you choose using pre-shared key to authenticate, type the key into the
box.
Trust Domain If you choose to use RSA signature or DSA signature, select a trust
domain.
User Key Click Generate. In the Generate the User Key dialog, type the IKE ID into
the IKE ID box, and then click Generate. The generated user key will be
displayed in the Generate Result box. PnPVPN client uses this key as the
password to authenticate the login users.
l Initiator - Specifies that the ISAKMP gateway serves only as the ini-
tiator.
l DPD Interval - The interval of sending DPD request to the peer. The
value range is 1 to 10 seconds. The default value is 10 seconds.
l DPS Retries - The times of sending DPD request to the peer. The
device will keep sending discovery requests to the peer until it
reaches the specified times of DPD reties. If the device does not
receive response from the peer after the retry times, it will determ-
ine that the peer ISAKMP gateway is down. The value range is 1 to
10 times. The default value is 3.
Peer Name Specifies the name of the ISAKMP gateway. To edit an ISAKMP gateway,
click Edit.
Information Shows the information of the selected peer.
Tunnel
DNS1/2 Specifies the IP address of the DNS server allocated to the client by the
PnPVPN server. You can define one primary DNS server and a backup
DNS server.
WINS1/2 Specifies the IP address of WINS server allocated to the client by the
PnPVPN server. You can define one primary WINS server and a backup
WINS server.
Enable Idle Time Select the Enable check box to enable the idle time function. By default,
this function is disabled. This time length is the longest time the tunnel
can exist without traffic passing through. When the time is over, SA will
be cleared.
DF-Bit Select the check box to allow the forwarding device execute IP packet frag-
mentation. The options are:
Tunnel Route This item only can be modified after this IKE VPN is created. Click Choose
to add one or more tunnel routes in the appeared Tunnel Route Con-
figuration dialog. You can add up to 128 tunnel routes.
l Src Address - Specifies the source IP address that sends Ping pack-
ets.
l Notify Track Event - Select the Enable check box to enable the VPN
tunnel status notification function. With this function enabled, for
route-based VPN, the system will inform the routing module about
the information of the disconnected VPN tunnel and update the tun-
nel route once detecting any VPN tunnel disconnection; for policy-
based VPN, the system will inform the policy module about the
information of the disconnected VPN tunnel and update the tunnel
policy once detecting any VPN tunnel disconnection.
In the Manual Key VPN Configuration dialog, configure the corresponding options.
Basic
Interface Specifies the egress interface for the manual key VPN. Select the interface
you want from the Interface drop-down list.
Interface Type Select the interface type, including IPv4 or IPv6. Only the IPv6 firmware
supports to configure IPv6 type interface.
Protocol Specifies the protocol type. The options are ESP and AH. The default
value is ESP.
Encryption Specifies the encryption algorithm.
l None – No authentication.
l DES – Uses DES as the encryption algorithm. The key length is 64-
bit.
l None – No authentication.
Description
Description Type the description for the manual key VPN.
ISAKMP SA
Option Description
Cookie Displays the negotiation cookies which are used to match SA Phase 1.
Status Displays the status of SA Phase1.
IPSec SA
Option Description
Dial-up User
Option Description
Peer Displays the statistic information of the peer user. Select the peer you
want from the Peer drop-down list.
User ID Displays the IKE ID of the user selected.
IP Displays the corresponding IP address.
Encrypted Packets Displays the number of encrypted packets transferred through the tun-
nel.
Encrypted Bytes Displays the number of encrypted bytes transferred through the tunnel.
Decrypted Packets Displays the number of decrypted packets transferred through the tun-
nel.
Decrypted Bytes Displays the number of decrypted bytes transferred through the tunnel.
l PnPVPN Server: Normally deployed in the headquarters and maintained by an IT engineer. The PnPVPN Server
issues most of the configuration commands to clients. The device usually works as a PnPVPN Server and one
device can serve as multiple servers.
l PnPVPN Client: Normally deployed in the branch offices and controlled remotely by headquarters engineer. With
simple configuration, such as client ID, password and server IP settings, the PnPVPN Client can obtain con-
figuration commands (e.g. DNS, WINS, DHCP address pool, etc.) from PnPVPN Server.
The device can serve as both a PnPVPN Server and a PnPVPN Client. When working as a PnPVPN Server, the maximum
number of VPN instance and the supported client number of each device may vary according to the platform series.
1. The client initiates a connection request and sends its own ID and password to the server.
2. The server verifies the ID and password when it receives the request. If the verification succeeds, the server
issues configuration information, including DHCP address pool, DHCP mask, DHCP gateway, WINS, DNS and tun-
nel routes, etc,. to the client.
4. The client PC automatically gains an IP address, IP mask, gateway address and other network parameters and con-
nects itself to the VPN.
Server Address Type the IP address of PnPVPN Server into the box.
ID Specifies the IKE ID assigned to the client by the server.
Password Specifies the password assigned to the client by the server.
Confirm Pass- Enter the password again to make confirmation.
word
Auto Save Select Enable to auto save the DHCP and WINS information released by
PnPVPN Server.
Outgoing IF Specifies the interface connecting to the Internet.
Incoming IF Specifies the interface on PnPVPN Client accessed by Intranet PC or
application servers.
1. Check if the client is configured with any static IP binding rule. If so, assign the binding IP address to the client;
otherwise, further check other configurations. Note if the binding IP address is in use, the user will be unable to
log in.
2. Check if the client is configured with any IP-role binding rule. If so, assign an IP address within the binding IP
range to the client; otherwise, the user will be unable to log in.
Note: The IP addresses defined in the static IP binding rule and IP-role binding rule should not
be overlapped.
Add Click Add to add the item that binds the specified user to the IP address.
l Allocate IP addresses, DNS server addresses, and WIN server addresses to SSL VPN clients.
Co nfiguring an SSL V PN
To configure an SSL VPN:
SSL VPN Name Type the name of the SSL VPN instance
Assigned Users
AAA Server Select an AAA server from the AAA Server drop-down list. You can click
Domain Type the domain name into the Domain box. The domain name is used
to distinguish the AAA server.
Verify User After enable this function, the system will verify the username and its
Domain Name domain name.
Add Click Add to add the assigned users. You can repeat to add more items.
l Select a tunnel interface from the drop-down list, and then click Edit
to edit the selected tunnel interface.
l Select an address pool from the drop-down list, and then click Edit
to edit the selected address pool.
In the Binding Resource tab, configure the binding relationship between user groups and resources.
Binding Resource
Resource List Types or selects an existing resource name.
User Specifies a user group name.
1. From the User drop-down menu, select the AAA server where user
groups reside. Currently, only the local authentication server and
the RADIUS server are available.
3. After selecting user groups, click to add the them to the right
pane.
4. After adding the desired objects, click the blank area in this dialog
to complete the configuration.
Note:
3. If necessary, click Advanced to configure the advanced functions, including parameters, client, host security,
SMS authentication, and optimized path.
Client Connection
Idle Time Specifies the time that a client keeps online without any traffic with the
server. After waiting for the idle time, the server will disconnect the con-
nection with the client. The value range is 15 to 1500 minutes. The
default value is 30.
Multiple Login This function permits one client to sign in at more than one place sim-
ultaneously. Select the Enable check box to enable the function.
Multiple Login Type the login time into the Multiple Login Times box. The value range
Times is 0 to 99,999,999. The value of 0 indicates no login time limitation.
Advanced Parameters
Anti-Replay The anti-replay function is used to prevent replay attacks. The default
value is 32.
DF-Bit Specifies whether to permit packet fragmentation on the device for-
warding the packets. The actions include:
l The system does not allow the local user to change the password.
Download URL When USB Key authentication is enabled, you can download the UKey
driver from this URL.
Trust Domain To configure the trust domain and the subject & username checking func-
tion:
Sub-
ject&Username 1. From the Trust domain drop-down list, select the PKI trust domain
Checking that contains the CA (Certification Authority) certificate. If only the
CN Matching certificate submitted by the client is matched to any CA certificate
of the trust domain, the authentication will succeed.
OU Matching
2. If necessary, select the Subject&Username Checking check box
to enable the subject & username check function. After enabling it,
when the user is authenticated by the USB Key certificate, the sys-
tem will check whether the subject CommonName in the client cer-
3. Click Add. The configured settings will be displayed in the list below.
To delete an item, select the item you want to delete from the list,
and then click Delete.
SMS Test To check whether the device works normally, specify a mobile phone
number in the box and then click Send.
Role Specify the role to which the host checking rule will be applied. Select the
role from the Role drop-down list. Default indicates the rule will take
effect to all the roles.
Host Checking Specify the host checking profile. Select the profile from the Host Check-
Name ing Name drop-down list.
Guest Role Select the guest role from the Guest Role drop-down list. The user will
get the access permission of the guest role when the host checking fails.
If Null is selected, the system will disconnect the connection when the
host checking fails.
Periodic Check- Specify the checking period. The system will check the status of the host
ing automatically according to the host checking profile in each period.
Add Click Add. The configured settings will be displayed in the table below.
Delete To delete an item, select the item you want to delete from the list, and
then click Delete.
Host Binding
Enable Host Bind- Select the Enable Host Binding check box to enable the function. By
ing default, one user can only log in on one host. You can change the login
status by configuring the following options.
l Automatically add the user-host ID entry into the binding list at the
first login.
Note: To use the host binding function, you still have to configure it in
the host binding configuration page. For more information about host
binding, see "Host Binding" on Page 173.
1. The server recognizes the ISP type of the client according to the cli-
ent's source address.
2. The server sends all the sorted IP addresses of the egress inter-
faces to the client.
1. The server recognizes the ISP type of the client according to the cli-
ent's source address.
2. The server sends all the sorted NAT IP addresses of the external
interfaces to the client.
3. Click New.
Name Enters a name for a new resource item. Names of resource items in
different resources can not be the same.
URL Enters a URL for a new resource item.
Add Click Addto add this binding item to the list below.
Note: The number of resource items that can be added in a
resource ranges from 0 to 48. The total number of resource items
that can be added in all resources can not exceed 48.
Delete To delete a rule, select the rule you want to delete from the list and
click Delete.
Up/Down/Top/Bottom You can move the location for items at your own choice to adjust
the presentation sequence accordingly.
4. Click OK, the new resource will be displayed in the resource list.
At most 3 resource items can be displayed in the resource list for each resource, and the other items will be dis-
played as "...". You can click Edit or Delete button to edit or delete the selected resource.
l The resource list function is only available for Windows SSL VPN clients.
l Check whether the IP-user binding rule is configured for the client. If yes, allocate the bound IP to the client; if no,
the server will select an IP which is not bound or used from the address pool, then allocate it to the client.
l Check whether the IP-role binding rule is configured for the client. If yes, get an IP from the IP range and allocate
to the client; if no, the server will select an IP which is not bound or used from the address pool, then allocate it to
the client.
Note: IP addresses in the IP-user binding rule and the IP address in the IP-role binding rules
should not overlap.
3. Click Browse to select the background picture. The selected pictures must be zipped, and the file name must be
Login_box_bg_en.gif for English pages. The picture size must be 624px*376px.
4. Click Upload to upload the background picture to the system. After uploading successfully, you have completed
the background picture modification.
5. Enter the title in the Authentication Page Title box to customize the title of the login page.
6. Click OK to save the settings. Clicking Cancel will only affect the authentication page title modification.
If you want to use the default authentication title Login, click Clear Page Title. Then click OK. If you want to restore
the default picture, click Restore Default Background and select English in the pop-up dialog. Then click OK.
1. When an SSL VPN user logs in via the SSL VPN client, the client collects the host information of main board serial
number, hard disk serial number, CUP ID, and BIOS serial number.
2. Based on the above information, the client performs the MD5 calculation to generate a 32-digit character, which is
named host ID.
3. The client sends the host ID and user/password to the SSL VPN server.
4. The SSL VPN server verifies the host according to the entries in the host unbinding list and host binding list, and
deal with the verified host according to the host binding configuration.
The host unbinding list and host binding list are describes as follows:
l Host unbinding list: The host unbinding list contains the user-host ID entries for the first-login users.
l Host binding list: The host binding list contains the user-host ID entries for the users who can pass the veri-
fication. The entries in the host unbinding list can be moved to the host binding list manually or automatically for
the first login. When a user logs in, the SSL VPN server will check whether the host binding list contains the user-
host ID entry of the login user. If there is the matched entry in the host binding list, the user will pass the veri-
fication and the sever will go on checking the user/password. If there is no matched entry for the login user, the
connection will be disconnected.
Configuring H os t Binding
Configuring host binding includes host binding/unbinding configurations, super user configurations, shared host con-
figurations, and user-host binding list importing/exporting.
2. At the top right corner, click Host Checking/Binding to visit the Host Checking/Binding page.
3. With the Binding and Unbinding tab active, select the entries you want to add in the Host Unbinding List.
4. Click Add to add the selected entries to the Host Binding List.
To delete a binding entry from the host binding list:
2. At the top right corner, click Host Checking/Binding to visit the Host Checking/Binding page.
4. With the Binding and Unbinding tab active, select the entries you want to delete in the Host binding List.
Configuring a Supe r U se r
The super user won't be controlled by the host checking function, and he can log in at any host. To configure a super
user:
2. At the top right corner, click Host Checking/Binding to visit the Host Checking/Binding page.
2. At the top right corner, click Host Checking/Binding to visit the Host Checking/Binding page.
2. At the top right corner, click Host Checking/Binding to visit the Host Checking/Binding page.
5. Click Browse to find the binding list file and click Upload.
To export the host binding list:
2. At the top right corner, click Host Checking/Binding to visit the Host Checking/Binding page.
Factor Description
Operating system l Operating system, e.g., Windows 2000, Windows 2003, Windows
XP, Windows Vista, Windows 7m Windows 8, etc.
Whether the IE version and security level reach the specified requirements
Other con- Whether the specified processes are running
figurations
Whether the specified services are installed
Whether the specified services are running
Whether the specified registry key values exist
Whether the specified files exist in the system
1. The SSL VPN client sends request for connection and passes the authentication.
2. The SSL VPN server sends host checking profile to the client.
3. The client checks the host security status according to the items in the host checking profile. If it failed in the host
checking, the system will notify the checking result.
5. The server disconnects the connection for the failed client or gives the guest role's access permission to the failed
client.
2. At the top right corner, click Host Checking/Binding to visit the Host Checking/Binding page.
3. In the Host Checking tab, click New to create a new host checking rule.
l Must Match: The OS version running on the client host must be the
same as the version specified here. Select the OS version and ser-
vice pack version from the drop-down lists respectively.
l Monitor: The client host must enable the real-time monitor of the
AV software.
l Virus Signature DB Update: The client host must enable the sig-
nature database online update function.
Anti-spyware Checks the status and configurations of the anti-spyware software:
Software
l Installed: The client host must have the anti-spyware installed.
l Monitor: The client host must enable the real-time monitor of the
anti-spyware.
l Virus Signature DB Update: The client host must enable the sig-
nature database online update function.
Firewall Checks the status and configurations of the firewall:
l Installed: The client host must have the personal firewall installed.
l Monitor: The client host must enable the real-time monitor function
of the personal firewall.
Registry Key Value
Key1/2/3/4/5 Checks whether the key value exists. Up to 5 key values can be con-
figured. The check types are:
l Exist: The client host must have the key value. Type the value into
the box.
l Do not Exist: The client cannot have the key value. Type the value
into the box.
File Path Name
File1/2/3/4/5 Checks whether the file exists. Up to 5 files can be configured. The check
types are:
l Exist: The client host must have the file. Type the value into the
box.
l Do not Exist: The client cannot have the file. Type the value into the
box.
Running Process Name
Process1/2/3/4/5 Checks whether the process is running. Up to 5 processes can be con-
figured. The check types are:
l Exist: The client host must have the process running. Type the pro-
cess name into the box.
l Exist: The client host must have the service installed. Type the ser-
vice name into the box.
l Do not Exist: The client host cannot have the service installed.
Type the service name into the box.
Running Service name
Service1/2/3/4/5 Checks whether the service is running. Up to 5 services can be con-
figured. The check types are:
l Exist: The client host must have the service running. Type the ser-
vice name into the box.
l Do not Exist: The client host cannot have the service running. Type
the service name into the box.
l Get interface and route information from the PC on which the client is running.
l Show the connecting status, statistics, interface information, and route information.
l Username/Password
1. Visit the following URL with a web browser: https://IP-Address:Port-Number. In the URL, IP-Address and Port-
Number refer to the IP address and HTTPS port number of the egress interface specified in the SSL VPN instance.
2. In the SSL VPN login page (shown in Figure 1), type the username and password into the Username and Pass-
word boxes respectively, and then click Login.
l If local authentication server is configured on the device, the username and password should be configured
before on the device.
l If "Radius authentication + RSA SecurID Token authentication by RSA Server" is configured on the device,
and the user logs in for the first time, the username should be the username configured on the Radius
server, and the password should be the dynamic Token password being bound to the user. Click Login, and
in the PIN Setting page (shown in Figure 2), set a PIN (4 to 8 digits). After the PIN has been set successfully,
you will be prompted to login again with the new password (shown in Figure 3). Click Login again to return
to the login page, type the correct username and new password, and click Login. The new password is PIN +
dynamic Token password. For example, if the PIN is set to 54321, and the dynamic Token password is
808771, then the new password is 54321808771.
l If "Radius authentication + RSA SecurID Token authentication by RSA Server" is configured on the device, but
the user is not logging in for the first time, the username should be the username configured on the Radius
server, and the password should be PIN + dynamic Token password.
Figure 2
Figure 3
3. If SMS authentication is enabled on the SSL VPN server, the SMS Authentication dialog will appear. Type the
authentication code and click Authenticate. If you have not received the authentication code in one minute, you
can re-apply.
l After passing the authentication, you have three chances to type the authentication code. If you give incorrect
authentication code three times in succession, the connection will be disconnected automatically.
l You have three chances to apply the authenticate code, and the sending interval is one minute. Re-applying
authentication code will void the old code, thus you must provide the latest code to pass the authentication.
4. After login, IE will download the client software automatically, and you can install it just following the prompts; for
other web browsers, e.g., Firefox, you should click Download to download the client software scvpn.exe first,
and then double-click it to install.
A virtual network adapter will be installed on your PC together with Secure Connect. It is used to transmit encrypted
data between the SSL VPN server and client.
1. Insert the USB Key to the USB port of the PC, or import the file certificate provided by the administrator manually.
2. Visit the following URL with a web browser: https://IP-Address:Port-Number. In the URL, IP-Address and Port-
Number refer to the IP address and HTTPS port number of the egress interface specified in the SSL VPN instance.
3. In the Select Digital Certificate dialog, select the certificate you want and click OK. If USB Key certificate is selec-
ted, in the pop-up dialog, provide the UKey PIN code (1111 by default) and click OK.
4. In the SSL VPN login page shown below, type the username and password into the Username and Password
boxes respectively, and then click Login. The login user should be configured before in the device.
5. If SMS authentication is enabled on the SSL VPN server, the SMS Authentication dialog will appear. Type the
authentication code and click Authenticate. If you have not received the authentication code in one minute, you
can re-apply.
l After passing the authentication, you have three chances to type the authentication code. If you give incorrect
authentication code three times in succession, the connection will be disconnected automatically.
l You have three chances to apply the authenticate code, and the sending interval is one minute. Re-applying
authentication code will void the old code, thus you must provide the latest code to pass the authentication.
6. After login, IE will download the client software automatically, and you can install it just following the prompts; for
other web browsers, e.g., Firefox, you should click Download to download the client software scvpn.exe first,
and then double-click it to install.
A virtual network adapter will be installed on your PC together with Secure Connect. It is used to transmit encrypted
data between the SSL VPN server and client.
1. Insert the USB Key to the USB port of the PC, or import the file certificate provided by the administrator manually.
2. Visit the following URL with a web browser: https://IP-Address:Port-Number. In the URL, IP-Address and Port-
Number refer to the IP address and HTTPS port number of the egress interface specified in the SSL VPN instance.
3. In the Select Digital Certificate dialog, select the certificate you want and click OK. If USB Key certificate is selec-
ted, in the Enter Password dialog, provide the UKey user password (1111 by default) and click OK.
4. After login, IE will download the client software automatically, and you can install it just following the prompts; for
other web browsers, e.g., Firefox, you should click Download to download the client software scvpn.exe first,
and then double-click it to install.
l Starting directly
Sta rting v ia We b
This section describes how to start Secure Connect via Web based on the three authentication methods configured on
the server. For the Username/Password + Digital Certificate authentication, the digital certificate can either be the USB
Key certificate provided by the vendor, or the file certificate provided by the administrator.
When the Username/Password authentication is configured on the server, take the following steps to start Secure Con-
nect via web:
1. Type the URL https://IP-Address:Port-Number into the address bar of your web browser.
2. In the login page (shown in Figure 4), type the username and password into the Username and Password boxes
respectively, and then click Login.
l If local authentication server is configured on the device, the username and password should be configured
before on the device;
l If "Radius authentication + RSA SecurID Token authentication by RSA Server" is configured on the device,
and the user logs in for the first time, the username should be the username configured on the Radius
server, and the password should be the dynamic Token password being bound to the user. Click Login, and
in the PIN Setting page (shown in Figure 5), set a PIN (4 to 8 digits). After the PIN has been set successfully,
you will be prompted to login again with the new password (shown in Figure 6). Click Login again to return
to the login page, type the correct username and new password, and click Login. The new password is PIN +
dynamic Token password. For example, if the PIN is set to 54321, and the dynamic Token password is
808771, then the new password is 54321808771.
l If "Radius authentication + RSA SecurID Token authentication by RSA Server" is configured on the device, but
the user is not logging in for the first time, the username should be the username configured on the Radius
server, and the password should be PIN + dynamic Token password.
Figure 4
Figure 6
3. If the SMS authentication function is enabled, type the SMS authentication code into the box, and then click
Authenticate. If you have not received the code in one minute, you can re-apply.
l After passing the authentication, you have three chances to type the authentication code. If you give incorrect
authentication code three times in succession, the connection will be disconnected automatically.
l You have three chances to apply the authenticate code, and the sending interval is one minute. Re-applying
authentication code will void the old code, thus you must provide the latest code to pass the authentication.
Finishing the above steps, the client will connect to the server automatically. After the connection has been established
successfully, the icon ( ) will be displayed in the notification area. And the encrypted communication between the
client and server can be implemented now.
When the Username/Password + Digital Certificate authentication is configured on the server, for the USB Key cer-
tificate, to start Secure Connect via web:
2. Type the URL https://IP-Address:Port-Number into the address bar of your web browser.
3. In the Select Digital Certificate dialog, select the digital certificate you want and click OK. In the Enter Password
dialog, provide the UKey user password (1111 by default) and click OK.
4. In the SSL VPN login page shown below, type the username and password into the Username and Password
boxes respectively, and then click Login. The login user should be configured before on the device.
l After passing the authentication, you have three chances to type the authentication code. If you give incorrect
authentication code three times in succession, the connection will be disconnected automatically.
l You have three chances to apply the authenticate code, and the sending interval is one minute. Re-applying
authentication code will void the old code, thus you must provide the latest code to pass the authentication.
6. In the USB Key PIN dialog shown below, type the UKey PIN (1111 by default), and click OK.
Finishing the above steps, the client will connect to the server automatically. After the connection has been established
successfully, the icon ( ) will be displayed in the notification area. And the encrypted communication between the
client and server can be implemented now.
When the Username/Password + Digital Certificate authentication is configured on the server, for the file certificate, to
start Secure Connect via web:
2. Type the URL https://IP-Address:Port-Number into the address bar of your web browser.
3. In the Select Digital Certificate dialog, select the digital certificate you want and click OK.
4. In the SSL VPN login page shown below, type the username and password into the Username and Password
boxes respectively, and then click Login. The login user should be configured before on the device.
l After passing the authentication, you have three chances to type the authentication code. If you give incorrect
authentication code three times in succession, the connection will be disconnected automatically.
l You have three chances to apply the authenticate code, and the sending interval is one minute. Re-applying
authentication code will void the old code, thus you must provide the latest code to pass the authentication.
Finishing the above steps, the client will connect to the server automatically. After the connection has been established
successfully, the icon ( ) will be displayed in the notification area. And the encrypted communication between the
client and server can be implemented now.
When the Digital Certificate Only authentication is configured on the server, for the USB Key certificate, to start Secure
Connect via web:
2. Type the URL https://IP-Address:Port-Number into the address bar of your web browser.
3. In the Select Digital Certificate dialog, select the digital certificate you want and click OK. In the Enter Password
dialog, provide the UKey user password (1111 by default) and click OK.
4. In the USB Key PIN dialog shown below, type the UKey PIN (1111 by default), and click OK.
Finishing the above steps, the client will connect to the server automatically. After the connection has been established
successfully, the icon ( ) will be displayed in the notification area. And the encrypted communication between the
client and server can be implemented now.
When the Digital Certificate Only authentication is configured on the server, for the file certificate, to start Secure Con-
nect via web:
2. Type the URL https://IP-Address:Port-Number into the address bar of your web browser.
successfully, the icon ( ) will be displayed in the notification area. And the encrypted communication between the
client and server can be implemented now.
1. In your PC, double click the shortcut to Hillstone Secure Connect on your desktop.
2. In the Login dialog, click Mode. In the Login Mode dialog shown below, click Username/Password, and then
click OK.
3. In the Login dialog of the Username/Password authentication mode (shown in Figure 7), configure the options to
login.
Option Description
Saved Con- Provides the connection information you have filled before. Select a con-
nection nection from the drop-down list.
Server Enter the IP address of SSL VPN server.
Port Enter the HTTPS port number of SSL VPN server.
Username Enter the name of the login user.
Password Enter the password of the login user.
l If local authentication server is configured on the device, the username and password should be configured
before on the device;
l If "Radius authentication + RSA SecurID Token authentication by RSA Server" is configured on the device,
and the user logs in for the first time, the username should be the username configured on the Radius
server, and the password should be the dynamic Token password being bound to the user. Click Login, and
in the PIN Setting page (shown in Figure 8), set a PIN (4 to 8 digits). After the PIN has been set successfully,
you will be prompted to login again with the new password (shown in Figure 9). Click Login again to return
to the login page, type the correct username and new password, and click Login. The new password is PIN +
dynamic Token password. For example, if the PIN is set to 54321, and the dynamic Token password is
808771, then the new password is 54321808771.
Figure 7
Figure 8
Figure 9
4. Click Login. If SMS authentication is enabled, type the authentication code into the box in the SMS Auth dialog (as
shown below) and click Verify. If you have not received the authentication code in one minute, you can re-apply
by clicking Reapply.
successfully, the icon ( ) will be displayed in the notification area. And the encrypted communication between the
client and server can be implemented now.
When the Username/Password + Digital Certificate authentication is configured on the server, for the USB Key cer-
tificate, to start Secure Connect directly:
2. In your PC, double click the shortcut to Hillstone Secure Connect on your desktop.
3. In the Login dialog, click Mode. In the Login Mode dialog, first click Username/Password + Digital
Certificate, and if necessary, click Select Cert. In the Select Certificate dialog shown below, select a USB Key
certificate. If the USB Key certificate is not listed, click Update. The client will send the selected certificate to the
server for authentication. Finally click OK.
4. In the Login dialog of the Username/Password + Digital Certificate authentication mode (as shown below), con-
figure the options to login.
Finishing the above steps, the client will connect to the server automatically. After the connection has been established
successfully, the icon ( ) will be displayed in the notification area. And the encrypted communication between the
client and server can be implemented now.
When the Username/Password + Digital Certificate authentication is configured on the server, for the file certificate, to
start Secure Connect directly:
2. In your PC, double click the shortcut to Hillstone Secure Connect on your desktop.
3. In the Login dialog, click Mode. In the Login Mode dialog, first click Username/Password + Digital
Certificate, and if necessary, click Select Cert. In the Select Certificate dialog shown below, select a file cer-
tificate. If the file certificate is not listed, click Update. The client will send the selected certificate to the server
for authentication. Finally click OK.
5. Click Login. If SMS authentication is enabled, type the authentication code into the box in the SMS Auth dialog (as
shown below) and click Verify. If you have not received the authentication code in one minute, you can re-apply
by clicking Reapply.
successfully, the icon ( ) will be displayed in the notification area. And the encrypted communication between the
client and server can be implemented now.
When the Digital Certificate Only authentication is configured on the server, for the USB Key certificate, to start Secure
Connect directly:
2. In your PC, double click the shortcut to Hillstone Secure Connect on your desktop.
3. In the Login dialog, click Mode. In the Login Mode dialog, first click Username/Password + Digital
Certificate, and if necessary, click Select Cert. In the Select Certificate dialog shown below, select a USB Key
certificate. If the USB Key certificate is not listed, click Update. The client will send the selected certificate to the
server for authentication. Finally click OK.
4. In the Login dialog of the Username/Password + Digital Certificate authentication mode (as shown below), con-
figure the options to login.
successfully, the icon ( ) will be displayed in the notification area. And the encrypted communication between the
client and server can be implemented now.
