Table of Contents

Advertisement

12 April 2022
QUANTUM SPARK 1500,
1600 AND 1800
APPLIANCE SERIES
R80.20.40
Locally Managed
Administration Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CHECK POINT SPARK 1530 and is the answer not in the manual?

Questions and answers

Summarization of Contents

Quantum Spark 1500, 1600 and 1800 Appliance Series Overview
1500 Appliances
Overview of the Quantum Spark 1500 appliance series, including its architecture and features.
1600 and 1800 Appliances
Overview of the Quantum Spark 1600/1800 Security Appliances, their enterprise-grade security capabilities.
Getting Started
Installing the appliance and connecting the cables
Steps for physically installing the appliance and connecting necessary cables for initial setup.
Configuring Security Policies
Guidance on setting up and configuring the appliance's security policies for network protection.
Configuring VPN
Steps and considerations for setting up VPN connections on the appliance for secure remote access.
Configuring Clusters
Information on configuring the appliance in a cluster for high availability and redundancy.
Setting up the Quantum Spark Appliance
Connecting the Cables
Detailed instructions on connecting the power and network cables to the appliance.
First Time Deployment Options
Zero Touch Cloud Service
Explains how to use Zero Touch Cloud Service for managing initial gateway deployments via the Check Point portal.
Deploying from a USB Drive or SD Card
Guide on using USB drives or SD cards for quick appliance configuration without the wizard.
Configuration and Upgrade Scenarios
Configuring Cloud Services
Steps to connect the Quantum Spark Appliance to Cloud Services for management and monitoring.
Configuring VPN
Configuring Remote Access VPN
Guide on setting up remote access VPNs, including client options and configuration methods.
Configuring Site to Site VPN with a Preshared Secret
Steps for establishing site-to-site VPN tunnels using a preshared secret for authentication.
Configuring Site to Site VPN with a Certificate
Instructions for setting up site-to-site VPN tunnels using digital certificates for authentication.
Managing Clusters
Configuring a Cluster
How to configure a cluster of two appliances for high availability and redundancy.
Upgrading a Cluster
Process for upgrading cluster members while maintaining network connectivity.
Configuring QoS
Configuring the QoS Blade
How to activate QoS, define default policies, and add manual rules for bandwidth control.
Appliance Configuration
Introduction to the WebUI Application
Overview of the Web User Interface application used for appliance configuration.
The Home Tab
Viewing System Information
Accessing and understanding the system overview shown on the Home > System page.
Controlling and Monitoring Software Blades
To enable or disable a Software Blade
Steps to activate or deactivate the different software blades available on the appliance.
To see or edit setting information
How to view and modify the specific settings for each software blade.
Setting the Management Mode
To set the management type
Options for setting the appliance's management type: locally or centrally.
Security Management Server
Configuring and managing the connection to the Security Management Server.
Configuring Cloud Services
To connect the appliance to Cloud Services
Step-by-step guide to connect the appliance to Check Point Cloud Services for management.
Managing Licenses
If you have Internet connectivity configured
Procedures for activating appliance licenses when Internet connectivity is available.
To configure the proxy details
Steps to configure proxy server details required for license activation.
Viewing the Site Map
Notifications
How to view and manage system events and notifications displayed in a table format.
Managing Active Devices
Manage the display
Options to customize the display of active devices, such as saving, filtering, and viewing details.
Viewing Monitoring Data
Network
Viewing network statistics, including bandwidth usage and traffic data for specified timeframes.
Security
Monitoring security-related information, such as infected devices and security events detected.
Viewing Reports
Rounding Off of Time
Explanation of how report generation times are rounded down based on intervals.
Executive Summary
Overview of the report's executive summary, including malware detection and bandwidth statistics.
Using System Tools
To monitor system resources
Checking CPU, memory, and disk usage to monitor appliance system resources.
To show the routing table
Displaying and viewing the appliance's current routing table for network traffic management.
Managing the Device
Configuring Internet Connectivity
Setting up and managing how the appliance connects to the internet.
