Table of Contents

Advertisement

Quick Links

UTM User Manual
www.allo.com
Version 2.0
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the UTM and is the answer not in the manual?

Questions and answers

Summary of Contents for Allo.com UTM

  • Page 1 UTM User Manual www.allo.com Version 2.0...
  • Page 2 Information in this document is subject to change without notice and should not be construed as a commitment on the part of allo.com. And does not assume any responsibility or make any warranty against errors. It may appear in this document and disclaims any implied warranty of merchantability or fitness for a particular purpose.
  • Page 3: About This Manual

    UTM User Manual About this manual This manual describes the allo product application and explains how to work and use it major features. It serves as a means to describe the user interface and how to use it to accomplish common tasks.
  • Page 4: Table Of Contents

    1. Introduction ......................... 8 1.1 Overview ..........................8 1.2 Technical Specifications ......................9 1.3 Equipment Structure ......................10 1.3.1 UTM Rear View ....................... 10 1.3.2 UTM Front View ......................10 1.4 Initial Setup & Configuration ....................11 1.4.1 Connecting the Hardware ....................11 1.4.2 Network Deployment ......................
  • Page 5 UTM User Manual 4.2 Virtual IPS ..........................23 4.3 VLAN Config ........................... 24 4.4 Zones ............................. 25 4.5 WAN Load Balancing ......................26 4.6 Routing ..........................27 4.6.1 Static Routes ........................27 4.7 DNS ............................28 4.8 DHCP Server .......................... 28 4.9 Dynamic DNS .........................
  • Page 6 UTM User Manual 6.3 VPN ............................57 6.3.1 SSLVPN Server Settings ....................58 6.3.2 SSLVPN Client Profiles..................... 60 6.3.3 SSLVPN P2P Policies ......................61 6.3.4 Client Certificates ......................63 6.3.5 IPSec Settings ........................64 6.3.6 IPSec Policies........................65 6.4 Web Proxy ..........................70 6.4.1 Proxy Configuration ......................
  • Page 7 UTM User Manual 8.1 Diagnostics Report ........................ 86 8.2 Ping ............................87 8.3 Trace Route ........................... 87 8.4 DNS Lookup ........................... 88 8.5 Packet Trace .......................... 89 9. Reports ..........................90 9.1 System ........................... 90 9.1.1System usage ........................90 9.2 Firewall ..........................90 9.2.1 Internet Usage ........................
  • Page 8: Introduction

    Internet connection. As a complete security solution, the UTM combines a powerful, flexible firewall with a content scan engine that protect your network from denial of service (DoS) attacks, unwanted traffic, traffic with objectionable content, spam, phishing, and Web-borne threats such as spyware, viruses, and other malware threats.
  • Page 9: Technical Specifications

    UTM User Manual 1.2 Technical Specifications No of Interfaces Two 1Gbps WAN port & four 1Gbps LAN ports, 1 console interface, 1 USB port Status Firewall Inspection Deep Packet Inspection Signatures Support ~4000 active signatures from snort VRT/emerging threats Application Protocols Detection...
  • Page 10: Equipment Structure

    UTM User Manual Notification LEDs (On the front panel of the UTM) 1.3 Equipment Structure 1.3.1 UTM Rear View Figure 1: UTM Rear View 1.3.2 UTM Front View Figure 2: UTM Front View www.allo.com Version 2.0...
  • Page 11: Initial Setup & Configuration

    UTM User Manual 1.4 Initial Setup & Configuration 1.4.1 Connecting the Hardware Figure 3: Connecting the Hardware www.allo.com Version 2.0...
  • Page 12: Network Deployment

    UTM User Manual 1.4.2 Network Deployment Figure 4: Network Deployment Default Configuration Port IP Ares Ethernet Port IP Address LAN 0-3 > eth1 10.0.0.1/255.255.255.0 WAN > eth0 10.1.0.1/255.255.255.0 Management VLAN 192.168.1.1/255.255.255.0 (Accessible Ports) Default Firewall Mode Router www.allo.com Version 2.0...
  • Page 13: Connect Utm Firewall

     The recommended browsers for accessing UTM 1.0 WebUI is Mozilla Firefox / Internet Explorer 8 and above.  Accept the Self signed SSL Certificate and Login to the UTM appliance using default Web UI credentials. Figure 5: UTM Login page ...
  • Page 14: Dashboard