Us i ng Fi l e Cer ti f i c ate O nl y
When the Digital Certificate Only authentication is configured on the server, for the file certificate, to start Secure Con-
nect directly:
2. In your PC, double click the shortcut to Hillstone Secure Connect on your desktop.
3. In the Login dialog, click Mode. In the Login Mode dialog, first click Username/Password + Digital
Certificate, and if necessary, click Select Cert. In the Select Certificate dialog shown below, select a file cer-
tificate. If the file certificate is not listed, click Update. The client will send the selected certificate to the server
for authentication. Finally click OK.
successfully, the icon ( ) will be displayed in the notification area. And the encrypted communication between the
client and server can be implemented now.
Double click the Secure Connect icon ( ) in the notification area, the Network Information dialog appears. This dia-
log shows information about statistics, interfaces, and routes.
G e ne ra l
Descriptions of the options on the General tab:
Address Information
Status The current connecting state between the client and server. The possible
states are: connecting, connected, disconnecting, and disconnected.
IPCompress
Sent The number of sent packets through the SSL VPN tunnel.
Received The number of received packets through the SSL VPN tunnel.
Tunnel Bytes
Sent The number of sent bytes through the SSL VPN tunnel.
Received The number of received bytes through the SSL VPN tunnel.
Connected Time
Duration Shows the time period during which the client is keeping online.
Compress Ratio
Inte rfa ce
Descriptions of the options on the Interface tab:
Option Description
Adapter Name The name of the adapter used to send SSL VPN encrypted data.
Adapter Type The type of the adapter used to send SSL VPN encrypted data.
Adapter Status The status of the adapter used to send SSL VPN encrypted data.
Physical Address The MAC address of the interface used to send SSL VPN encrypted data.
IP Address Type The type of the interface address used to send SSL VPN encrypted data.
Network Address The IP address (allocated by SSL VPN server) of the interface used to send
SSL VPN encrypted data.
Subnet Mask The subnet mask of the interface used to send SSL VPN encrypted data.
Default Gateway The gateway address of the interface used to send SSL VPN encrypted data.
DNS Server The DNS server addresses used by the client.
Address
WINS Address The WINS server addresses used by the client.
Route
Description of the option on the Route tab:
Option Description
Local LAN Routes The routes used by the virtual network adapter.
Right-click the Secure Connect icon ( ) in the notification area, the menu appears.
Option Description
Configuring G e ne ra l Options
In the Secure Connect Options dialog, select General from the navigation pane and the general options will be dis-
played.
Descriptions of the options:
Option Description
Auto Start Select this check box to autorun the SSL VPN client when the PC is started.
Auto Login Select this check box to allow the specified user to login automatically when
the PC is started. Select the auto login user from the Default Connection
drop-down list.
Auto Reconnect Select this check box to allow the client to reconnect the SSL VPN server
automatically after the unexpected disconnection.
Select Cert Click the button to select a USB Key certificate in the Select Certificate dia-
log. This option is available when USB KEY authentication is enabled.
1. In the Secure Connect Options dialog, select Saved Connection from the navigation pane and the login options
will be displayed.
Connection Specifies the name for the connection to identify it. The system will
Name assign a name to the connection based on its server, port, and user auto-
matically if keeping this option blank.
Server Specifies the IP address of the SSL VPN server.
Port Specifies the HTTPS port number of the SSL VPN server.
Username Specifies the login user.
Login Mode Specifies the login mode. It can be one of the following options:
2. Click Apply.
l Display the connection status with the device, traffic statistics, interface information, and routing information.
2. Use your mobile phone to scan the QR code of the client for Android at the right sidebar, and the URL of the client
displays.
7. Click Install.
After installing the client successfully, the icon of Hillstone Secure Connect appears in the desktop as shown below:
1. Click the icon of Hillstone Secure Connect. The login page appears.
l Please Choose: Select a login entry. A login entry stores the login information and it facilities your next login.
For more information on login entry, see the Configuration Management section below.
l Server: Enters the IP address or the server name of the device that acts as the VPN server.
3. If the SSL VPN server enables the SMS authentication, the SMS authentication page will appear. In this page, enter
the received authentication code and then submit it. If you do not receive the authentication code, you can request
it after one minute.
After the client connects to the SSL VPN server, the key icon ( ) will appear at the notification area of your Android
system.
l The Connection Time: Time period during which the client is online.
l Received Bytes: Shows the received bytes through the SSL VPN tunnel.
l Sent Bytes: Shows the sent bytes through the SSL VPN tunnel.
l Server: Shows the IP address or the server name of the device that client connects to.
l Account: Shows the username that logs into the VPN instance.
l Private Server Address: Shows the interface’s IP address of the device that the client connects to.
l Client Private Address: Shows the IP address of the interface. This interface transmits the encrypted traffic and
this IP address is assigned by the SSL VPN server.
l Address Mask: Shows the netmask of the IP address of the interface. This interface transmits the encrypted
traffic.
l Routing Information: Shows the routing information for transmitting encrypted data.
l Disconnection Connection: Click this button to disconnect the current connection with the server.
Configura tion Ma na ge me nt
Click VPN at the bottom of the page to enter into the Configuration Management page. In this page, you can per-
form the following operations:
A d d i ng a Lo g i n E ntr y
To facilities the login process, you can add a login entry that stores the login information. The added login entry will
display in the drop-down list of Please Choose in the login page. You can select a login entry and the login inform-
ation will be filled in automatically.
To add a login entry, take the following steps:
1. In the Configuration Management page, click the icon at the top-right corner.
b. Server: Enters the IP address or the server name of the device that acts as the VPN server.
E d i ti ng a Lo g i n E ntr y
1. In the login entry list, click the one that you want to edit and several buttons display.
1. In the login entry list, click the one that you want to delete and several buttons display.
2. Click Delete.
M o d i f yi ng the Lo g i n Pas s wo r d
1. In the login entry list, click the one that you want to modify the password and several buttons display.
3. Enter the current password and new password in the pop-up dialog.
To disconnect the connection or log into the client, take the following steps:
1. In the login entry list, click a login entry and several buttons display.
2. If the connection status to this server is disconnected, you can click Login to log into the client; if the connection
status is connected, you can click Disconnect Connection to disconnect the connection.
l Auto Reconnect: After turning on this switch, the client wil automatically reconnect to the server if the connection
is disconnected unexpectedly.
l Show Notify: After turning on this switch, the client icon will display in the notification area.
l Auto Login: After turning on this switch, the client will automatically connect to the server when it stars. The
server is the one that the client connects to the last time.
l Remember The Password: After turning on this switch, the client wil remember the password and automatically
fill in the login entry.
About U s
Click About at the bottom of the page to enter into the About US page. This page displays the version information, con-
tact information, copyright information, etc.
l Simplify the VPN creation process between the Apple device and the Hillstone device
l Display the VPN connection status between the Apple device and the Hillstone device
1. Click the HBC icon located at the desktop of iOS. The login page of HBC appears.
2. In the login page, specify the following information and then click Login.
l Server: Enters the IP address or the server name of the device that acts as the VPN server.
3. After logging the VPN server successfully, the Install Profile page pops up and the deployment process starts
automatically.
6. Enter your passcode. The passcode is the one for unlocking your iOS screen. With the correct passcode entered,
iOS starts to install the profile.
The profile deployed is for the instance with the above parameters (connection, server, port, username, and pass-
word). If the value of one parameter changes, you need to deploy the VPN configuration profile again.
1. Start HBC.
2. In the login page, enters the required information. The value of these parameters should be the ones that you
have specified in the above section of Deploying VPN Configurations. If one of the parameter changes, you need to
re-deploy the VPN configurations.
5. In the VPN page, select the configuration that has the same name as the one you configured in the section of
Deploying VPN Configurations.
7. In this VPN page, when the Status value is Connected, it indicates the VPN between the iOS device and the Hill-
stone device has been established.
l Import configuration: If HBC can connects to the Hillstone device successfully but the iOS VPN connection is
failed, you need to re-deploy the VPN configurations. After turning on this Import configuration switch, HBC
will re-deploy the VPN configurations when you log in for the next time.
About U S
Click About at the bottom of the page to enter into the About Us page and it displays the information of version, copy-
right, etc.
l Establish the SSL VPN connection with the SSL VPN server.
To open the installation file, you must have the administrator permission and select Anywhere in System Prefer-
ences > Security & Privacy > General > Allow apps downloaded from.
l Server: Enter the IP address or the server name of the device that acts as the VPN server.
5. In the toolbar, click Connect. If you do not select Remember password in step 3, enter the password in the
pop-up and then click OK.
After the client connects to the SSL VPN server, the status bar displays Connection established. Meanwhile, the noti-
fication area of Mac displays . The encrypted data can be transmitted between the SSL VPN client and SSL VPN
server now.
GUI
The GUI of the client includes four areas: toolbar, connection list, connection information, and status bar.
Toolba r
In the toolbar, you can perform the following actions:
l Connect: Select a connection from the connection list and then click Connect. The client starts to establish the con-
nection with server side.
l New: Create a new connection. For details, see Starting Client and Establishing Connection.
l Modify: Select a connection from the connection list and then click Modify. For details of modifying the para-
meters, see Starting Client and Establishing Connection.
l Delete: Select a connection from the connection list and then click Delete to delete this connection.
l Settings: Set to minimize the client when the connection is established and select whether to check the update of
the client when it starts.
l Disconnect: Disconnect the current connection. After the connection is established, this button displays.
l Info: View the channel information and the route information of the current connection. After the connection is
established, this button displays.
Sta tus Ba r
Displays the connection status.
Menu
The SCVPN item in the menu includes the following options:
l Level: Select the log level. When selecting the lower level in the menu, the displayed logs will include the logs of
upper level. However, when selecting the upper level in the menu, the displayed logs will not include the logs of
lower level.
l Get interface and route information from the PC on which the client is running.
2. After downloading the installation file, right-click the client icon and select Properties to go to the properties
page.
4. Double-click the client icon and follow the setup wizard to complete the installation.
1. Double-click the SCVPN icon on the desktop of the Linux system, and system enters the super user authentication
page. Then enter the password of super user , and click Authenticate to enter the main interface of the client.
l Server: Enter the IP address or the server name of the device that acts as the VPN server.
l User name: Enters the login name. For detailed information, refer to "User" on Page 248.
4. Select the connection name in the connection list. In the toolbar, click Connect. If you do not select Remember
password in step 3, enter the password in the pop-up and then click OK.
5. After the client connects to the SSL VPN server, the status bar displays Connection established. The encrypted
data can be transmitted between the SSL VPN client and SSL VPN server now.
2. In the Maintain SCVPN page, select Update components or Remove all components to upgrade or unin-
stall the client, then click Next.
Toolba r
In the toolbar, you can perform the following actions:
l Connect: Select a connection from the connection list and then click Connect. The client starts to establish the
connection with server side.
l New: Create a new connection. For details, see Starting Client and Establishing Connection.
l Modify: Select a connection from the connection list and then click Modify. For details of modifying the para-
meters, see Starting Client and Establishing Connection.
l Delete: Select a connection from the connection list and then click Delete to delete this connection.
l Cancel: Click this button to cancel the connection. When the client is connecting the server side, this button dis-
plays, see Starting Client and Establishing Connection.
l Disconnect: Disconnect the current connection. After the connection is established, this button displays, see
Starting Client and Establishing Connection.
l Info: View the channel information and the route information of the current connection. After the connection is
established, this button displays, see Starting Client and Establishing Connection.
l After establishing the connection, the connection information area displays the connection duration, server IP
address, the IP assigned to the client, the number of packets sent/received through the SSL VPN tunnel, and the
bytes sent/received through the SSL VPN tunnel.
Sta tus Ba r
Displays the connection status and the connection progress when connecting the server, see Starting Client and Estab-
lishing Connection.
Menu
Click the logging menu in the top-left corner of the client interface .
l Level: Select the log level. When selecting a level in the menu, the system will display the logs of upper levels and
will not display the logs of lower levels.
l About: Display the version information, copyright information and other relevant information.
Co nfiguring an L2TP V PN
To create an L2TP VPN instance:
L2TP VPN Name Type the name of the L2TP VPN instance
Assigned Users
AAA Server Select an AAA server from the AAA Server drop-down list. You can click
View AAA Server to view the detailed information of this AAA server.
Domain Type the domain name into the Domain box. The domain name is used
to distinguish the AAA server.
Verify User After enable this function, the system will verify the username and its
Domain Name domain name.
Add Click Add to add the assigned users. You can repeat to add more items.
l Select a tunnel interface from the drop-down list, and then click Edit
to edit the selected tunnel interface.
l Select an address pool from the drop-down list, and then click Edit
to edit the selected address pool.
Information Shows the start IP address, end IP address, and mask of the address pool.
L2TP over IPSec
L2TP over IPSec Select a referenced IPSec tunnel from the drop-down list. L2TP does not
encrypt the data transmitted through the tunnel, so it cannot assure
security during the transmission. You can use L2TP in combination with
IPSec, and encrypt data by IPSec, thus assuring the security for the data
transmitted through the L2TP tunnel..
l Transmit Retry: Specifies the retry times for sending LCP Echo pack-
ets. If LNS has not received any response after the specified retry
times, it will determine the connection is disconnected.
l The static IP binding rule binds the client user to a fixed IP address in the address pool. Once the client has estab-
lished a connection successfully, the system will assign the binding IP to the client.
l The IP-role binding rule binds the role to a specific IP range in the address pool. Once the client has established a
connection successfully, the system will assign an IP address within the IP range to the client.
When LNS is allocating IP addresses in the address pool, the system will check the IP binding rule and determine how
to assign IP addresses for the client based on the specific checking order below:
Note: The IP addresses defined in the static IP binding rule and IP-role binding rule should not
be overlapped.
Option Description
This chapter describes the concept and configuration of objects that will be referenced by other modules in system,
including:
l "Address" on Page 223: Contains address information, and can be used by multiple modules, such as policy
rules, NAT rules, QoS, session limit rules, etc.
l "Host Book" on Page 225: A collection of one domain name or several domain names.
l "Service Book" on Page 226: Contains service information, and can be used by multiple modules, such as policy
rules, NAT rules, QoS, etc.
l "Application Book" on Page 230: Contains application information, and can be used by multiple modules, such as
policy rules, NAT rules, QoS, etc.
l "SLB Server Pool " on Page 234: Describes SLB server configurations.
l "Schedule" on Page 236: Specifies a time range or period. The functions (such as policy rules, QoS rules, host
blacklist, connections between the PPPoE interface and Internet) that use the schedule will take effect in the time
range or period specified by the schedule.
l "User" on Page 248: Contains information about the functions and services provided by a Hillstone device, and
users authenticated and managed by the device.
l "Role" on Page 256: Contains role information that associates users to privileges. In function configurations, dif-
ferent roles are assigned with different services. Therefore, the mapped users can gain the corresponding ser-
vices as well.
l "Track Object" on Page 259: Tracks if the specified object (IP address or host) is reachable or if the specified
interface is connected. This function is designed to track HA and interfaces.
l "URL Filter" on Page 261: URL filter controls the access to some certain websites and records log messages for the
access actions.
l All address books contain a default address entry named Any. The IP address of Any is 0.0.0.0/0, i.e., any IP
address. Any can neither be edited nor deleted.
l One address entry can contain another address entry in the address book.
l If the IP range of an address entry changes, StoneOS will update other modules that reference the address entry
automatically.
Address book supports IPv4 and IPv6 address. If IPv6 is enabled, you can configure IPv6 address entry.
Creating an Address B o o k
To create an address book:
2. Click New.
Name Type the address entry name into the Name box.
Type Select the IP type, including IPv4 or IPv6. Only the IPv6 firmware sup-
ports to configure IPv6 type IP. If IPv6 is selected, all the IP/netmask, IP
range, address entry configured should be in IPv6 format.
Member
Member Select an address entry member from the drop-down list, and configure
IP/netmask, IP range, Host name, Address entry, or Country/Region
as needed.
Excluded Member
Member Specify the excluded member. Select an address entry member from the
drop-down list, and configure IP/netmask, IP range, Host name or
Address entry as needed.
Note: Excluded members address range need to in the address range of
members, otherwise can not complete the configuration.
Add Click Add to add the configured excluded member to the list below. If
needed, repeat the above steps to add more excluded members.
Delete Delete the selected excluded member entry from the list.
3. Click OK.
2. In the Address Book dialog, select an address entry from the member list, and view the details under the list.
Note:
l The maximum number of host entries is one fourth of the maximum number of address
entries.
l At most one host entry can be configured for each PBR rule.
Creating a H o st B o o k
To create a host book:
2. Click New.
3. Click OK.
User-defined Service
Except for the above predefined services, you can also create your own user-defined services easily. The parameters
that will be specified for the user-defined service entries include:
l Name
l Protocol type
l The source and destination port for TCP or UDP service, and the type and code value for ICMP service.
l Each service of the service book can be used by one or more service groups.
l A service group can contain both predefined services and user-defined services.
l A service group can contain another service group. The service group of StoneOS supports up to 8 layers of
nests.
The service group also has the following limitations:
l The service group being used by any policy cannot be deleted. To delete such a service group, you must first end
its relationship with other modules.
l If a user-defined service is deleted from the service group, the service will also be deleted from all the service
groups using it.
Co nfiguring a Service B o o k
This section describes how to configure a user-defined service and service group.
2. Click New.
Service Type the name for the user-defined service into the textbox.
Member Specify a protocol type for the user-defined service. The available
options include TCP, UDP, ICMP and Others. If needed, you can add mul-
tiple service items.
Click New and the parameters for the protocol types are described as fol-
lows:
ICMP Type: Specifies a ICMP type for the service entry. The
value range is 3 (Destination-Unreachable), 4 (Source
Description If needed, type the description for the service into the text box.
3. Click OK.
2. Click New.
Name Type the name for the user-defined service group into the text box.
Description If needed, type the description for the service into the text box.
Member Add services or service groups to the service group. The system supports
at most 8-layer nested service group.
Expand Pre-defined Service or User-defined Service from the left pane,
select services or service groups, and then click Add to add them to the
right pane. To remove a selected service, select it from the right pane,
3. Click OK.
2. In the service dialog, select an address entry from the member list, and view the details under the list.
2. Select the application you want to edit from the application list, and click Edit.
3. In the Application Configuration dialog, edit TCP timeout for the application.
2. Click New.
3. Click OK.
2. Click New.
3. Click OK.
2. Click New.
4. Specifies the filter condition. Choose category, subcategory, technology, risk and characteristic by sequence in
the drop-down list. You can click Clear Filter to clear all the selected filter conditions according to your need.
5. Click OK.
2. Click New.
Source
Zone Specify the source security zone of the signature rule.
Address Specify the source address. You can use the Address Book type or the
IP/Netmask type.
Destination
Address Specify the source address. You can use the Address Book type or the
IP/Netmask type.
Protocol
Enable Select the Enable check box to configure the protocol of the signature
rule.
Type When selecting TCP or UDP,
l Type: Specify the value of the ICMP type of the application sig-
nature. The options are as follows: 3 (Destination-Unreachable), 4
(Source Quench), 5 (Redirect), 8 (Echo), 11 (Time Exceeded),
12 (Parameter Problem), 13 (Timestamp), 15 (Information), and
l Min Code: Specify the value of the ICMP code of the application sig-
nature. The ICMP code is in the range of 0 to 5. The default value is
0-5.
When selecting Others:
3. Click OK.
2. In the application dialog, select an address entry from the member list, and view the details under the list.
l Distribute the traffic to the specified port of each intranet server. This is applicable to the scenario that different
intranet servers meanwhile and individually provide the same service via specified port.
l Distribute the traffic to different ports of an intranet server. This is applicable to the scenario that an intranet
server provides the same service by running the same process at different ports.
In the SLB Server Pool Configuration dialog, configure the following options.
Option Description
Member Specifies the member of the pool. You can type the IP range or the IP
address and the netmask.
Weight Specifies the traffic forwarding weight during the load balancing. The
value ranges from 1 to 255.
Add Add the SLB address pool member to the SLB server pool. You can add
up to 256 members.
Track
l When the members in the SLB server pool have the same IP
address and different ports, you don’t need to specify the port
l When the members in the SLB server pool are all configured with
IP addresses and ports and these configured IP addresses are dif-
ferent from each other, you can select whether to specify the port
when configuring the track rule. If specified, the system will track
the specified port of these IP addresses. If not, the system will
track the configured ports of the IP addresses of the members.
Interval Specifies the interval between each Ping/TCP/UDP packet. The unit is
second. The value ranges from 3 to 255.
Retries Specifies a retry threshold. If no response packet is received after the spe-
cified times of retries, The system will determine this track entry fails, i.e.,
the track entry is unreachable. The value range is 1 to 255.
Weight Specifies a weight for the overall failure of the whole track rule if this
track entry fails. The value range is 1 to 255.
Add Click Add to add the configured track rule to the list.
Threshold Types the threshold for the track rule into the Threshold box. The value
range is 1 to 255. If the sum of weights for failed entries in the track rule
exceeds the threshold, the system will conclude that the track rule fails.
3. In the Server List tab at the bottom of this page, view the information of the servers that are in this SLB pool.
5. In the Referenced tab, view the DNAT rules that use the SLB pool.
Periodic Sc hedule
Periodic schedule is the collection of periods specified by all the schedule entries within the schedule. You can add up
to 16 schedule entries to a periodic schedule. These entries can be divided into 3 types:
l Daily: The specified time of every day, such as Everyday 09:00 to 18:00.
l Days: The specified time of a specified day during a week, such as Monday Tuesday Saturday 09:00 to 13:30.
l Period: A continuous period during a week, such as from Monday 09:30 to Wednesday 15:00.
Creating a Schedule
To create a schedule:
2. Click New.
Delete Select the entry you want to delete from the period schedule list below,
and click Delete.
Absolute Sched- The absolute schedule decides a time range in which the periodic sched-
ule ule will take effect. Without configuring a absolute schedule, the periodic
schedule will take effect as soon as it is used by some module.
3. Click OK.
l Local server: a local server is the firewall itself. The firewall stores user identity information and handles
requests. A local server authentication is fast and cheap, but its storage space is limited by the firewall hardware
size.
l External servers:
l Radius server
l LDAP server
l TACACS+ server
According to the type of authentication, you need to choose different AAA server:
l "802.1x" on Page 134 and "Configuring IPSec-XAUTH Address Pool" on Page 160: Only local and Radius servers
supports these two types of authentication.
l Other authentication methods mentioned in this guide: all four servers can support other authentication.
Server Name Type the name for the new server into the text box.
Role Mapping Specifies a role mapping rule for the server. With this option selected, sys-
Rule tem will allocate a role for users who have been authenticated to the
server according to the specified role mapping rule.
Change Pass- If needed, select the Enable checkbox. With this function enabled, the sys-
word tem allows users to change their own passwords after the successful
WebAuth or SCVPN authentication.
Backup To configure a backup authentication server, select a server from the
Authentication drop-down list. After configuring a backup authentication server for the
Server local server, the backup authentication server will take over the authen-
tication task when the primary server malfunctions or authentication fails
on the primary server. The backup authentication server can be any exist-
ing local, Active-Directory, RADIUS or LDAP server defined in the system.
Optional
Role Mapping Specifies a role mapping rule for the server. With this option selected, sys-
Rule tem will allocate a role for users who have been authenticated to the
server according to the specified role mapping rule.
Backup server Specifies an IP address or domain name for backup server 1 or backup
1/Backup server server 2.
2
Virtual Router- Specifies a VR for the backup server.
1/Virtual Router2
Retries Specifies a retry time for the authentication packets sent to the AAA
server. The value range is 1 to 10. The default value is 3.
Timeout Specifies a timeout for the server response. The value range is 1 to 30
seconds. The default value is 3.
Backup Auth Specifies a backup authentication server. After configuring a backup
Server authentication server for the Radius server, the backup authentication
server will take over the authentication task when the primary server mal-
functions or authentication fails on the primary server. The backup
authentication server can be any existing local, Active-Directory, RADIUS
or LDAP server defined in the system.
Enable Account Select the Enable Account checkbox to enable accounting for the Radius
server, and then configure options in the sliding out area.
3. Click OK.
Optional
Role Mapping Rule Specifies a role mapping rule for the server. With this option selec-
ted, system will allocate a role for users who have been authen-
ticated to the server according to the specified role mapping rule.
Backup server Specifies an IP address or domain name for backup server 1 or
1/Backup server 2 backup server 2.
Virtual Router1/Virtual Specifies a VR for the backup server.
Router2
Synchronization Check the checkbox to enable the synchronization function; clear
the checkbox to disable the synchronization function, and the sys-
tem will stop synchronizing and clear the existed user information.
By default, the system will synchronize the user information on the
configured Active-Directory server to the local every 30 minutes.
Automatic Syn- Click the radio button to specify the automatic synchronization.
chronization
Interval Synchronization Specifies the time interval of
automatic synchronization. The
value range is 30 to 1440
minutes. The default value is
30.
Daily Synchronization Specifies the time when the
user information is syn-
chronized everyday. The format
is HH:MM, HH and MM indicates
hour and minute respectively.
Once Synchronization If this parameter is specified, the
system will synchronize auto-
matically when the configuration
of Active-Directory server is mod-
ified. After executing this com-
mand , the system will
synchronize user information
immediately.
User Filter Specifies the user-filter conditions, the system can only synchronize
and authenticate users that are in accordance with the filtering con-
dition on the authentication server. The length is 0 to 120 char-
acters. For example, if the condition is configured to
“memberOf=CN=Admin,DC=test,DC=com”,which manifests that
the system only can synchronize or authenticate user whose DN is
“memberOf=CN=Admin,DC=test,DC=com”. The commonly used
operators are: =(equals a value)、&(and)、|(or)、!(not)、*(Wild-
card.Matches zero or more charactors.)、~=( fuzzy query.)、>=(Be
equal or greater than a specified value in lexicographical order.)、
<=( Be equal or less than a specified value in lexicographical
order.).
Security Agent Select the Enable check box to enable Security Agent. With this
function enabled, the system will be able to obtain the mappings
between the usernames of the domain users and IP addresses from
the AD server, so that the domain users can gain access to network
resources. In this way "Single Sign-On" on Page 126 is imple-
mented. Besides, by making use of the obtained mappings, the sys-
tem can also implement other user-based functions, like security
statistics, logging, behavior auditing, etc. To enable Security Agent
on the AD server, you need to install and run Security Agent first
on the server. After that when a domain user is logging in or log-
ging off, Security Agent will log the user's username, IP address,
current time and other information, and add the mapping between
the username and IP address to the system. In this way the system
can obtain every online user's IP address.
3. Click OK.
Co nfiguring LD AP Server
1. Select Object > AAA Server, and then select New > LDAP Server.
Password Specifies a password for the LDAP server. This should correspond to the
password for Admin DN.
Optional
Role Mapping Specifies a role mapping rule for the server. With this option selected, sys-
Rule
tem will allocate a role for users who have been authenticated to the
server according to the specified role mapping rule.
Backup server Specifies an IP address or domain name for backup server 1 or backup
1/Backup server server 2.
2
Virtual Router- Specifies a VR for the backup server.
1/Virtual Router2
Synchronization Check the checkbox to enable the synchronization function; clear the
checkbox to disable the synchronization function, and the system will
stop synchronizing and clear the existed user information. By default, the
system will synchronize the user information on the configured LDAP
server to the local every 30 minutes.
Automatic Syn- Click the radio button to specify the automatic synchronization.
chronization
Interval Synchronization Specifies the time interval of auto-
matic synchronization. The value
range is 30 to 1440 minutes. The
default value is 30.
Daily Synchronization Specifies the time when the user
information is synchronized every-
day. The format is HH:MM, HH and
MM indicates hour and minute
respectively.
Once Synchronization If this parameter is specified, the sys-
tem will synchronize automatically
when the configuration of LDAP server
is modified. After executing this com-
mand , the system will synchronize
user information immediately.
User Filter Specifies the user filters, the system can only synchronize and authen-
ticate users that match the filters on the authentication server. The
length is 0 to 120 characters. For example, if the condition is configured
to “(|(objectclass=inetOrgperson)(objectclass=person))”,which mani-
fests that the system only can synchronize or authenticate users which
are defined as inetOrgperson or person. The commonly used operators
are as follows: =(equals a value)、&(and)、|(or)、!(not)、*(Wildcard.
Matches zero or more characters.)、~=( fuzzy query.)、>=(Be equal or
greater than a specified value in lexicographical order.)、<=( Be equal or
less than a specified value in lexicographical order.).
Naming Attrib- Specifies a naming attribute for the LDAP server. The default naming
ute attribute is uid.
Member Attrib- Specifies a member attribute for the LDAP server. The default member
ute attribute is uniqueMember.
Group Class Specifies a group class for the LDAP server. The default class is groupo-
funiquenames.
Backup Specifies a backup authentication server. After configuring a backup
Authentication authentication server for the LDAP server, the backup authentication
Server server will take over the authentication task when the primary server mal-
functions or authentication fails on the primary server. The backup
authentication server can be any existing local, Active-Directory, RADIUS
or LDAP server defined in the system.