The 'Configuration' tab
The 'Configuration' tab
Details on configuring internet connection parameters like connection name and interface.
To configure an internet connection over the DMZ port
Specific steps to configure an internet connection using the DMZ port.
IPv6 connection types
IPv6 connection types
Understanding and configuring various IPv6 connection types supported by the appliance.
To configure a new internet connection (IPv6)
Step-by-step guide to setting up a new IPv6 internet connection on the appliance.
Prefix Delegation (IPv6 only)
Prefix Delegation (IPv6 only)
How to enable and configure prefix delegation for IPv6 connections.
To enable prefix delegation in an IPv6 connection
Detailed steps to enable prefix delegation for an IPv6 internet connection.
Neighbor Discover Protocol (ND Proxy) - IPv6 only
Neighbor Discover Protocol (ND Proxy) - IPv6 only
Using ND Proxy to assign globally-routable IPv6 addresses to internal interfaces.
To enable ND Proxy
Step-by-step instructions to enable and configure the Neighbor Discovery proxy.
DS-Lite (Dual Stack Lite, IPoE)
DS-Lite (Dual Stack Lite, IPoE)
Explanation of DS-Lite connection type for IPv4 internet access over IPv6 tunnels.
To enable DS-Lite
Procedure to enable and configure the DS-Lite connection type.
IPIP
IPIP
Details on IPIP as a variation of DS-Lite for tunneling IPv4 over IPv6-only networks.
To enable IPIP
Steps to enable and configure the IPIP feature for VPN tunnels.
Creating a New Bond (WAN)
Creating a New Bond (WAN)
How to create a new WAN connection using link aggregation (Bond) for increased throughput.
Configuring a USB Cellular Connection
Configuring a USB Cellular Connection
Instructions for configuring a USB cellular connection for internet access, excluding LTE models.
Configuring an LTE Internet Connection (WiFi-LTE models only)
Steps to configure an LTE internet connection for WiFi-LTE models, supporting IPv4, IPv6, or mixed.
The 'Connection Monitoring' tab
The 'Connection Monitoring' tab
Configuration options for monitoring internet connection state and detecting connectivity loss.
The 'Advanced' tab
For PPPoE
Advanced settings specific to PPPoE connections, including IP address assignment and service provider settings.
For PPTP and L2TP
Advanced settings for PPTP and L2TP VPN configurations, covering IP assignment and provider settings.
Port Settings
Port Settings
Configuring MTU size, MAC address cloning, and link speed for network interfaces.
QoS Settings (bandwidth control)
Enabling and configuring QoS for download and upload bandwidth control for IPv4 connections.
ISP Redundancy - supported in IPv4 connections only
ISP Redundancy - supported in IPv4 connections only
Configuring multiple internet connections in High Availability or Load Sharing modes for ISP redundancy.
NAT Settings
Options for disabling NAT settings for specific internet connections when global hide NAT is enabled.
Configuring Wireless Network
Guest wireless network
Configuration for guest wireless networks, using hotspot by default and unprotected.
Standard wireless network
Setup for standard wireless networks, requiring a password and not using a hotspot by default.
Cloning a VAP
Process for cloning a Virtual Access Point (VAP) to create a duplicate wireless network.
Wireless Scheduler
Setting scheduled times for WiFi to be active or inactive, differentiating between radio bands.
Wireless Network tab
Interface Connection
Selecting network assignment and configuring IP addresses for wireless interfaces.
DHCPv4 Server
Configuring the DHCPv4 server for wireless networks, including IP address ranges and reservations.
DNS Server Settings (For DHCPv4)
DNS Server Settings (For DHCPv4)
Configuring DNS server settings for DHCPv4 clients, including auto or manual IP addresses.
Default Gateway
Setting the default gateway for DHCP clients, either using the appliance's IP or a specified address.
Configuring the Local Network
A bridge connects two or more local area networks (LANs)
Explanation of how bridges and switches connect LANs and facilitate data transmission.
The page also lets you
Capabilities of the local network page, including configuring switches, bridges, VLANs, and alias IPs.
Notes
Important notes regarding LAN port assignments and configuration restrictions for switches and bridges.
Reserved IP Address for Specific MAC
Reserved IP Address for Specific MAC
Configuring the network to assign IP addresses only to known hosts based on their MAC addresses.
Switch
Understanding how LAN ports are grouped into switches and configuring them.
WAN as LAN
WAN as LAN
Using the WAN port for LAN connections, particularly with SFP for internal networks.
Monitor Mode
Monitor Mode
Configuring the appliance to monitor traffic using Automatic Learning or user-defined networks.
Automatic Learning
How the appliance automatically recognizes external networks based on default gateway requests.
Physical Interfaces
Physical Interfaces
Configuring the settings for physical interfaces, including options for DMZ.
Bridge
Bridge
Creating and configuring bridge interfaces, including settings for networks and DHCP server.
The 'Configuration' tab
The 'Configuration' tab
Configuring bridge settings, including Spanning Tree Protocol and IP addressing.
The 'Advanced' tab
Advanced configuration options for bridge interfaces, such as MTU size and MAC address override.
VLANs
VLANs
Creating and editing tag-based VLANs for network segmentation.
Alias IP
Associating multiple IP addresses with a single network interface using alias IPs.
VPN Tunnel (VTI)
VPN Tunnel (VTI)
Creating and editing Virtual Tunnel Interfaces (VTIs) for route-based VPN tunnels.
Virtual Access Point (VAP)
Virtual Access Point (VAP)
Creating and editing Virtual Access Points (VAPs) for wireless networks.
BOND
BOND
Configuring Link Aggregation (BOND) to improve network throughput and redundancy.
Configuring a Hotspot
Configuring a Hotspot
Setting up guest access, customizing the portal, and defining exceptions for hotspots.
To disable Hotspot
Steps to disable the hotspot feature on the appliance.
Configuring the Routing Table
The Device > Routing page shows routing tables
Managing routing tables by adding, editing, or deleting routes and configuring manual rules.
To add a new static route (IPv4 addresses)
Procedure for adding new static IPv4 routes to the routing table.
Configuring MAC Filtering
MAC Filtering
Managing an allowlist of MAC addresses to control LAN access and block unauthorized devices.
To disable MAC filtering for a specific interface
Steps to disable MAC filtering for individual LAN interfaces.
802.1x Authentication Protocol
802.1x Authentication Protocol
Implementing port-based network access control using IEEE 802.1x authentication.
To enable 802.1x authentication on a LAN switch or interface
Activating 802.1x authentication on LAN switches or individual interfaces.
Configuring the DNS Server
To configure DNS
Setting up DNS servers and defining the domain name for network name resolution.
Enter a Domain Name
Configuring the domain name for local hosts and appending it to DNS queries.
Configuring the Proxy Server
To configure a proxy server
Setting up a proxy server for connecting to Check Point update and license servers.
Backup, Restore, Upgrade, and Other System Operations
Restore factory default settings
Restoring the appliance to its factory default settings, reverting to default operational parameters.
To automatically upgrade your appliance firmware
Configuring automatic firmware upgrades for the appliance when Cloud Services is not used.
To backup appliance settings
Steps to back up the appliance's system settings, including network configuration and security policy.
To restore a backed up configuration
Instructions on how to restore previously saved appliance configurations.
Configuring Local and Remote System Administrators
Administrator Roles
Overview of different administrator roles and their associated permissions for managing the appliance.
To create a local administrator
Procedure for creating new local administrator accounts with specific roles and permissions.
Configuring Administrator Access
To set the interface sources from which administrator access is allowed
Defining which network interfaces (LAN, Wireless, VPN, Internet) allow administrator access.
To allow administrator access from specified IP addresses
Configuring access for administrators from specific IP addresses or networks for enhanced security.
Managing Device Details
Enter an Appliance Name
Setting a unique name for the appliance to identify it within the network.
Assign a Web portal certificate
Assigning a Web portal certificate for secure access to the appliance's web interface.
Managing Date and Time
To configure date and time manually
Manually setting the appliance's date and time through the WebUI.