    UTM User Manual 2. Dashboard On logging into the UTM WebUI, the dashboard will be shown. The user can visit the dashboard page from the any configuration page in the UTM WebUI, by clicking the UTM Product Icon that appears in the left corner of the Top panel.
  • Page 15: Device Settings

    UTM User Manual 3. Device Settings 3.1 Host Config Navigate through Device Settings > Host Config Configuring hostname and domain name of the device. Figure 7: Host Config 3.2 Admin User Navigate through Device Settings > Admin User The user allows for configuring web UI administrator username and password. User can change the web UI username and password.
  • Page 16: Ssh

    UTM User Manual 3.3 SSH Navigate through Device Settings > SSH Secure SHell (SSH) is a network protocol for secure data communication, remote command line login, remote command execution, and other secure network services between two networked computers. It connects, via a secure channel over an insecure network, a server and a client running SSH server and SSH Client programs, respectively.
  • Page 17: Time

    UTM User Manual Figure 10: Web User Interface 3.5 Time Navigate through Device Settings > Time The user allows for configuring time settings to the device using NTP server or using manual settings. Using sync with NTP, the user has to provide the NTP servers to sync with the time along with the zone specified in the zone list.
  • Page 18: Snmp

    Trap Servers List: A trap is an SNMP agent's way of notifying the manager that "something is wrong". UTM SNMP traps will capable of sending SNMP traps on their own to alert an SNMP manager when they experience a problem.
  • Page 19: Certificates

    UTM User Manual Figure 13: Create Trap Servers List Figure 14: SNMP 3.7 Certificates Navigate through Device Settings > Certificates In this section includes two sections: 3.7.1Built-in certificates #Built-In which includes default root certificates about 200+. www.allo.com Version 2.0...
  • Page 20: Local Certificates

    UTM User Manual Figure 15: Built-in Certificates 3.7.2 Local Certificates # Local which user uploaded certificates in PKCS12 format contains root certificate, server certificate and server key. Challenge password is the password for extracting uploaded PKCS12 file and New Certificate Name is the name for uploaded certificate.
  • Page 21: Logging

    UTM User Manual 3.8 Logging Navigate through Device Settings > Logging Configuring logging server address to where the log information has to be sent like Firewall alerts, IPS alerts, VPN alerts etc. Figure 17: Logging 3.9 Maintenance Navigate through Device Settings > Maintenance This section consists of two parts: Administration and Firmware.
  • Page 22: Firmware

    UTM User Manual Backup configuration which provides facility to take back up of current configuration settings. Restore configuration which provides facility to restore the configuration which is provided. Figure 18: Administration 3.9.2 Firmware Navigate through Device Settings > Maintenance > Firmware It includes #factory reset- it resets the device to default configuration settings.
  • Page 23: Network Settings

    PRIMARY means the connection will be on the external interface. Figure 20: Interfaces 4.2 Virtual IPS Navigate through Network > Virtual IPS UTM's VIPs addressing enables hosting for several different applications and virtual appliances on a server with only one logical IP address www.allo.com Version 2.0...
  • Page 24: Vlan Config

    UTM User Manual Figure 21: Create Virtual IPS Figure 22: Virtual IPS 4.3 VLAN Config Navigate through Network > VLAN Config A VLAN is a group of end stations with a common set of requirements, independent of physical location. VLANs have the same attributes as a physical LAN but allow you to group end stations even if they are not located physically on the same LAN segment.
  • Page 25: Zones

    Figure 24: VLAN Config 4.4 Zones Navigate through Network > Zones UTM zones are used to create any area that is separated from another. It allows user to create their individual LAN and WAN Zone according to their network environment naturally. www.allo.com...
  • Page 26: Wan Load Balancing

    4.5 WAN Load Balancing Navigate through Network > WAN Load Balancing UTM has the ability to balance traffic across two WAN links without using complex routing protocols. It uses following 4 techniques to balance load across two WAN:  Active Failover ...
  • Page 27: Routing

    UTM User Manual Figure 27: Web Load Balancing 4.6 Routing 4.6.1 Static Routes Navigate through Network > Routing> Static Routes We configure routes to the destination network by specifying destination address, net mask and metric value (0 - 31). Gateway is optional.
  • Page 28: Dns