3. Click OK.
2. Click New > TACACS+ Server, and the <TACACS+ Server Configuration> dialog will appear.
Optional
Role mapping Select a role mapping rule for the server. With this option selected, sys-
rule tem will allocate a role for users who have been authenticated to the
server according to the specified role mapping rule.
Backup Server 1 Enter the domain name or IP address of backup TACACS+ server.
(2)
Virtual Router 1 Select the VRouter of backup server.
(2)
Co nnectivity Test
When AAA server parameters are configured, you can test if they are correct by testing server connectivity.
To test server connectivity:
2. Select your AAA server type, which can be Radius, AD, LDAP or TACACS+. Local server does not need connectivity
test.
4. For Radius or TACACS+ server, enter a username and password in the popped <Test Connectivity> dialog. If the
server is AD or LDAP, the login-dn and secret is used to test connectivity.
5. Click Test Connectivity. If "Test connectivity success" message appears, the AAA server settings are correct.
If there is an error message, here are the causes:
l Connect AAA server timeout: Wrong server address, port or wrong virtual router.
As shown above, User1, User2 and User3 belong to UserGroup1, while User3 also belongs to UserGroup2, and User-
Group2 also contains User4, User5 and UserGroup1.
Mobile+country Specified the user's mobile number. When users log in the SCVPN cli-
code ent, system will send the verification code to the mobile number.
Description If needed, type the description for the user.
Group Add the user to a selected usergroup. Click Choose, and in the
Choose User Group dialog, select the usergroup you want and click
Add.
Expiration Select the Enable check box to enable expiration for the user, and
then specify a date and time. After expiration, the user cannot be
authenticated, therefore cannot be used in the system. By default
expiration is not enabled.
In the VPN Options tab, configure network parameters for the PnPVPN client.
Option Description
IKE ID Specifies a IKE ID type for dial-up VPN users. If FQDN or ASN1 is selec-
ted, also type the ID's content in the text box below.
DHCP Start IP Specifies a start IP for the DHCP address pool.
DHCP End IP Specifies an end IP for the DHCP address pool.
DHCP Netmask Specifies a netmask for the DHCP address pool.
DHCP Gateway Specifies a gateway for the DHCP address pool. The IP address of the
gateway corresponds to the IP address of PnPVPN client's Intranet
interface and PC's gateway address. The PC's IP address is determined
by the segment and netmask configured in the above DHCP address
pool. Therefore, the gateway's address and DHCP address pool
should be in the same segment.
DNS1 Specifies an IP address for the DNS server. You can specify one
primary DNS server (DNS1) and up to three alternative DNS servers.
DNS2
DNS3
DNS4
WINS1 Specifies an IP address for the WINS server. You can specify one
primary WINS server (WINS1)and one alternative WINS server.
WINS2
Tunnel IP Specifies an IP address for the PnPVPN client's tunnel interface. Select
the Enable SNAT check box to enable SNAT.
3. Click OK.
3. Type the name for the user group into the Name box.
4. Specifies members for the user group. Expand User or User Group in the Available list, select a user or user
5. Click OK.
Co nfiguring a LD AP User
This section describes how to configure a LDAP user.
Configuring a LD AP Server
To create a LDAP user, firstly, you need to configure a LDAP server to import an LDAP user and perform authentication.
To configure an LDAP server:
3. Click Configure.
Password Specifies a password for the LDAP server. This should correspond to the
password for Admin DN.
Confirm Pass- Enter the password again to confirm.
word
Optional
Backup server Specifies an IP address or domain name for Backup server 1/Backup
1/Backup server server 2.
2
Virtual Router- Specifies a VR for the backup server.
1/Virtual Router2
Synchronous Specifies user synchronization mode, including Group Synchronization
Operation Mode and OU Synchronization. By default, user information will be syn-
chronized to the local based on Group.
OU maximum Specifies the maximum depth of OU to be synchronized. The value range
depth is 1 to 12, and the default value is 12.
OU structure that exceeds the maximum depth will not be synchronized,
but users that exceed the maximum depth will be synchronized to the
specified deepest OU where they belong to. If the total characters of the
OU name for each level(including the “OU=” string and punctuation)
is more than 128, OU information that exceeds the length will not be syn-
chronized to the local.
User Filter Specifies the user filters, the system can only synchronize and authen-
ticate users that match the filters on the authentication server. The
length is 0 to 120 characters. For example, if the condition is configured
to “(|(objectclass=inetOrgperson)(objectclass=person))”,which mani-
fests that the system only can synchronize or authenticate users which
are defined as inetOrgperson or person. The commonly used operators
are as follows: =(equals a value)、&(and)、|(or)、!(not)、*(Wildcard.
Matches zero or more characters.)、~=( fuzzy query.)、>=(Be equal or
greater than a specified value in lexicographical order.)、<=( Be equal or
less than a specified value in lexicographical order.).
Naming Attrib- Specifies a naming attribute for the LDAP server. The default naming
ute attribute is uid.
Member Attrib- Specifies a member attribute for the LDAP server. The default member
ute attribute is uniqueMember.
Group Class Specifies a group class for the LDAP server. The default class is
GroupOfUiqueNames.
Backup Specifies a backup authentication server. After configuring a backup
Authentication authentication server for the LDAP server, the backup authentication
Server server will take over the authentication task when the primary server mal-
functions or authentication fails on the primary server. The backup
authentication server can be any existing local, Active-Directory, RADIUS
or LDAP server defined in the system.
4. Click OK.
2. Select a server from the LDAP Server drop-down list, and click Sync Users.
Configuring a n AD Server
To create an AD user, first you need to configure an AD server to import an AD user and perform authentication. To
configure an AD server:
3. Click Configure.
Password Specifies a password for the AD server. This should correspond to the
password for Admin DN.
Confirm password Enter the password again to confirm.
Optional
Backup Server 1/2 Specifies an IP address or domain name for the backup AD server 1 or
2.
Virtual Router- Specifies a VR for the backup server.
1/Virtual Router2
Synchronous Oper- Specifies user synchronization mode, including Group Synchronization
ation Mode and OU Synchronization. By default, user information will be syn-
chronized to the local based on Group.
OU maximum Specifies the maximum depth of OU to be synchronized. The value
depth range is 1 to 12, and the default value is 12.
OU structure that exceeds the maximum depth will not be syn-
chronized, but users that exceed the maximum depth will be syn-
chronized to the specified deepest OU where they belong to. If the total
characters of the OU name for each level(including the “OU=” string
and punctuation) is more than 128, OU information that exceeds the
length will not be synchronized to the local.
User Filter Specifies the user-filter conditions, the system can only synchronize
and authenticate users that are in accordance with the filtering con-
dition on the authentication server. The length is 0 to 120 characters.
For example, if the condition is configured to “mem-
berOf=CN=Admin,DC=test,DC=com”,which manifests that the system
only can synchronize or authenticate user whose DN is “mem-
berOf=CN=Admin,DC=test,DC=com”. The commonly used operators
are: =(equals a value)、&(and)、|(or)、!(not)、*(Wildcard.Matches
zero or more charactors.)、~=( fuzzy query.)、>=(Be equal or greater
than a specified value in lexicographical order.)、<=( Be equal or less
than a specified value in lexicographical order.).
Security Agent Select the Enable check box to enable Security Agent. With this func-
tion enabled, the system will be able to obtain the mappings between
the usernames of the domain users and IP addresses from the AD
server, so that the domain users can gain access to network resources.
In this way "Single Sign-On" on Page 126 is implemented. Besides, by
making use of the obtained mappings, the system can also implement
other user-based functions, like security statistics, logging, behavior
auditing, etc. To enable Security Agent on the AD server, you need to
install and run Security Agent first on the server. After that when a
domain user is logging in or logging off, Security Agent will log the
user's username, IP address, current time and other information, and
add the mapping between the username and IP address to the system.
In this way the system can obtain every online user's IP address.
4. Click OK.
2. Select an AD server from the Active Directory Server drop-down list, and click Sync Users.
Binding Type
Binding Type By specifying the binding type, you can bind the user to a IP address or
MAC address.
l MAC - If MAC is selected, type the MAC address into the MAC text
box. And select a VR from the Virtual Router drop-down list.
3. Click OK.
l Role-based policy rules: Implements access control for users of different types.
l Role-based statistics: Collects statistics on bandwidth, sessions and new sessions for users of different types.
l SCVPN role-based host security detection: Implements control over accesses to specific resources for users of dif-
ferent types.
Creating a Ro le
To create a role:
2. Click New.
Role Name Type the role name into the Role Name box.
Description Type the description for the role into the Description box.
3. Click OK.
2. Click New.
4. In the Member section, select a role name from the first drop-down list, and then select a user, user group, cer-
tificate name (the CN field of USB Key certificate) or organization unit (the OU field of USB Key certificate) from the
second drop-down list. If User, User group, CN or OU is selected, also select or enter the corresponding user
name, user group name, CN or OU into the box behind.
6. If needed, repeat Step 4 and Step 5 to add more mappings. To delete a role mapping, select the role mapping you
want to delete from the mapping list, and click Delete.
7. Click OK.
Creating a Ro le Co mbinatio n
To create a role combination:
2. Click New.
First Prefix Specifies a prefix for the first role in the role regular expression.
First Role Select a role name from the First Role drop-down list to specify a name
for the first role in the role regular expression.
Second Prefix Specifies a prefix for the second role in the role regular expression.
Second Role Select a role name from the Second Role drop-down list to specify a
name for the second role in the role regular expression.
Result Role Select a role name from the Result Role drop-down list to specify a name
for the result role in the role regular expression.
3. Click OK.
2. Click New.
l Click Add in Add Track Members section and then configure the fol-
lowing options in the Add Interfaces dialog:
l Weight - Specifies a weight for the interface, i.e. the weight for
overall failure of the whole track object if this track entry fails.
Select HTTP Ping ARP DNS TCPradio button:
l Click Add, select a packet type from the drop-down list, and then
configure the following options in the Add
HTTP/Ping/ARP/DNS/TCP Member dialog:
HA sync Select this check box to enable HA sync function. The primary device will
synchronize its information with the backup device.
3. Click OK.
l Access control to certain category of websites, such as gambling and pornographic websites.
l Access control to certain category of websites during the specified period. For example, forbid to access IM web-
sites during the office hours.
l Access control to the website whose URL contains the specified keywords. For example, forbid to access the URL
that contains the keyword of game.
2. Click New.
Name Specifies the name of the rule. You can configure same URL filter rule
name in different VSYSs.
Control Type Control types are URL Category, URL Keyword Category, and Web Surf-
ing Record. You can select one type for each URL filter rule.
URL Category controls the access to some certain category of website.
The options are:
l SSL inspection: Select the Enable check box to enable SSL nego-
tiation packets inspection. For HTTPS traffic, the system can
acquire the domain name of the site which you want to access from
the SSL negotiation packets after this feature is configured. Then,
the system will perform URL filter in accordance with the domain
name. If SSL proxy is configured at the same time, SSL negotiation
packets inspection method will be preferred for URL filter.
l New: Creates a new URL category. For more information about URL
category, see "User-defined URL DB" on Page 266.
l Edit: Selects a URL category from the list, and click Edit to edit the
selected URL category.
l Log: Selects the check box to log access to the corresponding URL
category.
l Other URLS: Specifies the actions to the URLs that are not in the
list, including Block Access and Record Log.
URL Keyword Category controls the access to the website who's URL con-
tains the specific keywords. Click the URL Keyword Categoryoption to
configure. The options are:
l Edit: Select a URL keyword category from the list, and click Edit to
edit the selected URL keyword category.
l Block: Selects the check box to block the access to the website
whose URL contains the specified keywords.
l Log: Selects the check box to log the access to the website whose
URL contains the specified keywords.
l Other URLS: Specifies the actions to the URLs that do not contain
the keywords in the list, including Block Access and Record Log.
Web Surfing Record logs the GETand POST methods of HTTP.
l If a security zone is configured with the URL filter function, the system will perform detection on the traffic that is
destined to the binding zone specified in the rule, and then do according to what you specified.
l If a policy rule is configured with the URL filter function, the system will perform detection on the traffic that is
destined to the policy rule you specified, and then response.
l The threat protection configurations in a policy rule is superior to that in a zone rule if specified at the same time,
and the URL filter configurations in a destination zone is superior to that in a source zone if specified at the same
time.
l To perform the URL filter function on the HTTPS traffic, see the policy-based URL filter.
To realize the zone-based URL filter:
1. Create a zone. For more information about how to create, refer to "Security Zone" on Page 35.
3. Enable the threat protection you need, and select an URL filter rules from the profile drop-down list below; or you
can click Add Profile from the profile drop-down list below, to creat an URL filter rule, see "Part 1: Creating a URL
filter rule" on Page 261.
1. Configure a security policy rule. See "Configuring a Security Policy Rule" on Page 274.
2. In the Protection tab, select the Enable check box of URL Filter.
3. From the Profile drop-down list, select a URL filter rule. You can also click Add Profile to create a new URL filter
rule.
4. To perform the URL filter function on the HTTPS traffic, you need to enable the SSL proxy function for this security
policy rule. The system will decrypt the HTTPS traffic according to the SSL proxy profile and then perform the URL
filter function on the decrypted traffic.
According to the various configurations of the security policy rule, the system will perform the fol-
lowing actions:
If the SSL proxy and URL filter functions are enabled on a security policy rule but the control type of the selected
URL filter rule is the Web surfing record, the system will not record the GET and POST methods and the posted
contents via HTTPS.
If the zone which the security policy rule binds with is also configured with URL filter, the system will perform the
following actions:
Object Description
Predefined URL The predefined URL database includes dozens of categories and tens of mil-
DB lions of URLs and you can use it to specify the URL categories.
URL Lookup Use the URL lookup function to inquire URL information from the URL data-
base, including the URL category and the category type.
Warning Page l Block warning: When your network access is blocked, you will be
prompted with a warning page in the Web browser.
Note:
l Only after cancelling the binding can you delete the URL filter rule.
l To get the latest URL categories, you are recommended to update the URL database first.
For more information about URL database, see "Predefined URL DB" on Page 265.
l You can export the log messages to specified destinations. For more information about log
messages, see "NBC Logs" on Page 442.
l Summary: The statistical information of the top 10 user/IPs, the top 10 URLs, and the top 10 URL categories dur-
ing the specified period of time are displayed.
l URL Category:The URL category and detailed hit count and traffic are displayed.
To view the URL hit statistics, see "URL Hit" on Page 408 in Monitor.
l To view the URL hit statistics, enable URL Hit in "Monitor Configuration" on Page 417.
l To view the traffic of the URL category, enable URL Hit and URL Category Bandwidth in "Monitor Con-
figuration" on Page 417.
Object Description
Predefined URL The predefined URL database includes dozens of categories and tens of mil-
DB lions of URLs and you can use it to specify the URL categories.
User-defined URL The user-defined URL database is defined by yourself and you can use it to
DB specify the URL category.
URL Lookup Use the URL lookup function to inquire URL information from the URL data-
base.
Keyword Cat- Use the keyword category function to customize the keyword categories.
egory
Warning Page l Block warning: When your network access is blocked, you will be
prompted with a warning page in the Web browser.
Predefined URL D B
The system contains a predefined URL database.
Note: The predefined URL database is controlled by a license controlled. Only after a URL
license is installed, the predefined URL database can be used.
The predefined URL database provides URL categories for the configurations of URL filter. It includes dozens of cat-
egories and tens of millions of URLs .
When identifying the URL category, the user-defined URL database has a higher priority than the predefined URL data-
base.
2. In the URL category database update section, you can view the current version of the database, perform the
remote update, configure the remote update, and perform the local update.
3. Select Enable Auto Update to enable the automatic update function. And then continue to specify the frequency
and time. Click OK to save your settings.
4. Click Configure Update Server to configure the update server URL. In the pop-up dialog, specify the URL or IP
address of the update server, and select the virtual router that can connect to the server. To restore the URL set-
tings to the default ones, click Restore Default.
5. Click Configure Proxy Server, then enter the IP addresses and ports of the main proxy server and the backup
proxy server. When the device accesses the Internet through a HTTP proxy server, you need to specify the IP
address and the port number of the HTTP proxy server. With the HTTP proxy server specified, various signature
database can update normally.
2. In the URL category database update section, click Update to update the predefined URL database.
2. In the URL category database update section, click Browse to select the URL database file from your local disk.
Note: You can not upgrade the predefined URL database from local in non-root VSYS.
Us er-defined URL D B
Besides categories in predefined URL database, you can also create user-defined URL categories, which provides URL
categories for the configurations of URL filter. When identifying the URL category, the user-defined URL database has
a higher priority than the predefined URL database.
System provides three predefined URL categories: custom1, custom2, custom3. You can import your own URL lists
into one of the predefined URL category.
Configuring U se r- de fine d U RL D B
To configure a user-defined URL category:
2. At the top-right corner, select Configuration > User-defined URL DB. The User-defined URL DB dialog
appears.
4. Type the category name in the Category box. URL category name cannot only be a hyphen (-). And you can create
at most 16 user-defined categories.
6. Click Add to add the URL and its category to the table.
7. To edit an existing one, select it and then click Edit. After editing it, click Add to save the changes.
Importing U se r- de fine d U RL
System supports to batch import user-defined URL lists into the predefined URL category named custom1/2/3. To
import user-defined URL:
2. At the top-right corner, select Configuration > User-defined URL DB. The User-defined URL DB dialog
appears.
3. Select one of the predefined URL category(custom1/2/3), and then click Import.
2. At the top-right corner, select Configuration > User-defined URL DB. The User-defined URL DB dialog
appears.
3. Select one of the predefined URL category(custom1/2/3), and then click Clear, the URL in the custom 1/2/3 will
be cleared from the system.
URL Look up
You can inquire a URL to view the details by URL lookup, including the URL category and the category type.
2. At the top-right corner, click Configuration > URL Lookup. The URL Lookup dialog appears.
3. Type the URL into the Please enter the URL to inquire box.
4. Click Inquire, and the results will be displayed at the bottom of the dialog.
Configuring U RL Lookup Se rv e rs
URL lookup server can classify an uncategorized URL (URL is neither in predefined URL database nor in user-defined
URL database) you have accessed, and then add it to the URL database during database updating. Two default URL
lookup servers are provided: url1.hillstonenet.com and url2.hillstonenet.com. By default, the URL lookup servers are
enabled.
To configure a URL lookup server:
2. At the top-right corner, Select Configuration > Predefined URL DB. The Predefined URL DB dialog appears.
4. In the Inquiry server section, double-click the cell in the IP/Port/Virtual Router column of Server1/2 and type a
new value.
5. Select the check box in the Enable column to enable this URL lookup server.
l If the sum is larger than or equal to category threshold (100), the configured category action will be triggered;
l If more than one category action can be triggered and there is block action configured, the final action will be
Block;
l If more than one category action can be triggered and all the configured actions are Permit, the final action will be
Permit.
For example, a URL filter rule contains two keyword categories C1 with action block and C2 with action permit. Both of
C1 and C2 contain the same keywords K1 and K2. Trust values of K1 and K2 in C1 are 20 and 40. Trust values of K1
and K2 in C2 are 30 and 80.
If the system detects 1 occurrence of K1 and K2 each on a URL, then C1 trust value is 20*1+ 40*1=60<100, and C2
trust value is 30*1+80*1=110>100. As a result, the C2 action is triggered and the URL access is permitted.
If the system detects 3 occurrences of K1 and 1 occurrence of K2 on a URL, then C1 trust value is 20*3+40*1=100,
and C2 trust value C2 is 30*3+80*1=170>100. Conditions for both C1 and C2 are satisfied, but the block action for
C1 is triggered, so the web page access is denied.
2. At the top-right corner, Select Configuration > Keyword Category. The Keyword Category dialog appears.
5. Click New. In the slide area, specify the keyword, character matching method (simple/regular expression), and
trust value (100 by default).
8. To delete a keyword, select the keyword you want to delete from the list and click Delete.
Wa rning Pa ge
The warning page shows the user block information and user audit information.
The block warning function is disabled by default. To configure the block warning function:
2. At the top-right corner, Select Configuration > Warning Page. The Warning Page dialog appears.
The audit warning function is disabled by default. To configure the audit warning function:
2. At the top-right corner, Select Configuration > Warning Page. The Warning Page dialog appears.
l Security policy: Security policy the basic function of devices that is designed to control the traffic forwarding
between security zones/segments. By default all traffic between security zones/segments will be denied.
l NAT: When the IP packets pass through the devices or routers, the devices or routers will translate the source IP
address and/or the destination IP address in the IP packets.
l QoS: QoS is used to provide different priorities to different traffic, in order to control the delay and flapping, and
decrease the packet loss rate. QoS can assure the normal transmission of critical business traffic when the net-
work is overloaded or congested.
l Session limit: The session limit function limit the number of sessions and control the session rate to the source IP
address, destination IP address, specified IP address, service or role/user/user group, thereby to protect from
DoS attacks and control the bandwidth of applications, such as IM or P2P.
l Internet behavior control: The Internet behavior control allows you to flexibly configure control rules to com-
prehensively control and audit (by behavior logs and content logs) on user network behavior.
l Global blacklist: After adding the IP addresses or services to the global blacklist, the system will perform the block
action to the IP address and service until the block duration ends.
l Actions that the devices will perform when processing the specific type of traffic, including Permit, Deny, Tunnel,
From tunnel, WebAuth, and Portal server.
Generally a security policy rule consists of two parts: filtering conditions and actions. You can set the filtering con-
ditions by specifying traffic's source zone/address, destination zone/address, service type, and user. Each policy rule
is labeled with a unique ID which is automatically generated when the rule is created. You can also specify a policy rule
ID at your own choice. All policy rules in the system are arranged in a specific order. When traffic flows into a device,
the device will query for policy rules by turn, and processes the traffic according to the first matched rule.
The max global security policy rule numbers may vary from different models.
Security policy supports IPv4 and IPv6 address. If IPv6 is enabled, you can configure IPv6 address entry for the policy
rule.
This section contains the following contents:
l Manage the security policy rules: enable/disable a policy rule, clone a policy rule, adjust security rule position,
configure default action, view and clear policy hit count, hit count check, and rule redundancy check.
2. At the top-left corner, click New. The Policy Configuration dialog appears.
Type Select the IP type, including IPv4 or IPv6. Only the IPv6 firmware sup-
ports to configure IPv6 type IP. If IPv6 is selected, all the IP/netmask, IP
4. After adding the desired addresses, click the blank area in this dia-
log to complete the source address configuration.
You can also perform other operations:
l When selecting the Address Book type, you can click Add to cre-
ate a new address entry.
1. From the User drop-down menu, select the AAA server where the
users and user groups reside. To specify a role, select Role from
the AAA Server drop-down list.
4. After adding the desired objects, click the blank area in this dialog
to complete the user configuration.
Destination
4. After adding the desired addresses, click the blank area in this dia-
log to complete the destination address configuration.
You can also perform other operations:
l When selecting the Address Book type, you can click Add to cre-
ate a new address entry.
Other Information
Service Specifies a service or service group.
2. You can search the desired service/service group, expand the ser-
vice/service group list.
4. After adding the desired objects, click the blank area in this dialog
to complete the service configuration.
You can also perform other operations:
3. After adding the desired objects, click the blank area in this dialog
to complete the application configuration.
You can also perform other operations:
Action Specifies an action for the traffic that is matched to the policy rule, includ-
ing:
l From tunnel (VPN) - For the traffic from a peer to local, if this
option is selected, the system will first determine if the traffic ori-
ginates from a tunnel. Only such traffic will be permitted. Select
From tunnel (VPN) from the drop-down list after selecting the
Security Connection option, and then select a tunnel from the fol-
lowing drop-down list.
l Tunnel (VPN) - For the traffic from local to a peer, select this option
Antivirus Specifies an antivirus profile. The combination of security policy rule and
antivirus profile enables the devices to implement fine-grained applic-
ation layer policy control.
IPS Specifies an IPS profile. The combination of security policy rule and IPS
profile enables the devices to implement fine-grained application layer
policy control.
URL Filter Specifies a URL filter profile. The combination of security policy rule and
URL filter profile enables the devices to implement fine-grained applic-
ation layer policy control.
Schedule Specifies a schedule when the security policy rule will take effect. Select a
desired schedule from the Schedule drop-down list. After selecting the
desired schedules, click the blank area in this dialog to complete the
schedule configuration.
To create a new schedule, click New Schedule.
QoS Add QoS tag to the matched traffic by typing the value into the box,
which is used to control traffic combined with QoS. For more information
about QoS configuration, see "Pipes" on Page 288.
Log You can log policy rule matching in system logs according to your needs.
l For the policy rules of Permit, logs will be generated in two con-
ditions: the traffic that is matched to policy rules starts and ends
its session.
l For the policy rules of Deny, logs will be generated when the traffic
that is matched to policy rules is denied.
Select one or more check boxes to enable the corresponding log types.
l Click the button under Session column in the Policy list, and then the Session Detail dialog appears. You can
view the current session status of the selected policy.
l Click the button under Session column, and then the Session Detail dialog appears. You can view the current
session status of the selected policy.
l Hover over your mouse on the configuration in a certain column. Then based on the configuration type, the WebUI
displays either the icon or the detailed configurations.
l You can click the icon. Based on the configuration type, the WebUI displays Filter or Detail. Click Detail
to see the detailed configurations. Click Filter to display all policy rules that have the same configuration as
the current one where you hover over the mouse on.
Use the Filter to search out the policy rules that matches the filter conditions.
2. At the top-right corner, click Filter. Then a new row appears at the top.
3. Click +Filter to add a new filter condition. Then select a filter condition from the drop-down menu and enter a
value.
4. Press Enter to search out the policy rules that matches the filter conditions.
5. Repeat the above two steps to add more filter conditions. The relationship between each filter condition is AND.
6. To delete a filter condition, hover over your mouse on that condition and then click the icon. To close the filter,
3. Click More, and then select Enable or Disable to enable or disable the rule.
The disabled rule will not display in the list. Click More > Show Disabled Policies to show them.
2. Select the security policy rule that you want to clone and click Copy.
3. Click Paste. In the pop-up, select the desired position. Then the rule will be cloned to the desired position.
2. Select the check box of the security policy whose position will be adjusted.
3. Click Move.
4. In the pop-up menu, type the rule ID and then click Before ID or After ID. Then the rule will be moved before or
after the specified ID.
All policies Clears the hit counts for all policy rules.
Default policy Clears the hit counts for the default action policy rules.
Policy ID Clears the hit counts for a specified policy rule ID.
H it Count Chec k
System supports to check policy rule hit counts.
To check hit count:
2. Click More and select Hit Count Check. After the check, the policy rules whose hit count is 0 will be highlight,
that is to say, the policy rule is not used in the system.
2. Click More and select Redundancy Check. After the check, system will highlight the policy rule which is over-
shadowed.
Note: Status will be shown below the policy list when redundancy check is started. It is
not recommended to edit a policy rule during the redundancy check. You can click to
stop the check manually.
Before you use enable the user online notification function, you must configure the WebAuth function. For more inform-
ation about configuring WebAuth function, view "Web Authentication" on Page 121.
2. Select the security policy rule that you want to enable the user online notification function. Generally, it is recom-
mended to select the security policy rule that is under the WebAuth policy rule and whose action is permit to the
HTTP traffic.
3. Click Edit.
4. In the Basic tab, select the Enable Web Redirect check box and type the notification URL into the Notification
page URL box.
l Idle time: The time that an online user keeps online without traffic transmitting. If exceeding the idle time, the
HTTP request will be redirected to the user online notification page again.
l Background picture: You can change the background picture on the prompt page.
To configure the parameters:
2. Select the security policy rule with the user online notification function enabled.
4. Type the idle time value into the Idle time box. The default value is 30 minutes. The range is 3 to 1440 minutes.
Note: If you have configured QoS in the previous QoS function before upgrading the system to
verion 5.5, the previous QoS function will take effect. You still need to configure the previous
QoS function in CLI. You cannot use the newest iQoS function in version 5.5 and the newest
iQoS function will not display in the WebUI and will not take effect. If you have not configured
the previous QoS function before upgrading the system to version 5.5, the system will enable
the newest iQoS function in version 5.5. You can configure iQoS function in the WebUI and the
previous QoS function will not take effect.
I mplement Mechanism
The packets are classified and marked after entering the system from the ingress interface. For the classified and
marked traffic, the system will smoothly forward the traffic through shaping mechanism, or drop the traffic through
policing mechanism. If selecting shaping mechanism to forward the traffic, the congestion management and con-
gestion avoidance mechanisms give different priorities to different types of packets so that the packets of higher pri-
ority can pass the gateway earlier to avoid network congestion.
