Check Point Safe@Office Internet Security Appliance User Guide Version 8.2 Part No: 700797, November 2010
Contents iv Check Point Safe@Office User Guide Viewing Network Statistics ...
Before You Install the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 85 Chapter 3 This chapter describes how to properly
Before You Install the Safe@Office Appliance 86 Check Point Safe@Office User Guide Windows Vista Checking the TCP/IP Installation 1. Click Sta
Before You Install the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 87 The Network Sharing Center screen appears. 3.
Before You Install the Safe@Office Appliance 88 Check Point Safe@Office User Guide The Network Connections screen appears. 4. Double-click the
Before You Install the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 89 The Local Area Connection Properties window open
Before You Install the Safe@Office Appliance 90 Check Point Safe@Office User Guide Note: Normally, it is not recommended to assign a static IP
Before You Install the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 91 The Network and Dial-up Connections window appea
Before You Install the Safe@Office Appliance 92 Check Point Safe@Office User Guide 4. In the above window, check if TCP/IP appears in the compon
Before You Install the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 93 Installing TCP/IP Protocol 1. In the Local Ar
Contents Contents v Using Web Content Filtering ...
Before You Install the Safe@Office Appliance 94 Check Point Safe@Office User Guide TCP/IP Settings 1. In the Local Area Connection Properties wi
Before You Install the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 95 Mac OS Use the following procedure for setting
Before You Install the Safe@Office Appliance 96 Check Point Safe@Office User Guide Mac OS-X Use the following procedure for setting up the TCP/
Before You Install the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 97 The Network window appears. 3. Click Configur
Appliance Installation 98 Check Point Safe@Office User Guide TCP/IP configuration fields appear. 4. Click the Configure IPv4 drop-down list, an
Appliance Installation Chapter 3: Installing and Setting Up Safe@Office 99 Appliance Installation Installing Non-ADSL Models To install the Safe
Appliance Installation 100 Check Point Safe@Office User Guide Installing ADSL Models To install the Safe@Office appliance 1. Verify that you
Appliance Installation Chapter 3: Installing and Setting Up Safe@Office 101 4. To use the appliance with a non-ADSL connection, or with an exist
Appliance Installation 102 Check Point Safe@Office User Guide Cascading Your Appliance The Safe@Office appliance protects all computers and ne
Wall Mounting the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 103 Connecting the Appliance to Network Printers In m
Contents vi Check Point Safe@Office User Guide Managing Users ...
Wall Mounting the Safe@Office Appliance 104 Check Point Safe@Office User Guide 3. Mark two drill holes on the wall, in accordance with the follo
Securing the Safe@Office Appliance against Theft Chapter 3: Installing and Setting Up Safe@Office 105 Your Safe@Office appliance is wall mounted.
Securing the Safe@Office Appliance against Theft 106 Check Point Safe@Office User Guide While these parts may differ between devices, all looped
Setting Up the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 107 5. Thread the anti-theft device's pin through the
Setting Up the Safe@Office Appliance 108 Check Point Safe@Office User Guide Logging in to the Safe@Office Portal and setting up your password
Setting Up the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 109 You can access the Setup Wizard at any time after initi
Setting Up the Safe@Office Appliance 110 Check Point Safe@Office User Guide The Safe@Office Setup Wizard opens with the Welcome page displayed.
Initial Login to the Safe@Office Portal Chapter 4: Getting Started 111 Chapter 4 This chapter contains all the information you need in order to g
Initial Login to the Safe@Office Portal 112 Check Point Safe@Office User Guide The initial login page appears. 2. Type a password both in the
Initial Login to the Safe@Office Portal Chapter 4: Getting Started 113 The Safe@Office Setup Wizard opens, with the Welcome page displayed. 4.
Contents Contents vii Using Diagnostic Tools ...
Logging in to the Safe@Office Portal 114 Check Point Safe@Office User Guide Logging in to the Safe@Office Portal Note: By default, HTTP and H
Logging in to the Safe@Office Portal Chapter 4: Getting Started 115 The login page appears. 2. Type your username and password. 3. Click OK.
Accessing the Safe@Office Portal Remotely Using HTTPS 116 Check Point Safe@Office User Guide The Welcome page appears. Accessing the Safe@Offi
Accessing the Safe@Office Portal Remotely Using HTTPS Chapter 4: Getting Started 117 Note: In order to access the Safe@Office Portal remotely u
Using the Safe@Office Portal 118 Check Point Safe@Office User Guide g. Click OK. The Security Alert dialog box reappears. h. Click Yes. The Saf
Using the Safe@Office Portal Chapter 4: Getting Started 119 Figure 26: Safe@Office Portal
Using the Safe@Office Portal 120 Check Point Safe@Office User Guide Main Menu The main menu includes the following submenus. Table 27: Main Men
Using the Safe@Office Portal Chapter 4: Getting Started 121 This submenu… Does this… Logout Allows you to log out of the Safe@Office Portal. M
Using the Safe@Office Portal 122 Check Point Safe@Office User Guide This field… Displays this… page 125. Service Center Displays your subscripti
Logging Out Chapter 4: Getting Started 123 Logging Out Logging out terminates your administration session. Any subsequent attempt to connect to
Overview Chapter 5: Configuring the Internet Connection 125 Chapter 5 This chapter describes how to configure and work with a Safe@Office Interne
Using the Internet Wizard 126 Check Point Safe@Office User Guide You can configure your Internet connection using any of the following setup too
Using the Internet Wizard Chapter 5: Configuring the Internet Connection 127 Configuring an Ethernet-Based Connection on Non-ADSL Models To conf
Using the Internet Wizard 128 Check Point Safe@Office User Guide The Internet Connection Method dialog box appears. 4. Select the Internet conn
Using the Internet Wizard Chapter 5: Configuring the Internet Connection 129 Using a PPPoE Connection If you selected the PPPoE (PPP over Etherne
Using the Internet Wizard 130 Check Point Safe@Office User Guide 3. Click Next. The system attempts to connect to the Internet via the specifie
Using the Internet Wizard Chapter 5: Configuring the Internet Connection 131 Using a PPTP Connection If you selected the PPTP connection method,
Using the Internet Wizard 132 Check Point Safe@Office User Guide Table 30: PPTP Connection Fields In this field… Do this… Username Type your us
Using the Internet Wizard Chapter 5: Configuring the Internet Connection 133 Using a Static IP Connection If you selected the Static IP connectio
About Your Check Point Safe@Office Appliance Chapter 1: About This Guide ix To make finding information in this guide easier, some types of infor
Using the Internet Wizard 134 Check Point Safe@Office User Guide Table 31: PPPoE Connection Fields In this field… Do this… IP Address Type the
Using the Internet Wizard Chapter 5: Configuring the Internet Connection 135 Configuring an Ethernet-Based Connection on ADSL Models Note: I
Using the Internet Wizard 136 Check Point Safe@Office User Guide The Internet Connection Method dialog box appears. 6. Select the Internet conn
Using the Internet Wizard Chapter 5: Configuring the Internet Connection 137 Configuring a Direct ADSL Connection To configure a direct ADSL con
Using the Internet Wizard 138 Check Point Safe@Office User Guide The ADSL Configuration Assistant opens. 2) In the Country drop-down list, sele
Using the Internet Wizard Chapter 5: Configuring the Internet Connection 139 If you chose PPPoE or PPPoA, continue at Using a PPPoE or PPPoA Conn
Using the Internet Wizard 140 Check Point Safe@Office User Guide Using a PPPoE or PPPoA Connection If you selected the PPPoE (PPP over Ethernet)
Using Internet Setup Chapter 5: Configuring the Internet Connection 141 Table 33: PPPoE Connection Fields In this field… Do this… Username Type
Using Internet Setup 142 Check Point Safe@Office User Guide The Internet page appears. 2. Next to the desired Internet connection, click Edit.
Using Internet Setup Chapter 5: Configuring the Internet Connection 143 The Internet Setup page appears. 3. Do one of the following: • To con
About Your Check Point Safe@Office Appliance x Check Point Safe@Office User Guide All products, with or without the Power Pack, with ADSL only
Using Internet Setup 144 Check Point Safe@Office User Guide Configuring a Direct ADSL Connection 1. In the Port drop-down list, select ADSL.
Using Internet Setup Chapter 5: Configuring the Internet Connection 145 Using a PPPoA (PPP over ATM) Connection 1. Complete the fields using th
Using Internet Setup 146 Check Point Safe@Office User Guide New fields appear, depending on the check boxes you selected. 2. Click Apply. The S
Using Internet Setup Chapter 5: Configuring the Internet Connection 147 Once the connection is made, the Status Bar displays the Internet status
Using Internet Setup 148 Check Point Safe@Office User Guide New fields appear, depending on the check boxes you selected. 2. Click Apply. The S
Using Internet Setup Chapter 5: Configuring the Internet Connection 149 Using a PPPoE (PPP over Ethernet) Connection 1. Complete the fields usi
Using Internet Setup 150 Check Point Safe@Office User Guide New fields appear, depending on the check boxes you selected. 2. Click Apply. The S
Using Internet Setup Chapter 5: Configuring the Internet Connection 151 Once the connection is made, the Status Bar displays the Internet status
Using Internet Setup 152 Check Point Safe@Office User Guide New fields appear, depending on the check boxes you selected. 2. Click Apply. The S
Using Internet Setup Chapter 5: Configuring the Internet Connection 153 Configuring an Ethernet-Based Connection 1. In the Port drop-down list,
About Your Check Point Safe@Office Appliance Chapter 1: Introduction 1 Chapter 1 This chapter introduces the Check Point Safe@Office appliance an
Using Internet Setup 154 Check Point Safe@Office User Guide Using a LAN Connection 1. Complete the fields using the relevant information in Int
Using Internet Setup Chapter 5: Configuring the Internet Connection 155 New fields appear, depending on the check boxes you selected. 2. Click
Using Internet Setup 156 Check Point Safe@Office User Guide Using a Cable Modem Connection 1. Complete the fields using the relevant informatio
Using Internet Setup Chapter 5: Configuring the Internet Connection 157 New fields appear, depending on the check boxes you selected. 2. Click
Using Internet Setup 158 Check Point Safe@Office User Guide Using a PPPoE Connection 1. Complete the fields using the relevant information in I
Using Internet Setup Chapter 5: Configuring the Internet Connection 159 New fields appear, depending on the check boxes you selected. 2. Click
Using Internet Setup 160 Check Point Safe@Office User Guide Using a PPTP Connection 1. Complete the fields using the relevant information in In
Using Internet Setup Chapter 5: Configuring the Internet Connection 161 New fields appear, depending on the check boxes you selected. 2. Click
Using Internet Setup 162 Check Point Safe@Office User Guide Once the connection is made, the Status Bar displays the Internet status “Connected”.
Using Internet Setup Chapter 5: Configuring the Internet Connection 163 New fields appear, depending on the check boxes you selected. 2. Click
Safe@Office Product Family 2 Check Point Safe@Office User Guide The Safe@Office appliance also allows sharing your Internet connection among seve
Using Internet Setup 164 Check Point Safe@Office User Guide Once the connection is made, the Status Bar displays the Internet status “Connected”.
Using Internet Setup Chapter 5: Configuring the Internet Connection 165 New fields appear, depending on the check boxes you selected. 2. Click
Using Internet Setup 166 Check Point Safe@Office User Guide Configuring a Dialup Connection Note: To use this connection type, you must first
Using Internet Setup Chapter 5: Configuring the Internet Connection 167 New fields appear, depending on the check boxes you selected. 3. Click
Using Internet Setup 168 Check Point Safe@Office User Guide Configuring No Connection 1. In the Port drop-down list, select None. The fields di
Using Internet Setup Chapter 5: Configuring the Internet Connection 169 In this field… Do this… Service Type your service name. If your ISP has
Using Internet Setup 170 Check Point Safe@Office User Guide In this field… Do this… When no higher priority connection is available Select this
Using Internet Setup Chapter 5: Configuring the Internet Connection 171 In this field… Do this… IP Address Type the static IP address of your Sa
Using Internet Setup 172 Check Point Safe@Office User Guide In this field… Do this… page 293. Shape Downstream: Link Rate Select this option to e
Using Internet Setup Chapter 5: Configuring the Internet Connection 173 In this field… Do this… Note: When configuring MAC cloning for the second
Safe@Office 1000N and 1000N ADSL Product Features Chapter 1: Introduction 3 Safe@Office 1000N and 1000N ADSL Product Features Table 1: Safe@Offic
Using Internet Setup 174 Check Point Safe@Office User Guide In this field… Do this… Balancing on page 192. High Availability The High Availabili
Using Internet Setup Chapter 5: Configuring the Internet Connection 175 In this field… Do this… Connection Probing Method While the Probe Next Ho
Setting Up Modems 176 Check Point Safe@Office User Guide In this field… Do this… 1, 2, 3 If you chose the Ping Addresses connection probing meth
Setting Up Modems Chapter 5: Configuring the Internet Connection 177 See Setting Up an ExpressCard Cellular Modem on page 185. Setting Up an RS2
Setting Up Modems 178 Check Point Safe@Office User Guide 3. Next to Serial, click Edit. The Port Setup page appears. 4. In the Assign to Netw
Setting Up Modems Chapter 5: Configuring the Internet Connection 179 New fields appear. 5. Complete the fields using the information in Dialup
Setting Up Modems 180 Check Point Safe@Office User Guide Table 35: RS232 Dialup Fields In this field… Do this… Modem Type Select the modem type.
Setting Up Modems Chapter 5: Configuring the Internet Connection 181 Setting Up a USB Modem Warning: Before attaching a USB modem, ensure that
Setting Up Modems 182 Check Point Safe@Office User Guide 3. Next to USB, click Edit. The USB Devices page appears. If the Safe@Office appliance
Setting Up Modems Chapter 5: Configuring the Internet Connection 183 The USB Modem Setup page appears. 5. Complete the fields using the inform
COPYRIGHT & TRADEMARKS Copyright © 2010 SofaWare, All Rights Reserved. No part of this document may be reproduced in any form or by any means wi
Safe@Office 1000N and 1000N ADSL Product Features 4 Check Point Safe@Office User Guide DMZ/WAN2 Port Ethernet / SFP, 10/100/1000 Mbps Dialup Bac
Setting Up Modems 184 Check Point Safe@Office User Guide Table 36: USB Dialup Fields In this field… Do this… Modem Type Select the modem type.
