Advertisement

Quick Links

HiGuard Wireless Router
For SOHO
Manual
Please feel free to contact us if you have any questions.
E-mail:
help@higuard.com
Power By ShareTech

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SOHO and is the answer not in the manual?

Questions and answers

Summary of Contents for HiGuard SOHO

  • Page 1 HiGuard Wireless Router For SOHO Manual Please feel free to contact us if you have any questions. E-mail: help@higuard.com Power By ShareTech...
  • Page 2: Table Of Contents

    2-2、Hardware Installaion ..........................9 2-3、Set up your computer ..........................11 2-3-1、Windows XP ............................ 11 2-3-2、Windows 7 ............................14 Chapter 3: Connect to HiGuard 3-1、Config. wizard ............................17 3-2、Log-in HiGuard GUI ..........................21 3-3、Firmware Upgrade ..........................23 3-4、Restart Device ............................24 3-5、Signature Update ...........................
  • Page 3 6-1-1、DHCP (Dynamic IP) ........................60 6-1-2、Static IP(Static IP) .......................... 61 6-1-3、PPPoE(ADSL Dial-up) ........................62 6-2、Local Area Network (LAN) Setting ....................... 63 6-2-1、HiGuard Management IP ......................63 6-2-2、DHCP Server Setting ........................63 6-2-3、DNS Server Setting ........................64 6-3、Wireless ............................... 65 6-4、Dynamic DNS ............................67 6-5、IPv6 ..............................
  • Page 4 Chapter 7: Log & Report 7-1、Setup ............................... 75 7-2、Anti-Virus ............................77 7-3、Application Guard ........................... 78 7-4、URL Keyword Filter ......................... 79 7-5、URL Category Filter ......................... 80 7-6 、Access Control List ......................... 81 7-7 、Firewall Protection ........................82 7-8 、VPN IPSec ............................83...
  • Page 5: Chapter 1 Higuard

    Chapter 1 HiGuard The HiGuard, Network Security Adaptor, is a powerful device that provides network layer seven (OSI Layer 7) security protections to the connected equipments after Internet accessed devices. Without additional host CPU resource or installation process, HiGuard provides transparent security features like anti-virus, instant message, peer-to-peer application control, and malicious drive-by download attacks prevention.
  • Page 6: 1-2、Protection

    1-2. Protection Anti-Virus Packet-based Virus Scanning Support HTTP / FTP / SMTP / POP3 / IMAP4/ TCP STREAM Packet-Based Decoding for Base64 / UUencode / QP Packet-Based Decompression for Zip / GZIP Detect Viruses Across in Multi-Packets Application Guard Detection for Well-Known Protocols HTTP / FTP / SMTP / POP3 AOL / Jabber / MSN / QQ eDonkey / Fasttrack / Thunder...
  • Page 7: 1-3、Identify Components

    1-3. Identify Components The following sections describe the physical characteristics of the HiGuard. 1-3-1. Front Panel The LEDs of the HiGuard indicate its operational status. Color Condition Status Power on POWER Green Power off WIFI enabled Green Blinking Transmitting Wi-Fi...
  • Page 8: 1-3-2、Back Panal

    POWER The receptacle where you plug in the power adapter. Using this port to connect your modem to Higuard. Using those ports to connect your PC or NB to HiGuard. Press to reset HiGuard. RESET Press over five seconds to reset to default settings.
  • Page 9: Chapter 2 Quick Installation

    Chapter 2 Quick Installation In this chapter, the installation and configuring network of HiGuard will be introduced. 2-1. Unboxing HiGuard Please ensure you have all these components: 1. HiGuard Wireless Base Unit 2. RJ-45 Ethernet Cable 3. One Power Adapter 4.
  • Page 10: 2-2、Hardware Installaion

    Switch on your ADSL Modem/Cable Modem and wait till the Internet LED on the ADSL modem turns green and remain steady. iv. Switch on the HiGuard appliance. Wait till the Power LED and WAN LED turns green. v. Switch on your computer now. HiGuard’s LAN LED will turn green and remains steady.
  • Page 11 B. USB Modem i. Plug a USB modem in the slot in the HiGuard appliance. ii. Use the RJ-45 Ethernet cable provided with the HiGuard appliance to connect your computer to any of the YELLOW sockes (LAN), and switch the HiGuard appliance.
  • Page 12: 2-3、Set Up Your Computer