In general, implementing QoS includes:
l Classification and marking mechanism: Classification and marking is the process of identifying the priority of each
packet. This is the first step of iQoS.
l Policing and shaping mechanisms: Policing and shaping mechanisms are used to identify traffic violation and
make responses. The policing mechanism checks traffic in real time, and takes immediate actions according to the
settings when it discovers violation. The shaping mechanism works together with queuing mechanism. It makes
sure that the traffic will never exceed the defined flow rate so that the traffic can go through that interface
smoothly.
l Congestion management mechanism: Congestion management mechanism uses queuing theory to solve prob-
lems in the congested interfaces. As the data rate can be different among different networks, congestion may hap-
pen to both wide area network (WAN) and local area network (LAN). Only when an interface is congested will the
queuing theory begin to work.
l Congestion avoidance mechanism: Congestion avoidance mechanism is a supplement to the queuing algorithm,
and it also relies on the queuing algorithm. The congestion avoidance mechanism is designed to process TCP-
based traffic.
Pipes
By configuring pipes, the devices implement iQoS. Pipe, which is a virtual concept, represents the bandwidth of trans-
mission path. The system classifies the traffic by using the pipe as the unit, and control the traffic crossing the pipes
according to the actions defined for the pipes. For all traffic crossing the device, they will flow into virtual pipes accord-
ing to the traffic matching conditions they match. If the traffic does not match any condition, they will flow into the
default pipe predefined by the system.
l Traffic matching conditions: Defines the traffic matching conditions to classify the traffic crossing the device into
matched pipes. The system will limit the bandwidth to the traffic that matches the traffic matching conditions.
You can define multiple traffic matching conditions to a pipe. The logical relation between each condition is OR.
When the traffic matches a traffic matching condition of a pipe, it will enter this pipe. If the same conditions are
configured in different root pipes, the traffic will first match the root pipe listed at the top of the Level-1 Control
list in the Policy > iQoS page.
l Traffic management actions: Defines the actions adopted to the traffic that has been classified to a pipe. The data
stream control includes the forward control and the backward control. Forward control controls the traffic that
flows from the source to the destination; backward control controls the traffic flows from the destination to the
source.
To provide flexible configurations, the system supports the multiple-level pipes. Configuring multiple-level pipes can
limit the bandwidth of different applications of different users. This can ensure the bandwidth for the key services and
users. Pipes can be nested to at most four levels. Sub pipes cannot be nested to the default pipe. The logical relation
between pipes is shown as below:
l You can create multiple root pipes that are independent individually. At most three levels of sub pipes can be nes-
ted to the root pipe.
l For the sub pipes at the same level, the total of their minimum bandwidth cannot exceed the minimum bandwidth
of their upper-level parent pipe, and the total of their maximum bandwidth cannot exceed the maximum band-
width of their upper-level parent pipe.
l If you have configured the forward or backward traffic management actions for the root pipe, all sub pipes that
belongs to this root pipe will inherit the configurations of the traffic direction set on the root pipe.
l The root pipe that is only configured the backward traffic management actions cannot work.
The following chart illustrates the application of multiple-level pipes in a company. The administrator can create the fol-
lowing pipes to limit the traffic:
1. Create a root pipe to limit the traffic of the office located in Beijing.
3. Create a sub pipe to limit the traffic of the specified applications so that each application has its own bandwidth.
According to the chart above, the process of traffic control is described below:
1. The traffic first flows into the level-1 control, and then the system classifies the traffic into different pipes accord-
ing to the traffic matching conditions of the pipe of level-1 control. The traffic that cannot match any pipe will be
classified into the default pipe. If the same conditions are configured in different root pipes, the traffic will first
match the root pipe listed at the top of the Level-1 Control list in the Policy > iQoS page. After the traffic flows
into the root pipe, the system classifies the traffic into different sub pipes according to the traffic matching con-
ditions of each sub pipe.
2. According to the traffic management actions configured for the pipes, the system manages and controls the
traffic that matches the traffic matching conditions.
3. The traffic dealt with by level-1 control flows into the level-2 control. The system manages and controls the traffic
in level-2 control. The principle of traffic matching, management and control are the same as the one of the level-
1 control.
Enabling iQo S
To enable iQoS:
1. Create the traffic matching conditions, which are used to capture the traffic that matches these conditions. If con-
figuring multiple traffic matching conditions for a pipe, the logical relation between each condition is OR.
2. Create a white list according to your requirements. The system will not control the traffic in the white list. Only
root pipe and the default pipe support the white list.
3. Specify the traffic management actions, which are used to deal with the traffic that is classified into a pipe.
4. Specify the schedule. The pipe will take effect during the specified time period.
Ba s ic Opera tions
Select Policy > iQoS > Policy to open the Policy page.
l Disable the level-2 traffic control: Click Disable second level control. The pipes in the level-2 traffic control will
not take effect. And the Level-2 Control tab will not appears in this page.
l View pipe information: The pipe list displays the name, mode, action, schedule, and the description of the pipes.
l Click the icon to expand the root pipe and display its sub pipes.
l Click the icon of the root pipe or the sub pipe to view the condition settings.
l Click the icon of the root pipe to view the white list settings.
l represents the root pipe is usable, represents the root pipe is unusable, represents the sub
pipe is usable, represents the sub pipe is unusable, the gray text represents the pipe is dis-
abled.
l Create a root pipe: Select the Level-1 Control or Level-2 Control tab, then click New in the menu bar to create a
new root pipe.
l Create a sub pipe: Click the icon of the root pipe or the sub pipe to create the corresponding sub pipe.
l Click Enable in the menu bar to enable the selected pipe. By default, the newly-created pipe will be enabled.
l Click Disable in the menu bar to disable the selected pipe. The disabled pipe will not take effect.
l Click Delete to delete the selected pipe. The default pipe cannot be deleted.
Configuring a Pipe
To configure a pipe:
l Parent Pipe/Control Level: Displays the control level or the parent pipe of the newly created pipe.
l The Shape mode can limit the data transmission rate and smoothly forward the traffic. This mode sup-
ports the bandwidth borrowing and priority adjusting for the traffic within the root pipe.
l The Policy mode will drop the traffic that exceeds the bandwidth limit. This mode does not support the
bandwidth borrowing and priority adjusting, and cannot guarantee the minimum bandwidth.
l The Monitor mode will monitor the matched traffic, generate the statistics, and will not control the traffic.
l Bandwidth borrowing: All sub pipes in a root pipe can lend the idle bandwidth to the pipes that are lack
of bandwidth. The prerequisite is the bandwidth of themselves are enough to forward their traffic.
l Priority adjusting: When there is traffic congestion, the system will arrange the traffic to enter the wait-
ing queue. You can set the traffic to have higher priority and the system will deal with the traffic in order
of precedence.
Zone Specify the source zone of the traffic. Select the zone name from the
drop-down menu.
Interface Specify the source interface of the traffic. Select the interface name from
the drop-down menu.
Address Specify the source address of the traffic.
4. After adding the desired addresses, click the blank area in this dia-
log to complete the address configuration.
You can also perform other operations:
l When selecting the Address Book type, you can click Add to cre-
ate a new address entry.
Zone Specify the destination zone of the traffic. Select the zone name from the
drop-down menu.
Interface Specify the destination interface of the traffic. Select the interface name
from the drop-down menu.
Address Specify the destination address of the traffic.
4. After adding the desired addresses, click the blank area in this dia-
log to complete the address configuration.
You can also perform other operations:
l When selecting the Address Book type, you can click Add to cre-
ate a new address entry.
1. From the User drop-down menu, select the AAA server where the
users and user groups reside.
4. After adding the desired objects, click the blank area in this dialog
to complete the user information configuration.
Service Specify a service or service group that the traffic belongs to.
2. You can search the desired service/service group, expand the ser-
vice/service group list.
4. After adding the desired objects, click the blank area in this dialog
to complete the service configuration.
You can also perform other operations:
3. After adding the desired objects, click the blank area in this dialog
to complete the application configuration.
You can also perform other operations:
4. If you are configuring root pipes, you can specify the white list settings based on the description of configuring
conditions.
l Limit Per IP represents that the system will limit the band-
width for each IP. In the Limit by section, select Source IP to
limit the bandwidth of the source IP in this pipe; or select
Destination IP to limit the bandwidth of the destination IP in
this pipe.
l Limit Per User represents that the system will limit the band-
width for each user. In the Limit by section, specify the min-
imum/maximum bandwidth of the users.
l When configuring the root pipe, you can select the Enable Aver-
age Bandwidth check box to make each source IP, destination IP,
or user to share an average bandwidth.
Limit by When the Limit type is Limit Per IP or Limit Per User, you need to specify
the minimum bandwidth or the maximum bandwidth:
Priority Specify the priority for the pipes. Select a number, between 0 and 7, from
the drop-down menu. The smaller the value is, the higher the priority is.
When a pipe has higher priority, the system will first deal with the traffic
in it and borrow the extra bandwidth from other pipes for it. The priority
of the default pipe is 7.
TOS Specify the TOS fields of the traffic; or click Configure to specify the TOS
fields of the IP header of the traffic in the appeared TOS Configuration
page.
Limit Opposite Select the LImit Opposite Bandwidth check box to configure the value of
Bandwidth limit-strength.The smaller the value, the smaller the limit.
l No Limit represents that the system will not limit the band-
width for each IP or each user.
l Limit Per IP represents that the system will limit the band-
width for each IP. In the Limit by section, select Source IP to
limit the bandwidth of the source IP in this pipe; or select
Destination IP to limit the bandwidth of the destination IP in
this pipe.
l Limit Per User represents that the system will limit the band-
width for each user. In the Limit by section, specify the min-
imum/maximum bandwidth of the users.
l When configuring the root pipe, you can select the Enable Aver-
age Bandwidth check box to make each source IP, destination IP,
or user to share an average bandwidth.
Limit by When the Limit type is Limit Per IP or Limit Per User, you need to specify
the minimum bandwidth or the maximum bandwidth:
Priority Specify the priority for the pipes. Select a number, between 0 and 7, from
the drop-down menu. The smaller the value is, the higher the priority is.
When a pipe has higher priority, the system will first deal with the traffic
in it and borrow the extra bandwidth from other pipes for it. The priority
of the default pipe is 7.
TOS Specify the TOS fields of the traffic; or click Configure to specify the TOS
fields of the IP header of the traffic in the appeared TOS Configuration
page.
Limit Opposite Select the LImit Opposite Bandwidth check box to configure the value of
Bandwidth limit-strength.The smaller the value, the smaller the limit.
6. In the Schedule tab, configure the time period when the pipe will take effect. Select the schedule from the drop-
down list, or create a new one.
As shown above, the device lies between the private network and the public network. When the internal PC at 10.1.1.2
sends an IP packet (IP packet 1) to the external server at 202.1.1.2 through the device, the device checks the packet
header. Finding that the IP packet is destined to the public network, the device translates the source IP address
10.1.1.2 of packet 1 to the public IP address 202.1.1.1 which can get routed on the Internet, and then forwards the
packet to the external server. At the same time, the device also records the mapping between the two addresses in its
NAT table. When the response packet of IP packet 1 reaches the device, the device checks the packet header again and
finds the mapping records in its NAT table, then replaces the destination address with the private address 10.1.1.2.
In this process, the device is transparent to the PC and the Server. To the external server, it considers that the IP
address of the internal PC is 202.1.1.1 and knows nothing about the private address 10.1.1.2. Therefore, NAT hides
the private network of enterprises.
I mplementing NAT
The devices translates the IP address and port number of the internal network host to the external network address
and port number of the device, and vice versa. That is translation between the "private IP address + port number" and
the "public IP address + port number".
The devices achieve the NAT function through the creation and implementation of NAT rules. There are two types of
NAT rules, which are source NAT rules (SNAT Rule) and destination NAT rules (DNAT Rule). SNAT translates source IP
addresses, thereby hiding the internal IP addresses or sharing the limited IP addresses; DNAT translates destination
IP addresses, usually translating IP addresses of internal servers (such as the WWW server or SMTP server) protected
by the device to public IP addresses.
Virtual Router Specifies a VRouter for the SNAT rule. The SNAT rule will take effect when
the traffic flows into this VRouter and matches the SNAT rule conditions.
Source Address Specifies the source IP address of the traffic, including:
HA Group Specifies the HA group that the SNAT rule belongs to. The default set-
ting is 0.
Description Types the description.
NAT Log Select the Enable check box to enable the log function for this SNAT
rule. The system will generate log information when there is traffic
matching to this NAT rule.
Position Specifies the position of the rule. Each SNAT rule has a unique ID.
When traffic flowing into the device, the device will search SNAT
rules by sequence, and then implement NAT on the source IP of the
traffic according to the first matched rule. The sequence of the ID
showed in the SNAT rule list is the order of the rule matching. Select
one of the following items from the drop-down list:
l Bottom - The rule is located at the bottom of all the rules in the
SNAT rule list. By default, the system will put the newly-cre-
ated SNAT rule at the bottom of all SNAT rules.
l Top - The rule is located at the top of all the rules in the SNAT
rule list.
l Before ID - Type the ID number into the text box. The rule will
be located before the ID you specified.
l After ID - Type the ID number into the text box. The rule will
be located after the ID you specified.
ID Specifies the method you get the rule ID. Each rule has its unique ID.
It can be automatically assigned by system or manually assigned by
yourself. If you select Manually assign , type an ID number into the
box behind.
2. Select the rule you want to adjust its priority and click Priority.
l Top: The rule is moved to the top of all the rules in the SNAT rule list.
l Bottom: The rule is moved to the bottom of all the rules in the SNAT rule list. By default, the system will put
l Before ID: Specifies an ID number. The rule will be moved before the ID you specified.
l After ID: Specifies an ID number. The rule will be moved after the ID you specified.
Virtual Router Specifies a VRouter for the DNAT rule. The DNAT rule will take effect
when the traffic flows into this VRouter and matches the DNAT rule con-
ditions.
Destination Specifies the destination IP address of the traffic, including:
Address
l Address Entry - Select an address entry from the drop-down list.
HA Group Specifies the HA group that the DNAT rule belongs to. The default set-
ting is 0.
Description Types the description.
Virtual Router Specifies a VRouter for the DNAT rule. The DNAT rule will take effect
when the traffic flows into this VRouter and matches the DNAT rule con-
ditions.
Destination Specifies the destination IP address of the traffic, including:
Address
l Address Entry - Select an address entry from the drop-down list.
Port Mapping Types the translated port number of the Intranet server. The available
range is 1 to 65535.
Others
HA Group Specifies the HA group that the DNAT rule belongs to. The default set-
ting is 0.
Description Types the description.
2. Click New and select Advanced Configuration. To edit the advanced settings of an existing DNAT rule, select it
and click Edit. The DNAT configuration dialog appears.
Virtual Router Specifies a VRouter for the DNAT rule. The DNAT rule will take effect
when the traffic flows into this VRouter and matches the DNAT rule con-
ditions.
Source Address Specifies the source IP address of the traffic, including:
Action Specifies the action for the traffic you specified, including:
Port Select Enable to translate the port number of the service that matches
the conditions above.
Load Balance Select Enable to enable the function. Traffic will be balanced to different
Intranet servers.
HA Group Specifies the HA group that the DNAT rule belongs to. The default set-
ting is 0.
Description Types the description.
Track Ping Pack- After enabling this function, the system will send Ping packets to check
ets whether the Intranet servers are reachable.
Track TCP Pack- After enabling this function, The system will send TCP packets to check
ets whether the TCP ports of Intranet servers are reachable.
TCP Port Specifies the TCP port number of the monitored Intranet server.
Others
NAT Log Enable the log function for this DNAT rule to generate the log inform-
ation when traffic matches this NAT rule.
Position Specifies the position of the rule. Each DNAT rule has a unique ID. When
traffic flowing into the device, the device will search DNAT rules by
sequence, and then implement DNAT on the source IP of the traffic
according to the first matched rule. The sequence of the ID showed in the
DNAT rule list is the order of the rule matching. Select one of the fol-
lowing items from the drop-down list:
l Bottom - The rule is located at the bottom of all the rules in the
DNAT rule list. By default, the system will put the newly-created
DNAT rule at the bottom of all SNAT rules.
l Top - The rule is located at the top of all the rules in the DNAT rule
list.
l Before ID - Type the ID number into the text box. The rule will be
located before the ID you specified.
l After ID - Type the ID number into the text box. The rule will be loc-
ated after the ID you specified.
ID The ID number is used to distinguish between NAT rules. Specifies the
method you get the rule ID. It can be automatically assigned by system
or manually assigned by yourself.
2. Select the rule you want to adjust its priority and click Priority.
l Top: The rule is moved to the top of all the rules in the DNAT rule list.
l Bottom: The rule is moved to the bottom of all the rules in the DNAT rule list. By default, the system will put
the newly-created DNAT rule at the bottom of all DNAT rules.
l Before ID: Specifies an ID number. The rule will be moved before the ID you specified.
l After ID: Specifies an ID number. The rule will be moved after the ID you specified.
2. You can set the filtering conditions according to the virtual router, SLB server pool, and server address and then
view the information.
Option Description
2. You can set the filtering conditions according to the virtual router, algorithm, and server pool name and then view
the information.
Option Description
l When you select Per Source IP, the system will limit the number
of sessions to each source IP address.
l When you select Per Destination IP, the system will limit the
number of sessions to each destination IP address.
Protocol
Protocol Limits the number of sessions to the protocol which have been setted in
the textbox.
Application
Role/User/User Group
Select the Role/User/User Group check box to configure the corresponding limit con-
ditions.
Role Select the Role radio button and a role from the Role drop-down list to
limit the number of sessions of the selected role.
User Select the User radio button and a user from the User drop-down list to
limit the number of sessions of the selected user.
User Group Select the User Group radio button and a user group from the User
Group drop-down list to limit the number of sessions of the selected
user group.
l Next to the User Group radio button, select All Users to limit the
total number of sessions to all users in the user group.
l Next to the User Group radio button, select Per User to limit the
number of sessions to each user.
Schedule
Schedule Select the Schedule check box and choose a schedule you need from the
drop-down list to make the session limit rule take effect within the time
period specified by the schedule.
Session Number Specify the maximum number of sessions. The value range is 0 to
1048576. The value of 0 indicates no limitation.
New Con- Specify the maximum number of sessions created per 5 seconds. The
nections/5s value range is 1 to 1048576.
7. Click Switch Mode to select a matching mode. If you select Use the Minimum Value and an IP address
matches multiple session limit rules, the maximum number of sessions of this IP address is limited to the min-
imum number of sessions of all matched session limit rules; if you select Use the Maximum Value and an IP
address matches multiple session limit rules, the maximum number of sessions of this IP address is the maximum
number of sessions of all matched session limit rlules.
2. Select the rule whose sessions statistic information you want to clear.
3. Click Clear.
l ARP Learning: Devices can obtain IP-MAC bindings in an Intranet from ARP learning, and add them to the ARP list.
By default this function is enabled. Thje devices will always keep ARP learning on, and add the learned IP-MAC
bindings to the ARP list. If any IP or MAC address changes during the learning process, the devices will add the
updated IP-MAC binding to the ARP list. If this function is disabled, only IP addresses in the ARP list can access
Internet.
l MAC Learning: Devices can obtain MAC-Port bindings in an Intranet from MAC learning, and add them to the MAC
list. By default this function is enabled. The devices will always keep MAC learning on, and add the learned MAC-
Port bindings to the MAC list. If any MAC address or port changes during the learning process, the devices will
add the updated MAC-Port binding to the MAC list.
l IP-MAC-Port Binding: If IP-MAC, MAC-Port or IP-MAC-Port binding is enabled, packets that are not matched to the
binding will be dropped to protect against ARP spoofing or MAC address list attacks. The combination of ARP and
MAC learning can achieve the effect of "real-time scan + static binding", and make the defense configuration more
simple and effective.
l Authenticated ARP: Authenticated ARP is implemented on the ARP client Hillstone Secure Defender. When a PC
with Hillstone Secure Defender installed accesses Internet via the interface that enables Authenticated ARP, it will
perform an ARP authentication with the device to assure the MAC address of the device being connected to the PC
is trusted.
l ARP Inspection: Devices support ARP Inspection for interfaces. With this function enabled, StoneOS will inspect
all ARP packets passing through the specified interfaces, and compare the IP addresses of the ARP packets with
the static IP-MAC bindings in the ARP list and IP-MAC bindings in the DHCP Snooping list.
l DHCP Snooping: With this function enabled, the system can create binding relationship between the MAC address
of the DHCP client and the allocated IP address by analyzing the packets between the DHCP client and server.
l Host Defense: With this function enabled, the system can send gratuitous ARP packets for different hosts to pro-
tect them against ARP attacks.
2. Click New.
VLAN ID If the port belongs to a VLAN, select the VLAN ID from the VLAN ID
drop-down list.
Virtual Router Select the virtual router that the binding item belongs to. By default, the
binding item belongs to trust-vr.
l ARP/MAC learning
l IP-MAC scan
To configure the ARP/MAC learning:
3. In the ARP/MAC Learning Configuration dialog, select the interface that you want to enable the ARP/MAC learning
function.
4. Click Enable and then select ARP Learning or MAC Learning in the pop-up menu. The system will enable the
selected function on the interface you select.
2. Select Binding Configuration and then click IP-MAC Scan from the pop-up menu.
3. In the IP-MAC Scan dialog, enter the start IP and the end IP.
4. Click OK to start scanning the specified IP addresses. The result will display in the table in the IP-MAC binding
tab.
2. Select Binding Configuration and then click Bind All from the pop-up menu.
2. Select Binding Configuration and then click Unbind All from the pop-up menu.
2. Select Others and then click lmport from the pop-up menu.
3. In the Import dialog, click Browse to select the file that contains the binding information. Only the UTF-8 encod-
ing file is supported.
To export the binding information:
2. Select Others and then click Export from the pop-up menu.
Note: The Loopback interface and PPPoE sub-interface are not designed with ARP learning, so
these two interfaces do not support Authenticated ARP.
To use the Authenticated ARP function, you need to enable the Authenticated ARP function in the device and install the
Hillstone Secure Defender in the PCs.
To enable the Authenticated ARP in the device:
2. Select the interfaces on which you want to enable the Authenticated ARP function.
3. Click Enable and select Force Authenticated ARP to enable the authenticated ARP function. Besides, you can
4. Enable or disable Force Install as needed. If the Force Install option is selected, PCs cannot access Internet via
the corresponding interface unless the ARP client has been installed; if the Force Install option is not selected,
only PCs with the ARP client installed are controlled by Authenticated ARP.
1. Enable Authenticated ARP for an interface, and also select the Force Install option for the interface.
2. When a PC accesses Internet via this interface, the Hillstone Secure Defneder's download page will pop up. Down-
load HillstoneSecureDefender.exe as prompted.
3. After downloading, double-click HillstoneSecureDefender.exe and install the client as prompted by the install-
ation wizard.
l If the IP address is in the ARP list and the MAC address is matched, the ARP packet will be forwarded;
l If the IP address is in the ARP list but the MAC address is not matched, the ARP packet will be dropped;
l If the IP address is not in the ARP list, continue to check if the IP address is in the DHCP Snooping list;
l If the IP address is in the DHCP Snooping list and the MAC address is also matched, the ARP packet will be for-
warded;
l If the IP address is in the DHCP Snooping list but the MAC address is not matched, the ARP packet will be dropped;
l If the IP address is not in the DHCP Snooping, the ARP packet will be dropped or forwarded according to the spe-
cific configuration.
Both the VSwitch and VLAN interface of the system support ARP Inspection. This function is disabled by default.
To configure ARP Inspection of the VSwitch interface:
5. To drop the traffic whose sender's IP address is not in the ARP table, select Drop. To forward the traffic whose
sender's IP address is not in the ARP table, select Forward.
7. For the interfaces belongs to the VSwitch interface, you can set the following options:
l If you do not need the ARP inspection in the interface, in the Advanced Options section, double-click the inter-
face and select Do Not Inspect option in the pop-up dialog.
2. Click New.
4. To drop the traffic whose sender's IP address is not in the ARP table, select Drop. To forward the traffic whose
sender's IP address is not in the ARP table, select Forward.
5. For the interfaces belongs to the VLAN, you can set the following options:
l If you do not need the ARP inspection in the interface, in the Advanced Options section, double-click the inter-
face and select Do Not Inspect option in the pop-up dialog.
l Configure the number of ARP packets received per second. When the ARP packet rate exceeds the specified
value, the excessive ARP packets will be dropped. The value range is 0 to 10000. The default value is 0, i.e.,
no rate limit.
Configuring D H CP Snooping
DHCP, the abbreviation for Dynamic Host Configuration Protocol, is designed to allocate appropriate IP addresses and
related network parameters for sub networks automatically. DHCP Snooping can create binding relationship between
the MAC address of the DHCP client and the allocated IP address by analyzing the packets between the DHCP client and
server. When ARP Inspection is also enabled, the system will check if an ARP packet passing through can be matched
to any binding of the list. If not, the ARP packet will be dropped. In the network that allocates addresses via DHCP, you
can prevent against ARP spoofing attacks by enabling ARP inspection and DHCP Snooping.
DHCP clients look for the server by broadcasting, and only accept the network configuration parameters provided by
the first reachable server. Therefore, an unauthorized DHCP server in the network might lead to DHCP server spoofing
attacks. The devices can prevent against DHCP server spoofing attacks by dropping DHCP response packets on related
ports.
Besides, some malicious attackers send DHCP requests to a DHCP server in succession by forging different MAC
addresses, and eventually lead to IP address unavailability to legal users by exhausting all the IP address resources.
This kind of attacks is commonly known as DHCP Starvation. The devices can prevent against such attacks by drop-
ping request packets on related ports, setting rate limit or enabling validity check.
The VSwitch interface of the system supports DHCP snooping. This function is disabled by default.
To configure DHCP snooping:
3. In the Interface tab, select the interfaces that need the DHCP snooping function.
l Validity check: Check if the client's MAC address of the DHCP packet is the same with the source MAC address
of the Ethernet packet. If not, the packet will be dropped. Select the interfaces that need the validity check
and then click Enable to enable this function.
l Rate limit: Specify the number of DHCP packets received per second on the interface. If the number exceeds
the specified value, the system will drop the excessive DHCP packets. The value range is 0 to 10000. The
default value is 0, i.e., no rate limit. To configure the rate limit, double-click the interface and then specify the
value in the Rate text box in the pop-up Port Configuration dialog.
l Drop: In the Port Configuration dialog, if the DHCP Request check box is selected, the system will drop all
the request packets sent by the client to the server; if the DHCP Response check box is selected, the system
will drop all the response packets returned by the server to the client.
2. In the current page, you can view the DHCP snooping list.
Configuring H os t D efens e
Host Defense is designed to send gratuitous ARP packets for different hosts to protect them against ARP attacks.
To configure host defense:
Excluded Port Specify an excluded port, i.e., the port that does not send gratuitous ARP
packets. Typically it is the port that is connected to the proxied host.
Host
IP Specify the IP address of the host that uses the device as a proxy.
MAC Specify the MAC address of the host that uses the device as a proxy.
Sending Rate Specify a gratuitous ARP packet send rate. The value range is 1 to 10/sec.
The default value is 1
3. Click OK to save your settings and return to the Host Defense page.
4. Repeat Step 2 and Step 3 to configure gratuitous ARP packets for more hosts. You can configure the device to
send gratuitous ARP packets for up to 16 hosts.
The second scenario, the device works as the gateway of Web servers. The device with SSL proxy enabled can work as
the SSL server, use the certificate of the Web server to establish the SSL connection with Web clients (Web browsers),
and send the decrypted traffic to the internal Web server.
Wo rk Mo de
There are three work modes. For the first scenario, the SSL proxy function can work in the Require mode and the
Exempt mode; for the second scenario, the SSL proxy function can work in the Offload mode.
When the SSL proxy function works in the Require mode and the Exempt mode, it can perform the SSL proxy on spe-
cified websites.
For the websites that do not need SSL proxy, it dynamically adds the IP address and port of the websites to a bypass
list, and the HTTPS traffic will be bypassed.
For the websites proxied by the SSL proxy function, the device will check the parameters of the SSL negotiation. When
a parameter matches an item in the checklist, the corresponding HTTPS traffic can be blocked or bypassed according
to the action you specified.
l If the action is Block, the HTTPS traffic will be blocked by the device.
l If the action is Bypass, the HTTPS traffic will not be decrypted. Meanwhile, the device will dynamically add the IP
address and port number of the Website to the bypass list, and the HTTPS traffic will be bypassed.
The device will decrypt the HTTPS traffic that are not blocked or bypassed.
When the SSL proxy function works in the Offload mode, it will proxy the SSL connections initialized by Web clients,
decrypt the HTTPS traffic, and send the HTTPS traffic as plaintext to the Web server.
You can integrate SSL proxy function with the followings:
l Integrate with the application identification function. Devices can decrypt the HTTPS traffic encrypted using SSL
by the applications and identify the application. After the application identification, you can configure the policy
rule, QoS, session limit, policy-based route.
l Integrate with the Web content function, Web post function, and email filter function. Devices can audit the
actions that access the HTTPS website.
l Support unilateral SSL proxy in WebAuth. SSL client can use SSL connection during authentication stage. When
authentication is completed, SSL proxy will no longer take effect, and the client and server communicate directly
without SSL encryption.
l Integrate with AV, IPS, and URL. Devices can perform the AV protection, IPS protection, and URL filter on the
decrypted HTTPS traffic.