    4.7 DNS Navigate through Network > DNS Domain Name System (DNS) is a service translates domain names into IP addresses. In UTM user can configure Primary DNS, Secondary DNS, and Tertiary DNS by giving either DNS server IP or name.
  • Page 29 UTM User Manual Figure 31: Add DHCP Server Settings Conflict time (60 – 3600) Decline time (60 – 3600) Offer time (60 – 3600) and Max lease (1 – 125). We can configure static mapping by adding the MAC address of a client , the IP address assign to clients, hostname to the client and whether to enable this rule or not.
  • Page 30: Dynamic Dns

    UTM User Manual 4.9 Dynamic DNS Navigate through Network > Dynamic DNS It is used to configure access to third-party dynamic DNS service providers Figure 33: Add DDNS If another Dynamic DNS Profile has been enabled on the WAN interface already; you can enable only one Dynamic DNS profile on the WAN interface at a time.
  • Page 31: Pppoe Profiles

    The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating PPP frames inside Ethernet frames and allows data communication between two network entities or points. UTM allows user to configure PPPOE profiles in PAP /CHAP authentication modes. Figure 35: Create PPPoE Profile Figure 36: PPPoE Profiles www.allo.com...
  • Page 32: Policy Objects

    Policy objects are building blocks for configuring Firewall, VPN, Web Filter, User Policies etc in UTM. They are something that can be configured once and then used over and over again to build what you need. They can assist in making the administration of the UTM unit easier and more intuitive as well as easier to change.
  • Page 33: Address Objects

    When properly set up these Address objects can be used with great flexibility to make the configuration of firewall/Web filtering policies simpler and more intuitive. The UTM policies verify and check the IP addresses contained in packet headers with a security policy’s source and destination addresses to determine if the security policy matches the traffic.
  • Page 34 UTM User Manual It determines the network address, host address, range of addresses and Mac address of the server. Address object name specifies the unique name for address object which used in Policies, etc.., it ranges from 3 – 32 characters. Eg. LAN_NETWORK.
  • Page 35: Service Groups

    UTM User Manual 5.3 Service Groups Navigate through Policy Objects > Service Groups Like Address Objects, services can also be bundled into Service groups for ease of administration. Ex: TCP_Services (HTTP, FTP, SMTP) UDP_SERVICES (DNS, TFTP) It designates the group of service targets which includes services like ssh, http, SMTP, etc.., Group Name: It specifies the unique group name which can be used in Policies like Firewall Policies, User Policies, etc...
  • Page 36: Service Objects

    UTM User Manual Figure 42: Service Groups 5.4 Service objects Navigate through Policy Objects > Service Objects TCP/IP suite is having a number of different services and Protocols. These protocols & Services using port number from 1-65535 port numbers. Each port number is having its own service.
  • Page 37: Web Filter Objects

    UTM User Manual Protocol: It specifies which protocol to be used for the service object. Protocols like TCP, UDP, TCP_UDP and ICMP. Port: It specifies the port for protocols like TCP and UDP. Eg. 22 ICMP type: It specifies the type of icmp to be used for the service object. Eg. Type 0: Echo Reply Figure 44: Service Objects 5.5 Web Filter objects...
  • Page 38 UTM User Manual Name: unique name for web filter objects. It ranges from 3 -32 characters. Eg. Videos URL: It specifies the URL list, which is used in web filtering for blocking the sites mentioned. Eg. www.allo.com IP address: It specifies the IP addresses of sites to be blocked using web filtering. Eg. IP address of www.google.com is 173.194.117.114.
  • Page 39: Policies

    UTM User Manual 6. Policies 6.1 Firewall Navigate through Policies> Firewall It filters the inbound and outbound traffic on a network, allowing safe & secure traffic to pass while blocking insecure traffic. A firewall is used to maintain a network secure. The primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a configured rule set.
  • Page 40: Firewall Policies