Setting Up Modems Chapter 5: Configuring the Internet Connection 185 In this field… Do this… PIN Type the Personal Identification Number (PIN) c
Setting Up Modems 186 Check Point Safe@Office User Guide The Ports page appears. 3. Next to ExC, click Edit. The USB Devices page appears. If t
Setting Up Modems Chapter 5: Configuring the Internet Connection 187 The Cellular Modem Setup page appears. 5. Complete the fields using the in
Viewing Internet Connection Information 188 Check Point Safe@Office User Guide Viewing Internet Connection Information You can view information
Viewing Internet Connection Information Chapter 5: Configuring the Internet Connection 189 Table 37: Internet Page Fields Field Description Stat
Enabling/Disabling the Internet Connection 190 Check Point Safe@Office User Guide Enabling/Disabling the Internet Connection You can temporarily
Configuring a Backup Internet Connection Chapter 5: Configuring the Internet Connection 191 Configuring a Backup Internet Connection You can con
Configuring WAN Load Balancing 192 Check Point Safe@Office User Guide Configuring WAN Load Balancing If your network is prone to congestion, f
Configuring WAN Load Balancing Chapter 5: Configuring the Internet Connection 193 ensure full utilization of both Internet connections, the ratio
Safe@Office 1000N and 1000N ADSL Product Features Chapter 1: Introduction 5 P2P File Sharing Blocking / Monitoring Port-based and Tag-based VLAN
Configuring Network Settings Chapter 6: Managing Your Network 195 Chapter 6 This chapter describes how to manage and configure your network conne
Configuring Network Settings 196 Check Point Safe@Office User Guide Configuring the LAN Network To configure the LAN network 1. Click Network
Configuring Network Settings Chapter 6: Managing Your Network 197 The Edit Network Settings page for the LAN network appears. 3. In the Mode dr
Configuring Network Settings 198 Check Point Safe@Office User Guide Changing IP Addresses If desired, you can change your Safe@Office appliance’
Configuring Network Settings Chapter 6: Managing Your Network 199 Your computer obtains an IP address in the new range. • Otherwise, manually r
Configuring Network Settings 200 Check Point Safe@Office User Guide Configuring a DHCP Server By default, the Safe@Office appliance operates as
Configuring Network Settings Chapter 6: Managing Your Network 201 Enabling/Disabling the Safe@Office DHCP Server You can enable and disable the
Configuring Network Settings 202 Check Point Safe@Office User Guide Configuring the DHCP Address Range By default, the Safe@Office DHCP server
Configuring Network Settings Chapter 6: Managing Your Network 203 The DHCP IP range fields appear. 2) In the DHCP IP range fields, type the des
Safe@Office 1000N and 1000N ADSL Product Features 6 Check Point Safe@Office User Guide IPSEC Features Hardware-accelerated DES, 3DES, AES, MD5,
Configuring Network Settings 204 Check Point Safe@Office User Guide Configuring DHCP Relay You can configure DHCP relay for internal networks.
Configuring Network Settings Chapter 6: Managing Your Network 205 The Automatic DHCP range check box is disabled, and new fields appear. 4. In
Configuring Network Settings 206 Check Point Safe@Office User Guide Configuring DHCP Server Options If desired, you can configure the following
Configuring Network Settings Chapter 6: Managing Your Network 207 The DHCP Server Options page appears. 4. Complete the fields using the releva
Configuring Network Settings 208 Check Point Safe@Office User Guide New fields appear, depending on the check boxes you selected. 5. Click Appl
Configuring Network Settings Chapter 6: Managing Your Network 209 Table 38: DHCP Server Options Fields In this field… Do this… Domain Name Type
Configuring Network Settings 210 Check Point Safe@Office User Guide In this field… Do this… Automatically assign default gateway Clear this optio
Configuring Network Settings Chapter 6: Managing Your Network 211 In this field… Do this… Nortel IP Phone To enable Nortel IP phones to receive
Configuring Network Settings 212 Check Point Safe@Office User Guide The Ports page appears. 3. Next to the DMZ/WAN2 port, click Edit.
Configuring Network Settings Chapter 6: Managing Your Network 213 The Port Setup page appears. 4. In the Assign to network drop-down list, sele
Safe@Office 1000N and 1000N ADSL Product Features Chapter 1: Introduction 7 MAC Cloning Network Address Translation (NAT) Rules Static Routes,
Configuring Network Settings 214 Check Point Safe@Office User Guide Note: The DMZ network must not overlap other networks. 11. In the Subnet M
Configuring Network Settings Chapter 6: Managing Your Network 215 Note: OfficeMode requires either Check Point SecureClient, an L2TP client, or
Configuring Network Settings 216 Check Point Safe@Office User Guide Configuring VLANs Your Safe@Office appliance allows you to partition your ne
Configuring Network Settings Chapter 6: Managing Your Network 217 The Safe@Office appliance supports the following VLAN types: • Tag-based In
Configuring Network Settings 218 Check Point Safe@Office User Guide • Port-based Port-based VLAN allows assigning the appliance's LAN port
Configuring Network Settings Chapter 6: Managing Your Network 219 • Wireless Distribution System (WDS) links In wireless Safe@Office models, yo
Configuring Network Settings 220 Check Point Safe@Office User Guide Adding and Editing Port-Based VLANs To add or edit a port-based VLAN 1. Cli
Configuring Network Settings Chapter 6: Managing Your Network 221 5. In the Mode drop-down list, select Enabled. The fields are enabled. 6. In
Configuring Network Settings 222 Check Point Safe@Office User Guide Adding and Editing Tag-Based VLANs To add or edit a tag-based VLAN 1. Click
Configuring Network Settings Chapter 6: Managing Your Network 223 A warning message appears. 12. Click OK. A success message appears. 13. Clic
Safe@Office 1000NW and 1000NW ADSL Product Features 8 Check Point Safe@Office User Guide Setting Rapid Deployment Hardware Specifications Power
Using the Internal DNS Server 224 Check Point Safe@Office User Guide 5. Click OK. The VLAN is deleted. Using the Internal DNS Server The Safe@
Using the Internal DNS Server Chapter 6: Managing Your Network 225 Enabling the Internal DNS Server To enable the internal DNS server 1. Click S
Using the Internal DNS Server 226 Check Point Safe@Office User Guide The Domain Name Suffix field appears. 3. In the Domain Name Suffix field,
Using Network Objects Chapter 6: Managing Your Network 227 Using Network Objects You can add individual computers or networks as network objects
Using Network Objects 228 Check Point Safe@Office User Guide DHCP reservation, and it is useful if you are hosting a public Internet server on yo
Using Network Objects Chapter 6: Managing Your Network 229 Adding and Editing Network Objects You can add or edit network objects via: • The Ne
Using Network Objects 230 Check Point Safe@Office User Guide 2. Do one of the following: • To add a network object, click New. • To edit an
Using Network Objects Chapter 6: Managing Your Network 231 The Step 2: Computer Details dialog box appears. If you chose Single Computer, the dia
Using Network Objects 232 Check Point Safe@Office User Guide The Step 3: Save dialog box appears. 7. Type a name for the network object in the
Using Network Objects Chapter 6: Managing Your Network 233 The My Computers page appears. If a computer has not yet been added as a network obje
Safe@Office 1000NW and 1000NW ADSL Product Features Chapter 1: Introduction 9 Hardware Features 4-Port LAN Switch Ethernet, 10/100/1000 Mbps WAN
Using Network Objects 234 Check Point Safe@Office User Guide The computer's IP address and MAC address are automatically filled in. 5. Comp
Using Network Objects Chapter 6: Managing Your Network 235 In this field… Do this… Exclude this computer from 802.1x Port Security Select this o
Using Network Objects 236 Check Point Safe@Office User Guide Table 40: Network Object Fields for a Network In this field… Do this… IP Range Ty
Configuring Network Service Objects Chapter 6: Managing Your Network 237 Viewing and Deleting Network Objects To view or delete a network object
Configuring Network Service Objects 238 Check Point Safe@Office User Guide Adding and Editing Network Service Objects To add or edit a network s
Configuring Network Service Objects Chapter 6: Managing Your Network 239 The Safe@Office Network Service Wizard opens, with the Step 1: Network S
Configuring Network Service Objects 240 Check Point Safe@Office User Guide 6. Click Finish. Table 41: Network Service Fields In this field… Do t
Using Static Routes Chapter 6: Managing Your Network 241 Using Static Routes A static route is a setting that explicitly specifies the route to
Using Static Routes 242 Check Point Safe@Office User Guide The Static Routes page lists all existing routes, including the default, and indicates
Using Static Routes Chapter 6: Managing Your Network 243 The Static Route Wizard opens displaying the Step 1: Source and Destination dialog box.
Safe@Office 1000NW and 1000NW ADSL Product Features 10 Check Point Safe@Office User Guide Intelligence SmartDefense™ (IPS) Network Address Tran
Using Static Routes 244 Check Point Safe@Office User Guide 6. Click Next. The new static route is saved. Table 42: Static Route Fields In this
Using Static Routes Chapter 6: Managing Your Network 245 In this field… Do this… Next Hop IP Specify the next hop to which packets should be sen
Managing Ports 246 Check Point Safe@Office User Guide Managing Ports The Safe@Office appliance enables you to quickly and easily assign its port
Managing Ports Chapter 6: Managing Your Network 247 You can assign this port... To these uses... USB Printers USB-based modems The Safe@Office a
Managing Ports 248 Check Point Safe@Office User Guide The Ports page appears. In non-ADSL models, this page appears as follows:
Managing Ports Chapter 6: Managing Your Network 249 In ADSL models, this page appears as follows: The page displays the information for each por
Managing Ports 250 Check Point Safe@Office User Guide This field… Displays… Status The port's current status. Ethernet ports can have the
Managing Ports Chapter 6: Managing Your Network 251 This field… Displays… The ADSL port can have the following statuses: Status Description Sync
Managing Ports 252 Check Point Safe@Office User Guide This field… Displays… The USB port can have the following statuses: Status Description Con
Managing Ports Chapter 6: Managing Your Network 253 This field… Displays… 802.1x The port's security scheme. This can be any of the followi
Safe@Office 1000NW and 1000NW ADSL Product Features Chapter 1: Introduction 11 VPN Server with OfficeMode and RADIUS Support Check Point VPN Clie
Managing Ports 254 Check Point Safe@Office User Guide Modifying Port Assignments You can assign ports to different networks or purposes. Since m
Managing Ports Chapter 6: Managing Your Network 255 To assign a port to... See... An ExpressCard modem Setting Up an ExpressCard Cellular Modem o
Managing Ports 256 Check Point Safe@Office User Guide • To disable the Serial port, select Disabled. 4. Click Apply. A warning message appears
Managing Ports Chapter 6: Managing Your Network 257 Resetting Ports to Defaults You can reset the Safe@Office appliance's ports to their de
Managing Ports 258 Check Point Safe@Office User Guide Resetting All Ports to Defaults To reset all ports to defaults 1. Click Network in the
Overview Chapter 7: Using Bridges 259 Chapter 7 This chapter describes how to connect multiple network segments at the data-link layer, using a b
Overview 260 Check Point Safe@Office User Guide If you enable the firewall between bridged network segments, the gateway operates as a regular fi
Overview Chapter 7: Using Bridges 261 For example, if you assign the LAN and primary WLAN networks to a bridge and disable the bridge's inte
Overview 262 Check Point Safe@Office User Guide • Transparent roaming In a routed network, if a host is physically moved from one network area
Overview Chapter 7: Using Bridges 263 How Does Bridge Mode Work? Bridges operate at layer 2 of the OSI model, therefore adding a bridge to an exi
Safe@Office 1000NW and 1000NW ADSL Product Features 12 Check Point Safe@Office User Guide Dead Internet Connection Detection (DCD) WAN Load Bala
Overview 264 Check Point Safe@Office User Guide Multiple Bridges and Spanning Tree Protocol When using multiple bridges, you can enable fault tol
Workflow Chapter 7: Using Bridges 265 Workflow To use a bridge 1. Add a bridge. See Adding and Editing Bridges on page 266. 2. Add the des
Adding and Editing Bridges 266 Check Point Safe@Office User Guide For information on adding security rules, see Adding and Editing Rules on page
Adding and Editing Bridges Chapter 7: Using Bridges 267 The Bridge Configuration page appears. 3. Complete the fields using the following table
Adding and Editing Bridges 268 Check Point Safe@Office User Guide Table 47: Bridge Configuration Fields In this field… Do this… Network Name Ty
Adding Internal Networks to Bridges Chapter 7: Using Bridges 269 In this field… Do this… Bridge Priority Select this bridge's priority. Th
Adding Internal Networks to Bridges 270 Check Point Safe@Office User Guide Adding Internal Networks to Bridges Note: In order to add a VLAN o
Adding Internal Networks to Bridges Chapter 7: Using Bridges 271 New fields appear. 4. Complete these fields as described below.
Adding Internal Networks to Bridges 272 Check Point Safe@Office User Guide If the assigned bridge uses STP, additional fields appear. 5. Click
Adding Internal Networks to Bridges Chapter 7: Using Bridges 273 Table 48: Bridged Network Fields In this field… Do this… Assign to Bridge Selec
Safe@Office 1000NW and 1000NW ADSL Product Features Chapter 1: Introduction 13 Dynamic Routing * Management Central Management SMP Local Managem
Adding Internet Connections to Bridges 274 Check Point Safe@Office User Guide In this field… Do this… Spanning Tree Protocol - Port Priority Sele
Adding Internet Connections to Bridges Chapter 7: Using Bridges 275 This option is available in ADSL models only. • To use the WAN port, select
Adding Internet Connections to Bridges 276 Check Point Safe@Office User Guide 6. Complete the rest of the fields using the relevant information
Adding Internet Connections to Bridges Chapter 7: Using Bridges 277 Table 49: Bridged Connection Fields In this field… Do this… Bridge Mode Sel
Deleting Bridges 278 Check Point Safe@Office User Guide In this field… Do this… Spanning Tree Protocol - Port Priority Select the port's pri
Deleting Bridges Chapter 7: Using Bridges 279 2. Remove all Internet connections from the bridge, by doing the following for each connection: a.
Overview Chapter 8: Configuring High Availability 281 Chapter 8 This chapter describes how to configure High Availability (HA) for two or more Sa
Overview 282 Check Point Safe@Office User Guide 4. When a gateway that was offline comes back online, or a gateway's priority changes, the
Overview Chapter 8: Configuring High Availability 283 Note: To use a WAN virtual IP address, the Internet connection method must be "Stati
modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification"
Safe@Office 500 and 500 ADSL Product Features 14 Check Point Safe@Office User Guide Safe@Office 500 and 500 ADSL Product Features Table 3: Safe@O
Configuring High Availability on a Gateway 284 Check Point Safe@Office User Guide Configuring High Availability on a Gateway The following proce
Configuring High Availability on a Gateway Chapter 8: Configuring High Availability 285 The fields are enabled. 4. Next to each network for wh
Configuring High Availability on a Gateway 286 Check Point Safe@Office User Guide This can be any unused IP address in the network, and must be t
Configuring High Availability on a Gateway Chapter 8: Configuring High Availability 287 Table 50: High Availability Page Fields In this field… Do
Configuring High Availability on a Gateway 288 Check Point Safe@Office User Guide In this field… Do this… When in passive state Disable VPN Se
Sample Implementation on Two Gateways Chapter 8: Configuring High Availability 289 In this field… Do this… Group ID If multiple HA clusters exis
Sample Implementation on Two Gateways 290 Check Point Safe@Office User Guide The procedure below shows how to configure HA for both the LAN and D
Sample Implementation on Two Gateways Chapter 8: Configuring High Availability 291 Gateway A will reduce its priority by 30, if its secondary Int
Sample Implementation on Two Gateways 292 Check Point Safe@Office User Guide
Overview Chapter 9: Using Traffic Shaper 293 Chapter 9 This chapter describes how to use Traffic Shaper to control the flow of communication to a
Safe@Office 500 and 500 ADSL Product Features Chapter 1: Introduction 15 Dialup Backup With external serial / USB modem Console Port (Serial) P
Overview 294 Check Point Safe@Office User Guide Each class has a bandwidth limit, which is the maximum amount of bandwidth that connections belon
Setting Up Traffic Shaper Chapter 9: Using Traffic Shaper 295 Setting Up Traffic Shaper To set up Traffic Shaper 1. Enable Traffic Shaper for t
Predefined QoS Classes 296 Check Point Safe@Office User Guide Shaper will handle outgoing VPN traffic as specified in the bandwidth policy for th
Adding and Editing Classes Chapter 9: Using Traffic Shaper 297 Class Weight Delay Sensitivity Useful for Urgent 15 High (Interactive Traffic)
Adding and Editing Classes 298 Check Point Safe@Office User Guide Adding and Editing Classes To add or edit a QoS class 1. Click Network in the
Adding and Editing Classes Chapter 9: Using Traffic Shaper 299 The Safe@Office QoS Class Editor wizard opens, with the Step 1 of 3: Quality of Se
Adding and Editing Classes 300 Check Point Safe@Office User Guide Note: Traffic Shaper may not enforce guaranteed rates and relative weights fo
Adding and Editing Classes Chapter 9: Using Traffic Shaper 301 Table 53: QoS Class Fields In this field… Do this… Relative Weight Type a value i
Viewing and Deleting Classes 302 Check Point Safe@Office User Guide In this field… Do this… Incoming Traffic: Limit rate to Select this option to
Restoring Traffic Shaper Defaults Chapter 9: Using Traffic Shaper 303 Restoring Traffic Shaper Defaults If desired, you can reset the Traffic Sh
Safe@Office 500 and 500 ADSL Product Features 16 Check Point Safe@Office User Guide Port-based and Tag-based VLAN * Port-based Security (802.1x)
Overview Chapter 10: Working with Wireless Networks 305 Chapter 10 This chapter describes how to configure wireless internal networks. This chapt
Overview 306 Check Point Safe@Office User Guide compatible stations. For more information on the Super G mode refer to: http://www.super-ag.com.
Overview Chapter 10: Working with Wireless Networks 307 Virtual Access Points The Safe@Office appliance enables you to partition the primary WLA
Overview 308 Check Point Safe@Office User Guide different access point, you can bridge the two network segments over WDS links. The network segme
Overview Chapter 10: Working with Wireless Networks 309 When used together with bridge mode and Spanning Tree Protocol (STP), you can use WDS lin
Overview 310 Check Point Safe@Office User Guide Note: Mesh topology is only supported in Safe@Office 500W. You can configure up to seven WDS
Overview Chapter 10: Working with Wireless Networks 311 Network Count Limitations You can configure a total of eight wireless objects, including
Overview 312 Check Point Safe@Office User Guide Security Protocol Description WEP encryption In the WEP (Wired Equivalent Privacy) encryption se
Overview Chapter 10: Working with Wireless Networks 313 Security Protocol Description recommended for situations where you want to authenticate w
Safe@Office 500 and 500 ADSL Product Features Chapter 1: Introduction 17 Networking Supported Internet Connection Methods Static IP, DHCP, PPPoE,
Configuring Wireless Networks 314 Check Point Safe@Office User Guide Note: For increased security, it is recommended to enable the Safe@Office
Configuring Wireless Networks Chapter 10: Working with Wireless Networks 315 The Wireless Configuration Wizard opens, with the Wireless Configura
Configuring Wireless Networks 316 Check Point Safe@Office User Guide 8. The Wireless Security dialog box appears. 9. Do one of the following:
Configuring Wireless Networks Chapter 10: Working with Wireless Networks 317 10. Do one of the following: • To bridge the LAN and WLAN networks
Configuring Wireless Networks 318 Check Point Safe@Office User Guide Do the following: 1. In the text box, type the passphrase for accessing the
Configuring Wireless Networks Chapter 10: Working with Wireless Networks 319 4. The Wireless Security Complete dialog box appears. 5. Click Fi
Configuring Wireless Networks 320 Check Point Safe@Office User Guide WEP If you chose WEP, the Wireless Configuration-WEP dialog box appears. Do
Configuring Wireless Networks Chapter 10: Working with Wireless Networks 321 4. Click Next. The Wireless Security Complete dialog box appears. 5
Configuring Wireless Networks 322 Check Point Safe@Office User Guide The Edit Network Settings page appears. The fields that appear depend on th
Configuring Wireless Networks Chapter 10: Working with Wireless Networks 323 10. Complete the fields using the information in Basic Wireless Set
Safe@Office 500 and 500 ADSL Product Features 18 Check Point Safe@Office User Guide Static Routes, Source Routes, and Service-Based Routes Ether
Configuring Wireless Networks 324 Check Point Safe@Office User Guide 13. Click OK. A success message appears. Note: Some wireless cards have
Configuring Wireless Networks Chapter 10: Working with Wireless Networks 325 In this field… Do this… • 802.11g Super (54/108 Mbps). Operates in
Configuring Wireless Networks 326 Check Point Safe@Office User Guide In this field… Do this… • A specific channel. The list of channels is depen
Configuring Wireless Networks Chapter 10: Working with Wireless Networks 327 In this field… Do this… Authentication Server Specify which authenti
Configuring Wireless Networks 328 Check Point Safe@Office User Guide In this field… Do this… WEP Keys If you selected WEP encryption, you must c
Configuring Wireless Networks Chapter 10: Working with Wireless Networks 329 Table 56: Advanced Wireless Settings Fields In this field… Do this
Configuring Wireless Networks 330 Check Point Safe@Office User Guide In this field… Do this… Wireless Transmitter Transmission Rate Select the
Configuring Wireless Networks Chapter 10: Working with Wireless Networks 331 In this field… Do this… Antenna Selection Multipath distortion is c
Configuring Wireless Networks 332 Check Point Safe@Office User Guide In this field… Do this… RTS Threshold Type the smallest IP packet size for
Configuring Wireless Networks Chapter 10: Working with Wireless Networks 333 In this field… Do this… WDS Specify whether to enable WDS links: •
Safe@Office 500W and 500W ADSL Product Features Chapter 1: Introduction 19 Hardware Specifications Power 100/110/120/210/220/230VAC (Linear Powe
Configuring Wireless Networks 334 Check Point Safe@Office User Guide To add or edit a VAP 1. Configure and enable the primary WLAN. For informat
Configuring Wireless Networks Chapter 10: Working with Wireless Networks 335 The Edit Network Settings page appears. 5. In the Network Name fie
Configuring Wireless Networks 336 Check Point Safe@Office User Guide New fields appear. The fields that appear depend on the hardware type. 7.
Configuring Wireless Networks Chapter 10: Working with Wireless Networks 337 See Configuring a DHCP Server on page 200. 12. Complete the fields
Configuring Wireless Networks 338 Check Point Safe@Office User Guide Note: Some wireless cards have "Infrastructure" and "Ad-hoc
Configuring Wireless Networks Chapter 10: Working with Wireless Networks 339 b) If using Safe@Office1000NW, enable WDS links. For information on
Configuring Wireless Networks 340 Check Point Safe@Office User Guide Note: This is the MAC address of the WLAN interface, not the WAN MAC addre
Configuring Wireless Networks Chapter 10: Working with Wireless Networks 341 New fields appear. The fields that appear depend on the hardware t
Troubleshooting Wireless Connectivity 342 Check Point Safe@Office User Guide Troubleshooting Wireless Connectivity I cannot connect to a wireless
Troubleshooting Wireless Connectivity Chapter 10: Working with Wireless Networks 343 • Relocate the Safe@Office appliance to a place with better
Safe@Office 500W and 500W ADSL Product Features 20 Check Point Safe@Office User Guide WAN Port Ethernet, 10/100 Mbps ADSL2+ ADSL Standards —
Troubleshooting Wireless Connectivity 344 Check Point Safe@Office User Guide parameter in the wireless network's advanced settings to a lowe
Viewing the Safe@Office Appliance Status Chapter 11: Viewing Reports 345 Chapter 11 This chapter describes the Safe@Office Portal reports. This
Viewing the Safe@Office Appliance Status 346 Check Point Safe@Office User Guide To view the Safe@Office appliance's current status 1. Click
Viewing the Safe@Office Appliance Status Chapter 11: Viewing Reports 347 Table 57: Status Monitor Fields This field… Displays… Device Information
Viewing the Safe@Office Appliance Status 348 Check Point Safe@Office User Guide This field… Displays… Internet The Safe@Office appliance's
Viewing the Safe@Office Appliance Status Chapter 11: Viewing Reports 349 This field… Displays… Antivirus The Safe@Office appliance's VStrea
Viewing the Safe@Office Appliance Status 350 Check Point Safe@Office User Guide This field… Displays… HA The Safe@Office appliance's High A
Viewing the Safe@Office Appliance Status Chapter 11: Viewing Reports 351 This field… Displays… System Mem The percentage of system memory in use
Using the Traffic Monitor 352 Check Point Safe@Office User Guide Using the Traffic Monitor You can view incoming and outgoing traffic for select
Using the Traffic Monitor Chapter 11: Viewing Reports 353 Viewing Traffic Reports To view a traffic report 1. Click Reports in the main menu, a
Safe@Office 500W and 500W ADSL Product Features Chapter 1: Introduction 21 Four Preset Security Policies Anti-spoofing Voice over IP Support S
Using the Traffic Monitor 354 Check Point Safe@Office User Guide 3. To refresh all traffic reports, click Refresh. 4. To clear all traffic repo
Using the Traffic Monitor Chapter 11: Viewing Reports 355 The Traffic Monitor Settings page appears. 3. In the Sample monitoring data every fie
Using the Traffic Monitor 356 Check Point Safe@Office User Guide Exporting General Traffic Reports You can export a general traffic report that
Viewing Computers Chapter 11: Viewing Reports 357 Viewing Computers This option allows you to view the currently active computers on your networ
Viewing Computers 358 Check Point Safe@Office User Guide blocked from accessing the Internet through the Safe@Office appliance, the reason why it
Viewing Connections Chapter 11: Viewing Reports 359 The Node Limit window appears with installed software product and the number of nodes used.
Viewing Connections 360 Check Point Safe@Office User Guide The Connections page appears. The page displays the information in the following tabl
Viewing Network Statistics Chapter 11: Viewing Reports 361 Table 59: Connections Fields This field… Displays… Protocol The protocol used (TCP, U
Viewing Network Statistics 362 Check Point Safe@Office User Guide Viewing Network Statistics You can view statistics for each of the Safe@Office
Viewing Network Statistics Chapter 11: Viewing Reports 363 2. To refresh the display, click Refresh. Table 60: General Network Statistics This f
Safe@Office 500W and 500W ADSL Product Features 22 Check Point Safe@Office User Guide Route-based VPN Backup VPN Gateways Remote Access VPN C
Viewing Network Statistics 364 Check Point Safe@Office User Guide The page displays statistics for the Internet connection. The following example
Viewing Network Statistics Chapter 11: Viewing Reports 365 This field… Displays… Internet Mode The Internet connection method used Connected
Viewing Network Statistics 366 Check Point Safe@Office User Guide This field… Displays… RF status These fields only appear for ADSL connections.
Viewing Network Statistics Chapter 11: Viewing Reports 367 This field… Displays… Errors The total number of transmitted and received packets fo
Viewing Network Statistics 368 Check Point Safe@Office User Guide Viewing Wired Network Statistics You can view statistics for wired network int
Viewing Network Statistics Chapter 11: Viewing Reports 369 Table 62: Wired Network Statistics This field… Displays… Type The network's typ
Viewing Network Statistics 370 Check Point Safe@Office User Guide Viewing Wireless Network Statistics If the primary WLAN is enabled, you can vi
Viewing Network Statistics Chapter 11: Viewing Reports 371 Table 63: Wireless Statistics This field… Displays… Type The network's type, in
Viewing Network Statistics 372 Check Point Safe@Office User Guide This field… Displays… Missing Fragments The total number of packets missed dur
Viewing Network Statistics Chapter 11: Viewing Reports 373 The page displays statistics for the bridge. For information on the fields, see the fo
Safe@Office 500W and 500W ADSL Product Features Chapter 1: Introduction 23 Connection DHCP Server, Client, and Relay DNS Server MAC Cloning Ne
Viewing the Routing Table 374 Check Point Safe@Office User Guide This field… Displays… Errors The total number of transmitted and received pack
Viewing the Routing Table Chapter 11: Viewing Reports 375 The Routing Table page appears. The page displays the information in the following tab
Viewing Wireless Station Statistics 376 Check Point Safe@Office User Guide This field… Displays… Interface The interface for which the route is
Viewing Wireless Station Statistics Chapter 11: Viewing Reports 377 Table 66: Wireless Station Statistics This field… Displays… Current Rate The
Viewing the Event Log Chapter 12: Viewing Logs 379 Chapter 12 This chapter describes the Safe@Office appliance logs. This chapter includes the fo
Viewing the Event Log 380 Check Point Safe@Office User Guide To view the event log 1. Click Logs in the main menu, and click the Event Log tab.
Viewing the Event Log Chapter 12: Viewing Logs 381 5. To refresh the display, click Refresh. 6. To save the displayed events to an *.xls file:
Viewing the Event Log 382 Check Point Safe@Office User Guide If you are using Internet Explorer, and this is the first time that you copy logs, a
Viewing the Security Log Chapter 12: Viewing Logs 383 Table 68: Event Log Color Coding An event marked in this color… Indicates… Red An error me
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original
Safe@Office 500W and 500W ADSL Product Features 24 Check Point Safe@Office User Guide Local Diagnostics Tools Ping, WHOIS, Packet Sniffer, Status
Viewing the Security Log 384 Check Point Safe@Office User Guide To view the security log 1. Click Logs in the main menu, and click the Security
Viewing the Security Log Chapter 12: Viewing Logs 385 4. To navigate the log table, do any of the following: • To scroll through the displayed
Viewing the Security Log 386 Check Point Safe@Office User Guide The selected logs are highlighted in yellow. b. Press CTRL+C. If you are using
Viewing the Security Log Chapter 12: Viewing Logs 387 Table 69: Security Log Columns This column... Displays... No The log message number Date
Viewing the Security Log 388 Check Point Safe@Office User Guide This column... Displays... Service The protocol and destination port used for th
Viewing the Security Log Chapter 12: Viewing Logs 389 Action Icon Description Potential Spam Detected An email was rejected as potential spam. M
The Safe@Office Firewall Security Policy Chapter 13: Setting Your Security Policy 391 Chapter 13 This chapter describes how to set up your Safe@O
The Safe@Office Firewall Security Policy 392 Check Point Safe@Office User Guide Security Policy Implementation The key to implementing a network
Default Security Policy Chapter 13: Setting Your Security Policy 393 Default Security Policy The Safe@Office default security policy includes the
Wireless Features Chapter 1: Introduction 25 Wireless Features Table 5: Safe@Office Wireless Features Feature Safe@Office 500W / Safe@Office 500
Setting the Firewall Security Level 394 Check Point Safe@Office User Guide Setting the Firewall Security Level The firewall security level can b
Setting the Firewall Security Level Chapter 13: Setting Your Security Policy 395 This level… Does this… Further Details Block All Blocks all acc
Setting the Firewall Security Level 396 Check Point Safe@Office User Guide The Firewall page appears. 2. Drag the security lever to the desired
Configuring Servers Chapter 13: Setting Your Security Policy 397 Configuring Servers Note: If you do not intend to host any public Internet
Configuring Servers 398 Check Point Safe@Office User Guide The Servers page appears, displaying a list of services and a host IP address for each
Configuring Servers Chapter 13: Setting Your Security Policy 399 Table 73: Servers Page Fields In this column… Do this… Allow Select the check b
Using Rules 400 Check Point Safe@Office User Guide Using Rules The Safe@Office appliance checks the protocol used, the ports range, and the dest
Using Rules Chapter 13: Setting Your Security Policy 401 For example, if you want to block all outgoing FTP traffic, except traffic from a specif
Using Rules 402 Check Point Safe@Office User Guide Table 74: Firewall Rule Types Rule Description Allow and Forward This rule type enables you to
Using Rules Chapter 13: Setting Your Security Policy 403 Rule Description Allow This rule type enables you to do the following: • Permit outgoi
Optional Security Services 26 Check Point Safe@Office User Guide * Requires Power Pack upgrade CPSB-500-UPG-PPACK or CPSB-1000-UPG-PPACK, dependi
Using Rules 404 Check Point Safe@Office User Guide Adding and Editing Firewall Rules To add or edit a firewall rule 1. Click Security in the ma
Using Rules Chapter 13: Setting Your Security Policy 405 The Safe@Office Firewall Rule wizard opens, with the Step 1: Rule Type dialog box displa
Using Rules 406 Check Point Safe@Office User Guide 5. Complete the fields using the relevant information in the following table. 6. Click Next.
Using Rules Chapter 13: Setting Your Security Policy 407 8. Complete the fields using the relevant information in the following table. 9. Click
Using Rules 408 Check Point Safe@Office User Guide The Step 5: Done dialog box appears. 12. If desired, type a description of the rule in the f
Using Rules Chapter 13: Setting Your Security Policy 409 In this field… Do this… Protocol Select the protocol for which the rule should apply (E
Using Rules 410 Check Point Safe@Office User Guide In this field… Do this… To specify the Safe@Office IP addresses, select This Gateway. To spec
Using Rules Chapter 13: Setting Your Security Policy 411 In this field… Do this… Log accepted connections / Log blocked connections Select this
Using Rules 412 Check Point Safe@Office User Guide Reordering Firewall Rules To reorder firewall rules 1. Click Security in the main menu, and
Using Port-Based Security Chapter 13: Setting Your Security Policy 413 Viewing and Deleting Firewall Rules To view or delete an existing firewal
Getting to Know Your Safe@Office 1000N Appliance Chapter 1: Introduction 27 Getting to Know Your Safe@Office 1000N Appliance Package Contents T
Using Port-Based Security 414 Check Point Safe@Office User Guide network, all users who authenticate successfully on that port are assigned to th
Using Port-Based Security Chapter 13: Setting Your Security Policy 415 Configuring Port-Based Security To configure 802.1x port-based security f
Using Port-Based Security 416 Check Point Safe@Office User Guide The Ports page appears. 5. Next to the desired port, click Edit.
Using Port-Based Security Chapter 13: Setting Your Security Policy 417 The Port Setup page appears. 6. In the Port Security drop-down list, sel
Using Port-Based Security 418 Check Point Safe@Office User Guide Table 76: Port-Based Security Fields In this field… Do this… Assign to network
Using Secure HotSpot Chapter 13: Setting Your Security Policy 419 Resetting 802.1x Locking When 802.1x port-based security is configured for a L
Using Secure HotSpot 420 Check Point Safe@Office User Guide On this page, users must read and accept the My HotSpot terms of use, and if My HotSp
Using Secure HotSpot Chapter 13: Setting Your Security Policy 421 My HotSpot page. For information on excluding network objects from HotSpot enfo
Using Secure HotSpot 422 Check Point Safe@Office User Guide Enabling/Disabling Secure HotSpot To enable/disable Secure HotSpot 1. Click Securit
Using Secure HotSpot Chapter 13: Setting Your Security Policy 423 3. Click Apply. Customizing Secure HotSpot To customize Secure HotSpot 1. C
Getting to Know Your Safe@Office 1000N Appliance 28 Check Point Safe@Office User Guide Rear Panel All physical connections (network and power) ar
Using NAT Rules 424 Check Point Safe@Office User Guide In this field… Do this… My HotSpot Terms Type the terms to which the user must agree befor
Using NAT Rules Chapter 13: Setting Your Security Policy 425 Using NAT Rules Overview In an IP network, each computer is assigned a unique IP ad
Using NAT Rules 426 Check Point Safe@Office User Guide Supported NAT Rule Types The Safe@Office appliance enables you to define the following typ
Using NAT Rules Chapter 13: Setting Your Security Policy 427 • Static NAT is configured for a network object (for information, see Using Network
Using NAT Rules 428 Check Point Safe@Office User Guide The Address Translation page appears. 2. Do one of the following: • To add a new rule,
Using NAT Rules Chapter 13: Setting Your Security Policy 429 The Address Translation wizard opens, with the Step 1 of 3: Original Connection Deta
Using NAT Rules 430 Check Point Safe@Office User Guide 6. Click Next. The Step 3 of 3: Save Address Translation dialog box appears. 7. If desi
Using NAT Rules Chapter 13: Setting Your Security Policy 431 Field Description And the destination is Select the original destination of the con
Using NAT Rules 432 Check Point Safe@Office User Guide Field Description Change the destination to Select the new destination to which the origi
Using the EAP Authenticator Chapter 13: Setting Your Security Policy 433 b. Click OK. The rule is deleted. Using the EAP Authenticator Wi-Fi Pr
Getting to Know Your Safe@Office 1000N Appliance Chapter 1: Introduction 29 Label Description RESET A button used for rebooting the Safe@Office
Using the EAP Authenticator 434 Check Point Safe@Office User Guide Workflows The Safe@Office built-in EAP authenticator can be used to authentica
Using the EAP Authenticator Chapter 13: Setting Your Security Policy 435 See Adding and Editing Users on page 680. e. Provide each of the users
Using the EAP Authenticator 436 Check Point Safe@Office User Guide instructions on generating a self-signed certificate, see Generating a Certifi
Using the EAP Authenticator Chapter 13: Setting Your Security Policy 437 • If the Choose a Wireless Network screen appears, click Change Advance
Using the EAP Authenticator 438 Check Point Safe@Office User Guide 7. In the Network name (SSID) field, type the Safe@Office appliance wireless
Using the EAP Authenticator Chapter 13: Setting Your Security Policy 439 The Protected EAP Properties dialog box appears. 14. Make sure that th
Using the EAP Authenticator 440 Check Point Safe@Office User Guide Configuring Clients for Server Authentication on Wired Connections To configu
Using the EAP Authenticator Chapter 13: Setting Your Security Policy 441 The Protected EAP Properties dialog box appears. 9. Make sure that the
Using the EAP Authenticator 442 Check Point Safe@Office User Guide Installing the Safe@Office Appliance's CA Certificate on Clients To inst
Using the EAP Authenticator Chapter 13: Setting Your Security Policy 443 The File to Import dialog box appears. 3. Browse to the Safe@Office ap
Getting to Know Your Safe@Office 1000N Appliance 30 Check Point Safe@Office User Guide Table 7: Safe@Office 1000N Appliance Status LEDs LED Stat
Using the EAP Authenticator 444 Check Point Safe@Office User Guide The Certificate Store dialog box appears. 6. Click Automatically select the
Using the EAP Authenticator Chapter 13: Setting Your Security Policy 445 If the Safe@Office appliance certificate was self-signed, a warning mess
Using the EAP Authenticator 446 Check Point Safe@Office User Guide d. Click Certificates. The Certificates dialog box appears. e. Click the Tru
Using the EAP Authenticator Chapter 13: Setting Your Security Policy 447 The Certificate dialog box appears with additional information. Connec
Using the EAP Authenticator 448 Check Point Safe@Office User Guide The Enter Credentials dialog box appears. 6. Type the Network Access user&a
Overview Chapter 14: Using SmartDefense 449 Chapter 14 This chapter explains how to use Check Point SmartDefense Services. This chapter includes
Configuring SmartDefense 450 Check Point Safe@Office User Guide Configuring SmartDefense You can configure SmartDefense using the following to
Configuring SmartDefense Chapter 14: Using SmartDefense 451 The SmartDefense page appears. 2. Click SmartDefense Wizard.
Configuring SmartDefense 452 Check Point Safe@Office User Guide The SmartDefense Wizard opens, with the Step 1: SmartDefense Level dialog box dis
Configuring SmartDefense Chapter 14: Using SmartDefense 453 5. Select the check boxes next to the types of public servers that are running on yo
Getting to Know Your Safe@Office 1000N ADSL Appliance Chapter 1: Introduction 31 1000Mbps Off, LINK/ACT Flashing (Green) 10 Mbps link establishe
Configuring SmartDefense 454 Check Point Safe@Office User Guide The Step 4: Confirmation dialog box appears. 9. Click Finish. Existing SmartDef
Configuring SmartDefense Chapter 14: Using SmartDefense 455 Table 79: SmartDefense Security Levels This level… Does this… Minimal Disables all
Configuring SmartDefense 456 Check Point Safe@Office User Guide Using the SmartDefense Tree For convenience, SmartDefense is organized as a tree
Configuring SmartDefense Chapter 14: Using SmartDefense 457 To configure a SmartDefense node 1. Click Security in the main menu, and click the
SmartDefense Categories 458 Check Point Safe@Office User Guide a) Click Default. A confirmation message appears. b) Click OK. The fields are re
SmartDefense Categories Chapter 14: Using SmartDefense 459 • Ping of Death on page 460 • Teardrop on page 459 Teardrop In a Teardrop attack, t
SmartDefense Categories 460 Check Point Safe@Office User Guide Ping of Death In a Ping of Death attack, the attacker sends a fragmented PING requ
SmartDefense Categories Chapter 14: Using SmartDefense 461 LAND In a LAND attack, the attacker sends a SYN packet, in which the source address an
SmartDefense Categories 462 Check Point Safe@Office User Guide Non-TCP Flooding Advanced firewalls maintain state information about connections i
SmartDefense Categories Chapter 14: Using SmartDefense 463 In this field… Do this… Max. Percent Non-TCP Traffic Type the maximum percentage of st
Getting to Know Your Safe@Office 1000N ADSL Appliance 32 Check Point Safe@Office User Guide Getting to Know Your Safe@Office 1000N ADSL Appliance
SmartDefense Categories 464 Check Point Safe@Office User Guide Table 84: Distributed Denial of Service Fields In this field… Do this… Action Spe
SmartDefense Categories Chapter 14: Using SmartDefense 465 Packet Sanity Packet Sanity performs several Layer 3 and Layer 4 sanity checks. These
SmartDefense Categories 466 Check Point Safe@Office User Guide In this field… Do this… Disable relaxed UDP length verification The UDP length ver
SmartDefense Categories Chapter 14: Using SmartDefense 467 Max Ping Size PING (ICMP echo request) is a program that uses ICMP protocol to check w
SmartDefense Categories 468 Check Point Safe@Office User Guide IP Fragments When an IP packet is too big to be transported by a network link, it
SmartDefense Categories Chapter 14: Using SmartDefense 469 Table 87: IP Fragments Fields In this field… Do this… Forbid IP Fragments Specify whe
SmartDefense Categories 470 Check Point Safe@Office User Guide Network Quota An attacker may try to overload a server in your network by establis
SmartDefense Categories Chapter 14: Using SmartDefense 471 In this field… Do this… Max. Connections/Second from Same Source IP Type the maximum n
SmartDefense Categories 472 Check Point Safe@Office User Guide Table 89: Welchia Fields In this field… Do this… Action Specify what action to ta
SmartDefense Categories Chapter 14: Using SmartDefense 473 Table 90: Cisco IOS DOS In this field… Do this… Action Specify what action to take w
Getting to Know Your Safe@Office 1000N ADSL Appliance Chapter 1: Introduction 33 • If desired, you can connect your appliance to an external bro
SmartDefense Categories 474 Check Point Safe@Office User Guide Null Payload Some worms, such as Sasser, use ICMP echo request packets with null p
SmartDefense Categories Chapter 14: Using SmartDefense 475 Checksum Verification SmartDefense identifies any IP, TCP, or UDP packets with incorre
SmartDefense Categories 476 Check Point Safe@Office User Guide TCP This category allows you to configure various protections related to the TCP p
SmartDefense Categories Chapter 14: Using SmartDefense 477 Table 93: Strict TCP In this field… Do this… Action Specify what action to take when
SmartDefense Categories 478 Check Point Safe@Office User Guide Table 94: Small PMTU Fields In this field… Do this… Action Specify what action t
SmartDefense Categories Chapter 14: Using SmartDefense 479 SynDefender In a SYN attack, the attacker sends many SYN packets without finishing the
SmartDefense Categories 480 Check Point Safe@Office User Guide In this field… Do this… Log mode Specify upon which events logs should be issued,
SmartDefense Categories Chapter 14: Using SmartDefense 481 Sequence Verifier The Safe@Office appliance examines each TCP packet's sequence n
SmartDefense Categories 482 Check Point Safe@Office User Guide Flags The URG flag is used to indicate that there is urgent data in the TCP stream
SmartDefense Categories Chapter 14: Using SmartDefense 483 Port Scan An attacker can perform a port scan to determine whether ports are open and
Do not expose the appliance to extreme high or low temperatures. Do not disassemble or open the appliance. Failure to comply will void the war
Getting to Know Your Safe@Office 1000N ADSL Appliance 34 Check Point Safe@Office User Guide Label Description DSL An RJ-11 ADSL port used for co
SmartDefense Categories 484 Check Point Safe@Office User Guide Table 98: Port Scan Fields In this field… Do this… Number of ports accessed Smart
SmartDefense Categories Chapter 14: Using SmartDefense 485 In this field… Do this… Track Specify whether to issue logs for scans, by selecting o
SmartDefense Categories 486 Check Point Safe@Office User Guide FTP Bounce When connecting to an FTP server, the client sends a PORT command speci
SmartDefense Categories Chapter 14: Using SmartDefense 487 Block Known Ports You can choose to block the FTP server from connecting to well-known
SmartDefense Categories 488 Check Point Safe@Office User Guide Block Port Overflow FTP clients send PORT commands when connecting to the FTP seve
SmartDefense Categories Chapter 14: Using SmartDefense 489 Blocked FTP Commands Some seldom-used FTP commands may compromise FTP server security
SmartDefense Categories 490 Check Point Safe@Office User Guide To allow a specific FTP command 1. In the Blocked Commands box, select the desire
SmartDefense Categories Chapter 14: Using SmartDefense 491 Table 102: Header Rejection Fields In this field… Do this… Action Specify what action
SmartDefense Categories 492 Check Point Safe@Office User Guide Table 103: Worm Catcher Fields In this field… Do this… Action Specify what action
SmartDefense Categories Chapter 14: Using SmartDefense 493 Table 104: File Print and Sharing Fields In this field… Do this… Action Specify what
Getting to Know Your Safe@Office 1000N ADSL Appliance Chapter 1: Introduction 35 Side Panel The side panel includes a slot for inserting an Expre
SmartDefense Categories 494 Check Point Safe@Office User Guide IGMP This category includes the IGMP protocol. IGMP is used by hosts and routers t
SmartDefense Categories Chapter 14: Using SmartDefense 495 In this field… Do this… Specify whether to allow or block IGMP packets that are sent t
SmartDefense Categories 496 Check Point Safe@Office User Guide SIP The SmartDefense SIP Application Level Gateway (ALG) processes the SIP protoco
SmartDefense Categories Chapter 14: Using SmartDefense 497 H.323 H.323 telephony is used by various devices and applications, such as Microsoft N
SmartDefense Categories 498 Check Point Safe@Office User Guide Peer-to-Peer SmartDefense can block peer-to-peer file-sharing traffic, by identify
SmartDefense Categories Chapter 14: Using SmartDefense 499 Table 108: Peer to Peer Fields In this field… Do this… Action Specify what action to
SmartDefense Categories 500 Check Point Safe@Office User Guide Instant Messaging Traffic SmartDefense can block instant messaging applications th
SmartDefense Categories Chapter 14: Using SmartDefense 501 Table 109: Instant Messengers Fields In this field… Do this… Action Specify what acti
SmartDefense Categories 502 Check Point Safe@Office User Guide Games This category includes XBox LIVE. XBox 360 requires gateways hosting XBox LI
Resetting SmartDefense to its Defaults Chapter 14: Using SmartDefense 503 Resetting SmartDefense to its Defaults If desired, you can reset the S
Getting to Know Your Safe@Office 1000N ADSL Appliance 36 Check Point Safe@Office User Guide Flashing quickly (Red) High temperature or system f
Overview Chapter 15: Using Antivirus and Antispam Filtering 505 Chapter 15 This chapter explains how to use antivirus and antispam filtering. Thi
Overview 506 Check Point Safe@Office User Guide VStream Antivirus Email Antivirus Point of Enforcement VStream Antivirus scans for viruses in t
Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 507 Using VStream Antivirus The Safe@Office appliance includes VStr
Using VStream Antivirus 508 Check Point Safe@Office User Guide If a virus if found in this protocol... VStream Antivirus does this... The protoco
Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 509 Enabling/Disabling VStream Antivirus To enable/disable VStream An
Using VStream Antivirus 510 Check Point Safe@Office User Guide Viewing VStream Antivirus Signature Database Information VStream Antivirus mainta
Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 511 Configuring the VStream Antivirus Policy VStream Antivirus includ
Using VStream Antivirus 512 Check Point Safe@Office User Guide The Safe@Office appliance will process rule 1 first, passing outgoing SMTP traffic
Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 513 The Antivirus Policy page appears. 2. Do one of the following: •
Getting to Know Your Safe@Office 1000N ADSL Appliance Chapter 1: Introduction 37 1000Mbps On (Green), LINK/ACT Flashing (Green) 1000 Mbps link e
Using VStream Antivirus 514 Check Point Safe@Office User Guide The VStream Policy Rule Wizard opens, with the Step 1: Rule Type dialog box displa
Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 515 5. Complete the fields using the relevant information in the foll
Using VStream Antivirus 516 Check Point Safe@Office User Guide 8. Complete the fields using the relevant information in the following table. 9.
Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 517 In this field… Do this… Custom Service Click this option to speci
Using VStream Antivirus 518 Check Point Safe@Office User Guide In this field… Do this… Data Direction Select the direction of connections to whi
Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 519 Enabling/Disabling VStream Antivirus Rules You can temporarily di
Using VStream Antivirus 520 Check Point Safe@Office User Guide Viewing and Deleting VStream Antivirus Rules To view or delete an existing VStrea
Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 521 The Advanced Antivirus Settings page appears. 2. Complete the fi
Using VStream Antivirus 522 Check Point Safe@Office User Guide Table 117: Advanced Antivirus Settings Fields In this field… Do this… File Types
Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 523 In this field… Do this… • WMA/WMV/ASF • RealMedia file • JPEG
Getting to Know Your Safe@Office 1000NW Appliance 38 Check Point Safe@Office User Guide Getting to Know Your Safe@Office 1000NW Appliance Packa
Using VStream Antivirus 524 Check Point Safe@Office User Guide In this field… Do this… When archived file exceeds limit or extraction fails Speci
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 525 Updating VStream Antivirus When you are subscribed to the VStream
Using VStream Antispam 526 Check Point Safe@Office User Guide attacks on your gateway or mail server. If you do not have a mail server in your ne
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 527 IP Reputation Content Based Antispam and Block List Detection Met
Using VStream Antispam 528 Check Point Safe@Office User Guide How VStream Antispam Works VStream Antispam works as follows: 1. A TCP connection
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 529 If the spam score exceeds the configured confidence level, VStre
Using VStream Antispam 530 Check Point Safe@Office User Guide Header Marking VStream Antispam adds the following headers to each email that is sc
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 531 Enabling/Disabling VStream Antispam You must enable at least one V
Using VStream Antispam 532 Check Point Safe@Office User Guide Table 119: VStream Antispam Fields In this field… Do this… Content Based Antispam
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 533 In this field… Do this… IP Reputation Checking Specify the IP Reput
Getting to Know Your Safe@Office 1000NW Appliance Chapter 1: Introduction 39 Rear Panel All physical connections (network and power) are made via
Using VStream Antispam 534 Check Point Safe@Office User Guide This field… Displays... Spam The number of SMTP and POP3 email messages that the C
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 535 Configuring the Content Based Antispam Engine You can configure ho
Using VStream Antispam 536 Check Point Safe@Office User Guide 4. Click Apply. Table 121: Content Based Antispam Settings Fields In this field… D
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 537 In this field… Do this… Track Specify whether VStream Antispam sho
Using VStream Antispam 538 Check Point Safe@Office User Guide In this field… Do this… Money the Easy Way". The default value is [SUSPECTED S
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 539 Configuring the Block List Engine You can configure a list of emai
Using VStream Antispam 540 Check Point Safe@Office User Guide The Blocked Sender List page appears. 3. Click Add. The Add Email to List dialog
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 541 5. Click OK. The sender appears in the Block Sender List table. V
Using VStream Antispam 542 Check Point Safe@Office User Guide The Antispam Block List Settings page appears. 3. Complete the fields using the i
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 543 Table 122: Antispam Block List Settings Fields In this field… Do th
Getting to Know Your Safe@Office 1000NW Appliance 40 Check Point Safe@Office User Guide Label Description Internet. Serial A serial (RS-232) por
Using VStream Antispam 544 Check Point Safe@Office User Guide Configuring the IP Reputation Engine You can configure how VStream Antispam should
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 545 4. Click Apply. Table 123: Antispam IP Reputation Settings Fields
Using VStream Antispam 546 Check Point Safe@Office User Guide In this field… Do this… Action Specify the action VStream Antispam should take upo
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 547 Configuring the VStream Antispam Policy VStream Antispam includes
Using VStream Antispam 548 Check Point Safe@Office User Guide The Safe@Office appliance will process rule 1 first, passing outgoing SMTP traffic
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 549 The Antispam Policy page appears. 2. Do one of the following: •
Using VStream Antispam 550 Check Point Safe@Office User Guide The VStream Antispam Policy Rule Wizard opens, with the Step 1: Rule Type dialog bo
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 551 6. Click Next. The Step 3: Done dialog box appears. 7. If desire
Using VStream Antispam 552 Check Point Safe@Office User Guide In this field… Do this… The connection source is Select the source of the connectio
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 553 Enabling/Disabling VStream Antispam Rules You can temporarily disa
Getting to Know Your Safe@Office 1000NW Appliance Chapter 1: Introduction 41 Front Panel The Safe@Office 1000NW appliance includes several status
Using VStream Antispam 554 Check Point Safe@Office User Guide Viewing and Deleting VStream Antispam Rules To view or delete an existing VStream
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 555 The Safe Sender List page appears. 2. Click Add. The Add Email to
Using VStream Antispam 556 Check Point Safe@Office User Guide 4. Click OK. The sender appears in the Safe Senders table. Viewing and Deleting S
Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 557 Configuring VStream Antispam Advanced Settings To configure VStrea
Using Centralized Email Filtering 558 Check Point Safe@Office User Guide • To specify that VStream Antivirus should not log email sent by addres
Using Centralized Email Filtering Chapter 15: Using Antivirus and Antispam Filtering 559 Enabling/Disabling Email Filtering To enable/disable Em
Using Centralized Email Filtering 560 Check Point Safe@Office User Guide Selecting Protocols for Scanning If you are locally managed, you can de
Using Centralized Email Filtering Chapter 15: Using Antivirus and Antispam Filtering 561 2. Next to the Bypass scanning if Service Center is una
Using Centralized Email Filtering 562 Check Point Safe@Office User Guide • The Snooze button changes to Resume. • The Email Filtering Off popu
Using Centralized Email Filtering Chapter 15: Using Antivirus and Antispam Filtering 563
Getting to Know Your Safe@Office 1000NW Appliance 42 Check Point Safe@Office User Guide Flashing quickly (Green) System boot in progress Flash
Overview Chapter 16: Using Web Content Filtering 565 Chapter 16 This chapter explains how to use Web content filtering. This chapter includes the
Overview 566 Check Point Safe@Office User Guide Web Rules Web Filtering Subscription and Connection Requirement Web rules are included with the
Using Web Rules Chapter 16: Using Web Content Filtering 567 Using Web Rules You can block or allow access to specific Web pages, by defining Web
Using Web Rules 568 Check Point Safe@Office User Guide The Safe@Office appliance will process rule 1 first, allowing access to the desired page,
Using Web Rules Chapter 16: Using Web Content Filtering 569 The Web Rules page appears. 2. Do one of the following: • To add a new rule, click
Using Web Rules 570 Check Point Safe@Office User Guide The Safe@Office Web Rule Wizard opens, with the Step 1: Rule Type dialog box displayed. 3
Using Web Rules Chapter 16: Using Web Content Filtering 571 The example below shows a Block rule. 5. To configure advanced settings, click Show
Using Web Rules 572 Check Point Safe@Office User Guide The Step 3: Confirm Rule dialog box appears. 8. Click Finish. The new rule appears in th
Using Web Rules Chapter 16: Using Web Content Filtering 573 In this field… Do this… Log allowed connections / Log blocked connections Select thi
Getting to Know Your Safe@Office 1000NW Appliance Chapter 1: Introduction 43 VPN Off No VPN tunnel established On (Green) VPN idle / No acti
Using Web Rules 574 Check Point Safe@Office User Guide Viewing and Deleting Web Rules To view or delete an existing Web rule 1. Click Security
Using Web Filtering Chapter 16: Using Web Content Filtering 575 Using Web Filtering When the Web Filtering service is enabled, access to Web con
Using Web Filtering 576 Check Point Safe@Office User Guide The Web Filtering page appears. 2. Drag the On/Off lever upwards or downwards. Web F
Using Web Filtering Chapter 16: Using Web Content Filtering 577 Selecting Categories for Blocking You can define which types of Web sites should
Using Web Filtering 578 Check Point Safe@Office User Guide 2. Next to the Bypass scanning if Service Center is unavailable option, specify how t
Using Web Filtering Chapter 16: Using Web Content Filtering 579 • The Snooze button changes to Resume. • The Web Filtering Off popup window op
Using Web Filtering 580 Check Point Safe@Office User Guide • The service is re-enabled for all internal network computers. • If you clicked Res
Using Web Filtering Chapter 16: Using Web Content Filtering 581 The Web Filtering Automatic Snooze Settings page appears. 3. Do one of the foll
Customizing the Access Denied Page 582 Check Point Safe@Office User Guide Resetting Web Filtering Categories to Defaults If desired, you can res
Customizing the Access Denied Page Chapter 16: Using Web Content Filtering 583 The Customize Access Denied Page page appears. In the following ex
Getting to Know Your Safe@Office 1000NW ADSL Appliance 44 Check Point Safe@Office User Guide Getting to Know Your Safe@Office 1000NW ADSL Applian
Overview Chapter 17: Updating the Firmware 585 Chapter 17 This chapter explains how to update the Safe@Office appliance's firmware. This cha
Using Software Updates 586 Check Point Safe@Office User Guide Using Software Updates Checking for Software Updates when Remotely Managed If you
Using Software Updates Chapter 17: Updating the Firmware 587 The system checks for new updates and installs them. Checking for Software Updates
Updating the Firmware Manually 588 Check Point Safe@Office User Guide Note: When the Software Updates service is set to Automatic, you can stil
Updating the Firmware Manually Chapter 17: Updating the Firmware 589 The Firmware Update page appears. 3. Click Browse. A browse window appea
Connecting to a Service Center Chapter 18: Using Subscription Services 591 Chapter 18 This chapter explains how to connect your Safe@Office appli
Connecting to a Service Center 592 Check Point Safe@Office User Guide The Account page appears. 2. In the Service Account area, click Connect.
Connecting to a Service Center Chapter 18: Using Subscription Services 593 The Safe@Office Services Wizard opens, with the Service Center dialog
Getting to Know Your Safe@Office 1000NW ADSL Appliance Chapter 1: Introduction 45 • A splitter with a micro-filter, installed on all the jacks c
Connecting to a Service Center 594 Check Point Safe@Office User Guide • If the Service Center requires authentication, the Service Center Login
Connecting to a Service Center Chapter 18: Using Subscription Services 595 6. Click Next. The Done screen appears with a success message. 7.
Connecting to a Service Center 596 Check Point Safe@Office User Guide • The services to which you are subscribed are now available on your Safe@
Viewing Services Information Chapter 18: Using Subscription Services 597 Viewing Services Information The Account page displays the following
Refreshing Your Service Center Connection 598 Check Point Safe@Office User Guide Refreshing Your Service Center Connection This option restarts
Configuring Your Account Chapter 18: Using Subscription Services 599 Configuring Your Account This option allows you to access your Service Cent
Disconnecting from Your Service Center 600 Check Point Safe@Office User Guide 4. Click Next. The Done screen appears with a success message. 5.
Overview Chapter 19: Working With VPNs 601 Chapter 19 This chapter describes how to use your Safe@Office appliance as a Remote Access VPN Client,
Overview 602 Check Point Safe@Office User Guide • SecuRemote Internal VPN Server. SecuRemote can also be used from your internal networks, allow
Overview Chapter 19: Working With VPNs 603 Site-to-Site VPNs A Site-to-Site VPN consists of two or more Site-to-Site VPN Gateways that can commun
Getting to Know Your Safe@Office 1000NW ADSL Appliance 46 Check Point Safe@Office User Guide Table 12: Safe@Office 1000NW ADSL Appliance Rear Pan
Overview 604 Check Point Safe@Office User Guide To create a Site-to-Site VPN with two VPN sites 1. On the first VPN site’s Safe@Office applianc
Overview Chapter 19: Working With VPNs 605 Remote Access VPNs A Remote Access VPN consists of one Remote Access VPN Server or Site-to-Site VPN Ga
Overview 606 Check Point Safe@Office User Guide To create a Remote Access VPN with two VPN sites 1. On the remote user VPN site's Safe@Off
Setting Up Your Safe@Office Appliance as a VPN Server Chapter 19: Working With VPNs 607 For information on setting up your Safe@Office appliance
Setting Up Your Safe@Office Appliance as a VPN Server 608 Check Point Safe@Office User Guide Note: The use of all Remote VPN Clients is subject
Setting Up Your Safe@Office Appliance as a VPN Server Chapter 19: Working With VPNs 609 See Setting Up Remote VPN Access for Users on page 687.
Setting Up Your Safe@Office Appliance as a VPN Server 610 Check Point Safe@Office User Guide 4. To allow authenticated users connecting from the
Setting Up Your Safe@Office Appliance as a VPN Server Chapter 19: Working With VPNs 611 Configuring the Endpoint Connect VPN Server To configure
Setting Up Your Safe@Office Appliance as a VPN Server 612 Check Point Safe@Office User Guide Configuring the L2TP VPN Server To configure the L2
Setting Up Your Safe@Office Appliance as a VPN Server Chapter 19: Working With VPNs 613 Installing SecuRemote If you configured the SecuRemote I
Getting to Know Your Safe@Office 1000NW ADSL Appliance Chapter 1: Introduction 47 Label Description firmware to the version that shipped with the
Setting Up Your Safe@Office Appliance as a VPN Server 614 Check Point Safe@Office User Guide 3. Follow the online instructions to complete insta
Setting Up Your Safe@Office Appliance as a VPN Server Chapter 19: Working With VPNs 615 The New Connection Wizard opens displaying the Welcome to
Setting Up Your Safe@Office Appliance as a VPN Server 616 Check Point Safe@Office User Guide 7. The Network Connection dialog box appears. 8.
Setting Up Your Safe@Office Appliance as a VPN Server Chapter 19: Working With VPNs 617 The Public Network dialog box appears. 12. Choose Do no
Setting Up Your Safe@Office Appliance as a VPN Server 618 Check Point Safe@Office User Guide The Completing the New Connection Wizard screen appe
Setting Up Your Safe@Office Appliance as a VPN Server Chapter 19: Working With VPNs 619 The Advanced Security Settings dialog box opens. 19. In
Setting Up Your Safe@Office Appliance as a VPN Server 620 Check Point Safe@Office User Guide 28. In the Type of VPN drop-down list, select L2TP
Adding and Editing VPN Sites Chapter 19: Working With VPNs 621 Adding and Editing VPN Sites To add or edit VPN sites 1. Click VPN in the main
Adding and Editing VPN Sites 622 Check Point Safe@Office User Guide The Safe@Office VPN Site Wizard opens, with the Welcome to the VPN Site Wizar
Adding and Editing VPN Sites Chapter 19: Working With VPNs 623 Configuring a Remote Access VPN Site If you selected Remote Access VPN, the VPN Ga
Getting to Know Your Safe@Office 1000NW ADSL Appliance 48 Check Point Safe@Office User Guide Front Panel The Safe@Office 1000NW ADSL appliance in
Adding and Editing VPN Sites 624 Check Point Safe@Office User Guide The VPN Network Configuration dialog box appears. 4. Specify how you want t
Adding and Editing VPN Sites Chapter 19: Working With VPNs 625 • If you chose Specify Configuration, a second VPN Network Configuration dialog b
Adding and Editing VPN Sites 626 Check Point Safe@Office User Guide In the Backup Gateway IP field, type the name of the VPN site to use if the p
Adding and Editing VPN Sites Chapter 19: Working With VPNs 627 Username and Password Authentication Method If you selected Username and Password,
Adding and Editing VPN Sites 628 Check Point Safe@Office User Guide Do the following: 1) To try to connect to the Remote Access VPN Server, sele
Adding and Editing VPN Sites Chapter 19: Working With VPNs 629 The VPN Site Created screen appears. 5. Click Finish. The VPN Sites page reappea
Adding and Editing VPN Sites 630 Check Point Safe@Office User Guide Certificate Authentication Method If you selected Certificate, the Connect di
Adding and Editing VPN Sites Chapter 19: Working With VPNs 631 The Site Name dialog box appears. 3. Enter a name for the VPN site. You may cho
Adding and Editing VPN Sites 632 Check Point Safe@Office User Guide 5. Click Finish. The VPN Sites page reappears. If you added a VPN site, the
Adding and Editing VPN Sites Chapter 19: Working With VPNs 633 The VPN Site Created screen appears. 3. Click Finish. The VPN Sites page reappea
Getting to Know Your Safe@Office 1000NW ADSL Appliance Chapter 1: Introduction 49 GbE Status (LAN 1-4 / DMZ/WAN2) 1000Mbps Off, LINK/ACT Off No
Adding and Editing VPN Sites 634 Check Point Safe@Office User Guide In this field… Do this… Specify Configuration Click this option to provide th
Adding and Editing VPN Sites Chapter 19: Working With VPNs 635 In this field… Do this… Subnet mask Select the subnet masks for the destination n
Adding and Editing VPN Sites 636 Check Point Safe@Office User Guide In this field… Do this… the appropriate user name and password have been ente
Adding and Editing VPN Sites Chapter 19: Working With VPNs 637 1. Complete the fields using the information in VPN Gateway Address Fields on pag
Adding and Editing VPN Sites 638 Check Point Safe@Office User Guide • If you chose Specify Configuration, a second VPN Network Configuration dia
Adding and Editing VPN Sites Chapter 19: Working With VPNs 639 In the Backup Gateway IP field, type the name of the VPN site to use if the primar
Adding and Editing VPN Sites 640 Check Point Safe@Office User Guide 5. Complete the fields using the information in Authentication Methods Field
Adding and Editing VPN Sites Chapter 19: Working With VPNs 641 Shared Secret Authentication Method If you selected Shared Secret, the Authenticat
Adding and Editing VPN Sites 642 Check Point Safe@Office User Guide The Security Methods dialog box appears. 2. To configure advanced security
Adding and Editing VPN Sites Chapter 19: Working With VPNs 643 The Connect dialog box appears. 4. To try to connect to the Remote Access VPN Se
Getting to Know Your Safe@Office 1000NW ADSL Appliance 50 Check Point Safe@Office User Guide VPN Off No VPN tunnel established On (Green) VP
Adding and Editing VPN Sites 644 Check Point Safe@Office User Guide • The Site Name dialog box appears. 6. Type a name for the VPN site. You
Adding and Editing VPN Sites Chapter 19: Working With VPNs 645 • If you selected Keep this site alive, and previously you chose Download Configu
Adding and Editing VPN Sites 646 Check Point Safe@Office User Guide Certificate Authentication Method If you selected Certificate, the following
Adding and Editing VPN Sites Chapter 19: Working With VPNs 647 1. To configure advanced security settings, click Show Advanced Settings. New fie
Adding and Editing VPN Sites 648 Check Point Safe@Office User Guide 3. To try to connect to the Remote Access VPN Server, select the Try to Conn
Adding and Editing VPN Sites Chapter 19: Working With VPNs 649 • If you selected Keep this site alive, and previously you chose Download Configu
Adding and Editing VPN Sites 650 Check Point Safe@Office User Guide Table 133: VPN Gateway Address Fields In this field… Do this… Gateway Address
Adding and Editing VPN Sites Chapter 19: Working With VPNs 651 Table 135: Authentication Methods Fields In this field… Do this… Shared Secret Se
Adding and Editing VPN Sites 652 Check Point Safe@Office User Guide Table 137: Security Methods Fields In this field… Do this… Phase 1 Security
Adding and Editing VPN Sites Chapter 19: Working With VPNs 653 In this field… Do this… Perfect Forward Secrecy Specify whether to enable Perfect
Getting to Know Your Safe@Office 500 Appliance Chapter 1: Introduction 51 Getting to Know Your Safe@Office 500 Appliance Package Contents The S
Viewing and Deleting VPN Sites 654 Check Point Safe@Office User Guide Viewing and Deleting VPN Sites To view or delete a VPN site 1. Click VPN
Logging in to a Remote Access VPN Site Chapter 19: Working With VPNs 655 Note: Disabling a VPN site eliminates the tunnel and erases the netwo
Logging in to a Remote Access VPN Site 656 Check Point Safe@Office User Guide Logging in through the Safe@Office Portal Note: You can only log
Logging in to a Remote Access VPN Site Chapter 19: Working With VPNs 657 Logging in through the my.vpn page To manually log in to a VPN site thr
Logging Out of a Remote Access VPN Site 658 Check Point Safe@Office User Guide • Once the Safe@Office appliance has finished connecting, the Sta
Using Certificates Chapter 19: Working With VPNs 659 Safe@Office VPN Server for the first time, the entity should check that the VPN peer's
Using Certificates 660 Check Point Safe@Office User Guide Generating a Self-Signed Certificate To generate a self-signed certificate 1. Click V
Using Certificates Chapter 19: Working With VPNs 661 The Safe@Office Certificate Wizard opens, with the Certificate Wizard dialog box displayed.
Using Certificates 662 Check Point Safe@Office User Guide The Safe@Office appliance generates the certificate. This may take a few seconds. The
Using Certificates Chapter 19: Working With VPNs 663 • The starting and ending dates between which the gateway's certificate and the CA&apo
Getting to Know Your Safe@Office 500 Appliance 52 Check Point Safe@Office User Guide The following table lists the Safe@Office 500 appliance&apo
Using Certificates 664 Check Point Safe@Office User Guide Table 138: Certificate Fields In this field… Do this… Country Select your country fro
Using Certificates Chapter 19: Working With VPNs 665 The Import Certificate dialog box appears. 4. Click Browse to open a file browser from whi
Using Certificates 666 Check Point Safe@Office User Guide 6. Type the pass-phrase you received from the network security administrator. 7. Clic
Using Certificates Chapter 19: Working With VPNs 667 Uninstalling a Certificate If you uninstall the certificate, no certificate will exist on t
Using Certificates 668 Check Point Safe@Office User Guide Exporting Certificates The Safe@Office appliance allows you to export the following ce
Using Certificates Chapter 19: Working With VPNs 669 The certificate is exported as a *.p12 file and saved to the specified directory. Note: T
Viewing VPN Tunnels 670 Check Point Safe@Office User Guide Viewing VPN Tunnels You can view a list of currently established VPN tunnels. VPN tun
Viewing VPN Tunnels Chapter 19: Working With VPNs 671 The VPN Tunnels page appears with a table of open VPN tunnels. The VPN Tunnels page inclu
Viewing VPN Tunnels 672 Check Point Safe@Office User Guide This field… Displays… Destination The IP address or address range of the entity to wh
Viewing IKE Traces for VPN Connections Chapter 19: Working With VPNs 673 This icon… Represents… A network for which an IKE Phase-2 tunnel was n
Getting to Know Your Safe@Office 500 Appliance Chapter 1: Introduction 53 Label Description WAN Wide Area Network: An Ethernet port (RJ-45) used
Viewing VPN Topology 674 Check Point Safe@Office User Guide To view the IKE trace for a connection 1. Establish a VPN tunnel to the VPN site wit
Viewing VPN Topology Chapter 19: Working With VPNs 675 The VPN Topology page appears displaying a tree of VPN sites to which the appliance is con
Viewing VPN Topology 676 Check Point Safe@Office User Guide Table 141: VPN Topology Page Fields This field… Displays… Split DNS The VPN site&apo
Changing Your Login Credentials Chapter 20: Managing Users 677 Chapter 20 This chapter describes how to manage Safe@Office appliance users. You c
Changing Your Login Credentials 678 Check Point Safe@Office User Guide The Internal Users page appears. 2. In the row of your username, click E
Changing Your Login Credentials Chapter 20: Managing Users 679 The Account Wizard opens displaying the Set User Details dialog box. 3. Edit the
Adding and Editing Users 680 Check Point Safe@Office User Guide The Set User Permissions dialog box appears. 6. Click Finish. Your changes are
Adding and Editing Users Chapter 20: Managing Users 681 The Account Wizard opens displaying the Set User Details dialog box. 3. Complete the fi
Adding and Editing Users 682 Check Point Safe@Office User Guide The options that appear on the page are dependant on the software and services yo
Adding and Editing Users Chapter 20: Managing Users 683 Table 143: Set User Permissions Fields In this field... Do this... Administrator Level
Contents Contents i Contents About This Guide ...
Getting to Know Your Safe@Office 500 ADSL Appliance 54 Check Point Safe@Office User Guide LED State Explanation Flashing (Red) Hacker attack bl
Adding Quick Guest HotSpot Users 684 Check Point Safe@Office User Guide Remote Desktop Access Select this option to allow the user to log in to t
Adding Quick Guest HotSpot Users Chapter 20: Managing Users 685 Adding Quick Guest HotSpot Users The Safe@Office appliance provides a shortcut f
Viewing and Deleting Users 686 Check Point Safe@Office User Guide The Account Wizard opens displaying the Save Quick Guest dialog box. 3. In th
Setting Up Remote VPN Access for Users Chapter 20: Managing Users 687 a) In the desired user’s row, click . A confirmation message appears. b)
Using RADIUS Authentication 688 Check Point Safe@Office User Guide Using RADIUS Authentication You can use Remote Authentication Dial-In User Se
Using RADIUS Authentication Chapter 20: Managing Users 689 to analyze RADIUS accounting data and generate performance reports for Secure HotSpot
Using RADIUS Authentication 690 Check Point Safe@Office User Guide 2. Complete the fields using the following table. 3. Click Apply. 4. To res
Using RADIUS Authentication Chapter 20: Managing Users 691 In this field… Do this… Realm If your organization uses RADIUS realms, type the realm
Using RADIUS Authentication 692 Check Point Safe@Office User Guide In this field… Do this… Administrator Level Select the level of access to th
Using RADIUS Authentication Chapter 20: Managing Users 693 In this field… Do this… Remote Desktop Access Select this option to allow all users au
Getting to Know Your Safe@Office 500 ADSL Appliance Chapter 1: Introduction 55 Getting to Know Your Safe@Office 500 ADSL Appliance Package Cont
Configuring RADIUS Attributes 694 Check Point Safe@Office User Guide Configuring RADIUS Attributes To configure a timeout for Secure HotSpot ses
Configuring RADIUS Attributes Chapter 20: Managing Users 695 Table 145: VSA Syntax Permission Description Attribute Number Attribute Format Att
Configuring RADIUS Attributes 696 Check Point Safe@Office User Guide Permission Description Attribute Number Attribute Format Attribute Values
Configuring RADIUS Attributes Chapter 20: Managing Users 697 Permission Description Attribute Number Attribute Format Attribute Values Notes
Overview Chapter 21: Using Remote Desktop 699 Chapter 21 This chapter describes how to remotely access the desktop of each of your computers, usi
Workflow 700 Check Point Safe@Office User Guide Workflow To use Remote Desktop 1. Configure Remote Desktop. See Configuring Remote Desktop on p
Configuring Remote Desktop Chapter 21: Using Remote Desktop 701 Configuring Remote Desktop To configure Remote Desktop 1. Click Setup in the ma
Configuring Remote Desktop 702 Check Point Safe@Office User Guide New fields appear. • To disable Remote Desktop, clear the Allow remote deskto
Configuring Remote Desktop Chapter 21: Using Remote Desktop 703 Table 146: Remote Desktop Options In this field… Do this… Sharing Share local
Getting to Know Your Safe@Office 500 ADSL Appliance 56 Check Point Safe@Office User Guide • If desired, you can connect your appliance to an ext
Configuring the Host Computer 704 Check Point Safe@Office User Guide Configuring the Host Computer To enable remote users to connect to a compute
Configuring the Host Computer Chapter 21: Using Remote Desktop 705 The Remote tab appears. 5. Select the Allow users to connect remotely to thi
Configuring the Host Computer 706 Check Point Safe@Office User Guide The Select Users dialog box appears. b. Type the desired user's usern
Accessing a Remote Computer's Desktop Chapter 21: Using Remote Desktop 707 Accessing a Remote Computer's Desktop Note: The client co
Accessing a Remote Computer's Desktop 708 Check Point Safe@Office User Guide • The Remote Desktop Connection Security Warning dialog box ap
Accessing a Remote Computer's Desktop Chapter 21: Using Remote Desktop 709 You can use the following keyboard shortcuts during the Remote D
Overview Chapter 22: Controlling the Appliance via the Command Line 711 Chapter 22 This chapter describes various ways of controlling your Safe@O
Using the Safe@Office Portal 712 Check Point Safe@Office User Guide Using the Safe@Office Portal You can control your appliance via the Safe@Off
Using the Safe@Office Portal Chapter 22: Controlling the Appliance via the Command Line 713 The Command Line page appears. 3. In the upper fiel
Getting to Know Your Safe@Office 500 ADSL Appliance Chapter 1: Introduction 57 Label Description Serial An RJ-45 serial (RS-232) port used for c
Using the Serial Console 714 Check Point Safe@Office User Guide Using the Serial Console You can connect a console to the Safe@Office applianc
Using the Serial Console Chapter 22: Controlling the Appliance via the Command Line 715 The Ports page appears. 3. Next to the Serial port, cli
Using the Serial Console 716 Check Point Safe@Office User Guide The Port Setup page appears. 4. In the Assign to drop-down list, select Console
Configuring SSH Chapter 22: Controlling the Appliance via the Command Line 717 Configuring SSH Safe@Office appliance users can control the appli
Configuring SSH 718 Check Point Safe@Office User Guide If you selected Internal Networks + IP Range, additional fields appear. 3. If you select
Configuring SSH Chapter 22: Controlling the Appliance via the Command Line 719 Table 148: SSH Access Options Select this option… To allow access
Viewing Firmware Status 720 Check Point Safe@Office User Guide Chapter 23 This chapter describes the tasks required for maintenance and diagnosis
Viewing Firmware Status Chapter 23: Maintenance 721 The Firmware page appears. The Firmware page displays the following information: Table 149:
Upgrading Your Software Product 722 Check Point Safe@Office User Guide This field… Displays… For example… Uptime The time that elapsed from the
Upgrading Your Software Product Chapter 23: Maintenance 723 The Safe@Office Licensing Wizard opens, with the Install Product Key dialog box displ
Getting to Know Your Safe@Office 500 ADSL Appliance 58 Check Point Safe@Office User Guide Front Panel The Safe@Office 500 ADSL appliance includes
Configuring a Gateway Hostname 724 Check Point Safe@Office User Guide 6. Click Finish. Configuring a Gateway Hostname You can define a gateway
Configuring Syslog Logging Chapter 23: Maintenance 725 The Gateway Name page appears. 3. In the Gateway Name field, type the desired hostname.
Configuring Syslog Logging 726 Check Point Safe@Office User Guide Configuring Syslog Logging You can configure the Safe@Office appliance to send
Configuring Syslog Logging Chapter 23: Maintenance 727 The Logging page appears. 2. Complete the fields using the information in the following
Configuring HTTPS 728 Check Point Safe@Office User Guide Configuring HTTPS You can enable Safe@Office appliance users to access the Safe@Office
Configuring HTTPS Chapter 23: Maintenance 729 2. Specify from where HTTPS access to the Safe@Office Portal should be granted. See Access Option
Configuring SNMP 730 Check Point Safe@Office User Guide Table 151: Access Options Select this option… To allow access from… Internal Networks T
Configuring SNMP Chapter 23: Maintenance 731 • IP-MIB All SNMP access is read-only. Note: Configuring SNMP is equivalent to creating a simple
Configuring SNMP 732 Check Point Safe@Office User Guide 3. If you selected Internal Networks + IP Range, enter the desired IP address range in t
Configuring SNMP Chapter 23: Maintenance 733 If you selected the Send SNMP Traps check box, additional fields appear. 6. Click Apply. The SNMP
Getting to Know Your Safe@Office 500 ADSL Appliance Chapter 1: Introduction 59 LED State Explanation LINK/ACT On, 100 On 100 Mbps link establis
Setting the Time on the Appliance 734 Check Point Safe@Office User Guide In this field... Do this… SNMP Port Type the port to use for SNMP. The
Setting the Time on the Appliance Chapter 23: Maintenance 735 Setting the Time on the Appliance You set the time displayed in the Safe@Office Po
Setting the Time on the Appliance 736 Check Point Safe@Office User Guide The following things happen in the order below: • If you selected Speci
Setting the Time on the Appliance Chapter 23: Maintenance 737 • The Date and Time Updated screen appears. 5. Click Finish. Table 153: Set Tim
Using Diagnostic Tools 738 Check Point Safe@Office User Guide Table 154: Time Servers Fields In this field… Do this… Primary Server Type the IP
Using Diagnostic Tools Chapter 23: Maintenance 739 Use this tool… To do this… For information, see... Packet Sniffer Capture network traffic. Th
Using Diagnostic Tools 740 Check Point Safe@Office User Guide The IP Tools window opens and displays a list of routers used to make the connectio
Using Diagnostic Tools Chapter 23: Maintenance 741 Table 156: IP Tools Fields In this field… Do this… Tool Select the desired tool. Source Addre
Using Diagnostic Tools 742 Check Point Safe@Office User Guide direction will be indicated by i (input) or o (output). To use Packet Sniffer 1. C
Using Diagnostic Tools Chapter 23: Maintenance 743 7. Browse to a destination directory of your choice. 8. Type a name for the configuration fi
Getting to Know Your Safe@Office 500W Appliance 60 Check Point Safe@Office User Guide Getting to Know Your Safe@Office 500W Appliance Package
Using Diagnostic Tools 744 Check Point Safe@Office User Guide Filter String Syntax The following represents a list of basic filter string element
Using Diagnostic Tools Chapter 23: Maintenance 745 EXAMPLE The following filter string saves packets that both originate from IP address is 192.1
Using Diagnostic Tools 746 Check Point Safe@Office User Guide PARAMETERS port Integer. The port to which the packet is sent. EXAMPLE The followi
Using Diagnostic Tools Chapter 23: Maintenance 747 host PURPOSE The host element captures all incoming and outgoing packets for a specific comput
Using Diagnostic Tools 748 Check Point Safe@Office User Guide or PURPOSE The or element is used to alternate between string elements. The filtere
Using Diagnostic Tools Chapter 23: Maintenance 749 EXAMPLE The following filter string saves all packets that either originated from port 80, or
Using Diagnostic Tools 750 Check Point Safe@Office User Guide PARAMETERS port Integer. The port from which the packet is sent. EXAMPLE The follo
Using Diagnostic Tools Chapter 23: Maintenance 751 EXAMPLE 1 The following filter string captures all TCP packets: tcp EXAMPLE 2 The following f
Backing Up and Restoring the Safe@Office Appliance Configuration 752 Check Point Safe@Office User Guide EXAMPLE 1 The following filter string ca
Backing Up and Restoring the Safe@Office Appliance Configuration Chapter 23: Maintenance 753 Backing Up the Appliance Configuration Exporting the
Getting to Know Your Safe@Office 500W Appliance Chapter 1: Introduction 61 Network Requirements • 10BaseT or 100BaseT Network Interface Card i
Backing Up and Restoring the Safe@Office Appliance Configuration 754 Check Point Safe@Office User Guide Backing Up the Appliance Configuration to
Backing Up and Restoring the Safe@Office Appliance Configuration Chapter 23: Maintenance 755 The Safe@Office appliance creates the folder <MAC
Backing Up and Restoring the Safe@Office Appliance Configuration 756 Check Point Safe@Office User Guide Restoring the Appliance Configuration Imp
Backing Up and Restoring the Safe@Office Appliance Configuration Chapter 23: Maintenance 757 4. Click Upload. A confirmation message appears. 5.
Backing Up and Restoring the Safe@Office Appliance Configuration 758 Check Point Safe@Office User Guide Restoring the Appliance Configuration fro
Using Rapid Deployment Chapter 23: Maintenance 759 Note: If the appliance's IP address changed as a result of the configuration import, yo
Using Rapid Deployment 760 Check Point Safe@Office User Guide Preparing the USB Flash Drive for Rapid Deployment Before performing a rapid deplo
Using Rapid Deployment Chapter 23: Maintenance 761 Table 158: Rapid Deployment File Names This file... Should be named... The primary firmware pr
Resetting the Safe@Office Appliance to Defaults 762 Check Point Safe@Office User Guide • If the deploy folder exists, the appliance loads shared
Resetting the Safe@Office Appliance to Defaults Chapter 23: Maintenance 763 When resetting the appliance via the Safe@Office Portal, you can choo
Getting to Know Your Safe@Office 500W Appliance 62 Check Point Safe@Office User Guide Table 18: Safe@Office 500W Appliance Rear Panel Elements L
Resetting the Safe@Office Appliance to Defaults 764 Check Point Safe@Office User Guide • The Please Wait screen appears. • The Safe@Office app
Running Diagnostics Chapter 23: Maintenance 765 Running Diagnostics You can view technical information about your Safe@Office appliance’s hard
Rebooting the Safe@Office Appliance 766 Check Point Safe@Office User Guide Rebooting the Safe@Office Appliance If your Safe@Office appliance is
Overview Chapter 24: Using Network Printers 767 Chapter 24 This chapter describes how to set up and use network printers. This chapter includes t
Setting Up Network Printers 768 Check Point Safe@Office User Guide Setting Up Network Printers To set up a network printer 1. Connect the netwo
Setting Up Network Printers Chapter 24: Using Network Printers 769 The USB Devices page appears. If the Safe@Office appliance detected the printe
Setting Up Network Printers 770 Check Point Safe@Office User Guide The Printer Setup page appears. 6. Write down the port number allocated to t
Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 771 See Configuring Computers to Use Network Printers on page 77
Configuring Computers to Use Network Printers 772 Check Point Safe@Office User Guide The Control Panel window opens. 3. Under Hardware and Soun
Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 773 The Printers screen appears. 4. Click Add a printer. The A
Getting to Know Your Safe@Office 500W Appliance Chapter 1: Introduction 63 Label Description LAN 1-4 Local Area Network switch: Four Ethernet po
Configuring Computers to Use Network Printers 774 Check Point Safe@Office User Guide The Choose a printer port dialog box appears. 7. Click Cre
Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 775 12. In the Port name field, type the port name. 13. Select
Configuring Computers to Use Network Printers 776 Check Point Safe@Office User Guide The Configure Standard TCP/IP Port Monitor dialog box opens.
Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 777 • If your printer does not appear in the lists, insert the
Configuring Computers to Use Network Printers 778 Check Point Safe@Office User Guide Windows 2000/XP This procedure is relevant for computers w
Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 779 The Local or Network Printer dialog box appears. 6. Click
Configuring Computers to Use Network Printers 780 Check Point Safe@Office User Guide The Add Standard TCP/IP Port Wizard opens with the Welcome d
Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 781 The Add Standard TCP/IP Printer Port Wizard opens, with the
Configuring Computers to Use Network Printers 782 Check Point Safe@Office User Guide 19. Click Next. The Completing the Add Standard TCP/IP Prin
Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 783 The printer appears in the Printers and Faxes window. 24. R
Contents ii Check Point Safe@Office User Guide Wall Mounting the Safe@Office Appliance ...
Getting to Know Your Safe@Office 500W Appliance 64 Check Point Safe@Office User Guide LED State Explanation On (Red) Error Flashing (Orange)
Configuring Computers to Use Network Printers 784 Check Point Safe@Office User Guide MAC OS-X This procedure is relevant for computers with the
Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 785 The Print & Fax window appears. 5. In the Printing ta
Configuring Computers to Use Network Printers 786 Check Point Safe@Office User Guide New fields appear. 7. In the first drop-down list, select
Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 787 A list of models appears. 12. In the Model Name list, sel
Viewing Network Printers 788 Check Point Safe@Office User Guide Viewing Network Printers To view network printers 1. Click Network in the mai
Changing Network Printer Ports Chapter 24: Using Network Printers 789 Changing Network Printer Ports When you set up a new network printer, the
Resetting Network Printers 790 Check Point Safe@Office User Guide Resetting Network Printers You can cause a network printer to restart the cu
Connectivity Chapter 25: Troubleshooting 791 Chapter 25 This chapter provides solutions to common problems you may encounter while using the Safe
Connectivity 792 Check Point Safe@Office User Guide • Check if you have defined firewall rules which block your Internet connectivity. • Check
Connectivity Chapter 25: Troubleshooting 793 I cannot access http://my.firewall or http://my.vpn. What should I do? • Verify that the Safe@Offic
Getting to Know Your Safe@Office 500W ADSL Appliance Chapter 1: Introduction 65 Getting to Know Your Safe@Office 500W ADSL Appliance Package Co
Connectivity 794 Check Point Safe@Office User Guide I am using the Safe@Office appliance behind another NAT device, and I am having problems with
Service Center and Upgrades Chapter 25: Troubleshooting 795 I cannot connect to the LAN network from the DMZ or primary WLAN network. What should
Other Problems 796 Check Point Safe@Office User Guide Other Problems I have forgotten my password. What should I do? Reset your Safe@Office appli
Technical Specifications Chapter 26: Specifications 797 Chapter 26 This chapter includes the following topics: Technical Specifications ...
Technical Specifications 798 Check Point Safe@Office User Guide Power Adapter Nominal Output 12VDC @ 2 A 12VDC @ 2 A Max. Power Consumption 15W
Technical Specifications Chapter 26: Specifications 799 Non-ADSL Model Attributes Table 160: Safe@Office Non-ADSL Model Attributes Attribute Safe
Technical Specifications 800 Check Point Safe@Office User Guide Humidity: Storage/Operation 10 ~ 90% / 10 ~ 90% (non-condensed) 10 ~ 90% / 10 ~
Technical Specifications Chapter 26: Specifications 801 Wireless Attributes Table 161: Safe@Office Wireless Attributes Attribute Safe@Office 100
Technical Specifications 802 Check Point Safe@Office User Guide Safe@Office 500 and 500W Table 162: Safe@Office ADSL Models Attributes Attribute
Technical Specifications Chapter 26: Specifications 803 Temperature: Operation 0÷C ~ 40÷C 0÷C ~ 40÷C Humidity: Storage/Operation 10 ~ 95% / 10
Getting to Know Your Safe@Office 500W ADSL Appliance 66 Check Point Safe@Office User Guide • If desired, you can connect your appliance to an ex
Technical Specifications 804 Check Point Safe@Office User Guide 5V Power Adapter Unit Power Adapter Nominal Input In: 100~240VAC @ 0.5A In: 1
Technical Specifications Chapter 26: Specifications 805 RF N/A FCC15C,TELCO Table 164: Table 165: Safe@Office Non-ADSL Models Attributes Attr
Technical Specifications 806 Check Point Safe@Office User Guide Temperature: Operation 0ºC ~ 40ºC 0ºC ~ 40ºC Humidity: Storage/Operation 10%
CE Declaration of Conformity Chapter 26: Specifications 807 DBPSK WPA Authentication Modes EAP-TLS, EAP-TTLS, PEAP (EAP-GTC), PEAP (EAP-MSCHAP V2
CE Declaration of Conformity 808 Check Point Safe@Office User Guide Table 167: Safe@Office CE Compliance Standards Attribute 500 500 ADSL 500
CE Declaration of Conformity Chapter 26: Specifications 809 Attribute 500 500 ADSL 500W ADSL 500W ETSI TS 101 388 V V ITU-T G.703 V V
CE Declaration of Conformity 810 Check Point Safe@Office User Guide Attribute 1000N 1000NW 1000N ADSL 1000NW ADSL EN 61000-3-2 V V V V EN 6100
CE Declaration of Conformity Chapter 26: Specifications 811 Attribute 1000N 1000NW 1000N ADSL 1000NW ADSL EN 300 328 V V EN 301 489-1 V V EN
CE Declaration of Conformity 812 Check Point Safe@Office User Guide This device complies with Part 15 of the FCC Rules. Operation is subject to t
CE Declaration of Conformity Chapter 26: Specifications 813 Attribute 500 500 ADSL 500W ADSL 500W C22.2 No. 60950 V V V V K60950 V V V
Getting to Know Your Safe@Office 500W ADSL Appliance Chapter 1: Introduction 67 Label Description Serial An RJ-45 serial (RS-232) port used for
CE Declaration of Conformity 814 Check Point Safe@Office User Guide Attribute 1000N 1000NW 1000N ADSL 1000NW ADSL EMC: FCC Part 15, Class B
CE Declaration of Conformity Chapter 26: Specifications 815 China China RoHS, RoHS & WEEE Declaration and Certification These systems have be
CE Declaration of Conformity 816 Check Point Safe@Office User Guide • Tributyl tin (TBT) and triphenyl tin (TPT) compounds Additional Materials
CE Declaration of Conformity Chapter 26: Specifications 817 AC Mains O O O O O O Accessories O O O O O O Cables O O O O O O Ta
CE Declaration of Conformity 818 Check Point Safe@Office User Guide Crystal Lead (Pb) 11800 Lead in high melting temperature type solders (i.e
Glossary of Terms Glossary of Terms 819 A ADSL Modem A device connecting a computer to the Internet via an existing phone line. ADSL (Asymmetric
Glossary of Terms 820 Check Point Safe@Office User Guide D DHCP Any machine requires a unique IP address to connect to the Internet using Interne
Glossary of Terms Glossary of Terms 821 HTTPS Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL. A protocol for accessing a
Glossary of Terms 822 Check Point Safe@Office User Guide M MAC Address The MAC (Media Access Control) address is a computer's unique hardwar
Glossary of Terms Glossary of Terms 823 PPTP The Point-to-Point Tunneling Protocol (PPTP) allows extending a local network by establishing privat
Getting to Know Your Safe@Office 500W ADSL Appliance 68 Check Point Safe@Office User Guide Front Panel The Safe@Office 500W ADSL appliance includ
Glossary of Terms 824 Check Point Safe@Office User Guide At the other end (the client program in your computer), TCP reassembles the individual p
Index Index 825 8 802.1x configuring for a wireless network • 309 configuring for ports • 411 excluding network objects from • 225 A Access Denie
Index 826 Check Point Safe@Office User Guide certificate explained • 654 exporting • 663 exporting CA • 664 exporting device • 663 generating sel
Index Index 827 Email Antispam • 556 Email Antivirus • 556 enabling/disabling • 557 selecting protocols for • 558 snoozing • 559 temporarily disa
Index 828 Check Point Safe@Office User Guide configuring • 279 explained • 279 Host Port Scan • 481 HTTPS configuring • 724 explained • 819 using
Index Index 829 configuring • 608 LAN cable • 99 configuring a connection • 123 configuring High Availability for • 279 explained • 819 ports • 9
Index 830 Check Point Safe@Office User Guide Network Interface Monitor viewing bridge statistics • 370 viewing general network statistics • 360 v
Index Index 831 configuring • 303 defined • 822 printers changing ports • 787 configuring computers to use • 769 resetting • 788 setting up • 766
Index 832 Check Point Safe@Office User Guide NAT • 423 VStream Antispam • 545 VStream Antivirus • 509 Web • 563 S Safe Senders adding • 553 delet
Index Index 833 setting the time • 732 setting up • 107 status • 343 technical specifications • 795 Safe@Office appliance configuration backing u
Getting to Know Your Safe@Office 500W ADSL Appliance Chapter 1: Introduction 69 LED State Explanation LINK/ACT On, 100 On 100 Mbps link establi
Index 834 Check Point Safe@Office User Guide Service Center connecting to • 587 disconnecting from • 595 refreshing a connection to • 594 service
Index Index 835 explained • 587 starting • 587 viewing information • 593 Sweep Scan • 481 SynDefender • 477 Syslog logging configuring • 722 expl
Index 836 Check Point Safe@Office User Guide configuring • 509 virtual access points (VAPs) about • 214 adding and editing • 331 deleting • 221 V
Index Index 837 reordering • 551 types • 546 VStream Antivirus about • 505 configuring • 505 configuring advanced settings • 518 configuring poli
Index 838 Check Point Safe@Office User Guide wireless protocols supported • 309 wireless stations viewing • 368 Worm Catcher • 489 X XBox LIVE •
Contacting Technical Support 70 Check Point Safe@Office User Guide Contacting Technical Support In case of a problem with your Safe@Office applia
Introduction to Information Security Chapter 2: Safe@Office Security 71 Chapter 2 This chapter explains the basic security concepts on which Safe
Introduction to Information Security 72 Check Point Safe@Office User Guide • Commercial companies store information about their revenues, busine
Introduction to Information Security Chapter 2: Safe@Office Security 73 Information Security Challenges The challenges of information security ca
Contents Contents iii Using Bridges ...
Introduction to Information Security 74 Check Point Safe@Office User Guide In order for a security policy be effective, it must be accompanied b
Introduction to Information Security Chapter 2: Safe@Office Security 75 • Applications are hosted on a main computer rather than on personal wor
The Safe@Office Firewall 76 Check Point Safe@Office User Guide • Large businesses have the funds and expertise to constantly enhance their secur
The Safe@Office Firewall Chapter 2: Safe@Office Security 77 Security Requirements In order to make control decisions for new communication attemp
The Safe@Office Firewall 78 Check Point Safe@Office User Guide Packet filters have the following advantages and disadvantages: Table 22: Packet F
The Safe@Office Firewall Chapter 2: Safe@Office Security 79 Check Point Stateful Inspection Technology Invented by Check Point, Stateful Inspecti
The Safe@Office Firewall 80 Check Point Safe@Office User Guide The Safe@Office firewall examines IP addresses, port numbers, and any other inform
The Safe@Office Firewall Chapter 2: Safe@Office Security 81 Step Channel Type Description Source TCP Source Port Destination TCP Destination Port
The Safe@Office Firewall 82 Check Point Safe@Office User Guide FTP client-server communication. The following table examines how different firewa
The Safe@Office Firewall Chapter 2: Safe@Office Security 83 Firewall Technology Action Stateful Inspection Firewall A Stateful Inspection firewa
Commentaires sur ces manuels