1. Configure the corresponding parameters of SSL negotiation, including the following items: specify the PKI trust
domain of the device certificates, obtain the CN value of the subject field from the website certificate, configure
the trusted SSL certificate list, and import a device certificate to the Web browser.
2. Configure a SSL proxy profile, including the following items: choose the work mode, set the website list (use the
CN value of the Subject field of the website certificate), configure the actions to the HTTPS traffic when its SSL
negotiation matches the item in the checklist, enable the audit warning page, and so on.
3. Bind a SSL proxy profile to a proper policy rule. The device will decrypt the HTTPS traffic that matches the policy
rule and is not blocked or bypassed by the device.
l The trust domain of trust_domain_ssl_proxy uses RSA and the modulus size is 1024 bits.
l The trust domain of trust_domain_ssl_proxy_2048 uses RSA and the modulus size is 2048 bits.
4. In the Details tab, click Subject. You can view the CN value in the text box.
2. At the top-right corner of the page, click Trust SSL Certificate Configuration.
l In the pop-up dialog, select a certificate and then click Delete to delete the selected certificate.
1. Export the device certificate to local PC. Select System > PKI.
2. In the Management tab in the PKI Management dialog, configure the options as below:
l Content: CA certificate
l Action: Export
3. Click OK and select the path to save the certificate. The certificate will be saved to the specified location.
Then, import device certificate to client browser. Take Internet Explore as the example:
1. Open IE.
4. In the Certificates dialog, click the Trusted Root Certification Authorities tab.
5. Click Import. Import the certificate following the Certificate Import Wizard.
2. At the top-left corner, click New to create a new SSL proxy profile.
l In the Require mode, the device perform the SSL proxy function on
the communication encrypted by the specified website certificate.
The communication encrypted by other website certificatesh will
be bypassed.
l In the Exempt mode, the device does not perform the SSL proxy
function on the communication encrypted by the specified website
certificate. The communication encrypted by other website cer-
tificates will be proxied by SSL proxy function.
Common Name Set the website list based on the work mode. When the SSL proxy is in
the Require mode, set the websites that will be proxied by the SSL proxy
function. When the SSL proxy is in the Exempt mode, set the websites
that will not be proxied by the SSL proxy function and the device will per-
form the SSL proxy on other websites.
To set the website list, specify the CN value of the subject field of the
website certificate and then click Add.
Warning Select Enable to enable the warning page. When the HTTPS traffic is
decrypted by the SSL proxy function, the request to a HTTPS website will
be redirected to a warning page of SSL proxy. In this page, the system
notifies the users that their accesses to HTTPS websites are being mon-
itored and asks the uses to protect their privacy.
Key Modulus Specify the key pair modulus size of the private/public keys that are asso-
ciated with the SSL proxy certificate. You can select 1024 bits or 2048 bits.
l When the system supports the SSL protocol used by the SSL
server, it will continue to check other items.
Unsupported Check the encryption algorithm used by the server.
encryption
algorithms l When the system does not support the encryption algorithm used
by the SSL server, you can select Block to block its HTTPS traffic,
or select Bypass to bypass its HTTPS traffic.
l When the SSL server does not verify the client certificate, it will
continue to check other items.
Blocking SSL ver- When the SSL server uses the specified version of SSL protocol, the sys-
sion tem can block its HTTPS traffic.
Blocking encryp- When the SSL server uses the specified encryption algorithm, the system
tion algorithm can block its HTTPS traffic.
Resource unavail- When the decryption resource is not enough, the system will bypass the
able HTTPS traffic. This action cannot be changed.
1. Configure a SSL proxy profile, including the following items: choose the work mode, specify the trust domain of
the Web server certificate and the HTTP port number of the Web server.
2. Bind a SSL proxy profile to a proper policy rule. The device will decrypt the HTTPS traffic that matches the policy
rule.
Service Port Specify the HTTP port number of the Web server.
Server Trust Since the device will work as the SSL server and use the certificate of the
Domain Web server to establish the SSL connection with Web clients (Web
browsers), you need to import the certificate and the key pair into a trust
domain in the device. For more information about importing the cer-
tificate and the key pair, see "PKI" on Page 137.
After you complete the importing, select the trust domain used by this
SSL Profile.
Warning Select Enable to enable the warning page. When the HTTPS traffic is
decrypted by the SSL proxy function, the request to a HTTPS website will
be redirected to a warning page of SSL proxy. In this page, the system
notifies the users that their accesses to HTTPS websites are being mon-
itored and asks the uses to protect their privacy.
Function Description
Web content Controls the network behavior of visiting the webpages (including the
webpages encrypted by HTTPS) that contain certain keywords, and log the
actions.
Web posting Controls the network behavior of posting on websites (including the
webpages encrypted by HTTPS) and posting specific keywords, and logs the
posting action and posted content.
Email filter Controls and audit SMTP mails and the web mails (including the encrypted
Gmail mails):
l Control and audit the behaviors of sending emails that contain spe-
cific sender, recipient, keyword or attachment.
IM Control Controls and audits the MSN, QQ and Yahoo! Messenger chatting.
HTTP/FTP control Controls and audits the actions of HTTP and FTP applications:
l HTTP methods, including Connect, Get, Put, Head, Options, Post, and
Trace;
Object Description
Predefined URL The predefined URL database includes dozens of categories and tens of mil-
DB lions of URLs and you can use it to specify the URL category and URL range
for the URL category/Web posting functions.
User-defined URL The user-defined URL database is defined by yourself and you can use it to
DB specify the URL category and URL range for the URL category/Web posting
functions.
URL Lookup Use the URL lookup function to inquire URL information from the URL data-
base.
Keyword Cat- Use the keyword category function to customize the keyword categories.
egory You can use it to specify the keyword for the URL category/Web post-
ing/email filter functions.
Warning Page l Block warning: When your network access is blocked, you will be
prompted with a warning page in the Web browser.
Predefined URL D B
The system contains a predefined URL database.
Note: The predefined URL database is controlled by a license controlled. Only after a URL
license is installed, the predefined URL database can be used.
The predefined URL database provides URL categories for the configurations of Web content/Web posting. It includes
dozens of categories and tens of millions of URLs .
When identifying the URL category of a URL, the user-defined URL database has a higher priority than the predefined
URL database.
3. Select Enable Auto Update to enable the automatic update function. And then continue to specify the frequency
and time. Click OK to save your settings.
4. Click Configure Update Server to configure the update server URL. In the pop-up dialog, specify the URL or IP
address of the update server, and select the virtual router that can connect to the server. To restore the URL set-
tings to the default ones, click Restore Default.
5. Click Configure Proxy Server, then enter the IP addresses and ports of the main proxy server and the backup
proxy server. When the device accesses the Internet through a HTTP proxy server, you need to specify the IP
address and the port number of the HTTP proxy server. With the HTTP proxy server specified, various signature
database can update normally.
2. In the URL category database update section, click Update to update the predefined URL database.
2. In the URL category database update section, click Browse to select the URL database file from your local disk.
Us er-defined URL D B
Besides categories in predefined URL database, you can also create user-defined URL categories, which provides URL
categories for the configurations of Web content/Web posting. When identifying the URL category, the user-defined
URL database has a higher priority than the predefined URL database.
System provides three predefined URL categories: custom1, custom2, custom3. You can import your own URL lists
into one of the predefined URL category.
Configuring U se r- de fine d U RL D B
To configure a user-defined URL category:
1. Select Policy > Internet Behavior Control > Web Content/Web Posting.
2. At the top-right corner, select Configuration > User-defined URL DB. The User-defined URL DB dialog
appears.
4. Type the category name in the Category box. URL category name cannot only be a hyphen (-). And you can create
at most 16 user-defined categories.
6. Click Add to add the URL and its category to the table.
7. To edit an existing one, select it and then click Edit. After editing it, click Add to save the changes.
Importing U se r- de fine d U RL
System supports to batch import user-defined URL lists into the predefined URL category named custom1/2/3. To
import user-defined URL:
2. At the top-right corner, select Configuration > User-defined URL DB. The User-defined URL DB dialog
appears.
3. Select one of the predefined URL category(custom1/2/3), and then click Import.
4. In the Batch Import URL dialog, click Browse button to select your local URL file. The file should be less than 1 M,
and has at most 1000 URLs. Wildcard is supported to use once in the URL file, which should be located at the start
of the address.
2. At the top-right corner, select Configuration > User-defined URL DB. The User-defined URL DB dialog
appears.
3. Select one of the predefined URL category(custom1/2/3), and then click Clear, the URL in the custom 1/2/3 will
be cleared from the system.
1. Select Policy > Internet Behavior Control > Web Content/Web Posting.
2. At the top-right corner, click Configuration > URL Lookup. The URL Lookup dialog appears.
3. Type the URL into the Please enter the URL to inquire box.
4. Click Inquire, and the results will be displayed at the bottom of the dialog.
Configuring U RL Lookup Se rv e rs
URL lookup server can classify an uncategorized URL (URL is neither in predefined URL database nor in user-defined
URL database) you have accessed, and then add it to the URL database during database updating. Two default URL
lookup servers are provided: url1.hillstonenet.com and url2.hillstonenet.com. By default, the URL lookup servers are
enabled.
To configure a URL lookup server:
1. Select Policy > Internet Behavior Control > Web Content/Web Posting.
2. At the top-right corner, Select Configuration > Predefined URL DB. The Predefined URL DB dialog appears.
3. Click Inquiry Server Configuration. The Predefined URL DB Inquiry Server Configuration dialog appears.
4. In the Inquiry server section, double-click the cell in the IP/Port/Virtual Router column of Server1/2 and type a
new value.
l If the sum is larger than or equal to category threshold (100), the configured category action will be triggered;
l If more than one category action can be triggered and there is block action configured, the final action will be
Block;
l If more than one category action can be triggered and all the configured actions are Permit, the final action will be
Permit.
For example, a web content rule contains two keyword categories C1 with action block and C2 with action permit. Both
of C1 and C2 contain the same keywords K1 and K2. Trust values of K1 and K2 in C1 are 20 and 40. Trust values of K1
and K2 in C2 are 30 and 80.
If the system detects 1 occurrence of K1 and K2 each on a web page, then C1 trust value is 20*1+ 40*1=60<100,
and C2 trust value is 30*1+80*1=110>100. As a result, the C2 action is triggered and the web page access is per-
mitted.
If the system detects 3 occurrences of K1 and 1 occurrence of K2 on a web page, then C1 trust value is 20*3+40*1-
1=100, and C2 trust value C2 is 30*3+80*1=170>100. Conditions for both C1 and C2 are satisfied, but the block
action for C1 is triggered, so the web page access is denied.
1. Select Policy > Internet Behavior Control > Web Content/Web Posting/Email Filter.
2. At the top-right corner, Select Configuration > Keyword Category. The Keyword Category dialog appears.
8. To delete a keyword, select the keyword you want to delete from the list and click Delete.
Wa rning Pa ge
The warning page shows the user block information and user audit information.
After enabling the block warning function, block warning information will be shown in the browser when one of the fol-
lowing actions is blocked:
l Visiting the web page that contains a certain type of keyword category
l HTTP actions of Connect, Get, Put, Head, Options, Post, and Trace. HTTP binary file download, such as .bat, .com.
Downloading ActiveX and Java Applet.
The block warning function is enabled by default. To configure the block warning function:
1. Click Policy > Internet Behavior Control > Web Content/Web Posting/Email Filter/HTTP/FTP
Control.
2. At the top-right corner, Select Configuration > Warning Page. The Warning Page dialog appears.
The audit warning function is disabled by default. To configure the audit warning function:
1. Select Policy > Internet Behavior Control > Web Content/Web Posting/Email Filter/HTTP/FTP Con-
trol.
2. At the top-right corner, Select Configuration > Warning Page. The Warning Page dialog appears.
Bypa s s D om a in
Regardless of internet behavior control rules, requests to the specified bypass domains will be allowed uncon-
ditionally.
To configure a bypass domain:
1. Select Policy > Internet Behavior Control > Web Content/Web Posting/Email Filter/HTTP/FTP Con-
trol.
4. Click Add. The domain name will be added to the system and displayed in the bypass domain list.
Us er Ex c eption
The user exception function is used to specify the users who will not be controlled by the internet behavior control
rules. The system supports the following types of user exception: IP, IP range, role, user, user group, and address
entry.
To configure the user exception:
1. Select Policy > Internet Behavior Control > Web Content/Web Posting/Email Filter/IM Con-
trol/HTTP/FTP Control.
2. At the top-right corner, Select Configuration > User Exception. The User Exception dialog appears.
3. Select the type of the user from the Type drop-down list.
5. Click Add. The user will be added to the system and displayed in the user exception list.
2. Click Add.
Option Description
User Type Specifies the users for the rule. The rule will be executed on the traffic of
the specified users. The user type includes the following options:
By default, the system use the address entry of any, then the rule will
4. After adding the desired addresses, click the blank area in this
dialog to complete the source address configuration.
l When selecting the Address Book type, you can click Add to cre-
ate a new address entry.
User Specifies a role, user or user group for the security policy rule.
1. From the User drop-down menu, select the AAA server where the
users and user groups reside. To specify a role, select Role from
the AAA Server drop-down list.
4. After adding the desired objects, click the blank area in this dia-
log to complete the user configuration.
Schedule Specifies the schedule of the rule. The rule will take effect in the period
defined by the schedule. By default, no schedule is specified, and the
rule is available all the time.
Select the check boxes of the wanted schedules in the list or create new
schedules by clicking New Schedule.
l Block: Select the check box to block the web pages containing the
corresponding keywords.
l Log: Select the check box to record log messages when visiting
the web pages containing the corresponding keywords.
l Record contents: Select the check box to record the keyword con-
text. This option is available only when the device has a storage
media (SD card, U disk, or storage module provided by Hillstone)
with the NBC license installed.
Apply to URL Cat- Specify the coverage of this rule. By default, the rule applies to all web-
egory site.
3. Click OK.
3. Click OK.
If necessary, you can configure some additional features by going to the right top corner and click Configuration.
Option Description
Predefined URL The predefined URL database includes dozens of categories and tens of mil-
DB lions of URLs and you can use it to specify the URL category and URL range
for the URL category/Web posting functions.
User-defined URL The user-defined URL database is defined by yourself and you can use it to
DB specify the URL category and URL range for the URL category/Web posting
functions.
URL Lookup Use the URL lookup function to inquire URL information from the URL data-
base.
l You can export logs to a designated destination. Refer to "Log Configuration" on Page 443.
l By default, a rule will immediately take effect after you click OK to complete configuration.
2. Click Priority.
4. Click OK.
View ing Monitored Res ults of Keyw ord Bloc k ing in Web Content
If you have configured email filter with keyword blocking, you can view the monitored results of blocking those words.
Select Monitor > Keyword Block > Web Content, you will see the monitored results. For more about monitoring,
refer to "Web Content" on Page 413.
2. Click New.
Option Description
User Type Specifies the users for the rule. The rule will be executed on the traffic of
the specified users. The user type includes the following options:
By default, the system use the address entry of any, then the rule will
be executed on all traffic.
4. After adding the desired addresses, click the blank area in this
dialog to complete the source address configuration.
l When selecting the Address Book type, you can click Add to cre-
ate a new address entry.
User Specifies a role, user or user group for the security policy rule.
1. From the User drop-down menu, select the AAA server where the
users and user groups reside. To specify a role, select Role from
the AAA Server drop-down list.
4. After adding the desired objects, click the blank area in this dia-
log to complete the user configuration.
Schedule Specifies the schedule of the rule. The rule will take effect in the period
defined by the schedule. By default, no schedule is specified, and the
rule is available all the time.
Select the check boxes of the wanted schedules in the list or create new
schedules by clicking New Schedule.
Apply to URL Cat- Specify the coverage of this rule. By default, the rule applies to all web-
egory site.
3. Click OK.
Posting inform- Controls the action of posting specific keywords. The options are:
ation with spe-
l New: Creates new keyword categories. For more information
cific keyword
about keyword category, see "Keyword Category" on Page 326.
3. Click OK.
If necessary, you can configure some additional features by going to the right top corner and click Configuration.
Option Description
Predefined URL The predefined URL database includes dozens of categories and tens of mil-
DB lions of URLs and you can use it to specify the URL category and URL range
for the URL category/Web posting functions.
User-defined URL The user-defined URL database is defined by yourself and you can use it to
DB specify the URL category and URL range for the URL category/Web posting
functions.
URL Lookup Use the URL lookup function to inquire URL information from the URL data-
base.
l If there is an action conflict between setting for "all websites" and "specific keywords",
when a traffic matches both rules, the "deny" action shall prevail.
l You can export logs to a designated destination. Refer to "Log Configuration" on Page 443.
l By default, a rule will immediately take effect after you click OK to complete configuration.
2. Click Priority.
4. Click OK.
View ing Monitored Res ults of Keyw ord Bloc k ing in Web Pos ts
If you have configured web posting rule with keyword blocking, you can view the monitored results of blocking those
words.
Select Monitor > Keyword Block > Web Posting, you will see the monitored results. For more about monitoring,
refer to "Keyword Block" on Page 413.
2. Click New.
Option Description
User Type Specifies the users for the rule. The rule will be executed on the traffic of
the specified users. The user type includes the following options:
By default, the system use the address entry of any, then the rule will
4. After adding the desired addresses, click the blank area in this
dialog to complete the source address configuration.
l When selecting the Address Book type, you can click Add to cre-
ate a new address entry.
User Specifies a role, user or user group for the security policy rule.
1. From the User drop-down menu, select the AAA server where the
users and user groups reside. To specify a role, select Role from
the AAA Server drop-down list.
4. After adding the desired objects, click the blank area in this dia-
log to complete the user configuration.
Schedule Specifies the schedule of the rule. The rule will take effect in the period
defined by the schedule. By default, no schedule is specified, and the
rule is available all the time.
Select the check boxes of the wanted schedules in the list or create new
schedules by clicking New Schedule.
Control Type All emails - This option applies to all the sending emails.
l Record Log - Select this check box if you want all emails to be
logged.
1. Click Sender.
3. Click Add.
5. Click OK.
1. Click Sender.
3. Click Add.
5. Click OK.
2. In the prompt, click Add. See the Keyword Category part in "Con-
figuring Internet Behavior Control Objects" on Page 322.
Exclusive Mailbox
Exclusive Mail- To configure mail addresses that do not follow the regulations of email
box filter:
4. Click OK.
If needed, you can also configure SSL proxy, keyword category, warning page, bypass domain and user exception.
To configure those feature, click Configuration on the right top corner of the Email Filter list page.
Keyword Cat- Use the keyword category function to customize the keyword categories.
egory You can use it to specify the keyword for the URL category/Web post-
ing/email filter functions.
Note:
l If an email filter rule has added all three of Audit/Block Sender, Receiver and email content,
the rule will take effect when one of them is hit.
l You can export logs to a designated destination. Refer to "Log Configuration" on Page 443.
l By default, a rule will immediately take effect after you click OK to complete configuration.
2. Click Priority.
4. Click OK.
2. Click New.
Option Description
User Type Specifies the users for the rule. The rule will be executed on the traffic
of the specified users. The user type includes the following options:
By default, the system use the address entry of any, then the rule will
be executed on all traffic.
4. After adding the desired addresses, click the blank area in this
dialog to complete the source address configuration.
l When selecting the Address Book type, you can click Add to cre-
ate a new address entry.
User Specifies a role, user or user group for the security policy rule.
1. From the User drop-down menu, select the AAA server where
the users and user groups reside. To specify a role, select Role
from the AAA Server drop-down list.
4. After adding the desired objects, click the blank area in this dia-
log to complete the user configuration.
Schedule Specifies the schedule of the rule. The rule will take effect in the period
defined by the schedule. By default, no schedule is specified, and the
rule is available all the time.
Select the check boxes of the wanted schedules in the list or create new
schedules by clicking New Schedule.
Action
2. Click Add. The added account will be shown in the list below.
3. Select the action check boxes for the accounts in the account list.
2. Click Add. The added account will be shown in the list below.
3. Select the action check boxes for the accounts in the account list.
2. Click Add. The added account will be shown in the list below.
3. Select the action check boxes for the accounts in the account list.
3. Click OK.
If necessary, you can configure some additional features by going to the right top corner and click Configuration.
Option Description
User Exception Users that are not controlled by the internet behavior control rules.
l By default, a rule will immediately take effect after you click OK to complete configuration.
2. Click Priority.
4. Click OK.
l Behavior control and audit of controlling the actions of Login, Get, and Put action in FTP;
l Behavior control and audit of controlling the actions of Connect, Get, Put, Head, Options, Post, Trace, Delete in
HTTP.
l Blocking downloading specific format files (e.g. bat and com), ActiveX and Java Applet objects.
2. Click New.
4. After adding the desired addresses, click the blank area in this dia-
log to complete the source address configuration.
You can also perform other operations:
l When selecting the Address Book type, you can click Add to cre-
ate a new address entry.
1. From the User drop-down menu, select the AAA server where the
users and user groups reside. To specify a role, select Role from
the AAA Server drop-down list.
4. After adding the desired objects, click the blank area in this dialog
to complete the user configuration.
Schedule Specifies the schedule of the rule. The rule will take effect in the period
defined by the schedule. By default, no schedule is specified, and the
rule is available all the time.
Select the check boxes of the wanted schedules in the list or create new
schedules by clicking New Schedule.
Action
FTP Controls the FTP methods, including Login, Get, and Put. Expand FTP,
and configure the FTP control options.
l Type the file name (for the method of GET or PUT) or user name
(for the method of Login) into the next box.
l From the second drop-down list, select the action. It can be Block
or Permit.
l From the third drop-down list, specify whether to record the log
messages.
l Click Add.
HTTP Controls the HTTP methods, including Connect, GET, PUT, Head,
Options, Post, Trace, and Delete. Expand HTTP, and configure the HTTP
control options.
l From the second drop-down list, select the action. It can be Block
or Permit.
l From the third drop-down list, specify whether to record the log
messages.
l Click Add.
3. Click OK.
If necessary, you can configure some additional features by going to the right top corner and click Configuration.
Option Description
Warning Page l Block warning: When your network access is blocked, you will be
prompted with a warning page in the Web browser.
Note:
l You can export logs to a designated destination. Refer to "Log Configuration" on Page 443.
l By default, a rule will immediately take effect after you click OK to complete configuration.
2. Click Priority.
4. Click OK.
Co nfiguring I P B lo ck Settings
To configure the IP block settings:
Virtual Router Selects the virtual router that the IP address belongs to.
IP Types the IP address that you want to block. This IP address can be not
only the source IP address, but also the destination IP address.
Blocked Dur- Types the duration that the IP address will be blocked. The unit is
ation second. The value ranges from 60 to 3600. The default value is 60.
Virtual Router Selects the virtual router that the IP address belongs to.
Source IP Types the source IP address of the blocked service. The service block func-
tion will block the service from the source IP address to the destination IP
address.
Threat prevention, that device can detect and block network threats occur. By configuring the threat protection func-
tion, Hillstone device can defense network attacks, and reduce losses caused by internal network.
Threat protection includes:
l Anti Virus: can detect the common file types and protocol types which are most likely to carry the virus and pro-
tect. Hillstone device can detect protocol types of POP3, HTTP, SMTP, IMAP4 and FTP, and the file types of archives
(including GZIP, BZIP2, TAR, ZIP and RAR-compressed archives), PE , HTML, MAIL, RIFF and JPEG.
l Intrusion Prevention: can detect and protect against mainstream application layer protocols (DNS, FTP, POP3,
SMTP, TELNET, MYSQL, MSSQL, ORACLE, NETBIOS), against web-based attacks and common Trojan attacks.
l Attack Defense: detect various types of network attacks, and take appropriate actions to protect Intranet against
malicious attacks, thus assuring the normal operation of the Intranet and systems.
l Perimeter Traffic Filtering: can filter the perimeter traffic based on known IP of black/white list, and take block
action on the malicious traffic that hits the blacklist.
The threat protection configurations based on security zones and policies.
l If a security zone is configured with the threat protection function, the system will perform detection on the traffic
that is destined to the binding zone specified in the rule, and then do according to what you specified.
l If a policy rule is configured with the threat protection function, the system will perform detection on the traffic
that is destined to the policy rule you specified, and then response.
l The threat protection configurations in a policy rule is superior to that in a zone rule if specified at the same time,
and the threat protection configurations in a destination zone is superior to that in a source zone if specified at the
same time.
Note:
l Currently, you can only enable the Anti Virus and Intrusion Prevention function based on
policies.
l Threat protection is controlled by license. To use Threat protection, apply and install the
Threat Protection( TP) license, 、 Anti Virus( AV) license orIntrusion Prevention System
( IPS) license.
Note: Anti Virus is controlled by license. To use Anti Virus, apply and install the Anti Virus
( AV) license.
Prepa ring
Before enabling Anti-Virus, make the following preparations:
2. Import an Anti-Virus license and reboot. The Anti-Virus will be enabled after the rebooting.
Note:
l You need to update the Anti-Virus signature database before enabling the function for the
first time. For more information about how to configure the update. To assure a proper con-
nection to the default update server, you need to configure a DNS server for StoneOS
before updating.
l If a security zone is configured with the Anti-Virus function, the system will perform detection on the traffic that is
destined to the binding zone specified in the rule, and then do according to what you specified.
l If a policy rule is configured with the threat protection function, the system will perform detection on the traffic
that is destined to the policy rule you specified, and then response.
l The threat protection configurations in a policy rule is superior to that in a zone rule if specified at the same time,
and the threat protection configurations in a destination zone is superior to that in a source zone if specified at the
same time.
l To perform the Anti-Virus function on the HTTPS traffic, see the policy-based Anti-Virus.
To realize the zone-based Anti-Virus:
1. Create a zone. For more information about how to create, refer to "Security Zone" on Page 35.
3. Enable the threat protection you need, and select an Anti-Virus rules from the profile drop-down list below; or you
can click Add Profile from the profile drop-down list below, to creat an Anti-Virus rule, see Configuring_Anti-
Virus_Rule.
1. Create a security policy rule. For more information, refer to "Security Policy" on Page 274.
4. To perform the Anti-Virus function on the HTTPS traffic, you need to enable the SSL proxy function for the above
specified security policy rule. The system will decrypt the HTTPS traffic according to the SSL proxy profile and
then perform the Anti-Virus function on the decrypted traffic.
According to the various configurations of the security policy rule, the system will perform the fol-
lowing actions:
Policy Rule Con-
Actions
figurations
SSL proxy The system decrypts the HTTPS traffic according to the SSL proxy profile
enabled but it does not perform the Anti-Virus function on the decrypted traffic.
Anti-Virus dis-
abled
SSL proxy The system decrypts the HTTPS traffic according to the SSL proxy profile
enabled and performs the Anti-Virus function on the decrypted traffic.
Anti-Virus
enabled
SSL proxy dis- The system performs the Anti-Virus function on the HTTP traffic accord-
abled ing to the Anti-Virus profile. The HTTPS traffic will not be decrypted and
the system will transfer it.
Anti-Virus
enabled
If the destination zone or the source zone specified in the security policy rule are configured with Anti-Virus as
well, the system will perform the following actions:
2. Click New.
l Fill Magic - Processes the virus file by filling magic words, i.e., fills
the file with the magic words (Virus is found, cleaned) from the
beginning to the ending part of the infected section.
l Reset Connection - If virus has been detected, system will reset con-
nections to the files.
Malicious Web- Select the check box behind Malicious Website Access Control to enable
site Access Con- the function.
trol
Action Specifies the action the system will take after the malicious website is
found.
Enable label e- If an email transferred over SMTP is scanned, you can enable label email
mail to scan the email and its attachment(s). The scanning results will be
included in the mail body, and sent with the email. If no virus has been
detected, the message of "No virus found" will be labeled; otherwise
information related to the virus will be displayed in the email, including
the filename, result and action.
Type the end message content into the box. The range is 1 to 128.
Note: By default, according to virus filtering protection level, system comes with three default
virus filtering rules: predef_low, predef_middle, predef_high. The default rule is not allowed
to edit or delete.
l Log Only - Only generates logs but will not scan the files. This action
is enabled by default.
l Reset Connection - If virus has been detected, StoneOS will reset con-
nections to the files.
l Log Only - Only generates logs but will not scan the files.
2. Click OK.
l By integrating with the SSL proxy function, IPS can monitor the HTTPS traffic.
The protocol detection procedure of IPS consists of two stages: signature matching and protocol parse.
l Signature matching: IPS abstracts the interested protocol elements of the traffic for signature matching. If the ele-
ments are matched to the items in the signature database, the system will process the traffic according to the
action configuration. This part of detection is configured in the Select Signature section.
l Protocol parse: IPS analyzes the protocol part of the traffic. If the analyze results shows the protocol part contains
abnormal contents, the system will process the traffic according to the action configuration. This part of detection
is configured in the Protocol Configuration section.