    2-3. Set up your computer In order to configure network quickly, please read the proper sections about Windows XP, and Windows 7. 2-3-1.Windows XP i. Click the “Control Panel” of the “Start Menu”. ii. Double click the “Network Connection” in the control panel.
  • Page 13 iii. Right click the “Load Area Connection” and the choose the “Properties”. iv. Choose the “General” tab and select the “Internet Protocol”. And then click the “properties” button.
  • Page 14 v. Choose “Obtain an IP address automatically” and click OK. For your reference. the default gateway is 192.168.1.1. As long as there is no conflict, you may enter IP from 192.168.1.2 to 192.168.1.254.
  • Page 15: 2-3-2.Windows 7

    2-3-2.Windows 7 i. Right click the network icon in the right bottom corner of Windows 7. Choose “Open Network and Share Center”. It will pop up a screen. In this screen, choose “Change Interface.” ii. Right click on the “Local Area Connection” icon and select “Status”.
  • Page 16 Automatically obtain IP address has not been set iii. Click “Properties” of the “Local Area Connection”. Select “Internet Protocol v4 (TCP/IPv4) ” and then click “Properties”. Please check section 2-3-1 and set up the automatically obtained IP. Automatically obtain IP address to complete the setup iv.
  • Page 17: Chapter 3 Connect To Higuard

    (Figure 3-1) Figure 3-1. Enter IP Address B. If you can see the following Admin Screen, it means HiGuard is successfully connected. Please select language at the bottom. Eenter “admin” as default username and “admin” as default password and click the Login button.
  • Page 18: 3-1、Config. Wizard

    3-1. Configuration Wizard The network configuration wizard will be enabled in the first login of HiGuard. And then It will help you step by step set up the network. If you login at the first time but cancel the network configuration wizar.
  • Page 19 3. Wide Area Networking (WAN) Setting: Set up WAN type. There are different parameters according to the WAN type. i. Choose “DHCP” for IP address. (Figure 3-4) Figure 3-4. WAN Configuration DHCP ii. Choose “Static” and key in IP address, Subnet Mask and Gateway. (Figure 3-5) Figure 3-5.
  • Page 20 DNS server. (Figure 3-6) Figure 3-6. WAN Configuration PPPoe 4. Local Area Networking (LAN) Setting: Set up the LAN. The LAN IP of HiGuard and its DHCP server setting can be assigned here. (Figure 3-7)
  • Page 21 (Figure 3-9) Figure 3-9. Done with the network configuration wizard. When “Done” is clicked, all the network settings are saved and HiGuard will reboot to make them effective. If there are other modifications need to be done, please login after new...
  • Page 22: 3-2、Log-In Higuard Gui

    3-2. Log-in Higuard GUI HiGuard provideS English, Traditional Chinese, Simplified Chinese and Japanese languages GUI. The default is English language GUI. You may switch language in the right bottom list box. The newly chosen language will be memorized. You will not need to choose language again next time.
  • Page 23 (Figure3-12, Figure3-13) Figure 3-12. This is the menu bar of the HiGuard, you may check the detail by clicking every item in the menu. Figure 3-13. The right area will show the detail according to the clicked items in the left menu.
  • Page 24: 3-3、Firmware Upgrade

    Configuration” or “Reset Configuration”. If this is a major upgrade (from v1.1 to v1.2), you must select “Reset Configuration”. After making sure everything, please click “Apply” button. Tips: In the process of firmware upgrade, HiGuard will validate the firmware file first. If this firmware is invalidate, it will be rejected.
  • Page 25: 3-4、Restart Device

    3-4. Restart Device To restart the HiGuard, just click the “System / Restart Device” on the left. (Figure 3-16) Figure 3-16. Restart Device menu And, click the “reboot” in the right area. (Figure 3-17) Figure 3-17. Restart Device Please wait until reboot completes.
  • Page 26: 3-5、Signature Update

    3-5. Signature Update When the automatic updating is enabled, updates will download and install automatically. In addition to that, you can update signature manually. (Figure 3-18) Figure 3-18.Details of Signature Update Select “Check Period” and click apply to save the setting. If you use HTTP Proxy, please click “enable”, and enter related information in the field.
  • Page 27: 3-6、Admin Password

    3-6. Admin Password The default password of HiGuard is “admin”. It is highly recommend that you change the default password. To change the password, please click the “Change Password” on the left. (Figure 3-20) Figure 3-20. Change Password On the right, please enter old password and new password twice. And then click “Apply” to save the password.
  • Page 28: 3-7、Web Access

    3-7. Web Access It is not allowed to login HiGuard via WAN in router mode by default. To change that policy, click the “System / Web Access” on the left. And make the proper modifications. (Figure 3-22) Figure 3-22. System/ WebAccess To allow WAN web access, please check the “Enable WAN Web Access”...
  • Page 29: 3-8、Time Settings

    3-8. Time Settings HiGuard enables NTP (Network Time Protocol) service by default. Therefore, it will synchronize time if the Internet access is correct. For example, as you may see in this NTP settings, it will adjust the time every 3600 seconds with the pre-defined NTP servers.
  • Page 30: 3-9、Config. Manager

    (Figure 3-25) Figure3-25. Config Manager 3-9-1. Export HiGuard Setting To export the current configuration profile, please click “Config Manager” on the left. And click the “Export” button of “Download config file”. (Figure 3-26) Browser will prompt the path name.
  • Page 31: 3-9-2、Restore Higuard Setting

    Please make sure and click “OK”. Otherwise, choose “Cancel”. (Figure 3-28) Figure 3-28. Success to restore profile to current config Tips: HiGuard will check the uploaded files. If it is not the configuration profile generated by HiGuard, it will be rejected. (Figure 3-29) Figure3-29.
  • Page 32: 3-9-3、Multiple Profile Management

    3-9-3. Multiple Profile Management You may create several configuration profiles for fast switching among different environments. 1. This version of HiGuard allows you to create 3 profiles. Just name it with meaningful words. For examples, “Bridge_Mode”. (Figure 3-30) Figure 3-30. Create Multiple Default Config 2.
  • Page 33: 3-9-4、Restore Factory Setting

    3-9-4. Restore Factory Settings To restore to the factory default settings, please enter HiGuard GUI and take following steps as your reference. 1. please click the “Config Manager” on the left. 2 . In the profile manager, click the “Restore” button of the “Default Profile.”...
  • Page 34: 3-9-5、Restore Factory Setting From Hardware

    This section introduces another method to restore to factory default setting without logging in HiGuard. Sometimes you can not log into HiGuard. For example, the password is lost, but you still need HiGuard to reset to default. Please follow the steps below 1.
  • Page 35: Anti-Virus

    Chapter 4 Protection HiGuard SOHO is not only a wireless router, but also a anti-virus, and malicious websites blocking gateway. You can build a secured network with HiGuard easily. Its installation is quick and no complex operation. In this section, all the security functions will be introduced.
  • Page 36: Signature

    There are several virus categories. For example, virus and spy. “Outbreak” means the virus will prevail in large scale when it is infected. If the packet passing through HiGuard is judged as a virus, then the file destroy mechanism will be activated provided the action of “Destroy File” is set.
  • Page 37: Anti-Virus Setting

    4-1-3. Anti-Virus Setting After enabling the anti-virus function, it will scan FTP/HTTP/POP3/SMTP/IMAP4/TCP Stream by default. You can adjusted here for individual protocol. The settings of six protocols which HiGuard will scan. (Figure 4-6) Figure 4-6 Action Configuration The settings of virus categories which HiGuard will scan.
  • Page 38 Anti-virus system will scan any type of files to prevent malwares interferes the normal operation of a computer. If you want to ignore some file type, please check the “Ignore” check box of the file type in the “Ignored File Type” tab. (Figure 4-10) Figure 4-10.
  • Page 39: Application Guard

    4-2. Application Guard Application Guard can manage the instant messager, peer to peer or social web sites. For example, if you want to block the usage of SKYPE or MSN Messager chat, the application guard is useful for this case. It can blocking specific application in the gateway. (Figure 4-11) Figure 4-11.
  • Page 40 Rule Setting In “application guard / configuration”, rules can be viewed as category or specific application. As the following example, all “Instant Messager” which in the signature file are blocked. (Figure 4-13) Figure 4-13 Specific Apllication Guard Configuration If only a specific application should be blocked, then we should go to second level. For the following example, IM is chosen first.
  • Page 41 As you may see in the following example, all MSN related rules are shown. And the you can block any of the five behavior – Login, Message, Audio, Video and File Transfer. (Figure 4-15) Figure 4-15. Block all MSN behaviors...
  • Page 42 Schedule Setting Assume a company only allows MSN for 12:00~13:00 everyday. We need two rules to describe this situation. Please check the following example. (Figure 4-16, 4-17) Figure 4-16. schedule setup Figure 4-17. schedule setup...
  • Page 43 After defined the schedule, please assign “Scheduled Block” to all the five MSN behaviors. (Figure 4-18) Figure 4-18. Application guard schedule setup...
  • Page 44 MAC White list Sometimes there will be exceptions. For example, the CEO and secretary can use facebook but not other people. In this case, we can add their MAC to the “MAC Whitelist” so that application guard will bypass any rules for these MAC address. (Figure 4-19, 4-20, 4-21) Figure 4-19.
  • Page 45: Url Keyword Filter

    “iframe” will be downloaded when the retrieval of this HTML page and siblings. (Figure 4-22) Figure 4-22. example of malicious websites HiGuard keeps updating the Web Guard signatures. Once the URL matches a malicious website, it will block this URL. (Figure 4-23) Figure 4-23. URL Keyword Filter Configuration After the “Enable Web Guard”...
  • Page 46 If you do not want to block the malicious web sites, you may enable “Log only and not blocking” check box in the “Web Guard / Configuration” page. (Figure 4-25) Figure 4-25. Keyword Filter Log only setup Tips: Unless itis for test only to equip all the necessary protection, it is not recommended to choose “Log only and not blocking”.
  • Page 47: Url Category Filter

    4-4. URL Category Filter HiGuard adopts a external web category database. You may block specific category of URL. For example, the adult websites are blocked for child in home market. Most company does not want to allow job websites for their employee.
  • Page 48 When users want to access this category of web sites, it will show “This website is blocked” warning message. (Figure 4-28) Figure 4-28 It is possible that “Log only and not blocking” is selected. However, this is not recommended. (Figure 4-29) Figure 4-29 After “Log only and not blocking”...
  • Page 49: Internet Authentication

    4-5. Internet Authentication Internet Authentication servers as a gateway to filter out unauthorizre users from accessing the Internet. Configuring the Authentication provides an effective method of managing the network’s use. Click “Internet Authentication/ Overview ”, and check “Enable Internet Authentication” box, and click “apply”...
  • Page 50 All the network users have to authenticate before login. There might be devices that IT administrators want to exempt from Authentication. They can add IP address to the Whitelist, and the device will be able to surf Internet without Authentication. (Figure 4-32) Figure 4-32.
  • Page 51 Device IP Whitelist Device IP Whitelist means authorize access or grant membership such as boss excluded from the normal regulation. (Figure 4-35) Figure 4-35. Add Device IP to Whitelist Device IP Whitelist setting is completed. (Figure 4-36) Figure 4-36. Success to add Device IP...
  • Page 52 4-6. QoS By configuring the QoS, IT administrator can limit the up speed and download speed, and apply the bandwidth configuration for each IP address. Configure QoS profile. IT administrator is able to set up 5 different profiles. (Figure 4-37) Figre 4-37.
  • Page 53 Figure 4-39. Success to save Single QoS In additon, administrator can click on detected IP to create multiple device from network neighborhood. (Figure 4-40) Figure 4-40. Quick ly add Device IP QoS...
  • Page 54: Chapter 5 Security

    Chapter 5 Security If users want to set up a web server or similar things, the HiGuard firewall section provides port forwarding, UPnP, Access Control List and is useful for these services. 5-1. Port Forwarding In order to allow Internet connections to reach the internal servers, you must use pot forwarding feature.
  • Page 55 To delete a single rule, just click the “Delete” check box in the right column and click “Apply”. The rule then is deleted. (Figure 5-3) Figure 5-3. Delete Poert Forwarding Service List To test this port forwarding rule is correct, just open a browser and connect to its Internet IP.
  • Page 56: Upnp

    5-2. UpnP UPnP means “Universal Plug and Play”. It is for primarily residential networks without expert administrators that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish functional network services for data sharing, communications, and entertainment.
  • Page 57: Access Control

    5-3. Access Control “Access Control List” is useful for allowing specific users to access a server. This enhances the security and prevents the unauthorized users. To add a access control rule, please click “Firewall / Access Control List” on the left. (Figure 5-6) Figure 5-6.
  • Page 58: Firewall Protection

    5-4. Firewall Protection HiGuard firewall performs stateful packet inspection which is configured to protect network from attacks, such as DOS, DDOS, UDP Flooding. Also, HiGuard firewall is designed to defend network users and prevent the abuse of network bandwidth. (Figure 5-8) Attacks: SYN attack detection:SYN Flood is a popular attack way.
  • Page 59 5-4-1. Setup When you enable SYN/ICMP/UDP/Port Scan Protection, all the configuration values are pre-filed. Administrator is able to change values according to each network situation. (Figure 5-9) Figure 5-9. SYN Attack Detection Setting...
  • Page 60 6-1. Wide Area Network (WAN) Setting WAN(Wide Area Network) means the network which the ADSL modem connect to for home or SOHO users. HiGuard is usually configured as “Router Mode” and ISP usually provide PPPoE service. For small to median enterprise or similar organization, there are a lot of PC. They usually equipped with a more powerful router.
  • Page 61: Dhcp (Dynamic Ip)

    (Figure 6-3) Figure 6-3. WAN Configuration- DHCP You may check the WAN IP in the network overview page if HiGuard is assigned to DHCP in address type. If you want to re-assigned the WAN IP again, just click the “Renew” button.
  • Page 62: Static Ip(Static Ip)

    6-1-2 Static IP (Static IP) If the ISP or network provider provides static IP, then we need IP, Netmask, Gateway, Primary DNS and Secondary DNS to configure the network. The following is an example. (Table 6-1) Item Parameter 192.168.195.164 Netmask 255.255.255.0 Gateway 192.168.195.254...
  • Page 63: Pppoe(Adsl Dial-Up)

    6-1-3 PPPoE (ADSL Dial-up) The following is a PPPoE example provided by a ISP. (Figure 6-7) Figure 6-7. ADSL Dial-up Please switch to “PPPoE” in WAN IP Setting and enter the PPPoE parameters accordingly, including user name, and password. (Figure 6-8) Figure 6-8.
  • Page 64: Local Area Network (Lan) Setting

    6-2. Local Area Network (LAN) Setting Adjust the LAN setting of HiGuard if necessary. 6-2-1 HiGurad Management IP The default management IP of HiGuard is 192.168.1.1. You may adjust it in “LAN Configuration” in “Network / Configuration”. (Figure 6-10) Figure 6-10. LAN Configuration 6-2-2 DHCP Server Setting You may enable DHCP server only in “Router Mode”.
  • Page 65: Dns Server Setting

    6-2-3 DNS Server Setting The HiGuard usually obtained the DNS info from its upper level network. To specify the DNS server by ourselves, please choose the “Static DNS server” and then enter the primary and secondary DNS server. Finally, click “Apply”.
  • Page 66: Wireless

    6-3. Wireless HiGuard disabled wireless by default because there is no default wireless password. To enable wireless, please click the “Network / Wireless” on the left. And then configure network mode and security. Figure 6-14) Figure 6-14. Enable Wireless Network ■...
  • Page 67 WPA2_PSK / WPA encrypts data with one 128 bit key. The WPA is WPA_PSK superior than WEP because of TKIP(Temporal Key Integrity Protocol). This prevents the WEP key attack. WPA2 is most security so far. WPA2 implements the mandatory elements of 802.11i. In particular, it introduces CCMP, a new AES-based encryption mode with strong security.
  • Page 68: Dynamic Dns

    6-4. Dynamic DNS Dynamic DNS allows the domain name bind to a dynamic IP of a PC or SOHO router. So that we can easily connect to the PC or SOHO router without knowing its IP. To use this dynamic DNS feature, you must register a domain name from DynDNS.org, TZO.com, NO-IP.COM or...
  • Page 69 When dynamic DNS works, you can refer to section 3-6 and allow users manage this device from Internet. It will be more convenient that we manage HiGuard remotely. Also, you can refer to section 5-1 and adjust the port forwarding properly. So that you can set up some servers like web site.
  • Page 70: Ipv6

    6-5. IPv6 To browse IPv6 web sites, the ISP or network provider must provide IPv6 access. Please check the following and set up your IPv6 network. (Figure 6-21) Figure 6-21. IPv6 Setup Tips: Windows XP does not turn on IPv6 by default. Please type “ipv6 help” in command line to check it is turn on or not.
  • Page 71: General Setup

    6-5-1. General Setup To enable IPv6, you have to configure WAN IP setting as “Static”in WAN Configuration. (Figure 6-23) Figure 6-23. IPv6 router mode Enter WAN IP address, Gateway, and Lan IP address. (Figure 6-24) Figure 6-24. IPv6 router mode...
  • Page 72 Open Command Promt and excute the“ipconfig”command. There should be IPv6 address shown, if you have configured IPv6 sucessfully. (Figure 6-25) Figure 6-25. IPconfing To test surfing IPv6 website, you can open an IE browser and enter “http:// ipv6.ntct.edu.tw/”in the addrss bar. If IPv6 works sucessfully, you will see the following picture.
  • Page 73: Vpn Ipsec

    6-6. VPN IPSec To obtain a private and secure network link, HiGuard is capable of establishing VPN connections, allowing for secured connections to branch offices and the “on-the-go” mobile workforce. HiGuard not only allows continuous collaboration and exchange of information but also saves time and cost on access resources through a secure tunnel.
  • Page 74 Example: Create IPSec connections between Company A and Company B (Headquarter) Suppose Company A create a VPN connection with Company B for downloading the sharing file. Company A WAN IP: 61.11.11.11 LAN IP: 192.168.0/24 Company B(Headquarter) WAN IP: 211.22.22.22 LAN IP: 192.168.200.0/24 (Figure 6-27) Figure 6-27.
  • Page 75 (Figure 6-28) Figure 6-28. IPSec VPN Tunnel Step 1. Company A connects to the HiGUard web UI. Click Network/ VPN IPSec. Step 2. Add VPN. Enter VPN Tunnel Name, Remote VPN Server, and Preshared key. Step 3. Select ISAKMP Algorithm, ENC Algorithm , AUTH Algorithm, and Group Step 4.
  • Page 76: Setup

    Chapter 7 Log and report HiGuard logs all its security functions. So that you can analyze and do statistics. Also, there is a search function in all these log pages. Some abnormal behaviors of network can be located and then help you to fix.
  • Page 77 We use « Tftpd32 » as syslog server example. It is easy to use and friendly. As you can see in the following picture, the syslog server is installed on 192.168.1.13 and it receive the logs. (Figure 7-3) Figure 7-3. Syslog Server...
  • Page 78: Anti-Virus

    7-2. Anti-Virus When “Enable Anti-Virus” is on in the “Anti-Virus/Overview” page, the anti-virus log is active according to the log settings you defined in the “Anti-Virus/Configuration” page. (Figure 7-4) Figure 7-4. Enable Anti-Virus Anti-virus system logs every protocols by default. The log is separate by protocols. This is convenient for users to find specific category of log.
  • Page 79: Application Guard

    7-3. Application Guard The settings in “Application Guard / Configuration” define the log behavior of application guard. For example, if you define all the MSN behaviors as “Log”, then it will log when MSN behaviors occurs. (Figure 7-6, Figure 7-7) Figure 7-6.
  • Page 80: Url Keyword Filter

    If “Enable Web Guard”in “Application Guard / Overview” is on, all the URL pass through HiGuard will be checked. All occurrence will be logged if it matches the web guard signature database or the user defined keywords. The following is the web guard log example.
  • Page 81: Url Category Filter

    7-5. URL Category Filter If “Enable URL Filter” in “URL Filter / Overview” is on, all the URL matches your defined category will be log and blocked. For example, “Job” category is selected and (Figure 7-9) users still try the famous job web site – “104 Job Bank”. All the access is blocked and log here.
  • Page 82: Access Control List

    7-6. Access Control Rules in “Firewall / Access Control List” (Please check section 5-3) have a “Log” attribute. If it is “Yes”, all occurrences of that rule will be logged. (Figure 7-10) Figure 7-10. Access Control Log...
  • Page 83: Firewall Protection

    7-7. Firewall Protection When Firewall Protection log is enabled, all the anomalous secessions and malicous attacked will be logged. Administrator can search logs according to date, time, source, destination, protocol, port, and attack type. (Figure 7-11) Figure 7-11. Firewall Protection Log...
  • Page 84: Vpn Ipsec

    7-8. VPN IPSec Rules in “Network / VPN IPSec” (Please check section 6-5) have a “Log” attribute. (Figure 7-12) If it is “Yes”, all occurrences of that rule will be logged. Figure 7-12. VPN IP Sec Log...

Table of Contents