Sign In
Upload
Manuals
Brands
Stonesoft Manuals
Software
StoneGate
Stonesoft StoneGate Security Solution Manuals
Manuals and User Guides for Stonesoft StoneGate Security Solution. We have
1
Stonesoft StoneGate Security Solution manual available for free PDF download: Reference Manual
Stonesoft StoneGate Reference Manual (345 pages)
Firewall/VPN
Brand:
Stonesoft
| Category:
Software
| Size: 2 MB
Table of Contents
Table of Contents
3
Table of Contents
7
Hapter
8
Table of Contents
9
Introduction
11
CHAPTER 1 Using Stonegate Documentation
13
C Hapter
13
How to Use this Guide
14
Typographical Conventions
14
Documentation Available
15
Product Documentation
15
Support Documentation
15
System Requirements
16
Contact Information
16
Licensing Issues
16
Technical Support
16
Your Comments
16
Other Queries
16
CHAPTER 2 Introduction to Firewalls
17
Hapter
17
The Role of the Firewall
18
Firewall Technologies
18
Packet Filtering
18
Proxy Firewalls
19
Stateful Inspection
19
Stonegate Multi-Layer Inspection
19
C Hapter
20
Additional Firewall Features
21
Authentication
21
Deep Packet Inspection and Unified Threat Management
21
Integration with External Content Inspection
21
Load Balancing and Traffic Management
22
Logging and Reporting
22
Network Address Translation (NAT)
23
Vpns
23
Firewall Weaknesses
23
Complexity of Administration
23
Single Point of Failure
24
Worms, Viruses, and Targeted Attacks
24
CHAPTER 3 Introduction to Stonegate
25
Firewall/Vpn
25
The Stonegate Security Platform
26
Stonegate Firewall/Vpn System Components
27
Firewall/Vpn Engines
28
Main Benefits of Stonegate Firewall/Vpn
28
Advanced Traffic Inspection
28
Built-In Clustering for Load Balancing and High Availability
29
Multi-Link Technology
29
Built-In Inbound Traffic Management
30
Qos and Bandwidth Management
30
Clustered Multi-Link Vpns
31
Integration with Stonegate IPS
31
C Hapter
32
CHAPTER 4 Stonegate Firewall/Vpn Deployment
33
Deployment Overview
34
Supported Platforms
34
General Deployment Guidelines
34
Positioning Firewalls
35
External to Internal Network Boundary
35
Internal Network Boundaries
36
DMZ Network Boundaries
37
Positioning Management Center Components
38
Interfaces and Routing
39
CHAPTER 5 Single Firewall Configuration
41
Overview to Single Firewall Configuration
42
Configuration of Single Firewalls
42
Dynamic Firewall Interface Addresses
42
Internal DHCP Server
43
Configuration Workflow
43
Task 1: Create a Single Firewall Element
43
Task 2: Define Physical Interfaces
43
Task 3: Define VLAN Interfaces
43
Task 4: Define an ADSL Interface
44
Task 5: Define IP Addresses
44
Task 6: Define Modem Interfaces
44
Task 7: Install the Firewall Engine
44
Task 8: Install a Firewall Policy
45
Example of a Single Firewall Deployment
45
Setting up a Single Firewall
45
Adding a New Interface to an Existing Configuration
46
Hapter
47
Firewall Cluster Configuration
47
Overview to Firewall Cluster Configuration
48
Benefits of Clustering
48
Communication between the Nodes
48
Hardware
49
Configuration of Firewall Clusters
49
Load Balancing
49
Standby Operation
49
Network Interfaces and IP Addresses
50
Clustering Modes
51
How Packet Dispatch Works
51
Configuration Workflow
53
Task 1: Create a Firewall Cluster Element
53
Task 2: Create Physical Interfaces
53
Task 3: Define VLAN Interfaces
53
Task 4: Configure Physical or VLAN Interfaces
54
Task 5: Install the Firewall Engines
55
Task 6: Install a Firewall Policy
55
Using a Firewall Cluster
55