Note: Intrusion Prevention System is controlled by license. To use Threat protection, apply
and install the Intrusion Prevention System (IPS) license.
Signatures
The IPS signatures are categorized by protocols, and identified by a unique signature ID. The signature ID consists of
two parts: protocol ID (1st bit or 1st and 2nd bit) and attacking signature ID (the last 5 bits). For example, in ID
605001, "6" identifies a Telnet protocol, and "00120" is the attacking signature ID. 1st bit in signature ID identify pro-
tocol anomaly signatures, the others identify attacking signatures. The mappings between IDs and protocols are
shown in the table below:
In the above table, Other-TCP identifies all the TCP protocols other than the standard TCP protocols listed in the table,
and Other-UDP identifies all the UDP protocols other than the standard UDP protocols listed in the table.
Prepa ra tion
Before enabling IPS, make the following preparations:
2. Import an Prevention System (IPS) license and reboot. The IPS will be enabled after the rebooting.
l To perform the IPS function on the HTTPS traffic, see the policy-based IPS.
To realize the zone-based IPS:
1. Create a zone. For more information about how to create, refer to "Security Zone" on Page 35.
3. Enable the IPS you need, and select an IPS rules from the profile drop-down list below; or you can click Add Pro-
file from the profile drop-down list below, to creat an IPS rule, see Configuring_an_IPS_Rule.
4. Click a direction (Inbound, Outbound, Bi-direction). The IPS rule will be applied to the traffic that is matched with
the specified security zone and direction.
To realize the policy-based IPS:
1. Create a policy rule. For more information about how to create, refer to "Security Policy" on Page 274.
3. Select the Enable check box of IPS. Then select an IPS rule from the Profile drop-down list. Or you can click Add
Profile from the Profile drop-down list to creat an IPS rule. For more information, see Configuring_an_IPS_Rule.
4. To perform the IPS function on the HTTPS traffic, you need to enable the SSL proxy function for the above spe-
cified security policy rule. The system will decrypt the HTTPS traffic according to the SSL proxy profile and then
perform the IPS function on the decrypted traffic.
According to the various configurations of the security policy rule, the system will perform the fol-
lowing actions:
Policy Rule Con-
Actions
figurations
SSL proxy The system decrypts the HTTPS traffic according to the SSL proxy profile
enabled but it does not perform the IPS function on the decrypted traffic.
IPS disabled
SSL proxy The system decrypts the HTTPS traffic according to the SSL proxy profile
If the destination zone or the source zone specified in the security policy rule are configured with IPS as well, the
system will perform the following actions:
Configuring a n IP S Rule
System has two default IPS rules: predef_default and predef_loose. The predef_default rule includes all the IPS
signatures and its default action is reset. The predef_loose includes all the IPS signatures and its default action is log
only.
To configure an IPS rule:
2. Click New to create a new IPS rule. To edit an existing one, select the check box of this rule and then click Edit. To
view it, click the name of this rule.
l Select By: Select the method of how to choose the signature set. There are two meth-
ods: Filter and Search Condition.
l Action: Specify the action performed on the abnormal traffic that match the signature
set.
Select By
Filter The system categorizes the signatures according to the following aspects
(aka main categories): affected OS, attack type, protocol, severity, released
year, affected application, and bulletin board. A signature can be in several
subcategories of one main category. For example, the signature of ID 105001
is in the Linux subcategory, the FreeBSD subcategory, and Other Linux sub-
category at the same time.
With Filter selected, the system displays the main categories and sub-
categories above. You can select the subcategories to choose the signatures
in this subcategory. As shown below, after selecting the Web Attack sub-
category in the Attack Type main category, the system will choose the sig-
natures related to this subcategory. To view the detailed information of
these chosen signatures, you can click the ID in the table.
When selecting main category and subcategory, note the following matters:
l You can select multiple subcategories of one main category. The logic
relation between them is OR.
l For example, you have selected Windows and Linux in OS and select
HIGH in Severity. The chosen signatures are those whose severity is
high and meanwhile whose affected operating system is either Win-
dows or Linux.
Search Condi- Enter the information of the signatures and press Enter to search the sig-
tion natures. The system will perform the fuzzy matching in the following field:
attack ID, attack name, description, and CVE-ID.
In the search results displayed in the table, select the check box of the
l Always perform the stricter action on the attack. The signature set with stricter
action will be matched. The strict level is: Block IP > Block Service > Rest > Log
Only. If one signature set is Block IP with 15s and the other is Block Service with 30s,
the final action will be Block IP with 30s.
l The action of the signature set created by Search Condition has high priority than the
action of the signature set created by Filter.
6. In the Protocol Configuration area, click . The protocol configurations specify the requirements that the pro-
tocol part of the traffic must meet. If the protocol part contains abnormal contents, the system will process the
traffic according to the action configuration. The system supports the configurations of HTTP, DNS, FTP, MSRPC,
POP3, SMTP, SUNRPC, and Telnet.
In the HTTP tab, select the Protocol tab, and configure the following settings:
l Banner information - Type the new information into the box that
will replace the original server banner information.
Max URI Length: Specify a max URI length for the HTTP protocol. If the
URI length exceeds the limitation, you can:
To protect the Web server, select Web Server in the HTTP tab.
Protecting the Web server means the system can detect the following attacks: SQL injection, XSS injection,
external link check, ACL, and HTTP request flood and take actions when detecting them. A pre-defined Web server
protection rule named default is built in. By default, this protection rule is enabled and cannot be disabled or
deleted.
Configure the following settings to protect the Web server:
Option Description
SQL Injection Pro- Select the Enable check box to enable SQL injection check.
tection
l Action: Log Only - Record a log. Rest - Reset connections (TCP) or
sends destination unreachable packets (UDP) and also generates
logs. Block IP - Block the IP address of the attacker and specify a
l Check point: Specifies the check point for the SQL injection check. It
can be Cookie, Cookie2, Post, Referer or URI.
XSS Injection Pro- Select the Enable check box to enable XSS injection check for the HTTP
tection protocol.
l Check point: Specifies the check point for the XSS injection check. It
can be Cookie, Cookie2, Post, Referer or URI.
External Link Select the Enable check box to enable external link check for the Web
Check server. This function controls the resource reference from the external
sites.
l External link exception: Click this link, the External Link Exception
Configuration dialog appears. All the URLs configured on this dialog
can be linked by the Web sever. At most 32 URLs can be specified for
one Web server.
l Auto (JS Cookie): The Web browser will finish the authen-
tication process automatically.
l Request limit: Specifies the request limit for the HTTP request
flood protection. After configuring the request limit, the system
will limit the request rate of each source IP. If the request rate is
higher than the limitation specified here and the HTTP request
flood protection is enabled, the system will handle the exceeded
requests according to the action specified (Block IP/Reset). To
record a log, select the Record log check box.
l Proxy limit: Specifies the proxy limit for the HTTP request flood pro-
tection. After configuring the proxy limit, the system will check
whether each source belongs to the each source IP proxy server. If
belongs to, according to configuration to limit the request rate. If
the request rate is higher than the limitation specified here and the
HTTP request flood protection is enabled, the system will handle the
exceeded requests according to the action specified (Block IP/Reset).
To record a log, select the Record log check box.
l White List: Specifies the white list for the HTTP request flood pro-
tection. The source IP added to the white list not check the HTTP
request flood protection.
l Banner Information: Type the new information into the box that will
replace the original server banner information.
Max Command Line Length: Specifies a max length (including carriage
return) for the FTP command line. If the length exceeds the limits, you
can:
l Block Service - Block the service of the attacker and specify a block
duration.
l Block Service - Block the service of the attacker and specify a block
duration.
l Banner information - Type the new information into the box that
will replace the original server banner information.
Max Command Line Length: Specifies a max length (including carriage
return) for the POP3 command line. If the length exceeds the limits, you
l Block Service - Block the service of the attacker and specify a block
duration.
l Block Service - Block the service of the attacker and specify a block
duration.
l Block Service - Block the service of the attacker and specify a block
duration.
l Block Service - Block the service of the attacker and specify a block
duration.
Option Description
IPS Select/clear the Enable check box to enable/disable the IPS function.
Merge Log System can merge IPS logs which have the same protocol ID, the same VSYS
ID, the same Signature ID, the same log ID, and the same merging type.
Thus it can help reduce logs and avoid to receive redundant logs. The func-
tion is disabled by default.
Select the merging types in the drop-down list:
l Source IP, Destination IP - Merge the logs with the same Source IP
and the same Destination IP.
Mode Specifies a working mode for IPS:
l IPS - If attacks have been detected, StoneOS will generate logs, and will
also reset connections or block attackers. This is the default mode.
l Log only - If attacks have been detected, StoneOS will only generate
logs, but will not reset connections or block attackers.
Signature List
Select Object > Intrusion Prevention System > Signature List. You can see the signature list.
The upper section is for searching signatures. The lower section is for managing signatures.
Attack Type Select the attack type from the drop-down list.
l Track - Select the track type from the drop-down list. It can be by_
src or by_dst. System will use the statistic of source IP or des-
tination IP to check whether the attack matches this rule.
l Count - Specifies the maximum times the rule occurs in the spe-
cified time. If the attacks exceed the Count value, system will trig-
In the Content tab, click New to specify the content of the signature:
Option Description
Content Specifies the signature content. Select the following check box if needed:
l URI - Means the content needs to match URI field of HTTP request.
Relative Specifies the signature content location.
l Offset: System will start searching after the offset from the
header of the application layer packet. The unit is byte.
l Depth: Specifies the scanning length after the offset. The unit
is byte.
l Load the database: After you create a new signature, click Load Database to make the newly created signature
take effect.
l Edit a signature: Select a signature and then click Edit. You can only edit the user-defined signature. After edit-
ing the signature, click Load Database to make the modifications take effect.
l Delete a signature: Select a signature and then click Delete. You can only delete the user-defined signature.
After deleting the signature, click Load Database to make the deletion take effect.
Sandbox
A sandbox executes a suspicious file in a virtual environment, collects the actions of this file, analyzes the collected
data, and verifies the legality of the file.
The Sandbox function of the system uses the cloud sandbox technology. The suspicious file will be uploaded to the
cloud side and the cloud sandbox will collect the actions of this file, analyze the collected data, verify the legality of the
file, and give the analyze result to the system.
The Sandbox function contains the following parts:
l If there is no analyze result about this file in the local database, system will upload this file to the cloud intel-
ligence server, and the cloud server intelligence will upload the suspicious file to the cloud sandbox for ana-
lysis.
l If this file has been identified as an illegal file in the local database of the Sandbox function, the system will
generate corresponding threat logs and cloudsandbox logs.
Additionally, you can specify the criteria of the suspicious files by configuring a sandbox profile.
l Check the analyze result returned from the cloud sandbox and take actions: The Sandbox function checks the ana-
lyze result of the suspicious file returned from the cloud sandbox, verifies the legality of the file, saves the result
to the local database. If this suspicious is identified as an illegal file, the system will generate threat logs and
cloudsandbox logs. This part is completed by the Sandbox function automatically.
l Maintain the local database of the Sandbox function: Record the information of the uploaded files, including
uploaded time, analyze result. This part is completed by the Sandbox function automatically.
Note: The Sandbox function is controlled by license. To use the Sandbox function, install the
Cloud sandbox license.
Co nfiguring Sandbo x
This chapter includes the following sections:
Prepa ra tion
Before enabling the Sandbox function, make the following preparations:
3. Import the Cloud sandbox license and reboot. The Sandbox function will be enabled after the rebooting.
Configuring Sa ndbox
The system supports the policy-based Sandbox. To realize the policy-based Sandbox:
1. Click Object > Sandbox > Configuration. Select Enable check box to enable the Sandbox function.
2. Click Object > Sandbox > Profile to create a sandbox rule you need.
l File Type: Support to detect PE, APK, JAR, MS-Office, PDF, SWF, RAR and ZIP file.
l Protocol Type: Support to detect HTTP, FTP, POP3, SMTP and IMAP4 protocol.
l White list: A white list includes domain names that are safe. When a file extracted from the traffic is from a
domain name in the white list, this file will not be marked as a suspicious file and it will not be upload to the cloud
sandbox.
l File filter: Mark the file as a suspicious file if it satisfies the criteria configured in the file filter settings. The ana-
lyze result from the cloud sandbox determines whether this suspicious file is legal or not.
There are three built-in sandbox rules with the files and protocols type configured, white list enabled and file filter con-
figured. The three default sandbox rules includes predef_low, predef_middle and predef_high.
l predef_low: A loose sandbox detection rule, whose file type is PE and protocol types are
HTTP/FTP/POP3/SMTP/IMAP4, with white list and file filter enabled.
l predef_middle: A middle-level sandbox detection rule, whose file types are PE/APK/JAR/MS-Office/PDF and pro-
tocol types are HTTP/FTP/POP3/SMTP/IMAP4, with white list and file filter enabled.
l predef_high: A strict sandbox detection rule, whose file types are PE/APK/JAR/MS-Office/PDF/SWF/RAR/ZIP and
protocol types are HTTP/FTP/POP3/SMTP/IMAP4, with white list and file filter enabled.
To create a new sandbox rule:
2. Click New to create a new sandbox rule. To edit an existing one, select the check box of this rule and then click
Edit.
Certificate verify Select Enable to enable the verification for the trusted certification. After
enabling, system will not detect the PE file whose certification is trusted.
File Filter: Mark the file as a suspicious file if it satisfies the criteria configured in the file fil-
ter settings. The analyze result from the cloud sandbox determines whether this sus-
picious file is legal or not. The logical relation is AND.
File Type Mark the file of the specified file type as a suspicious file. The system can
mark the PE(.exe), APK, JAR, MS-Office, PDF, SWF, RAR and ZIP file as a
suspicious file now. If no file type is specified, the Sandbox function will
mark no file as a suspicious one.
Protocol Specifies the protocol to scan. The system can scan the HTTP, FTP, POP3,
SMTP and IMAP4 traffic now. If no protocol is specified, the Sandbox
function will not scan the network traffic.
After specified the protocol type, you have to specify the direction of the
detection:
2. Select Enable check box of Sandbox to enable the Sandbox function. Clear the Enable check box to disable the
Sandbox function.
3. Specify the file size for the files you need. The file that is smaller than the specified file size will be marked as a
suspicious file.
4. If you select Benign file check box, system will record cloudsandbox logs of the file when it marks it as a benign
file. By default, system will not record logs for the benign files.
5. If you select Greyware file check box, system will record cloudsandbox logs of the file when it marks it as a grey-
ware file. A greyware file is the one system cannot judge it is a benign file or a malicious file. By default, system
will not record logs for the greyware files.
SYN Flo o d
Due to resource limitations, a server will only permit a certain number of TCP connections. SYN Flood just makes use of
this weakness. During the attack an attacker will craft a SYN packet, set its source address to a forged or non-existing
address, and initiate a connection to a server. Typically the server should reply the SYN packet with SYN-ACK, while
for such a carefully crafted SYN packet, the client will not send any ACK for the SYN-ACK packet, leading to a half-open
connection. The attacker can send large amount of such packets to the attacked host and establish equally large num-
ber of half-open connections until timeout. As a result, resources will be exhausted and normal accesses will be
blocked. In the environment of unlimited connections, SYN Flood will exhaust all the available memory and other
resources of the system.
WinNuke Attack
A WinNuke attack sends OOB (out-of-band) packets to the NetBIOS port (139) of a Windows system, leading to
NetBIOS fragment overlap and host crash. Another attacking vector is ICMP fragment. Generally an ICMP packet will
not be fragmented; so many systems cannot properly process ICMP fragments. If your system receives any ICMP frag-
ment, it's almost certain that the system is under attack.
Smurf Attack
Smurf attacks consist of two types: basic attack and advanced attack. A basic Smurf attack is used to attack a network
by setting the destination address of ICMP ECHO packets to the broadcast address of the attacked network. In such a
condition all the hosts within the network will send their own response to the ICMP request, leading to network con-
gestion. An advanced Smurf attack is mainly used to attack a target host by setting the source address of ICMP ECHO
packets to the address of the attacked host, eventually leading to host crash. Theoretically, the more hosts in a net-
work, the better the attacking effect will be.
Fraggle Attack
A fraggle attack is basically the same with a smurf attack. The only difference is the attacking vector of fraggle is UDP
packets.Fraggle.
Land Attack
During a Land attack, an attacker will carefully craft a packet and set its source and destination address to the address
of the server that will be attacked. In such a condition the attacked server will send a message to its own address, and
this address will also return a response and establish a Null connection. Each of such connections will be maintained
until timeout. Many servers will crash under Land attacks.
I P Fragment Attack
An attacker sends the victim an IP datagram with an offset smaller than 5 but greater than 0, which causes the victim
to malfunction or crash.
I P Optio n Attack
An attacker sends IP datagrams in which the IP options are abnormal. This attack intends to probe the network topo-
logy. The target system will break down if it is incapable of processing error packets.
1. Create a zone. For more information about how to create, refer to "Security Zone" on Page 35.
3. To enable the Attack Defense functions, select the Enable all check box, and click Configure.
l Address entry - Specifies the address entry and click Add to add to
the whitelist.
Enable all: Select this check box to enable all the Attack Defense func-
tions for the security zone.
Action: Specifies an action for all the Attack Defense functions, i.e., the
defense measure system will take if any attack has been detected.
Select all
l Drop - Drops packets. This is the default action.
l Max IP number per MAC - Specifies whether system will check the
IP number per MAC in ARP table. If the parameter is set to 0, sys-
tem will not check the IP number; if set to a value other than 0, the
system will check the IP number, and if the IP number per MAC is
larger than the parameter value, system will take the specified
l Reverse query - Select this check box to enable Reverse query. When
StoneOS receives an ARP request, it will log the IP address and reply
with another ARP request; and then StoneOS will check if any packet
with a different MAC address will be returned, or if the MAC address
of the returned packet is the same as that of the ARP request packet.
SYN flood: Select this check box to enable SYN flood defense for the
security zone.
MS-Windows WinNuke attack: Select this check box to enable WinNuke attack defense
defense for the security zone. If any WinNuke attack has been detected, StoneOS
will drop the packets and give an alarm.
IP address spoof: Select this check box to enable IP address spoof
defense for the security zone. If any IP address spoof attack has been
detected, StoneOS will drop the packets and give an alarm.
IP address sweep: Select this check box to enable IP address sweep
defense for the security zone.
l Proxy trigger rate - Specifies a min number for SYN packets that will
trigger SYN proxy or SYN-Cookie (if the Cookie check box is selec-
ted). If the number of inbound SYN packets destined to one single
port of one single destination IP address per second exceeds the spe-
cified value, StoneOS will trigger SYN proxy or SYN-Cookie. The
value range is 1 to 50000. The default value is 1000.
l Max SYN packet rate - Specifies a max number for SYN packets that
are permitted to pass through per second by SYN proxy or SYN-
Cookie (if the Cookie check box is selected). If the number of
inbound SYN packets destined to one single port of one single des-
tination IP address per second exceeds the specified value, StoneOS
will only permit the specified number of SYN packets to pass
through during the current and the next second. All the excessive
packets of the same type will be dropped during this period. The
value range is 1 to 1500000. The default value is 3000.
Protocol abnor- l Action - Specifies an action for TCP option anomaly attacks. The
mally report default action is Drop.
TCP split handshake: Select this check box to enable TCP split hand-
shake defense for the security zone.
5. Click OK.
l Predefined black list: Retrieve the IP of black/white list from the Perimeter Traffic Filtering signature database.
l User-defined black/white list : According to the actual needs of users, the specified IP address is added to a user-
definedblack/white list.
l Third-party black list: Make a linkage with trend of TDA, to get blacklisted from the trend TDA devices regularly.
Note:
l You need to update the IP reputation database before enabling the function for the first
time. By default, System will update the database at the certain time everyday, and you can
modify the updating settings according to your own requirements, see "Upgrading Sys-
tem" on Page 477.
l Perimeter Traffic Filtering is controlled by license. To use Threat protection, apply and
install the PTF license.
1. Create a zone. For more information about how to create, refer to "Security Zone" on Page 35;
3. Select the Enable check box after the Perimeter Traffic Filtering.
4. Specifies an action for the malicious traffic that hits the blacklist. Select the User-defined , Pre-defined or TDA
check box , and select the action from drop-down list:
l Log Only: Only generates logs if the malicious traffic hits the blacklist.This is the default option.
2. Click New.
In Perimeter Traffic Filtering Configuration dialog, enter the user-defined black/white list
3. Click OK.
Enable linkage Select the check box to enabling linkage with trend of TDA.
with trend of
TDA
The TDA device Specify the address for the TDA device.
address
The TDA device Specify the port number for the TDA device. The value range is 1 to
port 65535.
Linkage request Specify the Linkage request period for getting the blacklisted from the
cycle TDA devices.
Enable Linkage Select the check box to get the blacklist of the TDA device sandbox.
with sandbox
2. Click Search.
3. Enter the IP address and click Search,the results will be displayed in this dialog.
l Monitor: The Monitor function statistically the devices and displays the statistics in bar chart, line chart, tables,
and so on, which helps users have information about the devices.
l WAP traffic distribution: Displays the history result (In the past 24 hours and the last 30 days) of WAP traffic
distribution, including request and response.
l Report: Through gathering and analyzing the device traffic data, traffic management data, threat data, monitor
data and device resource utilization data, the function provides the all-around and multi-demensional staticstcs to
you
l Log: Records various system logs, including system logs, threat logs, session logs, NAT logs, NBC logs and con-
figuration logs.
l User: Displays the application statistics within the specified period (Realtime, latest 1 hour, latest 1 day, latest 1
month ) The statistics include the application traffic and applications' concurrent sessions.
l Application: Displays the statistics of applications, application categories, application subcategories, application
risk levels, application technologies, application characteristics within the specified period (Realtime, latest 1
hour, latest 1 day, latest 1 month ) The statistics include the application traffic and applications' concurrent ses-
sions.
l Cloud Application: Displays statistics of cloud based applications, including their traffic, new sessions and con-
current sessions.
l Share Access Detect: Displays the access terminal statistics of specified filter condition(Virtual router, IP, host
number), including operation system , online time, login time and last online time of users.
l Device: displays the device statistics within the specified period (Realtime, latest 1 hour, latest 1 day, latest 1
month ), including the total traffic, interface traffic, zone traffic, CPU/memory status, sessions, Online IP and
hardware status.
l URL Hit: If system is configured with "URL Filter" on Page 261, the predefined stat-set of URL Hit can gather stat-
istics on user/IPs, URLs and URL categories.
l Application Block: If system is configured with "Security Policy" on Page 274 the application block can gather
statistics on the applications and user/IPs.
l Keyword Block: If system is configured with"Web Content" on Page 330, "Email Filter" on Page 338, "Web Post-
ing" on Page 334, the predefined stat-set of Keyword Block can gather statistics on the Web keyword, Web
keywords, email keywords, posting keywords and users/IPs.
l Authentication User: If system is configured with"Web Authentication" on Page 121, "Single Sign-On" on Page
126, "SSL VPN" on Page 162 , "L2TP VPN" on Page 217 the auth user can gather statistics on the authenticated
users.
Note: Non-root VSYS also supports user monitor, but does not support address book stat-
istics.
Sum m a ry
Summary displays the user traffic/concurrent sessions ranking during specified period or of specified inter-
faces/zones. Click Monitor > User > Summary.
l Select different Statistical_Period to view the statistical information in different period of time.
l Hover your mouse over a bar, to view user 's average of upstream traffic, downstream traffic, total trafficor con-
current sessions .
l When displaying the user traffic statistics, the Upstream and Downstream legends are used to select the stat-
istical objects in the bar chart.
Us er D eta ils
Click Monitor > User > User Details.
l To view the detailed information of a certain user , select the user entry in the list.
l Application(real-time): Select the Application (real-time)tab, displays the detailed information of the cat-
egory,subcategory,risk level, technology,upstream traffic, downstream traffic, total traffic. Click Detailsin
the list to view the line chart.
l Cloud Application: Select the Cloud Application tab, display the cloud application information of selected user.
l Traffic: Select the Traffic tab, display the traffic trends of selected user .
l Concurrent Sessions: Select the Concurrent Sessions tab, display the concurrent sessions trends of selected
user .
l Frame a region in trends with the mouse, you can enlarge the scope of the displayed time period. Click
l Within the user entry list, hover your cursor over a user entry, its right has a button. Click this button and
select Add to Black List.
l To view the detailed information of a address entry, select the address entry in the list.
l Application (real-time): Select the Application (real-time) tab, displays the detailed information of the
upstream traffic, downstream traffic, total traffic. Click Detailsin the list to view the line chart.
l Cloud Application: Select the Cloud Application tab, display the cloud application information of selected
address book.
l Traffic: Select the Traffic tab, display the traffic trends of selected address entry.
l Concurrent Sessions: Select the Concurrent Sessions tab, display the concurrent sessions trends of selected
address entry.
The monitor address is a database that stores the users' address which is used for the statistics.
Click Monitor > User > Select Address Book, and Click at the top left corner.
l Select the address entry check box, and click Add to add a new address entry entry to the Selected list.
l In the Selected list, select the address entry, and click Remove, the address entry will not be counted.
l Last Hour: Displays the statistical information within the latest 1 hour.
l Last Day: Displays the statistical information within the latest 1 day.
l Last Month: Displays the statistical information within the latest 1 month.
Note: Non-root VSYS also supports application monitor, but does not support to monitor applic-
ation group.
Sum m a ry
Summary displays the following contents during specified period:
l Select different Statistical_Period to view the statistical information in different periods of time.
l From the drop-down menu, specify the type of statistics: Traffic or Concurrent Sessions.
l Hover your mouse over a bar or a pie, to view the concrete statistical values of total trafficor concurrent sessions .
l Click Time drop-down menu,select different Statistical_Period to view the statistical information in different peri-
ods of time.
l Click button, select Application in the drop-down menu,you can search the desired application by
entering the keyword of the application name in the text field.
l To view the detailed information of a certain application, select the application entry in the list.
l Users(real-time): Select the Users (real-time)tab, displays the detailed information of users which are using
the selected application.Click in details column, you can see the trends of upstream traffic, downstream
traffic, total traffic .
l Traffic: Select the Traffic tab, display the traffic trends of selected application.
l Concurrent Sessions: Select the Concurrent Sessions tab, display the concurrent sessions trends of selected
application.
l Description: Select the Description tab, displays the detailed information of the selected application.
l Click button, select Application Group in the drop-down menu,you can search the desired application
group by entering the keyword of the application group name in the text field.
l To view the detailed information of a certain application group, select the application group entry in the list.
l User(real-time): Select the Users(real-time)tab to display the detailed information of users which are using
the selected application group.Click in details column, you can see the trends of the upstream traffic,
downstream traffic, total traffic .
l Application(real-time): Select the Application(real-time) tab to display the detailed information of applications
in use belonging to the selected application group.Click in details column, you can see the trends of the
upstream traffic, downstream traffic, total traffic of the selected application.
l Traffic: Select the Traffic tab to display the traffic trends of selected application group.
l Concurrent Sessions: Select the Concurrent Sessions tab to display the concurrent sessions trends of selec-
ted application group.
l Description: Select the Description tab to display the detailed description of the selected application.
l In the Selected list, select the application groups entry, and click Remove, the application groups entry will not
be counted.
l Last 60 Minutes: Displays the statistical information within the latest 1 hour.
l Last 24 Hours: Displays the statistical information within the latest 1 day.
l Last 30 Days: Displays the statistical information within the latest 1 month.
Sum m a ry
Summary displays the following contents during specified period:
l Top 10 cloud application rank by traffic/concurrent session number with in a specified period ( realtime, latest 1
hour, latest 1 day, latest 1 month ).
l By selecting different filter, you can view the statistics of different time period.
l By selecting the drop-down menu of trafficor concurrent sessions, you can view your intended statistics.
l Hover your cursor over bar or pie chart to view exact data. Click the Details link on hover box, you will jump
to the Cloud Application Details page.
l Click the Time drop-down menu, you may select different time period to view the statistics in that period.
l To view the detailed information of a certain application group, select the application group entry in the list.
l User(real-time): Select the Users(real-time)tab to display the detailed information of users which are using
the selected application group.Click in details column, you can see the trends of the upstream traffic,
downstream traffic, total traffic.
l Application(real-time): Select the Application(real-time) tab to display the detailed information of applications
in use belonging to the selected application . Click in details column, you can see the trends of the
upstream traffic, downstream traffic, total traffic of the selected application.
l Traffic: Select the Traffic tab to display the traffic trends of selected application.
l Concurrent Sessions: Select the Concurrent Sessions tab to display the concurrent sessions trends of selec-
ted application.
l Description: Select the Description tab to display the detailed description of the selected application.
l Last 60 Minutes: Displays the statistical information within the latest 1 hour.
l Last 24 Hours: Displays the statistical information within the latest 1 day.
l Last 30 Days: Displays the statistical information within the latest 1 month.
l From Virtual Router drop-down menu, select the virtual router the IP belongs to. By default ,it is trust-vr.
l Click the Filter button and select IP. In the drop-down menu, select the source IP of IP information you want to
view. You can select 1 IP address.
l Click the Filter button and select Host Number>=. In the drop-down menu, select the minimum host number of
IP information you want to view.
l After configuring filter condition, the upside list will display the information of IP, host number and IP login time,
which is matched with the configured filter condition. Click an entry of IP information, the downside list will dis-
play the share access detect of this IP, which includes operation system , online time, login time and last online
time of users.