To set the date and time using a Network Time Protocol (NTP) server
Synchronizing the appliance's clock with an NTP server for accurate timekeeping.
Configuring DDNS and Access Service
DDNS
Configuring Dynamic DNS (DDNS) to update IP addresses with providers for hostname access.
Reach My Device
Enabling remote access to the appliance via WebUI or CLI through a secure Check Point Cloud Service.
Managing Internal Certificates
To reinitialize certificates
Reinitializing internal certificates when Internet connection IP addresses change, often managed via DDNS.
To replace an internal CA certificate
Replacing the internal CA certificate with a custom one, including private key password.
Configuring High Availability
Interface options in cluster mode
Understanding different interface modes (HA, Sync, Non-HA, Monitored) for cluster members.
To reset configuration settings
Steps to reset cluster configuration settings, requiring re-configuration via the wizard.
To failover from the primary to the other member
Procedures for forcing a failover from the primary cluster member to the secondary member.
Advanced Settings
To filter the list of attributes
Using the filter field to search and display specific advanced configuration attributes.
To configure the appliance attributes
Configuring specific appliance attributes by editing their settings and applying changes.
Managing the Access Policy
Configuring the Firewall Access Policy and Blade
Setting the default access policy, applications, URLs, and user awareness for the firewall blade.
Firewall Policy
Defining the default access policy mode (Strict, Standard, Off) and configuring outgoing services.
Application & URL Filtering
Application & URL Filtering
Defining how to handle applications and URL categories for traffic from your organization to the Internet.
Updates
Updates
Checking the status of software updates, including available, unreachable, or up-to-date status.
Working with the Firewall Access Policy
Firewall Policy
Managing the Firewall Rule Base, including creating, editing, and enabling/disabling rules.
Outgoing access to the Internet
Defining the policy for accessing the Internet, including blocking applications and URLs.
Incoming, internal and VPN traffic
Defining the policy for accessing organization's resources, including blocking external traffic.
Manual Rules
Adding manual rules as exceptions to the default firewall policy for specific traffic.
Updatable Objects
To import an updatable object
Importing updatable network objects representing external services into the firewall policy.
Customizing Messages
Customizing gateway messages to inform users about security policies and changing internet policies.
Defining Firewall Servers
To create a new object
Using a wizard to create new server objects, defining their type, access, and NAT policies.
Step 1: Server Type
Selecting the server type, including built-in common servers or defining custom server types.
Step 2: Server Definitions
Entering server details, including name, IP address, comments, and DNS resolution options.
Step 3: Access
Selecting the network zones from which the server is accessible, including trusted zones and DMZ.
Defining NAT Control
To disable NAT for outgoing traffic (Hide NAT)
Disabling NAT for outgoing traffic by setting 'Hide internal networks' to OFF.
To configure a server that is routable from the Internet (server with NAT)
Configuring servers accessible from the Internet using Port Forwarding or Static NAT.
Advanced - Creating and Editing NAT Rules
These are the fields that manage the NAT rules.
Fields used for managing NAT rules, including original and translated source, destination, and service.
To create a new NAT rule
Steps to create a new manual NAT rule, including source, destination, service, and translation settings.
Inspecting VoIP Traffic
Introduction
Overview of Voice over Internet Protocol (VoIP) and its support on Quantum Spark appliances.
To configure VoIP inspection in the WebUI
Steps to configure VoIP inspection, including SIP provider settings and on-premise devices.
Working with User Awareness
To enable or disable User Awareness
Turning the User Awareness blade on or off and using the configuration wizard for identity sources.
To configure User Awareness with the wizard
Using the wizard to select user identification methods like AD Query or Browser-Based Authentication.
Configuring the QoS Blade
QoS
Selecting the Access Policy control level for QoS: On (enforces policy) or Off (not enforced).
QoS default policy
Selecting options for the default QoS policy, including low latency and bandwidth guarantees.
Working with QoS Policy
Rule Base Field
Fields used in the QoS Policy Rule Base, including source, destination, service, guarantee/limit, weight, and track.
To create a QoS rule
Steps to create a QoS rule, defining traffic priority, bandwidth limits, and weights.
SSL Inspection Policy
SSL Inspection
Enabling and configuring SSL inspection to allow gateway to inspect encrypted traffic.
Deploying SSL Inspection
Steps for deploying SSL inspection, including downloading and installing the CA certificate.
SSL Inspection Exceptions
To add bypass exceptions
Defining manual rules to bypass SSL inspection for specific traffic based on scope, category, and tracking.
SSL Inspection Advanced
To add a CA manually to the trusted CA list
Manually adding a Certificate Authority (CA) to the trusted list for validating server certificates.
To delete a trusted CA
Deleting a trusted CA from the list that was added by the user.
Managing Threat Prevention
Configuring Threat Prevention Blade Control
Activating and configuring the IPS, Anti-Virus, Anti-Bot, and Threat Emulation blades.
To enable or disable Threat Prevention
Moving the slider to enable or disable the Threat Prevention blades.
To create a custom policy for Threat Prevention
Creating a custom policy by selecting tracking options, protection activation, severity, and performance impact.
Configuring Threat Prevention Policy Exceptions
Threat Prevention Exceptions
Configuring exception rules for traffic that IPS and malware engines do not inspect.
allowlists
Setting specified files and URLs that Anti-Virus, Anti-Bot, and Threat Emulation blades do not scan.
Viewing Infected Devices
The Infected Devices table shows this information for each entry
Information displayed for each infected device or server, including icon, object name, and incident type.
To add a malware exception rule for a specified protection
Creating an exception rule for a specific protection to bypass SSL inspection for particular traffic.
Viewing the IPS Protections List
To search for a specified protection
Searching for specific IPS protections using a filter box to monitor or override general policy.
Advanced Threat Prevention Engine Settings
IPS
Configuring advanced settings for the IPS engine, including protection download settings and bypass mode.
Anti-Virus
Configuring Anti-Virus settings for scanning incoming files, mail protocols, and file types.
Anti-Bot
Setting policy overrides for Anti-Bot protection types like malicious activity and reputation domains.
Threat Emulation
Configuring Threat Emulation settings for scanning files, protocols, and handling HTTP connections.
Configuring the Anti-Spam Blade Control
To enable or disable Anti-Spam
Enabling or disabling the Anti-Spam engine to block or flag emails with spam content.
To configure the Anti-Spam engine to work in detect only mode
Setting the Anti-Spam engine to detect-only mode to log emails without blocking them.
To configure the Anti-Spam Policy
Configuring the spam filter to inspect sender address and email content for spam detection.
Configuring Anti-Spam Exceptions
To add a new sender/domain/IP address to the Allow or Block list
Adding new sender, domain, or IP address entries to the allow or block list for spam filtering.
Managing VPN
Configuring the Remote Access Blade
Setting up and managing the Remote Access Blade for secure encrypted connections via the Internet.
To configure DDNS
Configuring DDNS or a static IP Internet connection for appliance accessibility.
To enable or disable VPN Remote Access
Enabling or disabling the VPN Remote Access feature on the appliance.
Configuring Remote Access Users
To add a new local user with remote access permissions
Adding new local users and configuring their remote access permissions and SSL VPN bookmarks.
To add a new local users group with remote access permissions
Creating new user groups and assigning remote access permissions and SSL VPN bookmarks.
To add remote access permissions to an existing Active Directory group
Granting remote access permissions to existing Active Directory groups.
To add remote access permissions to all users in defined in an Active Directory
Applying remote access permissions to all users within an Active Directory domain.
Remote Access - Connected Remote Users
The VPN Remote Access > Connected Remote Users page shows the currently connected remote users
Viewing a list of currently connected remote users, including username, IP address, and connection time.
Configuring Remote Access Authentication Servers
To add a RADIUS server
Defining primary and secondary RADIUS servers for user authentication and remote access.
RADIUS servers can be used for
Utilizing RADIUS servers for defining users with remote access privileges and for defining administrators.
To add an Active Directory domain
Adding an Active Directory domain for seamless user recognition and policy configuration.