Internal DHCP Server
55
Manual Load Balancing
56
Node State Synchronization
56
Security Level for State Synchronization
56
Examples of Firewall Cluster Deployment
57
Setting up a Firewall Cluster
57
Adding a Node to a Firewall Cluster
58
Hapter
59
Routing and Antispoofing
59
Overview to Routing and Antispoofing
60
Configuration of Routing and Antispoofing
60
Reading the Routing and Antispoofing Trees
60
Default Elements
62
Multi-Link Routing for Single and Clustered Firewalls
62
Configuration Workflow
63
Task 1: Add Router or Netlink
63
Task 2: Add Network(S)
63
Task 3: Refresh Firewall Policy
63
Using Routing and Antispoofing
63
Multicast Routing
63
Policy Routing
63
Modifying Antispoofing
64
Examples of Routing
64
Routing Internet Traffic with Multi-Link
64
Routing Traffic with Two Interfaces
64
Routing Traffic to Networks that Use same Address Space
65
C Hapter
66
Access Control Policies
67
Firewall Policies
69
Overview to Firewall Policies
70
How Stonegate Examines the Packets
70
Policy Hierarchy
70
Configuration of Policy Elements
72
Configuration Workflow
74
Default Elements
74
Task 1: Create a Firewall Template Policy
74
Task 2: Create a Firewall Policy
75
Task 3: Create a Firewall Sub-Policy
75
Task 4: Install the Policy
76
Using Policy Elements and Rules
77
Connection Tracking Vs. Connectionless Packet Inspection
77
Validating Policies
77
Adding Comments to Rules
80
Continue Rules
80
Policy Snapshots
80
Examples of Policy Element Use
81
Improving Readability and Performance
81
Protecting Essential Communications
81
Restricting Administrator Editing Rights
82
Access Rules
83
Hapter
83
Overview to Access Rules
84
Configuration of Access Rules
85
Considerations for Designing Access Rules
87
Default Elements
87
Configuration Workflow
89
Task 1: Define the Source and Destination
89
Task 2: Define the Service
89
Task 3: Select the Action and Action Options
90
Task 4: Select Logging Options
92
Task 5: Add User Authentication
92
Task 6: Restrict the Time When the Rule Is Enforced
92
Task 7: Restrict the Rule Match Based on Source VPN
93
Using Access Rules
93
Allowing System Communications
93
Configuring Default Settings for Several Rules
94
Using Continue Rules to Set Logging Options
94
Using Aliases in Access Rules
95
Using Continue Rules to Set the Protocol
95
Examples of Access Rules
96
Example of Rule Order
96
Example of Continue Rules
98
CHAPTER 10 Inspection Rules
99
Overview to Inspection Rules
100
Configuration of Inspection Rules
101
Considerations for Designing Inspection Rules
102
Exception Rule Cells
103
Default Elements
104
Configuration Workflow
104
Task 1: Activate Deep Inspection in Access Rules
105
Task 2: Activate the Relevant Inspection Checks
105
Task 3: Define the Exceptions
105
Task 4: Eliminate False Positives
106
Task 5: Add Custom Inspection Checks
106
Using Inspection Rules
106
Setting Default Options for Several Inspection Rules
106
Example of Inspection Rules
107
Eliminating a False Positive
107
C Hapter
108
Hapter
109
Network Address Translation (NAT) Rules
109
Overview to NAT
110
Static Source Translation
110
Dynamic Source Translation
111
Destination Port Translation
112
Static Destination Translation
112
Configuration of NAT
113
Configuration Workflow
115
Considerations for Designing NAT Rules
115
Default Elements
115
Task 1: Define Source, Destination, and Service
115
Task 2: Define Address Translation
115
Task 3: Define the Firewall(S) that Apply the Rule
116