Sum m a ry
Summary displays the device statistics within last 24 hours. Click Monitor>Device>Summary.
l Total traffic: Displays the total traffic within the specified statistical period.
l Hover your mouse over the chart to view the total traffic statistics at a specific point in time.
l Select different Statistical Period to view the statistical information in different period of time.
l If IPv6 is enabled, device traffic will show the total traffic of IPv4 and IPv6.
l Interface traffic: Displays the upstream traffic, downstream traffic, total traffic and concurrent sessions of inter-
face within the specified statistical period by rank.
l Click Traffic In, Traffic Out, Traffic, or Concurrent Sessions. System displays the interface traffic
according to the value(from large to small) of the specified object. By default, the interface traffic is displayed
according to the total traffic value of interface.
l Select different Statistical Period to view the statistical information in different period of time.
l If IPv6 is enabled, interface traffic will show the traffic of IPv4 and IPv6.
l Zone traffic: Displays the upstream traffic, downstream traffic, total traffic and concurrent sessions of zone
within the specified statistical period by rank.
l Select different Statistical Period to view the statistical information in different period of time.
l Hardware status: Displays the real-time hardware status, including storage, chassis temperature and fan status.
l Fan status: Displays the operation status of the fan. Green indicates normal, red indicates error or a power supply
module is not used.
l CPU/memory status: Displays current CPU utilization, memory utilization and CPU temperature statistics.
l Click legends of CPU Utilization, Memory Utilization or CPU Temperature to specify the histogram stat-
istical objects. By default, it displays statistics of all objects.
at the top right corner of some statistics page to set the time cycle.
l Last 60 Minutes: Displays the statistical information within the latest 1 hour.
l Last 24 Hours: Displays the statistical information within the latest 1 day.
l Last 30 Days: Displays the statistical information within the latest 1 month.
l In traffic trend section, click legends of Traffic In or Traffic Out to specify the statistical objects. By default, it
displays all statistical objects.
l In the User or Application section, click Username/IP or Application to display the real-time trend of the spe-
cified user or application. For example, the user traffic trend is shown as below.
l Select line chart or stacked chart from the pop-up menu at the top right corner .
l Hover your mouse over the chart to view the session statistics at a specific point in time.
l Hover your mouse over the line to view online users information.
Sum m a ry
Click Monitor> URL Hit>Summary.
l Select different Statistical_Period to view the statistical information in different period of time.
l Hover your mouse over a bar, to view the hit count of user/IP, URL or URL Category .
l Click at top-right corner of every table, enter the corresponding details page.
l Click , switch between the bar chart and the pie chart.
Us er/IP
Click Monitor> URL Hit>User/IP.
l Click a user/IP in the list to display the corresponding URL hit statistics in the curve chart below.
l Statistics: Displays the hit statistics of the selected User/IP, including the real-time statistics and statistics
for the latest 1 hour, 24 hours 30 days
l URL(real-time): Displays the URLs' real-time hit count of selected User/IP. Click URL link ,you can view the
corresponding URLs detailed statistics page.Click Detail link,you can view the URL hit trend of the selected
User/IP in the URL Filter Detailsdialog .
l URL category(real-time): Displays the URL categories' read-time hit count of selected user/IP. Click URL cat-
egory link , you can view the corresponding URL categories' detailed statistics page. Click Detail link, you
can view the URL category hit trend of the selected user/IP in the pop-up dialog .
l Click at top-right corner,then click the Filter button at top-left corner and select User/IP,You can
search the user/IP hit count information by entering the keyword of the username or IP.
URL
Click Monitor > URL Hit > URL.
l The URL, URL category and detailed hit count are displayed in the list below.
l Statistics: Displays the hit statistics of the selected URL, including the real-time statistics and statistics for
the latest 1 hour, 24 hours 30 days .
l User/IP(real-time): Displays the User/IP's real-time hit count of selected URL. Click User/IP link ,you can view
the corresponding user / IPs detailed statistics page.Click Detail link,you can view the URL hit trend of the
selected user/IP in the URL Filter Details dialog .
l Click at top-right corner,then click the Filter button at top-left corner and select URL,You can search
the URL hit count informations by entering the keyword of the URL.
URL Ca tegory
Click Monitor> URL Hit > URL Category.
l Click a URL category in the list to view its detailed statistics displayed in the Statistics, URL(real-time), User/IP
(real-tiime) tabs.
l Statistics: Displays the trend of the URL category visits, including the real-time trend and the trend in the last
60 minutes, 24 hours , 30 days.
l URL(real-time): Displays the visit information of the URLs, contained in the URL category, that are being vis-
ited.
l User/IP(real-time): Displays the visit information of the users or IPs that are visiting the URL category.
l Last 60 Minutes: Displays the statistical information within the latest 1 hour.
l Last 24 Hours: Displays the statistical information within the latest 1 day.
l Last 30 Days: Displays the statistical information within the latest 1 month.
Sum m a ry
Summary displays the application block can gather statistics on the top 10 applications and top 10 user/IPs. Click Mon-
itor>Application Block> Summary.
l Select different Statistical_Period to view the statistical information in different period of time.
l Hover your mouse over a bar, to view the block count on the applications and user/IPs.
l Click at top-right corner of every table, enter the corresponding details page.
l Click , switch between the bar chart and the pie chart.
Applic a tion
Click Monitor>Application Block> Application.
l The applications and detailed block count are displayed in the list below.
l To view the corresponding information of application block on the applications and user/IPs, select the application
entry in the list.
l User/IP: Displays the user/IPs that are blocked from the selected application. Click a user/IP in the list to dis-
play the corresponding block count statistics in the curve chart below. Click , jump to the corresponding
user / IPs page.
l Click , and click to select the condition in the drop-down list, you can search the application
block information by entering the keyword of the application name.
Us er/IP
Click Monitor>Application Block> User/IP.
l The user/IP and detailed block count are displayed in the list below.
l Click a user/IP in the list to display the corresponding block count statistics in the curve chart below. Click ,
jump to the corresponding user / IPs page.
l Click , and click to select the condition in the drop-down list, you can search the users/IPs
information.
The system supports the predefined time cycle and the custom time cycle. Click ( ) on the
top right corner of each tab to set the time cycle.
l Last Hour: Displays the statistical information within the latest 1 hour.
l Last Day: Displays the statistical information within the latest 1 day.
l Last Month: Displays the statistical information within the latest 1 month.
Sum m a ry
Summary display the predefined stat-set of Keyword Block can gather statistics on the top 10 hit Web keyword, top 10
hit Web keywords, top 10 hit email keywords, top 10 hit posting keywords and top 10 users/IPs. Click Monitor > Key-
word Block > Summary.
l Select different Statistical_Period to view the statistical information in different period of time.
l Hover your mouse over a bar, to view the block count on the keywords .
l Click at top-right corner of every table, enter the corresponding details page.
l Click , switch between the bar chart and the pie chart.
Web Content
Click Monitor>Keyword Block> Web Content.
l To view the corresponding information of keyword block on the Web content, select the keyword entry in the list.
l Statistics: Displays the statistics of the selected keyword, including the real-time statistics and statistics for
the latest 1 hour, 24 hours and 30 days.
l User/IP: Displays the user/IPs that are blocked by the selected keyword. Click a user/IP in the list to display
the corresponding block count statistics in the curve chart below. Click , jump to the corresponding user /
IPs page.
l Click , and click to select the condition in the drop-down list, you can search the keyword
block information by entering the keyword .
Em a il Content
Click Monitor>Keyword Block> Email Content.
Page description see Web_Content.
Us er/IP
Click Monitor>Keyword Block>User/IP.
l Click a user/IP in the list to display the corresponding statistics , Web content, Email Content, Web Posting in the
curve chart below. Click , jump to the corresponding detail page.
l Click , and click to select the condition in the drop-down list, you can search the users/IPs
information .
The system supports the predefined time cycle and the custom time cycle. Click ( ) on the
top right corner of each tab to set the time cycle.
l Last Hour: Displays the statistical information within the latest 1 hour.
l Last Day: Displays the statistical information within the latest 1 day.
l Last Month: Displays the statistical information within the latest 1 month.
l Click , and click to select the condition in the drop-down list to filter the users.
l Click Kick Out under the Operation column to kick the user out.
3. Click OK .
Note: After a monitor item is enabled or disabled in the root VSYS, the item of all VSYSs will be
enabled or disabled(except that the non-root VSYS does not support this monitor item). You
can not enable or disable monitor item in non-root VSYSs.
Statistics Statistics
Statistics
on the ses- on the
on the
sion num- new ses-
Initiator traffic of
ber of the sions of
the ini-
initiator's the ini-
tiator's IP
IP tiator's IP
Statistics
Statistics Statistics
on the
on the on the ses-
new ses-
Respon- traffic of sion num-
sions of
der the ber of the
the
respon- respon-
respon-
der's IP der's IP
der's IP
Statistics Statistics
Statistics
on the ses- on the
on the
sion num- new ses-
traffic of Stat-
ber of an sions of Stat-
Belong an IP that istics on Statistics
IP that an IP that istics
to zone belongs the on the
belongs belongs on the
to a spe- keywor- applic-
to a spe- to a spe- URL hit
No dir- cific secur- d block ation
cific secur- cific secur- count
ection ity zone count block
ity zone ity zone of the
of the count of
spe-
Statistics Statistics spe- the spe-
Statistics cified
on the ses- on the cified cified IPs
on the IPs
sion num- new ses- IPs
traffic of
ber of an sions of
Not an IP that
IP that an IP that
belong does not
does not does not
to zone belong to
belong to belong to
a specific
a specific a specific
security
security security
zone
zone zone
Statistics Statistics
Statistics
on the ses- on the
on the
sion num- new ses-
traffic of
Belong ber of an sions of
an IP that
to inter- IP that an IP that
belongs
face belongs belongs
to a spe-
to a spe- to a spe-
cific inter-
cific inter- cific inter-
face
face face
Statistics Statistics
Statistics
on the ses- on the
on the
sion num- new ses-
Not traffic of
ber of an sions of
belong an IP that
IP that an IP that
to inter- does not
does not does not
face belong to
belong to belong to
a specific
a specific a specific
interface
interface interface
Statistics
Statistics Statistics
on the
on the on the
number
inbound new
of
and out- received
Initiator received
bound and sent
and sent
traffic of sessions
sessions
the ini- of the ini-
of the ini-
tiator's IP tiator's IP
tiator's IP
Statistics
Statistics Statistics
on the
on the on the
number
inbound new
of
and out- received
Respon- received
bound and sent
der and sent
traffic of sessions
sessions
the of the
of the
respon- respon-
respon-
der's IP der's IP
der's IP
Bi-dir-
ectional Statistics
Statistics
Statistics on the
on the
on the number
new
inbound of
received
and out- received
and sent
bound and sent
Belong sessions
traffic of sessions
to zone of an IP
an IP that of an IP
that
belongs that
belongs
to a spe- belongs
to a spe-
cific secur- to a spe-
cific secur-
ity zone cific secur-
ity zone
ity zone
of an IP
that does
does not that does
not
belong to not
belong to
a specific belong to
a specific
security a specific
security
zone security
zone
zone
Statistics
Statistics
Statistics on the
on the
on the number
new
inbound of
received
and out- received
and sent
Belong bound and sent
sessions
to inter- traffic of sessions
of an IP
face an IP that of an IP
that
belongs that
belongs
to a spe- belongs
to a spe-
cific inter- to a spe-
cific inter-
face cific inter-
face
face
Statistics
Statistics
Statistics on the
on the
on the number
new
inbound of
received
and out- received
Not and sent
bound and sent
belong sessions
traffic of sessions
to inter- of an IP
an IP that of an IP
face that does
does not that does
not
belong to not
belong to
a specific belong to
a specific
interface a specific
interface
interface
The interface, zone, user, application, URL, URL category, VSYS type-based statistical information table
Data type
Statistics Statistics
Statistics Statistics
on the on the
on the on the ses-
new ses- URL hit
traffic of sion num-
No dir- sions of count of
Zone the spe- ber of the N/A N/A
ection the spe- the spe-
cified specified
cified cified
security security
security security
zones zones
zones zones
Statistics
Statistics Statistics
on the
on the on the
number
inbound new
of
and out- received
received
Bi-dir- bound and sent
and sent
ectional traffic of sessions
sessions
the spe- of the spe-
of the spe-
cified cified
cified
security security
security
zones zones
zones
Statistics
Statistics Statistics
on the
on the on the ses-
new ses-
No dir- traffic of sion num-
sions of
ection the spe- ber of the
the spe-
cified specified
cified Statistics
interfaces interfaces
interfaces on the
URL hit
Statistics count of
Interface Statistics Statistics N/A N/A
on the the spe-
on the on the
number cified
inbound new
of inter-
and out- received
Bi-dir- received faces
bound and sent
ectional and sent
traffic of sessions
sessions
the spe- of the spe-
of the spe-
cified cified
cified
interfaces interfaces
interfaces
Statistics Statistics
Statistics Statistics
on the on the
on the on the ses-
new ses- block
traffic of sion num-
Applic- sions of count of
N/A the spe- ber of the N/A N/A
ation the spe- the spe-
cified specified
cified cified
applic- applic-
applic- applic-
ations ations
ations ations
Statistics
on the
Stat-
No dir- traffic of Statistics
istics
ection the spe- Statistics Statistics on the
Statistics on the
cified on the on the applic-
on the ses- keywor-
users new ses- URL hit ation
sion num- d block
User sions of count of block
Statistics ber of the count
the spe- the spe- count of
on the specified of the
cified cified the spe-
inbound users spe-
Bi-dir- users users cified
and out- cified
ectional users
bound users
traffic of
the spe-
cified
users
Statistics
on the
hit
URL N/A N/A N/A N/A count of N/A N/A
the spe-
cified
URLs
Statistics
on the
hit
URL Cat- count of
N/A N/A N/A N/A N/A N/A
egory the spe-
cified
URL cat-
egories
Statistics Statistics
Statistics Statistics
on the on the
on the on the ses-
new ses- URL hit
traffic of sion num-
VSYS N/A sions of count of N/A N/A
the spe- ber of the
the spe- the spe-
cified specified
cified cified
VSYSs VSYSs
VSYSs VSYSs
You can configure a filtering condition for the stat-set to gather statistics on the specified condition, such as statistics
on the session number of the specified security zone, or on the traffic of the specified IP.
2. Click New.
Name Type the name for the stat-set into the Name box.
Data Type Select an appropriate data type from the Data type list
Group by Select an appropriate grouping method from the Group by list.
Root vsys only If you only want to perform the data statistics for the root VSYS, select
the Root vsys only checkbox. This checkbox will take effect when the data
type is Traffic, Session, Ramp-up rate, or URL hit. If data grouping
method is configured to VSYS, this checkbox will be not available.
Options To configure a filtering condition, click Option. In the Advanced dialog,
select a filter condition from the Filter drop-down list. For more details
about this option,see The_filtering_conditions_supported_table.
l The URL hit statistics are only available to users who have a URL license.
l If the Data type is Traffic, Session, Ramp-up rate, Virus attack count, Intrusion count or
URL hit count, then the Filter should not be Attack log.
l If the Data type is URL hit count, then the Filter should not be Service.
l Displays the top 10 statistical result from multiple aspects in forms of bar chart.
l View specified historic statistics by selecting a period from the statistic period drop-down list.
l Click All Data, view all the statistical result from multiple aspects in forms of list, trend. Click TOP 10 returns
bar chart.
l Request: Shows the count of request distributed to WAP gateway / Internet and all requests.
l Response: Shows the count of successful responses from WAP gateway /Internet ,failed responses from WAP
gateway/ Internet.
Report Cat-
Description
egories
Security Report Helps users quickly understand the overall risk situation of the servers and
users.
Flow Report Analysis and display of the user, application, interface, zone's traffic and
concurrency.
Content Report Detailed description of the URL hit, including the hit times, trends, cat-
egories, etc.
You can configure report task in "User-defined Task" on Page 428 and "Predefined Task" on Page 431, and view gen-
erated report files in "Report File" on Page 427.
l Hover your mouse to the Send Object column, the system will prompt the Email addresses or FTP information
about sending.
Note: If your browser has enabled "Blocking pop-up windows", you will not see the generated
file. Make sure to set your browser "Always allow pop-up windows", or you can go to your
blocked window history to find the report file.
2. Click New.
2. Select the category item you want, and click Add to add it to right
column.
Schedule
The schedule specifies the running time of report task. The report task can be run peri-
odically or run immediately.
Periodic: Generates report files as planned.
l Type: Generates report file based on the data in the specified statistical period.
Output
Send via FTP Check the Send via FTP check box to send the report file to a specified
FTP server.
l Path: Specifies the location where the report file will be saved.
2. Select the task you want, and click the Enable or Disable button on the top.
By default, the user-defined task is enabled.
l Security Report
l Flow Report
l Content Report
l Type: Generates report file based on the data in the specified statistical period.
Output
Send via FTP Check the Send via FTP check box to send the report file to a specified
FTP server.
l Path: Specifies the location where the report file will be saved.
l Device log
l Event - includes 8 severity levels: debugging, information, notification, warning, error, critical, alert, emer-
gency.
l Configuration - logs about configuration on command line interface, e.g. interface IP address setting.
l Threat - logs related to behaviors threatening the protected system, e.g. attack defense and application security.
l Session - Session logs, e.g. session protocols, source and destination IP addresses and ports.
l NAT - NAT logs, including NAT type, source and destination IP addresses and ports.
l NBC - logs about network behavior control, like IM chatting logs and URL browsing history.
l URL - logs about network surfing, e.g. Internet visiting time, web pages visiting history, URL filtering logs.
Lo g Severity
Event logs are categorized into eight severity levels.
Log Defin-
Severity Level Description
ition
l Console - The default output destination. You can close this destination via CLI.
l File - By default, the logs are sent to the specified USB destination in form of a file.
Lo g Fo rmat
To facilitate the access and analysis of the system logs, StoneOS logs follow a fixed pattern of information layout, i.e.
date/time, severity level@module: descriptions.See the example below:
2000-02-05 01:51:21, WARNING@LOGIN: Admin user "admin" logged in through console from localhost.
l Filter: Click Filter to add conditions to show logs that march your filter.
l Filter: Click Filter to add conditions to show logs that march your filter.
l Filter: Click Filter to add conditions to show logs that march your filter.
l Threat logging in the Logging feature is enabled. Refer to "Log Configuration" on Page 443.
l You have enabled one or more of the following features: "Anti Virus" on Page 353, " Intrusion Prevention System"
on Page 358, "Attack-Defense" on Page 379 or "Perimeter Traffic Filtering" on Page 388 .
To view threat logs, select Monitor > Log > Threat.
In this page, you can perform the following actions:
l Filter: Click Filter to add conditions to show logs that march your filter.
l NBC logging in the Logging feature is enabled. Refer to "Log Configuration" on Page 443.
l You have enabled one or more of the following features: ."Web Content" on Page 330、 "Web Posting" on Page
334、 "Email Filter" on Page 338 and "Internet Behavior Control" on Page 321 functions.
To view session logs, select Monitor > Log > Session.
Note:
l For ICMP session logs, the system will only record the ICMP type value and its code value.
As ICMP 3, 4, 5, 11 and 12 are generated by other communications, not a complete ICMP
session, the system will not record such kind of packets.
l For TCP and UDP session logs, the system will check the packet length first. If the packet
length is 20 bytes (i.e., with IP header, but no loads), it will be defined as a malformed
packet and be dropped; if a packet is over 20 bytes, but it has errors, the system will drop
it either. So, such abnormal TCP and UDP packets will not be recorded.
PB R Lo gs
This feature may not be available on all platforms. Please check your system's actual page to see if your device delivers
this feature.
PBR logs can be generated under the conditions that:
l PBR logging in the Logging feature is enabled. Refer to "Log Configuration" on Page 443.
l You have enabled logging function in PBR rules. Refer to "Creating a Policy-based Route Rule" on Page 109 .
To view PBR logs, select Monitor > Log > PBR.
l NAT logging in the Logging feature is enabled. Refer to "Log Configuration" on Page 443.
l NAT logging is the NAT rule configuration is enabled. Refer to"Configuring SNAT" on Page 295 and "Configuring
SNAT" on Page 295"Configuring DNAT" on Page 299.
To view NAT logs, select Monitor > Log> NAT.
l URL logging in the Logging feature is enabled. Refer to "Log Configuration" on Page 443.
l You have enabled logging function in URL rules. Refer to "URL Filter" on Page 261
To view threat logs, select Monitor > Log > URL.
l NBC logging in the Logging feature is enabled. Refer to "Log Configuration" on Page 443.
l You have enabled one or more of the following features: ."Web Content" on Page 330、 "Web Posting" on Page
334、 "Email Filter" on Page 338 and"Internet Behavior Control" on Page 321 functions.
To view NBC logs, select Monitor > Log > NBC.
Clo udSandB o x Lo gs
To view sandbox logs, select Monitor > Log > CloudSandBox.
In this page, you can perform the following actions:
l Filter: Click Filter to add conditions to show logs that march your filter.
3. Click New.
l Virtual Router: Select Virtual Router and then select a virtual router
form the drop-down list. If a virtual router is selected, the device will
determine the source IP address by searching the reachable routes
in the virtual router.
Protocol Specifies the protocol type of the syslog server. If "Secure-TCP" is selec-
ted, you can select Do not validate the server certificate option, and sys-
tem can transfer logs normally and do not need any certifications.
Port Specifies the port number of the syslog server.
Log Type Specifies the log types the syslog server will receive.
3. Select a device you want, the logs will be exported to that Unix server.
4. Click OK.
Configuring Logs
To configure parameters of various log types:
2. Click on the tab of the log type you want, and you will enter the corresponding log settings page.
3. Click OK.
Event Log
Option Description
Enable Select the check box to enable the event logging function.
Console Select the check box to send syslog to Console.
l Lowest severity - Specifies the lowest severity level. Logs below the
severity level selected here will not be exported.
Terminal Select the check box to send syslog to the terminal.
l Lowest severity - Specifies the lowest severity level. Logs below the
severity level selected here will not be exported.
Cache Select the check box to send syslog to the cache.
l Lowest severity - Specifies the lowest severity level. Logs below the
severity level selected here will not be exported.
l Max buffer size - The maximum size of the cached logs. The default
value may vary from different hardware platforms.
l Lowest severity - Specifies the lowest severity level. Logs below the
severity level selected here will not be exported.
l Max file size - Specifies the maximum size of the syslog file. The value
range is 4096 to 1048576 bytes. The default value is 1048576 bytes.
l Redirect log to USB - Select the check box and select a USB drive (USB0
or USB1) from the drop-down list. Type a name for the syslog file into
the Name box.
Log server Select the check box to export event logs to the syslog server.
l View Log Server - Click to see all existing syslog servers or to add new
server.
l Lowest severity - Specifies the lowest severity level. Logs below the
severity level selected here will not be exported.
Email address Select the check box to send event logs to the email.
l View Email Address: Click to see all existing email addresses or add
new address.
l Lowest severity - Specifies the lowest severity level. Logs below the
severity level selected here will not be exported.
Database Select the checkbox to save logs in the local device. Only several platforms
support this parameters.
l Disk Space - Enter a number as the percentage of a storage the logs will
take. For example, if you enter 30, the event logs will take at most 30%
of the total disk size.
l Disk Space Limit - If Auto Overwrite is selected, the logs which exceed
the disk space will overwrite the old logs automatically. If Stop Storing
is selected, system will stop storing new logs when the logs exceed the
disk space.
Network Log
Option Description
l Max buffer size - The maximum size of the cached network logs. The
value range is 4096 to 524288 bytes. The default value may vary
from different hardware platforms.
Log server Select the check box to export network logs to the syslog server.
l View Log Server - Click to see all existing syslog servers or to add new
server.
Database Select the checkbox to save logs in the local device. Only several platforms
support this parameters.
l Disk Space - Enter a number as the percentage of a storage the logs will
take. For example, if you enter 30, the network logs will take at most
30% of the total disk size.
l Disk Space Limit - If Auto Overwrite is selected, the logs which exceed
the disk space will overwrite the old logs automatically. If Stop Storing
is selected, system will stop storing new logs when the logs exceed the
disk space.
Configuration Log
Option Description
l Max buffer size - The maximum size of the cached configuration logs.
The value range is 4096 to 524288 bytes. The default value may vary
from different hardware platforms.
Log Server Select the check box to export network logs to the syslog server.
l View Log Server - Click to see all existing syslog servers or to add new
server.
Database Select the checkbox to save logs in the local device. Only several platforms
support this parameters.
l Disk Space - Enter a number as the percentage of a storage the logs will
take. For example, if you enter 30, the configuration logs will take at
most 30% of the total disk size.
l Disk Space Limit - If Auto Overwrite is selected, the logs which exceed
Log Generating Select the check box to define the maximum the efficiency of generating
Limitation logs.
Session Log
Option Description
l Record User Name: Select to show user's name in the session log mes-
sages.
l Record Host Name: Select to show host's name in the session log mes-
sages.
l Max buffer size - The maximum size of the cached session logs. The
value range is 4096 to 2097152 bytes. The default value may vary
from different hardware platforms.
Log Server Select the check box to export session logs to the syslog server.
l View Log Server - Click to see all existing syslog servers or to add new
server.
PBR Log
Option Description
l Record User Name: Select to show user's name in the PBR log mes-
sages.
l Record Host Name: Select to show host's name in the PBR log mes-
sages.
l Max buffer size - The maximum size of the cached PBR logs. The value
range is 4096 to 2097152 bytes. The default value may vary from dif-
ferent hardware platforms.
Log Server Select the check box to export PBR logs to the syslog server.
l View Log Server - Click to see all existing syslog servers or to add new
server.
NAT Log
l Record Host Name: Select to show host's name in the NAT log mes-
sages.
l Max buffer size - The maximum size of the cached NAT logs. The
default value may vary from different hardware platforms.
Log Server Select the check box to export NAT logs to log servers.
l View Log Server - Click to see all existing syslog servers or to add new
server.
URL Log
Option Description
l Record Host Name: Select to show host's name in the URL log mes-
sages.
l Max buffer size - The maximum size of the cached URL logs. The
default value may vary from different hardware platforms.
Log Server Select the check box to export URL logs to log server.
l View Log Server - Click to see all existing syslog servers or to add new
server.
NBC Log
Option Description
l Max buffer size - The maximum size of the cached NBC logs. The
default value may vary from different hardware platforms.
File Select to export NBC logs as a file to USB.
l Save logs to USB - Select a USB device and enter a name as the log file
name.
l View Log Server - Click to see all existing syslog servers or to add new
Local DB Select the checkbox to save logs in the local device. The log data will be
stored in SD card or storage expansion module.
CloudSandBox Log
Option Description
Log Server Select the check box to export CloudSandBox logs to log server.
l View Log Server - Click to see all existing syslog servers or to add new
server.
Threat Log
Option Description
l Max buffer size - The maximum size of the cached threat logs. The
default value may vary from different hardware platforms.
File Select to export threat logs as a file to USB.
l Save logs to USB - Select a USB device and enter a name as the log file
name.
l View Log Server - Click to see all existing syslog servers or to add new
server.
Email address Select the check box to export logs to the specified email address.
Database Select the checkbox to save logs in the local device. Only several platforms
support this parameters.
l Disk Space - Enter a number as the percentage of a storage the logs will
take. For example, if you enter 30, the threat logs will take at most 30%
of the total disk size.
l Disk Space Limit - If Auto Overwrite is selected, the logs which exceed
the disk space will overwrite the old logs automatically. If Stop Storing
is selected, system will stop storing new logs when the logs exceed the
disk space.
This feature may not be available on all platforms. Please check your system's actual page to see if your device delivers
this feature.
System supports the following diagnostic methods:
l Test Tools: DNS Query, Ping and Traceroute can be used when troubleshooting the network.
D NS Query
To check the DNS working status of the device:
3. Click Test, and the testing result will be displayed in the list below.
Ping
To check the network connecting status:
3. Click Test, and the testing result will be displayed in the list below.
l The Ping packet response. If there is no response from the target after timeout, it will print Destination Host
Not Response, etc. Otherwise, the response contains sequence of packet, TTL and the response time.
l Overall statistics, including number of packet sent, number of packet received, percentage of no response,
the minimum, average and maximum response time.
Tracero ute
Traceroute is used to test and record gateways the packet has traversed from the originating host to the destination. It
is mainly used to check whether the network connection is reachable, and analyze the broken point of the network.
The common Traceroute function is performed as follows: first, send a packet with TTL 1, so the first hop sends back
an ICMP error message to indicate that this packet can not be sent (because of the TTL timeout); then this packet is re-
sent, with TTL 2, TTL timeout is sent back again; repeat this process till the packet reaches the destination. In this
way, each ICMP TTL timeout source address is recorded. As the result, the path from the originating host to the des-
tination is identified.
To test and record gateways the packet has traversed by Traceroute:
3. Click Test, and the testing result will be displayed in the list below.
HA, the abbreviation for High Availability, provides a fail-over solution for communications line or device failure to
ensure the smooth communication and effectively improve the reliability of the network. To implement the HA function,
you need to configure the two devices as HA clusters, using the identical hardware platform, firmware version, both
enabling Virtual Router and AV functions, with anti-virus license installed. When one device is not available or can not
handle the request from the client properly, the request will be promptly directed to the other device that works nor-
mally, thus ensuring uninterrupted network communication and greatly improving the reliability of communications.
System supports three HA modes: Active-Passive (A/P), Active-Active (A/A), and Peer.
l Active-Passive (A/P) mode: In the HA cluster, configure two devices to form a HA group, with one device acting as
a primary device and the other acting as its backup device. The primary device is active, forwarding packets, and
meanwhile synchronizes all of its network and configuration information and current session information to the
backup device. When the primary device fails, the backup device will be promoted to primary and takes over its
work to forward packets. This A/P mode is redundant, and features a simple network structure for you to maintain
and manage.
l Active-Active (A/A) mode: When the security device is in NAT mode, routing mode or a combination of both, you
can configure two Hillstone devices in the HA cluster as active, so that the two devices are running their own tasks
simultaneously, and monitoring the operation status of each other. When one device fails, the other will take over
the work of the failure device and also run its own tasks simultaneously to ensure uninterrupted work. This mode
is known as the Active-Active mode. The A/A mode has the advantage of high-performance, as well as load-bal-
ancing.
l Peer mode: the Peer mode is a special HA Active-Active mode. In the Peer mode, two devices are both active, per-
form their own tasks simultaneously, and monitor the operation status of each other. When one device fails, the
other will take over the work of the failure device and also run its own tasks simultaneously. In the Peer mode, only
the device at the active status can send/receive packets. The device at the disabled status can make two devices
have the same configuration information but its interfaces do not send/receive any packets. The Peer mode is
more flexible and is suitable for the deployment in the asymmetric routing environment.
HA Active-Active (A/A) and Peer mode may not be available on all platforms. Please check your system's actual page to
see if your device delivers this feature.
Basic Concepts
H A Cluster
For the external network devices, a HA cluster is a single device which handles network traffic and provides security
services. The HA cluster is identified by its cluster ID. After specifying a HA cluster ID for the device, the device will be
in the HA state to implement HA function.
H A Gro up
System will select the primary and backup device of the same HA group ID in a HA cluster according to the HCMP pro-
tocol and the HA configuration. The primary device is in active state and processes network traffic. When the primary
device fails, the backup device will take over its work.
When assigning a cluster ID to the device, the HA group with ID 0 will be automatically created. In Active-Passive (A/P)
mode, the device only has HA group 0. In Active-Active (A/A) mode, the latest Hillstone version supports two HA
groups, i.e., Group 0 and Group 1.
H A No de
To distinguish the HA devices in a HA group, you can use the value of HA Node to mark the devices. StoneOS support
the values of 0 and 1.
In the HA Peer mode, the system can decide which device is the master according to the HA Node value. In the HA
group 0, the device whose HA Node value is 0 will be active and the device whose HA Node value is 1 is at the disabled
status. In the HA group 1, the device whose HA Node value is 0 is at the disabled status and the device whose HA Node
value is 0 is active.
H A Selectio n
In a HA cluster, if the group ID of the HA devices is the same, the one with higher priority will be selected as the
primary device.
H A Synchro nizatio n
To ensure the backup device can take over the work of the primary device when it fails, the primary device will syn-
chronize its information with the backup device. There are three types of information that can be synchronized: con-
figuration information, files and RDO (Runtime Dynamic Object). The specific content of RDO includes:
l Session information (The following types of session information will not be synchronized: the session to the
device itself, tunnel session, deny session, ICMP session, and the tentative session)
l SCVPN information
l ARP table
l PKI information
l DHCP information
l MAC table
l WebAuth information
System supports two methods to synchronize: real-time synchronization and batch synchronization. When the
primary device has just been selected successfully, the batch synchronization will be used to synchronize all inform-
ation of the primary device to the backup device. When the configurations change, the real-time synchronization will
be used to synchronize the changed information to the backup device. Except for the HA related configurations and
local configurations (for example, the host name), all the other configurations will be synchronized.
1. Configure a HA Virtual Forward Interface. For more information on configuring the interface, see "Configuring an
Interface" on Page 38.
2. Configure a HA link interface which is used for the device synchronization and HA packets transmission.
4. Configure a HA group. Specify the priority for devices and HA messages parameters.
To configure HA, take the following steps:
Option Description
Control link inter- Specifies the name of the HA control link interface. The control link inter-
face 1 face is used to synchronize all data between two devices.
Control link inter- Specifies the name of HA control link interface (Backup device).
face 2
Data link inter- Specifies the name of the HA data link interface. The data link interface is
face used to synchronize the data packet information. After specifying this
data link, the session information will be synchronized over this data
link. You can configure the physical interface or aggregate interface as
the interface of the data link and you can specify at most 1 HA data link
interface.
IP address Specifies the IP address and netmask of the HA link interface.
HA cluster ID Specifies an ID for HA cluster. The value ranges from 0 to 8. None indic-
ates to disable the HA function.
Node ID After enabling the HA function, specifies the Node ID (HA Node) for the
device. The IDs for two devices must be different. The range is 0 to 1. If
you do not specify this value, the devices will obtain the Node ID by auto-
matic negotiation.
Peer-mode Selects the Enable checkbox to enable the HA Peer mode and specifies
the role of this device in the HA cluster. The range is 0 to 1. By default,
the group 0 in the device whose HA Node ID is 0 will be active and the
group 0 in the device whose HA Node ID is will be in the disabled status.
Symmetric-rout- Select Symmetric-routing to make the device work in the symmetrical
ing routing environment.
HA Synchronize In some exceptional circumstances, the master and backup con-
Configuration figurations may not be synchronized. In such a case you need to manu-
2. Click OK.
Option Description
Firmware Show the current firmware version of device and the date of firmware
upgrade last time.
Application Sig- Show the current version of application signature database and the date of
nature update last time.
Advanced Threat Show the current version of advanced threat detection signature database
Detection Sig- and the date of update last time.
nature
Abnormal Beha- Show the current version of abnormal behavior detection signature data-
vior Detection Sig- base and the date of update last time.
nature
URL Signature Show the current version of URL signature database and the date of update
last time.
Perimeter Traffic Show the current version of perimeter traffic filtering signature database
Filtering Sig- and the date of update last time.
nature
Antivirus Sig- Show the current version of antivirus signature database and the date of
nature update last time.
IPS Signature Show the current version of IPS signature database and the date of update
last time.
Mitigation Sig- Show the current version of mitigation signature database and the date of
nature update last time.
Administrato rs
Device administrators of different roles have different privileges. The system supports pre-defined administrator roles
and customized administrator roles. By default, the system supports the following administrators, which cannot be
deleted or edited:
l admin: Permission for reading, executing and writing. This role has the authority over all features. You can view
the current or historical configuration information.
l admin-read-only: Permission for reading and executing. You can view the current or historical configuration
information.
l operator: You have the authority over all features except modify the Administrator's configuration, and no per-
mission for check the log information.
l auditor: You can only operate on the log information, including view, export and clear.
Note:
l The device ships with a default administrator named hillstone. You can modify the setting
of hillstone. However, this account cannot be deleted.
l Other role of administrator (except default administrator) cannot configure admin set-
tings, except modifying its own password.
l System auditor can manage one or multiple logs, while only system administrator can man-
age the log types.
l The non-root administrators are created by root RXW administrators after logging into non-root VSYS.
l After logging into root VSYS, the root administrators can switch to non-root VSYS and configure it.
l Non-root administrators can enter the corresponding non-root VSYS after successful login, but the non-root
administrators cannot switch to the root VSYS.
l Each administrator name should be unique in the VSYS it belongs to, while administrator names can be the same
in different VSYSs. In such a case, when logging in, you must specify the VSYS the administrator belongs to in
form of vsys_name\admin_name. If no VSYS is specified, you will enter the root VSYS.
The following table shows the permissions to different types of VSYS administrators.
Configure √ χ χ √ √ χ √ χ
(including
saving con-
figuration)
Configure √ χ χ χ √ χ χ χ
admin-
istrator
Restore fact- √ χ χ χ χ χ χ χ
ory default
Delete con- √ χ χ √ √ χ √ χ
figuration
file
Roll back √ χ χ √ √ χ √ χ
con-
figuration
Reboot √ χ χ √ χ χ χ χ
View con- √ √ χ √ View View View χ
figuration inform- inform- inform-
information ation in ation in ation in
current current current
VSYS VSYS VSYS
View log √ √ √ χ √ √ χ √
information
Modify cur- √ √ χ √ √ √ √ √
rent admin
password
ping/tracer- √ √ χ √ √ √ √ χ
oute
2. Click New.
l Operator: You have the authority over all features except modify
the Administrator's configuration, and no permission for check the
log information.
l Auditor: You can only operate on the log information, including the
view, export and clear.
4. Click OK.
Admin Ro les
Device administrators of different roles have different privileges. The system supports pre-defined administrator roles
and customized administrator roles. The pre-defined administrator role cannot be deleted or edited. You can cus-
tomize administrator roles according to your requirements:
To create a new administrator role:
2. Click New.
Trust H o st
Device only allows the trust host to manage the system to enhance the security. Administrator can specify an IP range,
and hosts in the specified IP range are trust hosts. Only trust hosts could access the management interface to manage
the device.
Note: If the system cannot be managed remotely, check the trust host configuration.
2. Click New.
Type Specifies the type of host. You can select IP/Netmask or IP Range.
l IP Range: Type the start IP and end IP into the IP box respectively.
Login Type Select the access methods for the trust host, including Telnet, SSH, HTTP
and HTTPS.
4. Click OK.
Management I nterface
Device supports the following access methods: Console, Telnet, SSH and WebUI. You can configure the timeout value,
port number, PKI trust domain of HTTPS,and PKI trust domain of certificate authentication. When accessing the device
through Telnet, SSH, HTTP or HTTPS, if login fails three times in one minute, the IP address that attempts the login will
be blocked for 2 minutes during which the IP address cannot connect to the device.
To configure the access methods:
l Timeout: Type the Console timeout value into the Timeout box.
The value range is 0 to 60. The default value is 10. The value of 0
indicates never timeout. If there is no activities until timeout, sys-
tem will drop the console connection.
Telnet Configure the Telnet access method parameters.
l HTTP Port: Specifies the HTTP port number. The value range is 1 to
65535. The default value is 80.
l HTTPS Port: Specifies the HTTPS port number. The value range is
1 to 65535. The default value is 443.
l HTTPS Trust Domain: Select the trust domain existing in the sys-
tem from the drop-down list. When HTTPS starts, HTTPS server
will use the certificate with the specified trusted domain. By
default, the trust domain trust_domain_default will be used.
3. Click OK.
Note: When changing HTTP port, HTTPS port or HTTPS Trust Domain, the web server will
restart. You may need to log in again if you are using the Web interface.
System Time
You can configure the current system time manually, or synchronize the system time with the NTP server time via NTP
protocol.
2. Under System Time Configuration in the System Time tab, configure the followings.
Option Description
Sync with Local Specifies the method of synchronize with local PC. You can select Sync
PC Time or Sync Zone&Time.
3. Click OK.
Configuring NT P
The system time may affect the establishment time of VPN tunnel and the schedule, so the accuracy of the system time
is very important. To ensure the system is able to maintain a accurate time, the device allows you to synchronize the
system time with a NTP server on the network via NTP protocol.
To configure NTP:
2. Under NTP Configuration in the System Time tab, configure the followings.
Option Description
Enable Select the Enable check box to enable the NTP function. By default, the
NTP function is disabled.
Authentication Select the Authentication check box to enable the NTP Authentication
function.
Server Specifies the NTP server that device need to synchronize with. You can
specify at most 3 servers.
l Key: Select a key from the Key drop-down list. If you enable the
NTP Authentication function, you must specify a key.
l Virtual Router: Select the Virtual Router of interface for NTP com-
munication from the drop-down list.
Maximum Adjust- Type the time value. If the time difference between the system time and
ment the NTP server's time is within the max adjustment value you specified,
the synchronization will succeed, otherwise it will fail.
3. Click OK.
NTP Key
After enabling NTP Authentication function, you need to configure MD5 key ID and keys. The device will only syn-
chronize with the authorized servers.
2. Click NEW.
Key ID Type the ID number into the Key ID box. The value range is 1 to 65535.
Password Type a MD5 key into the Password box. The value range is 1 to 31.
Confirm Pass- Re-type the same MD5 key you have entered into the Confirm box.
word
4. Click OK.
Optio n
Specifies system options, including system language, administrator authentication server, host name, password
strategy, reboot and exporting the system debugging information.
To change system option:
System Main- Configure the system language and administrator authentication server.
tenance
l System Language: You can select Chinese or English according
to your own requirements.
l Hostname: Type a host name you want to change into the Host-
name box.
l Domain: Type a domain name you want to specify into the Domain
box.
Password Configure password complexity for admin user.
Strategy
l Minimum Password Length: Specifies the minimum length of pass-
word. The value range is 4 to 16 characters. The default value is 4.
3. Click OK.
3. The system will reboot. You need to wait a while before it can start again.
D ata co llectio n
When the user enable the data collection function, in the system operation process, some of the data will be uploaded
to the cloud, the data is used for internal research to reduce false positives and to achieve better protection of the
equipment. User has a clear understanding of this type of case data upload and data using the appropriate function
increases. Data collection items include failure feedback now.
To enable the data collection function:
1. Select System > Configuration File Management > Configuration File List.
l Export: Select the configuration file you want to export, and click Export.
l Delete: Select the configuration file you want to delete, and click Delete.
l Backup Restore: You can restore the system configurations to the saved configuration file or factory default,
or you can backup the current configurations.
Option Description
Back up Current Type descriptions for the configuration file into Description box. Click
Configurations Start to backup.
Restore Con- Roll back to Saved Configurations:
figuration
l Select Backup System Configuration File: Click this button, then
select Backup Configuration File from the list. Click OK.
Note: Device will be restored to factory defaults. Meanwhile, all the system configurations will
be cleared, including backup system configuration files.
SNMP Agent
The device is designed with a SNMP Agent, which provides network management and monitors the running status of
the network and devices by viewing statistics and receiving notification of important system events.
To configure an SNMP Agent:
Option Description
SNMP Agent Select the Enable check box for Service to enable the SNMP Agent func-
tion.
ObjectID The Object ID displays the SNMP object ID of the system. The object ID is
specific to an individual system and cannot be modified.
System Contact Type the SNMP system contact information of the device into the System
Contact box. System contact is a management variable of the group sys-
tem in MIB II and it contains the ID and contact of relevant administrator
of the managed device. By configuring this parameter, you can save the
important information to the device for the possible use in case of emer-
gency.
Location Type the location of the device into the Location box.
Host Port Type the port number of the managed device into the Host Port box.
Virtual Router Select the VRouter from the Virtual Router drop-down list.
Local EnginelID Type the SNMP engine ID into the Local EngineID box.
3. Click Apply.
SNMP H o st
To create an SNMP host:
2. Click New.
Option Description
Type Select the SNMP host type from the Type drop-down list. You can select
IP Address, IP Range or IP/Netmask.
l IP/Netmask: Type the start IP address and Netmask for SNMP host
into the Hostnamebox respectively.
SNMP Version Select the SNMP version from the SNMP Version drop-down list.
Community Type the community for the SNMP host into the Community box. Com-
munity is a password sent in clear text between the manager and the
agent. This option is only effective if the SNMP version is V1 or V2C.
Permission Select the read and write permission for the community from the Per-
mission drop-down list. This option is only effective if the SNMP version
is V1 or V2C.
4. Click OK.
Trap H o st
To create a Trap host:
2. Click New.
Option Description
Host Type the domain name or IP address of the Trap host into the Host box.
Trap Host Port Type the port number for the Trap host into the Trap Host Port box.
SNMP Agent Select the SNMP version from the SNMP Agent drop-down list.
l V1 or V2C: Type the community for the Trap host into the Com-
munity box.
l V3: Select the V3 user from the V3 User drop-down list. Type the
Engine ID for the trap host into the Engine ID box.
4. Click OK.
V 3 User Gro up
SNMPv3 protocol introduces a user-based security module. You need to create an SNMP V3 user group for the SNMP
host if the SNMP version is V3.
To create a V3 user group:
2. Click New.
Name Type the SNMP V3 user group name into the Name box.
Security Model The Security model option displays the security model for the SNMP V3
user group.
Security Level Select the security level for the user group from the Security Level drop-
down list.
Security level determines the security mechanism used in processing an
SNMP packet. Security levels for V3 user groups include No Authentic-
ation (no authentication and encryption), Authentication (authen-
tication algorithm based on MD5 or SHA) and Authentication and
Encryption (authentication algorithm based on MD5 or SHA and mes-
sage encryption based on AES and DES).
Read View Select the read-only MIB view name for the user group from the Read
View drop-down list. If this parameter is not specified, all MIB views will
be none.
Write View Select the write MIB view name for the user group from the Write View
drop-down list. If this parameter is not specified, all MIB views will be
none.
4. Click OK.
V 3 User
If the selected SNMP version is V3, you need to create an SNMP V3 user group for the SNMP host and then add users to
the user group.
To create a user for an existing V3 user group:
2. Click New.
Name Type the SNMP V3 user name into the Name box.
V3 User Group Select an existing user group for the user from the Group drop-down list.
Security Model The Security model option displays the security model for the SNMP V3
user.
Remote IP Type the IP address of the remote management host into the Remote IP
box.
4. Click OK.
Upgrade Firmware
Backup Con- Make sure you have backed up the configuration file before upgrading.
figuration File Click Backup Configuration File to backup the current firemare file, the
system will automatically redirect to Configuration File Management
page after backup.
Current Version The current firmware version.
Upload Firmware Click Browse to select a firmware file from your local disk.
Backup Version The backup firmware version.
Reboot Select the Reboot to make the new firmware take effect check box and
click Apply to reboot system and make the firmware take effect. If you
click Apply without selecting the check box, the firmware will take effect
after the next startup.
Select the firm- Select the firmware that will take effect for the next startup.
ware that will
take effect for
the next startup.
Reboot Select the Reboot to make the new firmware take effect check box and
click Apply to reboot system and make the firmware take effect. If you
click Apply without selecting the check box, the firmware will take effect
after the next startup.
l Auto Update: Select Enable Auto Update and specify the auto
update time. Click Save to save your changes.
l Auto Update: Select Enable Auto Update and specify the auto
update time. Click Save to save your changes.
Platform Base You can install the platform base license after System cannot upgrade the
the device formal sale. The license provide OS version when License
basic firewall and VPN function. expired. But system could
work normally.
URL Providing URL database and URL signature System cannot provide to
database update. search URL database online
function when License
expired. But user-defined
URL and URL filtering func-
tion could be used nor-
mally.
APP signature APP signature license is issued with platform System cannot update the
license, you do not need to apply alone. The APP signature database
valid time of license is same as platform when License expires. But
license. the functions included and
rules could be used nor-
mally.
Threat Prevention A package of features, including AntiVirus, IPS, System cannot update all
and corresponding signature database update. signature databases when
license expires. But the func-
tions included and rules
could be used normally.
Expansion and Description Valid Time
Enhancement
License
l When you log into the device, the License Expiration Information dialog will pop up, which prompts for
licenses that are about to expire or have expired. Check the Don't remind me again checkbox so that the dialog
will never prompt again when you login. Click the Update Now button to jump to the License List page.
l The notification icon with the number of notifications is displayed in the upper-right corner. Hover your mouse
over the icon, and click Details after the License Expiration Information, the License Expiration Information
dialog will pop up.
Applying fo r a License
Before you apply for a license, you have to generate a license request first.
2. Under License Request, input user information. All fields are required.
4. Send the code to your sales contact. The sales person will issue the license and send the code back to you.
I nstalling a License
After obtaining the license, you must install it to the device.
To install a license:
Upload License Select Upload License File. Click Browse to select the license file, using
File the TXT format, and then click OK to upload it.
Manual Input Select Manual Input. Type the license string into the box.
Online Install Select the Online Install radio button and click the Online Install button,
your purchased licenses will be automatically installed. It should be
noted that the licenses must be in activated status in the Hillstone Online
Registration Platform(http://onlinelic.hillstonenet.com/reqlicense). (To
activate the license, you need to log into the platform using your user-
name and password of the platform.The username is the same as your
mailbox which was provided when placing an order. Hillstone will send
the password by e-mail.Then activate the licenses that need to be
installed. If you purchased the device from the Hillstone agent, please
contact the agent to activate the licenses.)
3. Click OK.
6. The system will reboot. When it starts again, installed license(s) will take effect.
Option Description
Name Type a name for the SMTP server into the box.
Server Type Domain name or IP address for the SMTP server into the box.
Virtual Router From the Virtual Router drop-down list, select the Virtual Router for the
SMTP server.
Verification Select the Enable check box for SMTP verification to enable it if needed.
Type the username and its password into the corresponding boxes.
Email Type the email address that sends log messages.
3. Click Apply.
Option Description
Maximum mes- Defines the maximum message number the modem can send in one hour.
sages per hour
Maximum mes- Defines the maximum messages number the modem can send in one day.
sages per day
Testing SMS
To test if the message sending works, you can send a test text to a mobile.
To send a text message to a specified mobile number:
3. click Send. If the SMS modem is correctly configured and connected, the phone using that number will receive a
text message; if it fails, an error message will indicate where the error is.
Note: For more information about HSM, please refer to HSM User Guide.
l Installed in public network: HSM is remotely deployed and connected to managed devices via Internet. When the
HSM and managed devices have a accessible route, the HSM can control the devices.
l Installed in private network: In this scenario, HSM and the managed devices are in the same subnet. HSM can
manage devices in the private network.
Co nnecting to H SM
To configure HSM parameters in the firewall:
3. Input HSM server's IP address in the Sever IP/Domain text box. The address cannot be 0.0.0.0 or
255.255.255.255, or mutlicast address.
5. Click OK.
Note: The Syslog Server part shows the HSM server's syslog server and its port.
3. Enter the URL of the Cloud·View server. The default configuration is cloud.hillstonenet.com.cn.
8. Select Threat Event to upload the threat events detected by Hillstone device.
10. Select whether to join the Hillstone could security program. This program will upload the threat prevention data to
cloud intelligence server. The uploaded data will be used for internal research to reduce false positives and to
achieve better protection of the equipment.
l Each VSYS has an its own virtual router, zone, address book and service book;
Note: The maximum VSYS number is determined by the platform capacity and license. You can
expand VSYS maximum number by purchasing addition licenses.
l When creating or deleting non-root VSYSs through CLI, you must be under the root VSYS configuration mode.
l Only the administrator with then RXW permission in root VSYS can create or delete non-root VSYS. For more
information about administrator permissions, see "Device Management" on Page 460.
l When creating a non-root VSYS, the following corresponding objects will be created simultaneously:
l An administrator with the RXW permission named admin. The password is vsys_name-admin.
l When deleting a non-root VSYS, all the objects and logs in the VSYS will be deleted simultaneously.
l The root VSYS contains a default VSwitch named VSwitch1, but there is no default VSwitch in a newly created
non-root VSYS. Therefore, before creating l2 zones in a non-root VSYS, a VSwitch must be created. The first
VSwitch created in a non-root VSYS will be considered as the default VSwitch, and the l2 zone created in the non-
root VSYS will be bound to the default VSwitch automatically.
l Dedicated object: A dedicated object belongs to a certain VSYS, and cannot be referenced by other VSYSs. Both
root VSYS and non-root VSYS can contain dedicated objects.
l Shared object: A shared object can be shared by multiple VSYSs. A shared object can only belong to the root
VSYS and can only be configured in the root VSYS. A non-root VSYS can reference the shared object, but cannot
configure them. The name of the shared object must be unique in the whole system.
The figure below shows the reference relationship among dedicated and shared VRouter, VSwitch, zone,
and interface.
As shown in the figure above, there are three VSYSs in StoneOS: Root VSYS, VSYS-A, and VSYS B.
Root VSYS contains shared objects (including Shared VRouter, Shared VSwitch, Shared L3-zone, Shared L2-zone,
Shared IF1, and Shared IF2) and dedicated objects.
VSYS-A and VSYS-B only contain dedicated objects. The dedicated objects VSYS-A and VSYS-B can reference the
shared objects in Root VSYS. For example, A-zone2 in VSYS-A is bound to the shared object Shared VRouter in Root
VSYS, and B-IF3 in VSYS-B is bound to the shared object Shared L2-zone in Root VSYS.
Sha re d VRoute r
A shared VRouter contains the shared and dedicated L3 zones of the root VSYS. Bind a L3 zone to a shared VRouter
and configure this L3 zone to have the shared property. Then this zone becomes a shared zone.
Sha re d VSwitch
A shared VSwitch contains the shared and dedicated L2 zones of the root VSYS. Bind a L2 zone to a shared VSwitch
and configure this L2 zone to have the shared property. Then this zone becomes a shared zone.
Sha re d Zone
The shared zones consist of L2 shared zones and L3 shared zones. After binding the L2 zone with the shared property
to a shared VSwitch, it becomes a shared L2 zone; after binding the L3 zone with shared property to a shared VRouter,
it becomes a shared L3 zone. A shared zone can contain interfaces in both root VSYS and non-root VSYS. All function
zones cannot be shared.
Option Description
l Physically Import: Select the interface you want, and click Phys-
ically Import to add it to the right pane.
l Logically Allocate: Select the interface you want, and click Logic-
ally Allocate to add it to the right pane.
4. Click OK to save configuration. The new VSYS will be seen in the VSYS list.
l Shared object: A shared object can be shared by multiple VSYSs. A shared object can only belong to the root
VSYS and can only be configured in the root VSYS. A non-root VSYS can reference the shared object, but cannot
configure them. The name of the shared object must be unique in the whole system.
To configure VSYS shared object:
Option Description
VSwitch In the VSwtich tab, select a Vswitch and click Share to set it as a shared
object; to make a VSwitch as a dedicated object, click Do Not Share.
VRouter In the VRouter tab, select a Vswitch and click Share to set it as a shared
object; to make a VRouter as a dedicated object, click Do Not Share.
Zone In the Zone tab, select a Zone and click Share to set it as a shared object;
to make a Zone as a dedicated object, click Do Not Share.
2. Click New .
System Specify the maximum quota and reserved quota of system resources.
Resources
l Session number: Specifies the maximum and reserved number for
sessions in the VSYS.
l Zones: Specifies the maximum and reserved number for zones in the
VSYS.
l SNAT rules: Specifies the maximum and reserved number for SNAT
rules in the VSYS.
l DNAT rule: Specifies the maximum and reserved number for SNAT
rules in the VSYS.
l IPsec: Specifies the maximum and reserved number for IPSec tunnels
in the VSYS.
URL Resources Specify the maximum quota and reserved quota of URL resources.
l URL: Select the Enable check box to enable the URL filter function.
l URL Profiles: Specifies the maximum and reserved number for URL
filter profiles in a VSYS.
l IPS: Select the Enable check box to enable the IPS function.
l IPS Profiles: Specifies the maximum and reserved number for IPS
profiles in a VSYS. You can create one IPS Profile at most in non-
root VSYS, i.e., the range of maximum quota varies from 0 to 1.
The default value of maximum quota and reserved quota is 0,
which means only predefined IPS Profiles can be used in non-root
VSYS.
Log Configuration
Log Con- Specify the maximum quota and reserved quota of memory buffer for
figuration each type of logs in a VSYS. The reserved quota should not exceed the
maximum quota. If the logs’ capacity in a VSYS exceeds its maximum
quota, the new logs will override the earliest logs in the buffer.
l Config Logs: Specify the maximum and reserved value of buffer for
configuration logs in a VSYS.
l Event Logs: Specify the maximum and reserved value of buffer for
event logs in a VSYS.
l Threat Logs: Specify the maximum and reserved value of buffer for
threat logs in a VSYS.
l Session Logs: Specify the maximum and reserved value of buffer for
session logs in a VSYS.
l NAT Logs: Specify the maximum and reserved value of buffer for
NAT logs in a VSYS.
4. Click OK to save settings. The new VSYS quota will be shown in the list.
l The default VSYS profile of the root VSYS named root-vsys-profile and the default VSYS pro-
file of non-root VSYS named default-vsys-profile cannot be edited or deleted.
l Before deleting a VSYS profile, you must delete all the VSYSs referencing the VSYS profile.
l The maximum quota varies from one platform to another. The reserved quota cannot
exceed maximum quota.