Configuring Advanced Remote Access Options
Office Mode
Configuring Office Mode for remote VPN clients to access organization resources via a VPN tunnel.
To configure the Office Mode network
Entering the Office Network address and Subnet Mask for Office Mode configuration.
To assign a VPN certificate
Assigning a VPN certificate from the list of installed certificates for secure connections.
Configuring the Site to Site VPN Blade
To enable or disable the VPN Site to Site blade
Activating or deactivating the VPN Site to Site blade to create VPN tunnels with remote sites.
To configure the default access policy from remote VPN sites
Setting the default access policy for remote VPN sites, including traffic logging.
Local Encryption Domain
Defining internal networks accessible by encrypted traffic from remote sites and networks.
Configuring VPN Sites
To add a new VPN site
Steps to add a new VPN site, configuring remote site details, connection type, and authentication.
Select the Connection type
Choosing the connection type for the VPN site, such as IP address, High Availability, or remote site initiation.
Select an authentication method
Choosing the authentication method (preshared secret or certificate) to match the remote gateway.
Configuring Advanced Site to Site Community Settings
To test the VPN connection for a site
Performing a VPN tunnel test to verify connectivity with a remote site.
To see the details of a site configured by Cloud Services
Viewing details of sites configured by Cloud Services, including remote site and encryption settings.
Viewing VPN Tunnels
The table below shows the details of each tunnel configured
Details displayed for each VPN tunnel, including interface, site name, peer address, status, and methods.
To filter the list
Filtering the list of VPN tunnels by entering criteria in the Type to filter box.
Configuring Advanced Site to Site Settings
Configuring a Local Encryption Domain
Defining internal networks accessible by encrypted traffic from remote sites and networks.
Managing Trusted CAs
To add a trusted CA
Adding a Certificate Authority (CA) to the trusted list by uploading its identifier file.
To edit a trusted CA's configuration
Editing trusted CA configurations, including CRL retrieval and caching options.
To delete a trusted CA
Deleting a trusted CA from the list that was added by the user.
Managing Installed Certificates
These are the steps to create a signed certificate
Steps to create a signed certificate: create request, export, send to CA, and upload.
To create a new certificate to be signed by a CA
Creating a new certificate signing request, including name, subject DN, and alternate names.
To upload the signed certificate when you receive the signed certificate from the CA
Uploading the signed certificate file (*.crt) received from the CA to verify it.
To upload a P12 file
Uploading a P12 certificate file, including editing the name and entering the password.
Managing Users and Objects
Working with User Awareness
Configuring User Awareness to enforce access control and show user-based logs.
To configure User Awareness with the wizard
Using the wizard to select user identification methods like AD Query or Browser-Based Authentication.
Configuring Local Users and User Groups
To add a new local user
Creating new local users with remote access permissions, including username, password, and comments.
To add a new local users group with remote access permissions
Creating new user groups and assigning remote access permissions and SSL VPN bookmarks.
Configuring Local and Remote System Administrators
Administrator Roles
Overview of different administrator roles and their associated permissions for managing the appliance.
To create a local administrator
Procedure for creating new local administrator accounts with specific roles and permissions.
To allow access for administrators defined in a remote RADIUS server
Configuring access for administrators defined on a remote RADIUS server.
Managing Authentication Servers
To add a RADIUS server
Defining primary and secondary RADIUS servers for user authentication and remote access.
To add an Active Directory domain
Adding an Active Directory domain for seamless user recognition and policy configuration.
Managing Applications & URLs
To configure the access policy
Configuring access policy using application groups, custom applications, and URLs.
What is a custom application?
Defining custom applications based on URL strings or regular expressions for policy enforcement.
What is a category?
Understanding URL categories inspected by Check Point Cloud for URL Filtering.
To create a custom URL
Creating custom URLs to be used in firewall rules for specific traffic filtering.
Managing System Services
To create a new service
Creating new service objects to define network protocols, ports, and IP protocols for security policy.
General
General settings for system services, including session timeout, source port usage, and reply handling.
Managing Service Groups
To create a new service group
Creating new service groups to organize services for easier security policy management.
To edit a service group
Editing existing service groups to modify their members or configuration.
Managing Network Objects
To create a Single IP network object
Creating a single IP network object representing a device with a specific IP address.
To create an IP Range network object
Creating an IP range network object representing a range of IP addresses.
To create a Network type network object
Creating a network type object representing a network address and subnet mask.
Managing Network Object Groups
To create a new network object group
Creating new network object groups to organize objects for security policy configuration.
To edit a network object group
Editing existing network object groups to modify their members or configuration.
Logs and Monitoring
Viewing Security Logs
Viewing the last 100 log records, searching, and refreshing security log data.
Storing Logs
Configuring log storage locally or on an external SD card, and deleting logs.
Viewing System Logs
To download the full log file
Downloading the full log file and saving a snapshot of syslogs to the flash disk.
To refresh the system logs list
Refreshing the system logs list to display the latest available log entries.
Configuring External Log Servers
External Check Point Log Server
Configuring an external Check Point Log Server for storing additional security and system logs.
Syslog Server Configuration
Configuring a gateway to send logs to multiple syslog servers using UDP or TLS Over TCP.
Managing Active Devices
Wireless Active Devices
Displaying devices connected to the gateway's wireless network and their network usage information.
Paired Mobile Devices
Showing mobile devices paired to the gateway and the procedure to revoke a pairing.
Viewing VPN Tunnels
The table below shows the details of each tunnel configured
Details of configured VPN tunnels, including interface, site name, peer address, status, and methods.
To filter the list
Filtering the list of VPN tunnels by entering criteria in the Type to filter box.
Viewing Active Connections
The list shows these fields
Fields displayed for active connections: Protocol, Source Address, Source Port, Destination Address, Destination Port.
Access Points
The network information includes
Network information for access points: Channel, Frequency, Security, Signal Strength, Signal Noise.
SNMP
To enable or disable SNMP
Turning the SNMP agent on or off for network monitoring.
To configure SNMP settings
Configuring SNMP settings like system location, contact details, and community strings.
SNMP v3 Users
Adding, editing, or deleting SNMP v3 users for secure monitoring access.
SNMP Traps Receivers
To add an SNMP trap receiver
Adding an SNMP trap receiver by entering its IP address and community name or user definition.
SNMP Traps
SNMP Traps for VPN Tunnels
Monitoring VPN tunnel status and alerting when tunnels go down.
Advanced Configuration
Upgrade Using a USB Drive
Upgrading the appliance firmware using a USB drive without a console connection.
Upgrade Using an SD Card
To upgrade to a new firmware image from an SD card
Upgrading firmware using an SD card on 1570/1590 appliances, deleting previous settings.
Boot Loader
The Gaia Embedded Boot Menu shows during boot
Accessing the Gaia Embedded Boot Menu during appliance boot for various operational options.
Upgrade Using Boot Loader
To upgrade the Quantum Spark Appliance using U-boot (boot loader)
Upgrading the appliance using U-boot via DMZ port, involving manual or automatic image loading.
Restoring Factory Defaults
To restore factory defaults with the WebUI
Restoring the appliance to factory default settings using the WebUI.
To restore factory defaults with the button on the back panel
Restoring factory defaults by pressing the button on the back panel of the appliance.
RESTful API
Enabling and disabling the REST API
Enabling or disabling the REST API on the gateway using Gaia Clish commands.
Request Structure
Understanding the structure of HTTP POST requests, including URL, headers, and payload.
Response Structure
Understanding the structure of API responses, including success and failure return values.
Versioning
Specifying API versions in HTTP POST requests for compatibility.
REST API Commands
(1) Login
Logging into the SMB appliance using administrator credentials to obtain a session identifier.
(2) Logout
Logging out from the current session, invalidating the session identifier.
(3) Generate-Report
Generating security report data based on selected time frames like hourly, daily, weekly, or monthly.
(4) Run-Clish-Command
Executing a single Gaia Clish command via the RESTful API for gateway management.

Table of Contents