Task 4: Check Other Configurations
116
Using NAT and NAT Rules
116
NAT and System Communications
116
Example of a Situation Where a Contact Address Is Needed
117
Contact Addresses and Locations
118
Outbound Load Balancing NAT
118
Protocols and NAT
119
Proxy ARP and NAT
119
Examples of NAT
119
Dynamic Source Address Translation
119
NAT with Hosts in the same Network
120
Static Address Translation
120
Hapter
123
Protocol Agents
123
Overview to Protocol Agents
124
Connection Handling
124
Protocol Validation
124
NAT in Application Data
125
Configuration of Protocol Agents
125
Configuration Workflow
125
Task 1: Create a Custom Service with a Protocol Agent
125
Task 2: Set Parameters for the Protocol Agent
126
Task 3: Insert the Service in Access Rules
126
Using Protocol Agents
126
FTP Agent
126
H.323 Agent
127
HTTP Agents
127
HTTPS Agent
127
ICMP Agent
128
MSRPC Agent
128
Netbios Agent
128
Oracle Agent
128
Remote Shell (RSH) Agent
128
Services in Firewall Agent
129
SIP Agent
129
SMTP Agent
129
SSH Agent
129
Sunrpc Agent
129
TCP Proxy Agent
130
TFTP Agent
130
Examples of Protocol Agent Use
130
Preventing Active Mode FTP
130
Logging Urls Accessed by Internal Users
131
Chapter
133
Overview to User Authentication
134
Configuration of User Authentication
135
The Internal User Database
136
External User Database Integration
137
External User Database Without Integration
137
User Management
137
Authentication Services
138
Default Elements
138
RADIUS Authentication
138
TACACS+ Authentication
138
Configuration Workflow
139
Task 1: Create an External Authentication Server Element
139
Task 2: Create an LDAP Server Element
139
Task 3: Create an Authentication Service Element
139
Task 4: Add an LDAP Domain
140
Task 5: Add Users and User Groups
140
Task 6: Define User Authentication in Ipv4 Access Rules
141
Examples of User Authentication
143
Using Stonegate with a Microsoft Active Directory Server
143
Using the Internal Database for Authenticating Users
143
Using Securid Authentication with Stonegate VPN Clients
144
Hapter
147
HTTPS Inspection
147
Overview to HTTPS Inspection
148
Configuration of HTTPS Inspection
149
Configuration Workflow
149
Default Elements
149
Task 1: Create Server Protection Credentials Elements
149
Task 2: Create Client Protection Certificate Authority Elements
150
Task 3: Specify HTTPS Inspection Options in the Firewall Properties
150
Task 4: Create an HTTPS Inspection Exceptions Element
150
Task 5: Create a Custom HTTPS Service
150
Task 6: Create an Ipv4 Access Rule
150
Using HTTPS Inspection
151
Security Considerations
151
Virus Scanning of Decrypted HTTPS Traffic
151
Examples of HTTPS Inspection
151
Server Protection
151
Client Protection
152
Web Filtering
153
Hapter
153
Overview to Web Filtering
154
Configuration of Web Filtering
154
Configuration Workflow
155
Default Elements
155
Task 1: Prepare the Firewall
155
Task 2: Create User Response Messages
155
Task 3: Blacklist/Whitelist Individual Urls
155
Task 4: Configure Web Filtering Rules in the Policy
155
Examples of Web Filtering
156
Allowing a Blocked URL
156
CHAPTER 16 Virus Scanning
157
Overview to Virus Scanning
158
Configuration of Virus Scanning
158
Configuration Workflow
158
Task 1: Activate the Anti-Virus Feature for a Firewall
158
Task 2: Select Traffic for Inspection with Access Rules
158
Task 3: Define the Content Not to be Scanned
159
Using Virus Scanning
159
Integrated Scanning Vs. Content Inspection Server
159
Limitations of Virus Scanning on Clusters