    There are no LAN & WAN networks it works in bridge mode. Transparent mode is typically used to apply the features such as Security Profiles etc. on a private network where the UTM unit will be behind an existing firewall or router.
  • Page 41 UTM User Manual Figure 48: Edit Firewall Policy user can edit the preconfigured firewall rules according to user network Click Edit button, structure. Policy Rules User can configure policy rules by making use of created address objects and Service objects.
  • Page 42 Using protocols are not identified by conventional web filters, these types of applications are difficult to stop. Shield UTM allows you to stop this traffic at the gateway itself. www.allo.com...
  • Page 43 UTM User Manual Figure 50: Application Control Web Filtering A Web filter is a program that can screen an incoming Web page to determine whether some or all of it should not be displayed to the user. The filter checks the origin or content of a Web page against a set of rules provided by company or person who has installed the Web filter.
  • Page 44 UTM User Manual Figure 51: Web Filtering The Web filter works primarily by looking at the destination location request for a HTTP(S) request made by the sending computer. If the URL is on a list that you have configured to list unwanted sites, the connection will be disallowed.
  • Page 45: User Policies

    UTM User Manual Figure 52: Firewall Policies 6.1.3 User Policies Navigate through Policies> Firewall > User Policies UTM allows user to configure their own User Policies according to their need in firewall. Figure 53: Create User Policy www.allo.com Version 2.0...
  • Page 46: Management Access

    UTM User Manual Figure 54: User Policies 6.1.4 Management Access Navigate through Policies> Firewall > Management access Management Access rules define the rules that traffic must meet to happen through an interface. When you define rules for outgoing traffic, i.e. LAN Management Access profile, they are utilized to the traffic before any other policies are enforced.
  • Page 47: Bandwidth Control

    6.1.5 Bandwidth control Navigate through Policies> Firewall > Bandwidth Control UTM Bandwidth control is designed to minimize the impact caused when the connection is under heavy load. Using Bandwidth Control, we can assign a specific minimum or maximum bandwidth for each computer, which means they have less impact on each other.
  • Page 48 UTM User Manual i. Priority ii. Rate i. Priority In Priority type user can select any one of following priority value to configure their BW profile. They are: 0 Realtime 1 Highest 2 High 3 Medium High 4 Medium 5 Medium Low...
  • Page 49 Internal, to a different IP address as it leaves another interface, usually the interface connected to the ISP and the Internet. This enables a single public address to represent a significantly larger number of private addresses. UTM NAT Supports following types: i. Static NAT ii. Source NAT iii.
  • Page 50: Port Forwarding/Destination Nat

    UTM User Manual 6.1.6 Port Forwarding/Destination NAT Navigate through Policies> Firewall > Port Forwarding It changes the destination address in IP header of a packet and also changes the destination port in the TCP/UDP headers. The typical usage is to redirect incoming packets with a destination of a public address/port to a private IP address/port inside your network.
  • Page 51: Source Nat

    Figure 62: Add Source NAT Rule UTM Source NAT changes the source address in the IP header of a packet. It may also change the source port in the TCP/UDP headers. The typical usage is to change the private address/port into a public address/port for packets leaving your network.
  • Page 52: Static Nat

    Navigate through Policies> Firewall > Static NAT UTM Static NAT changes the source address in the IP header of a packet. It also changes the destination address in the IP header of a packet which is coming from the public network. User can configure Static NAT by making use of the interface, internal address &port, External...
  • Page 53: Qos Settings

    UTM User Manual Figure 65: Static NAT 6.1.9 QOS Settings Navigate through Policies> Firewall > QOS Settings (Quality of Service) In relation to leased lines, QOS is a contractual guarantee of uptime and bandwidth. Figure 66: DSCP Mapping 6.2 IPS Navigate through Policies>...
  • Page 54: Ips Settings

    UTM User Manual UTM IPS supports: i. Predefined IPS signatures. UTM is having predefined signatures for all known attacks. ii. Custom IPS signatures. Custom Signatures allows user to configure own signatures to block any kind of attacks that are targeting to your network.
  • Page 55: Signature Settings

    6.2.2 Signature Settings Navigate through Policies> IPS > Signature Settings UTM user can change signature policy actions by selecting edit Buttons. He can change policy action to Prevent/Inspect/Disable in GUI. UTM user can have flexibility to change policy actions by following ways: ...
  • Page 56: Custom Signatures

    Figure 70: Signature Settings by Severity 6.2.3 Custom Signatures Navigate through Policies> IPS > Custom Signatures UTM user can customize or write their signatures for any newer attacks. The UTM IPS GUI allows user to add signatures, Export Signatures and preview signatures. www.allo.com...
  • Page 57: Vpn

    UTM User Manual When adding any new signatures, user just makes use of available options to customize their signatures. Figure 71: Add Custom Signature Figure 72: Custom Signatures 6.3 VPN Navigate through Policies> VPN A virtual private network (VPN) tunnel provides a secure communication channel either between two gateway VPN firewalls or between a remote VPN client and gateway VPN firewall.
  • Page 58: Sslvpn Server Settings

    UTM User Manual result, the IP address of at least one of the tunnel endpoints needs to be known in advance in order for the other tunnel endpoint to establish (or reestablish) the VPN tunnel. This private network used as a public network to connect remote sites or users together. The VPN uses "virtual"...
  • Page 59 UTM User Manual Protocol: Sever and client to use protocol (UDP/TCP) Preferred Cipher Suite: Cipher used for encrypting of data b/w client and server Server Certificate: Certificates used server for the connection. Compression: Enable/disable of compressed data Authentication Mode: Server and client can communicate in 3 modes Password: where Client and Server authentication is done using user name and password.
  • Page 60: Sslvpn Client Profiles

    UTM User Manual 6.3.2 SSLVPN Client Profiles Navigate through Policies> VPN > SSLVPN Client Profiles The Customer demands to be plugged in and configured here. Figure 75: Configure SSLVPN Client Profile User Name: Select the username to be configured. (The user is added in Users tab) Remote Nets: Clients side network to be accessed via server side Push Nets: Server side network to be accessed from configured user.
  • Page 61: Sslvpn P2P Policies

    UTM User Manual Figure 76: SSLVPN Client Profiles 6.3.3 SSLVPN P2P Policies Navigate through Policies> VPN > SSLVPN P2P Policies SSLVPN P2P tunnel provides a good communication channel between two gateway VPN firewalls. Figure 77: Create SSLVPN P2P Policies Protocol and Mode: Protocol used to communicate between 2 VPN gateways Protocol UDP: www.allo.com...
  • Page 62 UTM User Manual  Tunnel can be created in all the 3 modes  Mode p2p is selected on 1 gateway then p2p gateway has to select on the remote gateway  Mode Server is selected on 1 gateway then the Client has to be configured on the remote gateway.
  • Page 63: Client Certificates

    UTM User Manual Figure 78: SSLVPN P2P Policies 6.3.4 Client Certificates Navigate through Policies> VPN > Client Certificates The user can generate certificates signed by Device RootCa .Common name should match with SSLPVN client profile user name. Figure 79: Regenerate Client Certificate www.allo.com...
  • Page 64: Ipsec Settings

    UTM User Manual Figure 80: Clients Certificates 6.3.5 IPSec Settings Navigate through Policies> VPN > Settings IPSec The IPSec provides a method to manage authentication and data protection between multiple crypto peers engaging in secure data transfer. It includes the Internet Security Association and Key Management Protocol (ISAKMP)/Oakley and two IPSec IPSec protocols: Encapsulating Security Protocol (ESP) and Authentication Header (AH).
  • Page 65: Ipsec Policies

    UTM User Manual Figure 81: IPSec Settings Click on the save button, the message will prompt your IPSec Settings are saved successfully. Figure 82: Save the IPSec Settings 6.3.6 IPSec Policies Navigate through Policies> VPN > IPSec Policies Policy settings tab:...
  • Page 66 UTM User Manual It works by encapsulating and protecting an entire IP packet. Because tunnel mode encapsulates or hides the IP header of the pre-encrypted packet, a new IP header is added so that the packet can be successfully forwarded. The encrypting devices themselves own the IP addresses used in this new header.
  • Page 67 UTM User Manual Remote gateway: user can configure the Remote gateway IP. Remote network: Remote gateway to be accessed. Eg: 192.168.1.0/24 IKE (Internet Key Exchange) To implement a VPN solution with encryption, periodic changing of session encryption keys is necessary. Failure to change these keys makes the VPN susceptible to brute force decryption attacks.
  • Page 68 UTM User Manual Hash Algorithm: User can select either MD5 or SHA1 algorithm from the dropdown menu. Authentication: Supports 4 types of authentication and depending of authentication selected need to configure the field IPSec Figure 85: Create IPSec Policy-IPSec Transport: can use AH/ESP mode.
  • Page 69 UTM User Manual The ESP header (IP protocol 50) forms the core of the IPSec protocol. This protocol, in conjunction with an agreed-upon set of security Parameters or transform set, protects data by rendering it indecipherable. This protocol encrypts the data portion of the packet only and uses other protections (HMAC) for other protections (data integrity, anti-replay, and man-in-the- middle).
  • Page 70: Web Proxy

    UTM User Manual DNS: User can configure the DNS server for IPSec Policy. E.g.: 10.0.0.1 WIN: User can configure the WIN server for IPSec Policy.E.g.:10.0.0.254 Pfs Group: User can select the Pfs group value from the dropdown menu. Advanced Figure 87: Create IPSec Policy-Advanced Enable compression: deflate is a compression algorithm used to compress traffic Nat Traversal: This feature can be enabling or disable by selecting viable options.
  • Page 71: Proxy Configuration

    UTM User Manual 6.4.1 Proxy Configuration Navigate through Policies> Web Proxy> Proxy Configuration Figure 88: Web Proxy Proxy Mode: We have two modes: Transparent and Explicit. Transparent proxy: A transparent proxy server is also a caching, server but the server is configured in such a way that it eliminates the client side (browser side) configuration.
  • Page 72 Proxy Hostname: It specifies the hostname for web proxy. By default, device hostname is used for proxy. Append Domain Name: It specifies the domain name for proxy. Eg. allo.com Proxy Admin Email: It specifies the email id of admin, who will receive mail in case cache dies.
  • Page 73: Web Filter Blocking Page

    UTM User Manual 6.4.2 Web filter blocking page Navigate through Policies> Web Proxy> Web filter blocking page Figure 89: Web filter blocking page Error page selection: It specifies the error page to be displayed when user accesses are denied sites. It has Default and Custom. By default, an error page will be displayed from web proxy standard error page depending on the language selected in 'Error language in' where as in custom;...
  • Page 74: Web Cache Management

    UTM User Manual Figure 90: User Authentication 6.4.4 Web Cache Management Navigate through Policies> Web Proxy> Web Cache Management Clear web cache: It specifies to clear the web cache contents present on secondary device. Figure 91: Web Cache Management www.allo.com...
  • Page 75: External Proxy

    Internet can be a dangerous place filled with malware of various flavors. Currently, the malware that is most common in the Internet, in descending order, is Trojan horses, viruses, worms, adware, back door exploits, spyware and other variations. UTM antivirus filter works by inspecting the traffic that is transmitted through it.
  • Page 76: Anti Virus Settings

    UTM User Manual 6.5.1 Anti Virus Settings Navigate through Policies> Antivirus > Antivirus Settings Figure 93: Anti Virus Settings 6.6 Users Navigate through Policies> Users In this section, we can create users to system by configuring username and password. Figure 94: Create User Information Username: It specifies the username (5 –...
  • Page 77: User Groups

    UTM User Manual These users are used in SSLVPN Authentication and in User Policies for proxy authentication. 6.6.1 User Groups Navigate through Policies> Users > User Groups We can create user groups as set of users. It provides a list of users in the system, in which we can configure which user can be selected from the group.
  • Page 78: Status Information

    UTM User Manual 7. Status Information 7.1 Interfaces Navigate through Status Info > Interfaces UTM Interfaces demonstrate interface’s name, IP address and their Link status. User can Set, Update and refresh the interface Page. Figure 96: Interfaces 7.2 DHCP leases Navigate through Status Info >...
  • Page 79: Firewall

    Navigate through Status Info > Firewall > Connection Statistics It shows UTM Firewall’s Rx/Tx packets & their packet errors, packets dropped values and packet collisions. User can Set, Update and refresh Page. It shows list of interface names of UTM.e.g. eth0, eth1 www.allo.com...
  • Page 80: Connection Info

    UTM User Manual Figure 98: Connection Statistics 7.3.2 Connection info Navigate through Status Info > Firewall > Connection Info The Connection information page shows source IP, Source port, destination IP and port, Connection status, Flow, Tx/Rx packets with size in bytes. It also shows connection Status, Flow.
  • Page 81: System Log

    UTM User Manual Figure 100: Bandwidth Usage per IP 7.4 System Log Navigate through Status Info > System Log System logs shows logs with messages of particular module and logs time stamps. User can download the System Logs. User also Update & Refresh the page refresh interval.
  • Page 82: Ips Alerts

    UTM User Manual 7.5 IPS Alerts Navigate through Status Info > IPS Alerts It shows alerts generated by the IPS engine with signature ID, Signature category and alert message. IPS alert shows its Time Stamp information at which alert got triggered, Source IP &...
  • Page 83: Sslvpn P2P Status

    IP address of remote gateway, transport type, mode of connection and connection state. In UTM, an algorithm is a mathematical procedure that manipulates data to encrypt and decrypt it. Created On designates the time at which connection established and byte transacted counts in bytes.
  • Page 84: Service Status

    7.9 Service Status Navigate through Status Info > Service Status It shows UTM important services running/Stopped status with description. The user can restart the stopped/running status and user can set and update refresh interval. The service status page indicates service name, description name of services and connection status.
  • Page 85 UTM User Manual Figure 106: Service Status www.allo.com Version 2.0...
  • Page 86: Diagnostics

    The diagnostics page will allow the administrator to gather the troubleshooting logs which will help allo Support team in debugging any issues faced with UTM deployment setup. To run the utility on the device, the administrator needs to click the ‘Run diagnostics’ button.
  • Page 87: Ping

    The administrator can troubleshoot the network connectivity issues with running ping from the UTM device. The administrator needs to enter the IP address that needs to be pinged from the UTM appliance/ping count and click the ‘Ping’ button to run the task. The ping results will be displayed in the text area once the ping task is complete.
  • Page 88: Dns Lookup

    UTM User Manual Figure 110: Trace Route 8.4 DNS Lookup Navigate through Diagnostics > DNS Lookup To look up a DNS address: 1. Locate the Perform a DNS Lookup section on the Diagnostics screen. In the DNS Server Name field, enter a server name.
  • Page 89: Packet Trace

    UTM User Manual 8.5 Packet Trace Navigate through Diagnostics > Packet Trace It gives detailed information about the trace of packets in UTM with description message and time stamp. User can download the packet trace for further analysis. Figure 112: Packet Trace www.allo.com...
  • Page 90: Reports

    UTM User Manual 9. Reports 9.1 System It provides Simple logging information for the internal system services. 9.1.1System usage Navigate through Reports > System > System usage It shows the CPU usage of device during last 1 minute and records it in the graph of CPU usage vs.
  • Page 91: Bandwidth Usage

    UTM User Manual Figure 114: Internet Usage 9.2.2 Bandwidth Usage Navigate through Reports > Firewall > Bandwidth usage It shows WAN bandwidth usage in graphs. Figure 115: Bandwidth Usage www.allo.com Version 2.0...
  • Page 92: Web Filter

    UTM User Manual 9.3 Web filter Navigate through Reports > Web filter It displays the web filter log viewer running in real-time mode. User can refresh reports and go to web filters main page. Figure 116: Web filter 9.4 IPS Alert Reports Navigate through Reports >...
  • Page 93: Frequently Asked Questions (Faqs)

    UTM gives security to internal network by making use of Firewall, IPS (Intrusion Prevention System), VPN Connectivity, Layer 7 filtering, Web filtering, NAT etc.
  • Page 94 Protocols are not identified by conventional web filters, these types of applications are difficult to stop. Shield UTM allows you to stop this traffic at the gateway itself. What user authentication methods are supported by shield UTM? PAP (Password Authentication Protocol) CHAP (Challenge Authentication Protocol) &...
  • Page 95: Glossary

    UTM User Manual Glossary Term Definition BPS Bit per Second The bit/sec is a common measure of data speed for computer modems and transmission carriers. SSH- Secure SHell It works on TCP protocol & Port number is 22, sometimes known as Secure Socket Shell.
  • Page 96 UTM User Manual Term Definition Network Devices that typically support SNMP include routers, switches, servers, Management workstations, printers, modem racks and more. Protocol DNS Domain Name DNS is the Internet's equivalent of a phone book. They maintain a directory Server of domain names and translate them to Internet Protocol (IP) addresses.
  • Page 97 UTM User Manual Term Definition TFTP- Trivial File It’s a simple, lock-step, file transfer protocol which allows a client to get Transfer Protocol from or put a file onto a remote host. One of its primary uses is in the early stages of nodes booting from a Local Area Network.
  • Page 98 UTM User Manual Term Definition mail server to a POP3 e-mail client. TCP - Transmission It is a standard that defines how to establish and maintain a network Control Protocol conversation via which application programs can exchange data. TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other.
  • Page 99 UTM User Manual www.allo.com Version 2.0...

Table of Contents