159
External Content Inspection
161
Overview to Content Inspection
162
Configuration of Content Inspection
163
Default Elements
163
Configuration Workflow
164
Task 1: Create a CIS Server Element
164
Task 2: Create a Custom Service for Content Inspection Server Redirection
164
Task 3: Define Access Rules for Redirection
164
Task 4: Configure NAT Rules for Content Inspection Server Redirection
164
Using Content Inspection
165
Example of Content Inspection
166
Inspecting Internal User's Web Browsing and File Transfers
166
CHAPTER 18 Situations
169
Overview to Situations
170
Configuration of Situations
170
Situation Contexts
171
Anti-Virus Contexts
171
Protocol-Specific Contexts
171
System Contexts
171
Default Elements
172
Configuration Workflow
172
Task 1: Create a Situation Element
172
Task 2: Add a Context for the Situation
172
Task 3: Associate Tags And/Or Situation Types with the Situation
173
Task 4: Associate the Situation with a Vulnerability
173
Using Situations
173
Example of Custom Situations
174
Detecting the Use of Forbidden Software
174
CHAPTER 19 Blacklisting
175
Overview to Blacklisting
176
Risks of Blacklisting
176
Whitelisting
176
Configuration of Blacklisting
177
Configuration Workflow
177
Task 1: Define Blacklisting in Access Rules
178
Task 2: Define Analyzer-To-Firewall or Analyzer-To-Sensor Connections
178
Task 3: Define Inspection Rules in the IPS Policy
178
Using Blacklisting
178
Automatic Blacklisting
178
Monitoring Blacklisting
179
Examples of Blacklisting
179
Blacklisting Traffic from a Specific IP Address Manually
179
Automatic Blacklisting with IPS
179
Traffic Management
181
CHAPTER 20 Outbound Traffic Management
183
Overview to Outbound Traffic Management
184
Configuration of Multi-Link
184
Load Balancing Methods
185
Standby Netlinks for High Availability
185
Link Status Probing
185
Configuration Workflow
186
Task 1: Create Netlink Elements
186
Task 2: Configure Routing for Netlinks
186
Task 3: Combine Netlinks into Outbound Multi-Link Elements
186
Task 4: Create NAT Rules for Outbound Traffic
187
Using Multi-Link
187
Multi-Link with a Single Firewall
187
Multi-Link with a Firewall Cluster
188
Using Multiple Outbound Multi-Link Elements
189
Examples of Multi-Link
189
Preparing for ISP Breakdown
189
Excluding a Netlink from Handling a Qos Class of Traffic
189
Balancing Traffic According to Link Capacity
190
Balancing Traffic between Internet Connections
190
Hapter
191
Inbound Traffic Management
191
Overview to Server Pool Configuration
192
Configuration of Server Pools
192
Default Elements
193
Multi-Link for Server Pools
193
Configuration Workflow
194
Task 1: Define Hosts
194
Task 2: Combine Hosts into a Server Pool Element
194
Task 3: Configure the External DNS Server
194
Task 4: Create an Inbound Load Balancing Rule
194
Task 5: Set up Server Pool Monitoring Agents
194
Using Server Pools
195
Dynamic DNS (DDNS) Updates
195
Using Server Pool Monitoring Agents
195
Examples of Server Pools
197
Load Balancing for Web Servers
197
Setting up Multi-Link and Dynamic DNS Updates
198
Hapter
199
Bandwidth Management and Traffic Prioritization
199
Overview to Bandwidth Management and Traffic Prioritization
200
Bandwidth Management
200
Effects of Bandwidth Management and Prioritization
200
Traffic Prioritization
200
Configuration of Limits, Guarantees, and Priorities for Traffic
201
Configuration Workflow
202
Default Elements
202
Task 1: Define Qos Classes
202
Task 2: Define Qos Policies
203
Task 3: Assign Qos Classes to Traffic
204
Task 4: Define Qos for Physical or VLAN Interfaces
204
Using Bandwidth Management and Traffic Prioritization
205
Designing Qos Policies
205
Implementation Options
205
Communicating Priorities with DSCP Codes
206
Managing Bandwidth of Incoming Traffic
207
Examples of Bandwidth Management and Traffic Prioritization
208
Ensuring Quality of Important Communications
208
Preparing for ISP Breakdown
209
Limiting the Total Bandwidth Required
210
Virtual Private Networks
211
CHAPTER 23 Overview to Vpns
213
Introduction to Vpns
214
Ipsec Vpns
215
Tunnels
215
Security Associations (SA)
215
Internet Key Exchange (IKE)
215
Perfect Forward Secrecy (PFS)
216
AH and ESP
216
Authentication
217
Tunnel and Transport Modes
217
VPN Topologies
217
CHAPTER 24 VPN Configuration
221
Overview to VPN Configuration
222
Configuration of Vpns
222
Default Elements
224
Configuration Workflow
224
Task 1: Define the Gateway Settings
224
Task 2: Define the Gateway Profile
224
Task 3: Define the Gateways
225
Task 4: Define the Sites
225
Task 5: Create Certificates
226
Task 6: Define the VPN Profile
226
Task 7: Define the VPN Element
226
Task 8: Modify the Firewall Policy
227
Task 9: Configure VPN Clients and External Gateway Devices
228
Using Vpns
228
VPN Logging
229
Using a Dynamic IP Address for a VPN End-Point
229
Using a NAT Address for a VPN End-Point
229
Supported Authentication and Encryption Methods
230
FIPS Mode
230
GOST-Compliant Systems
230
Message Digest Algorithms
230
Authentication Methods
231
Encryption Algorithms
232
Using Pre-Shared Key Authentication
233
Using Certificate Authentication
233
Internal VPN Certificate Authority
234
Validity of Certificates
234
External Certificate Authorities
235
Configuring Vpns with External Gateway Devices
235
Clustering and Vpns
236
Multi-Link VPN
237
Examples of VPN Configurations
238
Creating a VPN between Three Offices
238
Creating a VPN for Mobile Users
239
Creating a VPN that Requires NAT
240
Appendices
243
Command Line Tools
245
Ppendix
245
Management Center Commands
246
Engine Commands
254
Server Pool Monitoring Agent Commands
259
Default Communication Ports
261
Ppendix
261
Management Center Ports
262
Firewall/Vpn Engine Ports
264
Appendix
269
Pre-Defined User Aliases
270
System Aliases
270
Ppendix
273
Regular Expression Syntax
273
Syntax for Stonegate Regular Expressions
274
Special Character Sequences
276
Pattern-Matching Modifiers
277
Bit Variable Extensions
278
Variable Expression Evaluation
280
Stream Operations
282
Other Expressions
283
System Variables
284
Independent Subexpressions
285
Parallel Matching Groups
286
Schema Updates for External LDAP Servers
287
APPENDIX Fsnmp Traps and Mibs
290
APPENDIX G Multicasting
301
The General Features of Multicasting
302
Multicasting Vs. Unicasting
302
Multicasting Vs. Broadcasting
302
IP Multicasting Overview
302
Multicasting Applications
303
Internet Group Management Protocol
303
Membership Messages
303
Ethernet Multicasting
304
Multicasting and Stonegate
304
Unicast MAC
305
Multicast MAC
306
Multicast MAC with IGMP
307
Glossary
309
Index
339
Advertisement
Advertisement
Related Products
Stonesoft StoneGate SG-250
Stonesoft StoneGate SG-200
Stonesoft SSL-1030
Stonesoft SSL-1060
Stonesoft SSL-1302
Stonesoft SSL-3200 Series
Stonesoft Categories
Firewall
Network Hardware
Server
Security System
Storage
More Stonesoft Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL