Check Point Software Technologies Safe@Office 1000NW Guide de l'utilisateur

Naviguer en ligne ou télécharger Guide de l'utilisateur pour Pare-feu matériel Check Point Software Technologies Safe@Office 1000NW. Check Point Software Technologies Safe@Office 1000NW Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 854
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
Check Point Safe@Office
Internet Security Appliance
User Guide
Version 8.2
Part No: 700797, November 2010
Vue de la page 0
1 2 3 4 5 6 ... 853 854

Résumé du contenu

Page 1 - Check Point Safe@Office

Check Point Safe@Office Internet Security Appliance User Guide Version 8.2 Part No: 700797, November 2010

Page 2 - GNU GENERAL PUBLIC LICENSE

Contents iv Check Point Safe@Office User Guide Viewing Network Statistics ...

Page 4 - SAFETY PRECAUTIONS

Before You Install the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 85 Chapter 3 This chapter describes how to properly

Page 5 - SECURITY DISCLAIMER

Before You Install the Safe@Office Appliance 86 Check Point Safe@Office User Guide Windows Vista Checking the TCP/IP Installation 1. Click Sta

Page 6

Before You Install the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 87 The Network Sharing Center screen appears. 3.

Page 7

Before You Install the Safe@Office Appliance 88 Check Point Safe@Office User Guide The Network Connections screen appears. 4. Double-click the

Page 8

Before You Install the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 89 The Local Area Connection Properties window open

Page 9 - Contents iii

Before You Install the Safe@Office Appliance 90 Check Point Safe@Office User Guide Note: Normally, it is not recommended to assign a static IP

Page 10 - Contents

Before You Install the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 91 The Network and Dial-up Connections window appea

Page 11 - Contents v

Before You Install the Safe@Office Appliance 92 Check Point Safe@Office User Guide 4. In the above window, check if TCP/IP appears in the compon

Page 12

Before You Install the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 93 Installing TCP/IP Protocol 1. In the Local Ar

Page 13 - Contents vii

Contents Contents v Using Web Content Filtering ...

Page 14

Before You Install the Safe@Office Appliance 94 Check Point Safe@Office User Guide TCP/IP Settings 1. In the Local Area Connection Properties wi

Page 15 - About This Guide

Before You Install the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 95 Mac OS Use the following procedure for setting

Page 16

Before You Install the Safe@Office Appliance 96 Check Point Safe@Office User Guide Mac OS-X Use the following procedure for setting up the TCP/

Page 17 - Introduction

Before You Install the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 97 The Network window appears. 3. Click Configur

Page 18 - Safe@Office Product Family

Appliance Installation 98 Check Point Safe@Office User Guide TCP/IP configuration fields appear. 4. Click the Configure IPv4 drop-down list, an

Page 19 - Features

Appliance Installation Chapter 3: Installing and Setting Up Safe@Office 99 Appliance Installation Installing Non-ADSL Models To install the Safe

Page 20

Appliance Installation 100 Check Point Safe@Office User Guide Installing ADSL Models To install the Safe@Office appliance 1. Verify that you

Page 21 - Chapter 1: Introduction 5

Appliance Installation Chapter 3: Installing and Setting Up Safe@Office 101 4. To use the appliance with a non-ADSL connection, or with an exist

Page 22

Appliance Installation 102 Check Point Safe@Office User Guide Cascading Your Appliance The Safe@Office appliance protects all computers and ne

Page 23 - Chapter 1: Introduction 7

Wall Mounting the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 103 Connecting the Appliance to Network Printers In m

Page 24

Contents vi Check Point Safe@Office User Guide Managing Users ...

Page 25 - Chapter 1: Introduction 9

Wall Mounting the Safe@Office Appliance 104 Check Point Safe@Office User Guide 3. Mark two drill holes on the wall, in accordance with the follo

Page 26

Securing the Safe@Office Appliance against Theft Chapter 3: Installing and Setting Up Safe@Office 105 Your Safe@Office appliance is wall mounted.

Page 27 - Chapter 1: Introduction 11

Securing the Safe@Office Appliance against Theft 106 Check Point Safe@Office User Guide While these parts may differ between devices, all looped

Page 28

Setting Up the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 107 5. Thread the anti-theft device's pin through the

Page 29 - Chapter 1: Introduction 13

Setting Up the Safe@Office Appliance 108 Check Point Safe@Office User Guide Logging in to the Safe@Office Portal and setting up your password

Page 30 - Safe@Office 500 ADSL

Setting Up the Safe@Office Appliance Chapter 3: Installing and Setting Up Safe@Office 109 You can access the Setup Wizard at any time after initi

Page 31 - Chapter 1: Introduction 15

Setting Up the Safe@Office Appliance 110 Check Point Safe@Office User Guide The Safe@Office Setup Wizard opens with the Welcome page displayed.

Page 32

Initial Login to the Safe@Office Portal Chapter 4: Getting Started 111 Chapter 4 This chapter contains all the information you need in order to g

Page 33 - Chapter 1: Introduction 17

Initial Login to the Safe@Office Portal 112 Check Point Safe@Office User Guide The initial login page appears. 2. Type a password both in the

Page 34

Initial Login to the Safe@Office Portal Chapter 4: Getting Started 113 The Safe@Office Setup Wizard opens, with the Welcome page displayed. 4.

Page 35

Contents Contents vii Using Diagnostic Tools ...

Page 36

Logging in to the Safe@Office Portal 114 Check Point Safe@Office User Guide Logging in to the Safe@Office Portal Note: By default, HTTP and H

Page 37 - Chapter 1: Introduction 21

Logging in to the Safe@Office Portal Chapter 4: Getting Started 115 The login page appears. 2. Type your username and password. 3. Click OK.

Page 38

Accessing the Safe@Office Portal Remotely Using HTTPS 116 Check Point Safe@Office User Guide The Welcome page appears. Accessing the Safe@Offi

Page 39 - Chapter 1: Introduction 23

Accessing the Safe@Office Portal Remotely Using HTTPS Chapter 4: Getting Started 117 Note: In order to access the Safe@Office Portal remotely u

Page 40

Using the Safe@Office Portal 118 Check Point Safe@Office User Guide g. Click OK. The Security Alert dialog box reappears. h. Click Yes. The Saf

Page 41 - Wireless Features

Using the Safe@Office Portal Chapter 4: Getting Started 119 Figure 26: Safe@Office Portal

Page 42 - Software Requirements

Using the Safe@Office Portal 120 Check Point Safe@Office User Guide Main Menu The main menu includes the following submenus. Table 27: Main Men

Page 43 - Network Requirements

Using the Safe@Office Portal Chapter 4: Getting Started 121 This submenu… Does this… Logout Allows you to log out of the Safe@Office Portal. M

Page 44 - Rear Panel

Using the Safe@Office Portal 122 Check Point Safe@Office User Guide This field… Displays this… page 125. Service Center Displays your subscripti

Page 45 - Front Panel

Logging Out Chapter 4: Getting Started 123 Logging Out Logging out terminates your administration session. Any subsequent attempt to connect to

Page 48

Overview Chapter 5: Configuring the Internet Connection 125 Chapter 5 This chapter describes how to configure and work with a Safe@Office Interne

Page 49

Using the Internet Wizard 126 Check Point Safe@Office User Guide You can configure your Internet connection using any of the following setup too

Page 50

Using the Internet Wizard Chapter 5: Configuring the Internet Connection 127 Configuring an Ethernet-Based Connection on Non-ADSL Models To conf

Page 51 - Side Panel

Using the Internet Wizard 128 Check Point Safe@Office User Guide The Internet Connection Method dialog box appears. 4. Select the Internet conn

Page 52

Using the Internet Wizard Chapter 5: Configuring the Internet Connection 129 Using a PPPoE Connection If you selected the PPPoE (PPP over Etherne

Page 53 - Chapter 1: Introduction 37

Using the Internet Wizard 130 Check Point Safe@Office User Guide 3. Click Next. The system attempts to connect to the Internet via the specifie

Page 54

Using the Internet Wizard Chapter 5: Configuring the Internet Connection 131 Using a PPTP Connection If you selected the PPTP connection method,

Page 55

Using the Internet Wizard 132 Check Point Safe@Office User Guide Table 30: PPTP Connection Fields In this field… Do this… Username Type your us

Page 56

Using the Internet Wizard Chapter 5: Configuring the Internet Connection 133 Using a Static IP Connection If you selected the Static IP connectio

Page 57

About Your Check Point Safe@Office Appliance Chapter 1: About This Guide ix To make finding information in this guide easier, some types of infor

Page 58

Using the Internet Wizard 134 Check Point Safe@Office User Guide Table 31: PPPoE Connection Fields In this field… Do this… IP Address Type the

Page 59 - Chapter 1: Introduction 43

Using the Internet Wizard Chapter 5: Configuring the Internet Connection 135 Configuring an Ethernet-Based Connection on ADSL Models Note: I

Page 60

Using the Internet Wizard 136 Check Point Safe@Office User Guide The Internet Connection Method dialog box appears. 6. Select the Internet conn

Page 61

Using the Internet Wizard Chapter 5: Configuring the Internet Connection 137 Configuring a Direct ADSL Connection To configure a direct ADSL con

Page 62

Using the Internet Wizard 138 Check Point Safe@Office User Guide The ADSL Configuration Assistant opens. 2) In the Country drop-down list, sele

Page 63

Using the Internet Wizard Chapter 5: Configuring the Internet Connection 139 If you chose PPPoE or PPPoA, continue at Using a PPPoE or PPPoA Conn

Page 64

Using the Internet Wizard 140 Check Point Safe@Office User Guide Using a PPPoE or PPPoA Connection If you selected the PPPoE (PPP over Ethernet)

Page 65 - Chapter 1: Introduction 49

Using Internet Setup Chapter 5: Configuring the Internet Connection 141 Table 33: PPPoE Connection Fields In this field… Do this… Username Type

Page 66

Using Internet Setup 142 Check Point Safe@Office User Guide The Internet page appears. 2. Next to the desired Internet connection, click Edit.

Page 67

Using Internet Setup Chapter 5: Configuring the Internet Connection 143 The Internet Setup page appears. 3. Do one of the following: • To con

Page 68

About Your Check Point Safe@Office Appliance x Check Point Safe@Office User Guide All products, with or without the Power Pack, with ADSL only

Page 69

Using Internet Setup 144 Check Point Safe@Office User Guide Configuring a Direct ADSL Connection 1. In the Port drop-down list, select ADSL.

Page 70

Using Internet Setup Chapter 5: Configuring the Internet Connection 145 Using a PPPoA (PPP over ATM) Connection 1. Complete the fields using th

Page 71

Using Internet Setup 146 Check Point Safe@Office User Guide New fields appear, depending on the check boxes you selected. 2. Click Apply. The S

Page 72

Using Internet Setup Chapter 5: Configuring the Internet Connection 147 Once the connection is made, the Status Bar displays the Internet status

Page 73

Using Internet Setup 148 Check Point Safe@Office User Guide New fields appear, depending on the check boxes you selected. 2. Click Apply. The S

Page 74

Using Internet Setup Chapter 5: Configuring the Internet Connection 149 Using a PPPoE (PPP over Ethernet) Connection 1. Complete the fields usi

Page 75

Using Internet Setup 150 Check Point Safe@Office User Guide New fields appear, depending on the check boxes you selected. 2. Click Apply. The S

Page 76

Using Internet Setup Chapter 5: Configuring the Internet Connection 151 Once the connection is made, the Status Bar displays the Internet status

Page 77

Using Internet Setup 152 Check Point Safe@Office User Guide New fields appear, depending on the check boxes you selected. 2. Click Apply. The S

Page 78

Using Internet Setup Chapter 5: Configuring the Internet Connection 153 Configuring an Ethernet-Based Connection 1. In the Port drop-down list,

Page 79

About Your Check Point Safe@Office Appliance Chapter 1: Introduction 1 Chapter 1 This chapter introduces the Check Point Safe@Office appliance an

Page 80

Using Internet Setup 154 Check Point Safe@Office User Guide Using a LAN Connection 1. Complete the fields using the relevant information in Int

Page 81

Using Internet Setup Chapter 5: Configuring the Internet Connection 155 New fields appear, depending on the check boxes you selected. 2. Click

Page 82

Using Internet Setup 156 Check Point Safe@Office User Guide Using a Cable Modem Connection 1. Complete the fields using the relevant informatio

Page 83

Using Internet Setup Chapter 5: Configuring the Internet Connection 157 New fields appear, depending on the check boxes you selected. 2. Click

Page 84

Using Internet Setup 158 Check Point Safe@Office User Guide Using a PPPoE Connection 1. Complete the fields using the relevant information in I

Page 85

Using Internet Setup Chapter 5: Configuring the Internet Connection 159 New fields appear, depending on the check boxes you selected. 2. Click

Page 86 - Contacting Technical Support

Using Internet Setup 160 Check Point Safe@Office User Guide Using a PPTP Connection 1. Complete the fields using the relevant information in In

Page 87 - Safe@Office Security

Using Internet Setup Chapter 5: Configuring the Internet Connection 161 New fields appear, depending on the check boxes you selected. 2. Click

Page 88

Using Internet Setup 162 Check Point Safe@Office User Guide Once the connection is made, the Status Bar displays the Internet status “Connected”.

Page 89 - The Security Policy

Using Internet Setup Chapter 5: Configuring the Internet Connection 163 New fields appear, depending on the check boxes you selected. 2. Click

Page 90

Safe@Office Product Family 2 Check Point Safe@Office User Guide The Safe@Office appliance also allows sharing your Internet connection among seve

Page 91

Using Internet Setup 164 Check Point Safe@Office User Guide Once the connection is made, the Status Bar displays the Internet status “Connected”.

Page 92 - The Safe@Office Firewall

Using Internet Setup Chapter 5: Configuring the Internet Connection 165 New fields appear, depending on the check boxes you selected. 2. Click

Page 93 - Old Firewall Technologies

Using Internet Setup 166 Check Point Safe@Office User Guide Configuring a Dialup Connection Note: To use this connection type, you must first

Page 94 - Application-Layer Gateways

Using Internet Setup Chapter 5: Configuring the Internet Connection 167 New fields appear, depending on the check boxes you selected. 3. Click

Page 95 - The Safe@Office Firewall

Using Internet Setup 168 Check Point Safe@Office User Guide Configuring No Connection 1. In the Port drop-down list, select None. The fields di

Page 96

Using Internet Setup Chapter 5: Configuring the Internet Connection 169 In this field… Do this… Service Type your service name. If your ISP has

Page 97

Using Internet Setup 170 Check Point Safe@Office User Guide In this field… Do this… When no higher priority connection is available Select this

Page 98 - Firewall Technology

Using Internet Setup Chapter 5: Configuring the Internet Connection 171 In this field… Do this… IP Address Type the static IP address of your Sa

Page 99

Using Internet Setup 172 Check Point Safe@Office User Guide In this field… Do this… page 293. Shape Downstream: Link Rate Select this option to e

Page 100

Using Internet Setup Chapter 5: Configuring the Internet Connection 173 In this field… Do this… Note: When configuring MAC cloning for the second

Page 101 - Chapter 3

Safe@Office 1000N and 1000N ADSL Product Features Chapter 1: Introduction 3 Safe@Office 1000N and 1000N ADSL Product Features Table 1: Safe@Offic

Page 102 - Windows Vista

Using Internet Setup 174 Check Point Safe@Office User Guide In this field… Do this… Balancing on page 192. High Availability The High Availabili

Page 103

Using Internet Setup Chapter 5: Configuring the Internet Connection 175 In this field… Do this… Connection Probing Method While the Probe Next Ho

Page 104

Setting Up Modems 176 Check Point Safe@Office User Guide In this field… Do this… 1, 2, 3 If you chose the Ping Addresses connection probing meth

Page 105 - TCP/IP Settings

Setting Up Modems Chapter 5: Configuring the Internet Connection 177 See Setting Up an ExpressCard Cellular Modem on page 185. Setting Up an RS2

Page 106 - Windows 2000/XP

Setting Up Modems 178 Check Point Safe@Office User Guide 3. Next to Serial, click Edit. The Port Setup page appears. 4. In the Assign to Netw

Page 107

Setting Up Modems Chapter 5: Configuring the Internet Connection 179 New fields appear. 5. Complete the fields using the information in Dialup

Page 108

Setting Up Modems 180 Check Point Safe@Office User Guide Table 35: RS232 Dialup Fields In this field… Do this… Modem Type Select the modem type.

Page 109 - Installing TCP/IP Protocol

Setting Up Modems Chapter 5: Configuring the Internet Connection 181 Setting Up a USB Modem Warning: Before attaching a USB modem, ensure that

Page 110

Setting Up Modems 182 Check Point Safe@Office User Guide 3. Next to USB, click Edit. The USB Devices page appears. If the Safe@Office appliance

Page 111

Setting Up Modems Chapter 5: Configuring the Internet Connection 183 The USB Modem Setup page appears. 5. Complete the fields using the inform

Page 112 - Mac OS-X

COPYRIGHT & TRADEMARKS Copyright © 2010 SofaWare, All Rights Reserved. No part of this document may be reproduced in any form or by any means wi

Page 113 - 3. Click Configure

Safe@Office 1000N and 1000N ADSL Product Features 4 Check Point Safe@Office User Guide DMZ/WAN2 Port Ethernet / SFP, 10/100/1000 Mbps Dialup Bac

Page 114 - 5. Click Apply Now

Setting Up Modems 184 Check Point Safe@Office User Guide Table 36: USB Dialup Fields In this field… Do this… Modem Type Select the modem type.

Page 115 - Appliance Installation

Setting Up Modems Chapter 5: Configuring the Internet Connection 185 In this field… Do this… PIN Type the Personal Identification Number (PIN) c

Page 116 - Installing ADSL Models

Setting Up Modems 186 Check Point Safe@Office User Guide The Ports page appears. 3. Next to ExC, click Edit. The USB Devices page appears. If t

Page 117 - Appliance Installation

Setting Up Modems Chapter 5: Configuring the Internet Connection 187 The Cellular Modem Setup page appears. 5. Complete the fields using the in

Page 118 - Cascading Your Appliance

Viewing Internet Connection Information 188 Check Point Safe@Office User Guide Viewing Internet Connection Information You can view information

Page 119 - To connect network printers

Viewing Internet Connection Information Chapter 5: Configuring the Internet Connection 189 Table 37: Internet Page Fields Field Description Stat

Page 120

Enabling/Disabling the Internet Connection 190 Check Point Safe@Office User Guide Enabling/Disabling the Internet Connection You can temporarily

Page 121 - Figure 24: Loope

Configuring a Backup Internet Connection Chapter 5: Configuring the Internet Connection 191 Configuring a Backup Internet Connection You can con

Page 122

Configuring WAN Load Balancing 192 Check Point Safe@Office User Guide Configuring WAN Load Balancing If your network is prone to congestion, f

Page 123

Configuring WAN Load Balancing Chapter 5: Configuring the Internet Connection 193 ensure full utilization of both Internet connections, the ratio

Page 124

Safe@Office 1000N and 1000N ADSL Product Features Chapter 1: Introduction 5 P2P File Sharing Blocking / Monitoring Port-based and Tag-based VLAN

Page 126

Configuring Network Settings Chapter 6: Managing Your Network 195 Chapter 6 This chapter describes how to manage and configure your network conne

Page 127 - Getting Started

Configuring Network Settings 196 Check Point Safe@Office User Guide Configuring the LAN Network To configure the LAN network 1. Click Network

Page 128 - 3. Click OK

Configuring Network Settings Chapter 6: Managing Your Network 197 The Edit Network Settings page for the LAN network appears. 3. In the Mode dr

Page 129

Configuring Network Settings 198 Check Point Safe@Office User Guide Changing IP Addresses If desired, you can change your Safe@Office appliance’

Page 130

Configuring Network Settings Chapter 6: Managing Your Network 199 Your computer obtains an IP address in the new range. • Otherwise, manually r

Page 131 - The login page appears

Configuring Network Settings 200 Check Point Safe@Office User Guide Configuring a DHCP Server By default, the Safe@Office appliance operates as

Page 132

Configuring Network Settings Chapter 6: Managing Your Network 201 Enabling/Disabling the Safe@Office DHCP Server You can enable and disable the

Page 133

Configuring Network Settings 202 Check Point Safe@Office User Guide Configuring the DHCP Address Range By default, the Safe@Office DHCP server

Page 134 - Using the Safe@Office Portal

Configuring Network Settings Chapter 6: Managing Your Network 203 The DHCP IP range fields appear. 2) In the DHCP IP range fields, type the des

Page 135 - Safe@Office Portal

Safe@Office 1000N and 1000N ADSL Product Features 6 Check Point Safe@Office User Guide IPSEC Features Hardware-accelerated DES, 3DES, AES, MD5,

Page 136 - Main Menu

Configuring Network Settings 204 Check Point Safe@Office User Guide Configuring DHCP Relay You can configure DHCP relay for internal networks.

Page 137 - Status Bar

Configuring Network Settings Chapter 6: Managing Your Network 205 The Automatic DHCP range check box is disabled, and new fields appear. 4. In

Page 138 - Displays this…

Configuring Network Settings 206 Check Point Safe@Office User Guide Configuring DHCP Server Options If desired, you can configure the following

Page 139 - Logging Out

Configuring Network Settings Chapter 6: Managing Your Network 207 The DHCP Server Options page appears. 4. Complete the fields using the releva

Page 140

Configuring Network Settings 208 Check Point Safe@Office User Guide New fields appear, depending on the check boxes you selected. 5. Click Appl

Page 141 - Overview

Configuring Network Settings Chapter 6: Managing Your Network 209 Table 38: DHCP Server Options Fields In this field… Do this… Domain Name Type

Page 142 - Using the Internet Wizard

Configuring Network Settings 210 Check Point Safe@Office User Guide In this field… Do this… Automatically assign default gateway Clear this optio

Page 143 - ADSL Models

Configuring Network Settings Chapter 6: Managing Your Network 211 In this field… Do this… Nortel IP Phone To enable Nortel IP phones to receive

Page 144

Configuring Network Settings 212 Check Point Safe@Office User Guide The Ports page appears. 3. Next to the DMZ/WAN2 port, click Edit.

Page 145 - Using a PPPoE Connection

Configuring Network Settings Chapter 6: Managing Your Network 213 The Port Setup page appears. 4. In the Assign to network drop-down list, sele

Page 146 - Do this…

Safe@Office 1000N and 1000N ADSL Product Features Chapter 1: Introduction 7 MAC Cloning Network Address Translation (NAT) Rules Static Routes,

Page 147 - Using a PPTP Connection

Configuring Network Settings 214 Check Point Safe@Office User Guide Note: The DMZ network must not overlap other networks. 11. In the Subnet M

Page 148

Configuring Network Settings Chapter 6: Managing Your Network 215 Note: OfficeMode requires either Check Point SecureClient, an L2TP client, or

Page 149 - Using a Static IP Connection

Configuring Network Settings 216 Check Point Safe@Office User Guide Configuring VLANs Your Safe@Office appliance allows you to partition your ne

Page 150 - Using a DHCP Connection

Configuring Network Settings Chapter 6: Managing Your Network 217 The Safe@Office appliance supports the following VLAN types: • Tag-based In

Page 151 - Using the Internet Wizard

Configuring Network Settings 218 Check Point Safe@Office User Guide • Port-based Port-based VLAN allows assigning the appliance's LAN port

Page 152

Configuring Network Settings Chapter 6: Managing Your Network 219 • Wireless Distribution System (WDS) links In wireless Safe@Office models, yo

Page 153

Configuring Network Settings 220 Check Point Safe@Office User Guide Adding and Editing Port-Based VLANs To add or edit a port-based VLAN 1. Cli

Page 154

Configuring Network Settings Chapter 6: Managing Your Network 221 5. In the Mode drop-down list, select Enabled. The fields are enabled. 6. In

Page 155

Configuring Network Settings 222 Check Point Safe@Office User Guide Adding and Editing Tag-Based VLANs To add or edit a tag-based VLAN 1. Click

Page 156

Configuring Network Settings Chapter 6: Managing Your Network 223 A warning message appears. 12. Click OK. A success message appears. 13. Clic

Page 157 - Using Internet Setup

Safe@Office 1000NW and 1000NW ADSL Product Features 8 Check Point Safe@Office User Guide Setting Rapid Deployment Hardware Specifications Power

Page 158 - The Internet page appears

Using the Internal DNS Server 224 Check Point Safe@Office User Guide 5. Click OK. The VLAN is deleted. Using the Internal DNS Server The Safe@

Page 159 - Using Internet Setup

Using the Internal DNS Server Chapter 6: Managing Your Network 225 Enabling the Internal DNS Server To enable the internal DNS server 1. Click S

Page 160

Using the Internal DNS Server 226 Check Point Safe@Office User Guide The Domain Name Suffix field appears. 3. In the Domain Name Suffix field,

Page 161

Using Network Objects Chapter 6: Managing Your Network 227 Using Network Objects You can add individual computers or networks as network objects

Page 162 - 2. Click Apply

Using Network Objects 228 Check Point Safe@Office User Guide DHCP reservation, and it is useful if you are hosting a public Internet server on yo

Page 163

Using Network Objects Chapter 6: Managing Your Network 229 Adding and Editing Network Objects You can add or edit network objects via: • The Ne

Page 164

Using Network Objects 230 Check Point Safe@Office User Guide 2. Do one of the following: • To add a network object, click New. • To edit an

Page 165

Using Network Objects Chapter 6: Managing Your Network 231 The Step 2: Computer Details dialog box appears. If you chose Single Computer, the dia

Page 166

Using Network Objects 232 Check Point Safe@Office User Guide The Step 3: Save dialog box appears. 7. Type a name for the network object in the

Page 167

Using Network Objects Chapter 6: Managing Your Network 233 The My Computers page appears. If a computer has not yet been added as a network obje

Page 168

Safe@Office 1000NW and 1000NW ADSL Product Features Chapter 1: Introduction 9 Hardware Features 4-Port LAN Switch Ethernet, 10/100/1000 Mbps WAN

Page 169

Using Network Objects 234 Check Point Safe@Office User Guide The computer's IP address and MAC address are automatically filled in. 5. Comp

Page 170 - Using a LAN Connection

Using Network Objects Chapter 6: Managing Your Network 235 In this field… Do this… Exclude this computer from 802.1x Port Security Select this o

Page 171

Using Network Objects 236 Check Point Safe@Office User Guide Table 40: Network Object Fields for a Network In this field… Do this… IP Range Ty

Page 172

Configuring Network Service Objects Chapter 6: Managing Your Network 237 Viewing and Deleting Network Objects To view or delete a network object

Page 173

Configuring Network Service Objects 238 Check Point Safe@Office User Guide Adding and Editing Network Service Objects To add or edit a network s

Page 174

Configuring Network Service Objects Chapter 6: Managing Your Network 239 The Safe@Office Network Service Wizard opens, with the Step 1: Network S

Page 175

Configuring Network Service Objects 240 Check Point Safe@Office User Guide 6. Click Finish. Table 41: Network Service Fields In this field… Do t

Page 176

Using Static Routes Chapter 6: Managing Your Network 241 Using Static Routes A static route is a setting that explicitly specifies the route to

Page 177

Using Static Routes 242 Check Point Safe@Office User Guide The Static Routes page lists all existing routes, including the default, and indicates

Page 178 - Using an L2TP Connection

Using Static Routes Chapter 6: Managing Your Network 243 The Static Route Wizard opens displaying the Step 1: Source and Destination dialog box.

Page 179

Safe@Office 1000NW and 1000NW ADSL Product Features 10 Check Point Safe@Office User Guide Intelligence SmartDefense™ (IPS) Network Address Tran

Page 180

Using Static Routes 244 Check Point Safe@Office User Guide 6. Click Next. The new static route is saved. Table 42: Static Route Fields In this

Page 181

Using Static Routes Chapter 6: Managing Your Network 245 In this field… Do this… Next Hop IP Specify the next hop to which packets should be sen

Page 182

Managing Ports 246 Check Point Safe@Office User Guide Managing Ports The Safe@Office appliance enables you to quickly and easily assign its port

Page 183

Managing Ports Chapter 6: Managing Your Network 247 You can assign this port... To these uses... USB Printers USB-based modems The Safe@Office a

Page 184 - Configuring No Connection

Managing Ports 248 Check Point Safe@Office User Guide The Ports page appears. In non-ADSL models, this page appears as follows:

Page 185

Managing Ports Chapter 6: Managing Your Network 249 In ADSL models, this page appears as follows: The page displays the information for each por

Page 186

Managing Ports 250 Check Point Safe@Office User Guide This field… Displays… Status The port's current status. Ethernet ports can have the

Page 187

Managing Ports Chapter 6: Managing Your Network 251 This field… Displays… The ADSL port can have the following statuses: Status Description Sync

Page 188

Managing Ports 252 Check Point Safe@Office User Guide This field… Displays… The USB port can have the following statuses: Status Description Con

Page 189

Managing Ports Chapter 6: Managing Your Network 253 This field… Displays… 802.1x The port's security scheme. This can be any of the followi

Page 190

Safe@Office 1000NW and 1000NW ADSL Product Features Chapter 1: Introduction 11 VPN Server with OfficeMode and RADIUS Support Check Point VPN Clie

Page 191

Managing Ports 254 Check Point Safe@Office User Guide Modifying Port Assignments You can assign ports to different networks or purposes. Since m

Page 192 - Setting Up Modems

Managing Ports Chapter 6: Managing Your Network 255 To assign a port to... See... An ExpressCard modem Setting Up an ExpressCard Cellular Modem o

Page 193 - Setting Up an RS232 Modem

Managing Ports 256 Check Point Safe@Office User Guide • To disable the Serial port, select Disabled. 4. Click Apply. A warning message appears

Page 194

Managing Ports Chapter 6: Managing Your Network 257 Resetting Ports to Defaults You can reset the Safe@Office appliance's ports to their de

Page 195 - Setting Up Modems

Managing Ports 258 Check Point Safe@Office User Guide Resetting All Ports to Defaults To reset all ports to defaults 1. Click Network in the

Page 196

Overview Chapter 7: Using Bridges 259 Chapter 7 This chapter describes how to connect multiple network segments at the data-link layer, using a b

Page 197 - Setting Up a USB Modem

Overview 260 Check Point Safe@Office User Guide If you enable the firewall between bridged network segments, the gateway operates as a regular fi

Page 198

Overview Chapter 7: Using Bridges 261 For example, if you assign the LAN and primary WLAN networks to a bridge and disable the bridge's inte

Page 199

Overview 262 Check Point Safe@Office User Guide • Transparent roaming In a routed network, if a host is physically moved from one network area

Page 200 - Table 36: USB Dialup Fields

Overview Chapter 7: Using Bridges 263 How Does Bridge Mode Work? Bridges operate at layer 2 of the OSI model, therefore adding a bridge to an exi

Page 201

Safe@Office 1000NW and 1000NW ADSL Product Features 12 Check Point Safe@Office User Guide Dead Internet Connection Detection (DCD) WAN Load Bala

Page 202

Overview 264 Check Point Safe@Office User Guide Multiple Bridges and Spanning Tree Protocol When using multiple bridges, you can enable fault tol

Page 203

Workflow Chapter 7: Using Bridges 265 Workflow To use a bridge 1. Add a bridge. See Adding and Editing Bridges on page 266. 2. Add the des

Page 204

Adding and Editing Bridges 266 Check Point Safe@Office User Guide For information on adding security rules, see Adding and Editing Rules on page

Page 205 - Description

Adding and Editing Bridges Chapter 7: Using Bridges 267 The Bridge Configuration page appears. 3. Complete the fields using the following table

Page 206

Adding and Editing Bridges 268 Check Point Safe@Office User Guide Table 47: Bridge Configuration Fields In this field… Do this… Network Name Ty

Page 207

Adding Internal Networks to Bridges Chapter 7: Using Bridges 269 In this field… Do this… Bridge Priority Select this bridge's priority. Th

Page 208

Adding Internal Networks to Bridges 270 Check Point Safe@Office User Guide Adding Internal Networks to Bridges Note: In order to add a VLAN o

Page 209

Adding Internal Networks to Bridges Chapter 7: Using Bridges 271 New fields appear. 4. Complete these fields as described below.

Page 210

Adding Internal Networks to Bridges 272 Check Point Safe@Office User Guide If the assigned bridge uses STP, additional fields appear. 5. Click

Page 211 - Managing Your Network

Adding Internal Networks to Bridges Chapter 7: Using Bridges 273 Table 48: Bridged Network Fields In this field… Do this… Assign to Bridge Selec

Page 212 - Configuring the LAN Network

Safe@Office 1000NW and 1000NW ADSL Product Features Chapter 1: Introduction 13 Dynamic Routing * Management Central Management SMP Local Managem

Page 213

Adding Internet Connections to Bridges 274 Check Point Safe@Office User Guide In this field… Do this… Spanning Tree Protocol - Port Priority Sele

Page 214 - Changing IP Addresses

Adding Internet Connections to Bridges Chapter 7: Using Bridges 275 This option is available in ADSL models only. • To use the WAN port, select

Page 215 - Enabling/Disabling Hide NAT

Adding Internet Connections to Bridges 276 Check Point Safe@Office User Guide 6. Complete the rest of the fields using the relevant information

Page 216 - Configuring a DHCP Server

Adding Internet Connections to Bridges Chapter 7: Using Bridges 277 Table 49: Bridged Connection Fields In this field… Do this… Bridge Mode Sel

Page 217

Deleting Bridges 278 Check Point Safe@Office User Guide In this field… Do this… Spanning Tree Protocol - Port Priority Select the port's pri

Page 218

Deleting Bridges Chapter 7: Using Bridges 279 2. Remove all Internet connections from the bridge, by doing the following for each connection: a.

Page 220 - Configuring DHCP Relay

Overview Chapter 8: Configuring High Availability 281 Chapter 8 This chapter describes how to configure High Availability (HA) for two or more Sa

Page 221

Overview 282 Check Point Safe@Office User Guide 4. When a gateway that was offline comes back online, or a gateway's priority changes, the

Page 222 - To configure DHCP options

Overview Chapter 8: Configuring High Availability 283 Note: To use a WAN virtual IP address, the Internet connection method must be "Stati

Page 223

modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification"

Page 224

Safe@Office 500 and 500 ADSL Product Features 14 Check Point Safe@Office User Guide Safe@Office 500 and 500 ADSL Product Features Table 3: Safe@O

Page 225

Configuring High Availability on a Gateway 284 Check Point Safe@Office User Guide Configuring High Availability on a Gateway The following proce

Page 226

Configuring High Availability on a Gateway Chapter 8: Configuring High Availability 285 The fields are enabled. 4. Next to each network for wh

Page 227 - Configuring a DMZ Network

Configuring High Availability on a Gateway 286 Check Point Safe@Office User Guide This can be any unused IP address in the network, and must be t

Page 228 - The Ports page appears

Configuring High Availability on a Gateway Chapter 8: Configuring High Availability 287 Table 50: High Availability Page Fields In this field… Do

Page 229

Configuring High Availability on a Gateway 288 Check Point Safe@Office User Guide In this field… Do this… When in passive state Disable VPN Se

Page 230

Sample Implementation on Two Gateways Chapter 8: Configuring High Availability 289 In this field… Do this… Group ID If multiple HA clusters exis

Page 231

Sample Implementation on Two Gateways 290 Check Point Safe@Office User Guide The procedure below shows how to configure HA for both the LAN and D

Page 232 - Configuring VLANs

Sample Implementation on Two Gateways Chapter 8: Configuring High Availability 291 Gateway A will reduce its priority by 30, if its secondary Int

Page 233 - Figure 27: Tag-Based VLAN

Sample Implementation on Two Gateways 292 Check Point Safe@Office User Guide

Page 234 - Figure 28: Port-Based VLAN

Overview Chapter 9: Using Traffic Shaper 293 Chapter 9 This chapter describes how to use Traffic Shaper to control the flow of communication to a

Page 235 - Adding and Editing VLANs

Safe@Office 500 and 500 ADSL Product Features Chapter 1: Introduction 15 Dialup Backup With external serial / USB modem Console Port (Serial) P

Page 236

Overview 294 Check Point Safe@Office User Guide Each class has a bandwidth limit, which is the maximum amount of bandwidth that connections belon

Page 237

Setting Up Traffic Shaper Chapter 9: Using Traffic Shaper 295 Setting Up Traffic Shaper To set up Traffic Shaper 1. Enable Traffic Shaper for t

Page 238

Predefined QoS Classes 296 Check Point Safe@Office User Guide Shaper will handle outgoing VPN traffic as specified in the bandwidth policy for th

Page 239 - Deleting VLANs

Adding and Editing Classes Chapter 9: Using Traffic Shaper 297 Class Weight Delay Sensitivity Useful for Urgent 15 High (Interactive Traffic)

Page 240 - Example

Adding and Editing Classes 298 Check Point Safe@Office User Guide Adding and Editing Classes To add or edit a QoS class 1. Click Network in the

Page 241 - The DNS Server page appears

Adding and Editing Classes Chapter 9: Using Traffic Shaper 299 The Safe@Office QoS Class Editor wizard opens, with the Step 1 of 3: Quality of Se

Page 242 - 4. Click Apply

Adding and Editing Classes 300 Check Point Safe@Office User Guide Note: Traffic Shaper may not enforce guaranteed rates and relative weights fo

Page 243 - Using Network Objects

Adding and Editing Classes Chapter 9: Using Traffic Shaper 301 Table 53: QoS Class Fields In this field… Do this… Relative Weight Type a value i

Page 244

Viewing and Deleting Classes 302 Check Point Safe@Office User Guide In this field… Do this… Incoming Traffic: Limit rate to Select this option to

Page 245 - Using Network Objects

Restoring Traffic Shaper Defaults Chapter 9: Using Traffic Shaper 303 Restoring Traffic Shaper Defaults If desired, you can reset the Traffic Sh

Page 246

Safe@Office 500 and 500 ADSL Product Features 16 Check Point Safe@Office User Guide Port-based and Tag-based VLAN * Port-based Security (802.1x)

Page 248 - 8. Click Finish

Overview Chapter 10: Working with Wireless Networks 305 Chapter 10 This chapter describes how to configure wireless internal networks. This chapt

Page 249

Overview 306 Check Point Safe@Office User Guide compatible stations. For more information on the Super G mode refer to: http://www.super-ag.com.

Page 250

Overview Chapter 10: Working with Wireless Networks 307 Virtual Access Points The Safe@Office appliance enables you to partition the primary WLA

Page 251

Overview 308 Check Point Safe@Office User Guide different access point, you can bridge the two network segments over WDS links. The network segme

Page 252

Overview Chapter 10: Working with Wireless Networks 309 When used together with bridge mode and Spanning Tree Protocol (STP), you can use WDS lin

Page 253

Overview 310 Check Point Safe@Office User Guide Note: Mesh topology is only supported in Safe@Office 500W. You can configure up to seven WDS

Page 254

Overview Chapter 10: Working with Wireless Networks 311 Network Count Limitations You can configure a total of eight wireless objects, including

Page 255

Overview 312 Check Point Safe@Office User Guide Security Protocol Description WEP encryption In the WEP (Wired Equivalent Privacy) encryption se

Page 256

Overview Chapter 10: Working with Wireless Networks 313 Security Protocol Description recommended for situations where you want to authenticate w

Page 257 - Using Static Routes

Safe@Office 500 and 500 ADSL Product Features Chapter 1: Introduction 17 Networking Supported Internet Connection Methods Static IP, DHCP, PPPoE,

Page 258 - To add a static route

Configuring Wireless Networks 314 Check Point Safe@Office User Guide Note: For increased security, it is recommended to enable the Safe@Office

Page 259 - Using Static Routes

Configuring Wireless Networks Chapter 10: Working with Wireless Networks 315 The Wireless Configuration Wizard opens, with the Wireless Configura

Page 260 - 6. Click Next

Configuring Wireless Networks 316 Check Point Safe@Office User Guide 8. The Wireless Security dialog box appears. 9. Do one of the following:

Page 261

Configuring Wireless Networks Chapter 10: Working with Wireless Networks 317 10. Do one of the following: • To bridge the LAN and WLAN networks

Page 262 - Managing Ports

Configuring Wireless Networks 318 Check Point Safe@Office User Guide Do the following: 1. In the text box, type the passphrase for accessing the

Page 263 - Viewing Port Statuses

Configuring Wireless Networks Chapter 10: Working with Wireless Networks 319 4. The Wireless Security Complete dialog box appears. 5. Click Fi

Page 264

Configuring Wireless Networks 320 Check Point Safe@Office User Guide WEP If you chose WEP, the Wireless Configuration-WEP dialog box appears. Do

Page 265 - Displays…

Configuring Wireless Networks Chapter 10: Working with Wireless Networks 321 4. Click Next. The Wireless Security Complete dialog box appears. 5

Page 266

Configuring Wireless Networks 322 Check Point Safe@Office User Guide The Edit Network Settings page appears. The fields that appear depend on th

Page 267

Configuring Wireless Networks Chapter 10: Working with Wireless Networks 323 10. Complete the fields using the information in Basic Wireless Set

Page 268

Safe@Office 500 and 500 ADSL Product Features 18 Check Point Safe@Office User Guide Static Routes, Source Routes, and Service-Based Routes Ether

Page 269

Configuring Wireless Networks 324 Check Point Safe@Office User Guide 13. Click OK. A success message appears. Note: Some wireless cards have

Page 270 - Modifying Port Assignments

Configuring Wireless Networks Chapter 10: Working with Wireless Networks 325 In this field… Do this… • 802.11g Super (54/108 Mbps). Operates in

Page 271 - To modify a port assignment

Configuring Wireless Networks 326 Check Point Safe@Office User Guide In this field… Do this… • A specific channel. The list of channels is depen

Page 272

Configuring Wireless Networks Chapter 10: Working with Wireless Networks 327 In this field… Do this… Authentication Server Specify which authenti

Page 273 - Resetting Ports to Defaults

Configuring Wireless Networks 328 Check Point Safe@Office User Guide In this field… Do this… WEP Keys If you selected WEP encryption, you must c

Page 274 - To reset a port to defaults

Configuring Wireless Networks Chapter 10: Working with Wireless Networks 329 Table 56: Advanced Wireless Settings Fields In this field… Do this

Page 275 - Using Bridges

Configuring Wireless Networks 330 Check Point Safe@Office User Guide In this field… Do this… Wireless Transmitter Transmission Rate Select the

Page 276

Configuring Wireless Networks Chapter 10: Working with Wireless Networks 331 In this field… Do this… Antenna Selection Multipath distortion is c

Page 277 - Figure 30: Bridge Firewalling

Configuring Wireless Networks 332 Check Point Safe@Office User Guide In this field… Do this… RTS Threshold Type the smallest IP packet size for

Page 278

Configuring Wireless Networks Chapter 10: Working with Wireless Networks 333 In this field… Do this… WDS Specify whether to enable WDS links: •

Page 279 - How Does Bridge Mode Work?

Safe@Office 500W and 500W ADSL Product Features Chapter 1: Introduction 19 Hardware Specifications Power 100/110/120/210/220/230VAC (Linear Powe

Page 280

Configuring Wireless Networks 334 Check Point Safe@Office User Guide To add or edit a VAP 1. Configure and enable the primary WLAN. For informat

Page 281 - Workflow

Configuring Wireless Networks Chapter 10: Working with Wireless Networks 335 The Edit Network Settings page appears. 5. In the Network Name fie

Page 282 - Adding and Editing Bridges

Configuring Wireless Networks 336 Check Point Safe@Office User Guide New fields appear. The fields that appear depend on the hardware type. 7.

Page 283 - A success message appears

Configuring Wireless Networks Chapter 10: Working with Wireless Networks 337 See Configuring a DHCP Server on page 200. 12. Complete the fields

Page 284

Configuring Wireless Networks 338 Check Point Safe@Office User Guide Note: Some wireless cards have "Infrastructure" and "Ad-hoc

Page 285

Configuring Wireless Networks Chapter 10: Working with Wireless Networks 339 b) If using Safe@Office1000NW, enable WDS links. For information on

Page 286

Configuring Wireless Networks 340 Check Point Safe@Office User Guide Note: This is the MAC address of the WLAN interface, not the WAN MAC addre

Page 287 - New fields appear

Configuring Wireless Networks Chapter 10: Working with Wireless Networks 341 New fields appear. The fields that appear depend on the hardware t

Page 288

Troubleshooting Wireless Connectivity 342 Check Point Safe@Office User Guide Troubleshooting Wireless Connectivity I cannot connect to a wireless

Page 289

Troubleshooting Wireless Connectivity Chapter 10: Working with Wireless Networks 343 • Relocate the Safe@Office appliance to a place with better

Page 290

Safe@Office 500W and 500W ADSL Product Features 20 Check Point Safe@Office User Guide WAN Port Ethernet, 10/100 Mbps ADSL2+ ADSL Standards —

Page 291

Troubleshooting Wireless Connectivity 344 Check Point Safe@Office User Guide parameter in the wireless network's advanced settings to a lowe

Page 292

Viewing the Safe@Office Appliance Status Chapter 11: Viewing Reports 345 Chapter 11 This chapter describes the Safe@Office Portal reports. This

Page 293

Viewing the Safe@Office Appliance Status 346 Check Point Safe@Office User Guide To view the Safe@Office appliance's current status 1. Click

Page 294 - Deleting Bridges

Viewing the Safe@Office Appliance Status Chapter 11: Viewing Reports 347 Table 57: Status Monitor Fields This field… Displays… Device Information

Page 295 - Deleting Bridges

Viewing the Safe@Office Appliance Status 348 Check Point Safe@Office User Guide This field… Displays… Internet The Safe@Office appliance's

Page 296

Viewing the Safe@Office Appliance Status Chapter 11: Viewing Reports 349 This field… Displays… Antivirus The Safe@Office appliance's VStrea

Page 297

Viewing the Safe@Office Appliance Status 350 Check Point Safe@Office User Guide This field… Displays… HA The Safe@Office appliance's High A

Page 298

Viewing the Safe@Office Appliance Status Chapter 11: Viewing Reports 351 This field… Displays… System Mem The percentage of system memory in use

Page 299 - Overview

Using the Traffic Monitor 352 Check Point Safe@Office User Guide Using the Traffic Monitor You can view incoming and outgoing traffic for select

Page 300

Using the Traffic Monitor Chapter 11: Viewing Reports 353 Viewing Traffic Reports To view a traffic report 1. Click Reports in the main menu, a

Page 301

Safe@Office 500W and 500W ADSL Product Features Chapter 1: Introduction 21 Four Preset Security Policies Anti-spoofing Voice over IP Support S

Page 302

Using the Traffic Monitor 354 Check Point Safe@Office User Guide 3. To refresh all traffic reports, click Refresh. 4. To clear all traffic repo

Page 303

Using the Traffic Monitor Chapter 11: Viewing Reports 355 The Traffic Monitor Settings page appears. 3. In the Sample monitoring data every fie

Page 304

Using the Traffic Monitor 356 Check Point Safe@Office User Guide Exporting General Traffic Reports You can export a general traffic report that

Page 305

Viewing Computers Chapter 11: Viewing Reports 357 Viewing Computers This option allows you to view the currently active computers on your networ

Page 306

Viewing Computers 358 Check Point Safe@Office User Guide blocked from accessing the Internet through the Safe@Office appliance, the reason why it

Page 307

Viewing Connections Chapter 11: Viewing Reports 359 The Node Limit window appears with installed software product and the number of nodes used.

Page 308

Viewing Connections 360 Check Point Safe@Office User Guide The Connections page appears. The page displays the information in the following tabl

Page 309 - Using Traffic Shaper

Viewing Network Statistics Chapter 11: Viewing Reports 361 Table 59: Connections Fields This field… Displays… Protocol The protocol used (TCP, U

Page 310

Viewing Network Statistics 362 Check Point Safe@Office User Guide Viewing Network Statistics You can view statistics for each of the Safe@Office

Page 311 - Setting Up Traffic Shaper

Viewing Network Statistics Chapter 11: Viewing Reports 363 2. To refresh the display, click Refresh. Table 60: General Network Statistics This f

Page 312 - Predefined QoS Classes

Safe@Office 500W and 500W ADSL Product Features 22 Check Point Safe@Office User Guide Route-based VPN Backup VPN Gateways Remote Access VPN C

Page 313 - Useful for

Viewing Network Statistics 364 Check Point Safe@Office User Guide The page displays statistics for the Internet connection. The following example

Page 314 - Adding and Editing Classes

Viewing Network Statistics Chapter 11: Viewing Reports 365 This field… Displays… Internet Mode The Internet connection method used Connected

Page 315 - Adding and Editing Classes

Viewing Network Statistics 366 Check Point Safe@Office User Guide This field… Displays… RF status These fields only appear for ADSL connections.

Page 316

Viewing Network Statistics Chapter 11: Viewing Reports 367 This field… Displays… Errors The total number of transmitted and received packets fo

Page 317 - Table 53: QoS Class Fields

Viewing Network Statistics 368 Check Point Safe@Office User Guide Viewing Wired Network Statistics You can view statistics for wired network int

Page 318 - Viewing and Deleting Classes

Viewing Network Statistics Chapter 11: Viewing Reports 369 Table 62: Wired Network Statistics This field… Displays… Type The network's typ

Page 319

Viewing Network Statistics 370 Check Point Safe@Office User Guide Viewing Wireless Network Statistics If the primary WLAN is enabled, you can vi

Page 320

Viewing Network Statistics Chapter 11: Viewing Reports 371 Table 63: Wireless Statistics This field… Displays… Type The network's type, in

Page 321

Viewing Network Statistics 372 Check Point Safe@Office User Guide This field… Displays… Missing Fragments The total number of packets missed dur

Page 322 - The Primary WLAN

Viewing Network Statistics Chapter 11: Viewing Reports 373 The page displays statistics for the bridge. For information on the fields, see the fo

Page 323 - Virtual Access Points

Safe@Office 500W and 500W ADSL Product Features Chapter 1: Introduction 23 Connection DHCP Server, Client, and Relay DNS Server MAC Cloning Ne

Page 324

Viewing the Routing Table 374 Check Point Safe@Office User Guide This field… Displays… Errors The total number of transmitted and received pack

Page 325 - Figure 34:

Viewing the Routing Table Chapter 11: Viewing Reports 375 The Routing Table page appears. The page displays the information in the following tab

Page 326 - Figure 35:

Viewing Wireless Station Statistics 376 Check Point Safe@Office User Guide This field… Displays… Interface The interface for which the route is

Page 327 - Wireless Security Protocols

Viewing Wireless Station Statistics Chapter 11: Viewing Reports 377 Table 66: Wireless Station Statistics This field… Displays… Current Rate The

Page 329

Viewing the Event Log Chapter 12: Viewing Logs 379 Chapter 12 This chapter describes the Safe@Office appliance logs. This chapter includes the fo

Page 330

Viewing the Event Log 380 Check Point Safe@Office User Guide To view the event log 1. Click Logs in the main menu, and click the Event Log tab.

Page 331

Viewing the Event Log Chapter 12: Viewing Logs 381 5. To refresh the display, click Refresh. 6. To save the displayed events to an *.xls file:

Page 332

Viewing the Event Log 382 Check Point Safe@Office User Guide If you are using Internet Explorer, and this is the first time that you copy logs, a

Page 333 - WPA-Personal

Viewing the Security Log Chapter 12: Viewing Logs 383 Table 68: Event Log Color Coding An event marked in this color… Indicates… Red An error me

Page 334

6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original

Page 335 - The wizard closes

Safe@Office 500W and 500W ADSL Product Features 24 Check Point Safe@Office User Guide Local Diagnostics Tools Ping, WHOIS, Packet Sniffer, Status

Page 336

Viewing the Security Log 384 Check Point Safe@Office User Guide To view the security log 1. Click Logs in the main menu, and click the Security

Page 337 - No Security

Viewing the Security Log Chapter 12: Viewing Logs 385 4. To navigate the log table, do any of the following: • To scroll through the displayed

Page 338

Viewing the Security Log 386 Check Point Safe@Office User Guide The selected logs are highlighted in yellow. b. Press CTRL+C. If you are using

Page 339

Viewing the Security Log Chapter 12: Viewing Logs 387 Table 69: Security Log Columns This column... Displays... No The log message number Date

Page 340 - 13. Click OK

Viewing the Security Log 388 Check Point Safe@Office User Guide This column... Displays... Service The protocol and destination port used for th

Page 341

Viewing the Security Log Chapter 12: Viewing Logs 389 Action Icon Description Potential Spam Detected An email was rejected as potential spam. M

Page 343

The Safe@Office Firewall Security Policy Chapter 13: Setting Your Security Policy 391 Chapter 13 This chapter describes how to set up your Safe@O

Page 344

The Safe@Office Firewall Security Policy 392 Check Point Safe@Office User Guide Security Policy Implementation The key to implementing a network

Page 345

Default Security Policy Chapter 13: Setting Your Security Policy 393 Default Security Policy The Safe@Office default security policy includes the

Page 346

Wireless Features Chapter 1: Introduction 25 Wireless Features Table 5: Safe@Office Wireless Features Feature Safe@Office 500W / Safe@Office 500

Page 347

Setting the Firewall Security Level 394 Check Point Safe@Office User Guide Setting the Firewall Security Level The firewall security level can b

Page 348

Setting the Firewall Security Level Chapter 13: Setting Your Security Policy 395 This level… Does this… Further Details Block All Blocks all acc

Page 349

Setting the Firewall Security Level 396 Check Point Safe@Office User Guide The Firewall page appears. 2. Drag the security lever to the desired

Page 350 - To add or edit a VAP

Configuring Servers Chapter 13: Setting Your Security Policy 397 Configuring Servers Note: If you do not intend to host any public Internet

Page 351

Configuring Servers 398 Check Point Safe@Office User Guide The Servers page appears, displaying a list of services and a host IP address for each

Page 352

Configuring Servers Chapter 13: Setting Your Security Policy 399 Table 73: Servers Page Fields In this column… Do this… Allow Select the check b

Page 353

Using Rules 400 Check Point Safe@Office User Guide Using Rules The Safe@Office appliance checks the protocol used, the ports range, and the dest

Page 354 - To add or edit a WDS link

Using Rules Chapter 13: Setting Your Security Policy 401 For example, if you want to block all outgoing FTP traffic, except traffic from a specif

Page 355

Using Rules 402 Check Point Safe@Office User Guide Table 74: Firewall Rule Types Rule Description Allow and Forward This rule type enables you to

Page 356

Using Rules Chapter 13: Setting Your Security Policy 403 Rule Description Allow This rule type enables you to do the following: • Permit outgoi

Page 357

Optional Security Services 26 Check Point Safe@Office User Guide * Requires Power Pack upgrade CPSB-500-UPG-PPACK or CPSB-1000-UPG-PPACK, dependi

Page 358

Using Rules 404 Check Point Safe@Office User Guide Adding and Editing Firewall Rules To add or edit a firewall rule 1. Click Security in the ma

Page 359

Using Rules Chapter 13: Setting Your Security Policy 405 The Safe@Office Firewall Rule wizard opens, with the Step 1: Rule Type dialog box displa

Page 360

Using Rules 406 Check Point Safe@Office User Guide 5. Complete the fields using the relevant information in the following table. 6. Click Next.

Page 361 - Viewing Reports

Using Rules Chapter 13: Setting Your Security Policy 407 8. Complete the fields using the relevant information in the following table. 9. Click

Page 362

Using Rules 408 Check Point Safe@Office User Guide The Step 5: Done dialog box appears. 12. If desired, type a description of the rule in the f

Page 363

Using Rules Chapter 13: Setting Your Security Policy 409 In this field… Do this… Protocol Select the protocol for which the rule should apply (E

Page 364

Using Rules 410 Check Point Safe@Office User Guide In this field… Do this… To specify the Safe@Office IP addresses, select This Gateway. To spec

Page 365

Using Rules Chapter 13: Setting Your Security Policy 411 In this field… Do this… Log accepted connections / Log blocked connections Select this

Page 366

Using Rules 412 Check Point Safe@Office User Guide Reordering Firewall Rules To reorder firewall rules 1. Click Security in the main menu, and

Page 367

Using Port-Based Security Chapter 13: Setting Your Security Policy 413 Viewing and Deleting Firewall Rules To view or delete an existing firewal

Page 368 - Using the Traffic Monitor

Getting to Know Your Safe@Office 1000N Appliance Chapter 1: Introduction 27 Getting to Know Your Safe@Office 1000N Appliance Package Contents T

Page 369 - Viewing Traffic Reports

Using Port-Based Security 414 Check Point Safe@Office User Guide network, all users who authenticate successfully on that port are assigned to th

Page 370

Using Port-Based Security Chapter 13: Setting Your Security Policy 415 Configuring Port-Based Security To configure 802.1x port-based security f

Page 371 - Using the Traffic Monitor

Using Port-Based Security 416 Check Point Safe@Office User Guide The Ports page appears. 5. Next to the desired port, click Edit.

Page 372

Using Port-Based Security Chapter 13: Setting Your Security Policy 417 The Port Setup page appears. 6. In the Port Security drop-down list, sel

Page 373 - Viewing Computers

Using Port-Based Security 418 Check Point Safe@Office User Guide Table 76: Port-Based Security Fields In this field… Do this… Assign to network

Page 374

Using Secure HotSpot Chapter 13: Setting Your Security Policy 419 Resetting 802.1x Locking When 802.1x port-based security is configured for a L

Page 375 - Viewing Connections

Using Secure HotSpot 420 Check Point Safe@Office User Guide On this page, users must read and accept the My HotSpot terms of use, and if My HotSp

Page 376

Using Secure HotSpot Chapter 13: Setting Your Security Policy 421 My HotSpot page. For information on excluding network objects from HotSpot enfo

Page 377 - Table 59: Connections Fields

Using Secure HotSpot 422 Check Point Safe@Office User Guide Enabling/Disabling Secure HotSpot To enable/disable Secure HotSpot 1. Click Securit

Page 378 - Viewing Network Statistics

Using Secure HotSpot Chapter 13: Setting Your Security Policy 423 3. Click Apply. Customizing Secure HotSpot To customize Secure HotSpot 1. C

Page 379

Getting to Know Your Safe@Office 1000N Appliance 28 Check Point Safe@Office User Guide Rear Panel All physical connections (network and power) ar

Page 380

Using NAT Rules 424 Check Point Safe@Office User Guide In this field… Do this… My HotSpot Terms Type the terms to which the user must agree befor

Page 381

Using NAT Rules Chapter 13: Setting Your Security Policy 425 Using NAT Rules Overview In an IP network, each computer is assigned a unique IP ad

Page 382

Using NAT Rules 426 Check Point Safe@Office User Guide Supported NAT Rule Types The Safe@Office appliance enables you to define the following typ

Page 383

Using NAT Rules Chapter 13: Setting Your Security Policy 427 • Static NAT is configured for a network object (for information, see Using Network

Page 384

Using NAT Rules 428 Check Point Safe@Office User Guide The Address Translation page appears. 2. Do one of the following: • To add a new rule,

Page 385

Using NAT Rules Chapter 13: Setting Your Security Policy 429 The Address Translation wizard opens, with the Step 1 of 3: Original Connection Deta

Page 386

Using NAT Rules 430 Check Point Safe@Office User Guide 6. Click Next. The Step 3 of 3: Save Address Translation dialog box appears. 7. If desi

Page 387

Using NAT Rules Chapter 13: Setting Your Security Policy 431 Field Description And the destination is Select the original destination of the con

Page 388 - Viewing Bridge Statistics

Using NAT Rules 432 Check Point Safe@Office User Guide Field Description Change the destination to Select the new destination to which the origi

Page 389 - Table 64: Bridge Statistics

Using the EAP Authenticator Chapter 13: Setting Your Security Policy 433 b. Click OK. The rule is deleted. Using the EAP Authenticator Wi-Fi Pr

Page 390 - Viewing the Routing Table

Getting to Know Your Safe@Office 1000N Appliance Chapter 1: Introduction 29 Label Description RESET A button used for rebooting the Safe@Office

Page 391

Using the EAP Authenticator 434 Check Point Safe@Office User Guide Workflows The Safe@Office built-in EAP authenticator can be used to authentica

Page 392

Using the EAP Authenticator Chapter 13: Setting Your Security Policy 435 See Adding and Editing Users on page 680. e. Provide each of the users

Page 393

Using the EAP Authenticator 436 Check Point Safe@Office User Guide instructions on generating a self-signed certificate, see Generating a Certifi

Page 394

Using the EAP Authenticator Chapter 13: Setting Your Security Policy 437 • If the Choose a Wireless Network screen appears, click Change Advance

Page 395 - Viewing Logs

Using the EAP Authenticator 438 Check Point Safe@Office User Guide 7. In the Network name (SSID) field, type the Safe@Office appliance wireless

Page 396 - To view the event log

Using the EAP Authenticator Chapter 13: Setting Your Security Policy 439 The Protected EAP Properties dialog box appears. 14. Make sure that th

Page 397 - Viewing the Event Log

Using the EAP Authenticator 440 Check Point Safe@Office User Guide Configuring Clients for Server Authentication on Wired Connections To configu

Page 398 - Displays

Using the EAP Authenticator Chapter 13: Setting Your Security Policy 441 The Protected EAP Properties dialog box appears. 9. Make sure that the

Page 399 - Viewing the Security Log

Using the EAP Authenticator 442 Check Point Safe@Office User Guide Installing the Safe@Office Appliance's CA Certificate on Clients To inst

Page 400 - To view the security log

Using the EAP Authenticator Chapter 13: Setting Your Security Policy 443 The File to Import dialog box appears. 3. Browse to the Safe@Office ap

Page 401 - Viewing the Security Log

Getting to Know Your Safe@Office 1000N Appliance 30 Check Point Safe@Office User Guide Table 7: Safe@Office 1000N Appliance Status LEDs LED Stat

Page 402

Using the EAP Authenticator 444 Check Point Safe@Office User Guide The Certificate Store dialog box appears. 6. Click Automatically select the

Page 403

Using the EAP Authenticator Chapter 13: Setting Your Security Policy 445 If the Safe@Office appliance certificate was self-signed, a warning mess

Page 404

Using the EAP Authenticator 446 Check Point Safe@Office User Guide d. Click Certificates. The Certificates dialog box appears. e. Click the Tru

Page 405

Using the EAP Authenticator Chapter 13: Setting Your Security Policy 447 The Certificate dialog box appears with additional information. Connec

Page 406

Using the EAP Authenticator 448 Check Point Safe@Office User Guide The Enter Credentials dialog box appears. 6. Type the Network Access user&a

Page 407 - Setting Your Security Policy

Overview Chapter 14: Using SmartDefense 449 Chapter 14 This chapter explains how to use Check Point SmartDefense Services. This chapter includes

Page 408 - Security Policy Enforcement

Configuring SmartDefense 450 Check Point Safe@Office User Guide Configuring SmartDefense You can configure SmartDefense using the following to

Page 409 - Default Security Policy

Configuring SmartDefense Chapter 14: Using SmartDefense 451 The SmartDefense page appears. 2. Click SmartDefense Wizard.

Page 410 - Further Details

Configuring SmartDefense 452 Check Point Safe@Office User Guide The SmartDefense Wizard opens, with the Step 1: SmartDefense Level dialog box dis

Page 411

Configuring SmartDefense Chapter 14: Using SmartDefense 453 5. Select the check boxes next to the types of public servers that are running on yo

Page 412 - The Firewall page appears

Getting to Know Your Safe@Office 1000N ADSL Appliance Chapter 1: Introduction 31 1000Mbps Off, LINK/ACT Flashing (Green) 10 Mbps link establishe

Page 413 - Configuring Servers

Configuring SmartDefense 454 Check Point Safe@Office User Guide The Step 4: Confirmation dialog box appears. 9. Click Finish. Existing SmartDef

Page 414

Configuring SmartDefense Chapter 14: Using SmartDefense 455 Table 79: SmartDefense Security Levels This level… Does this… Minimal Disables all

Page 415 - In this column…

Configuring SmartDefense 456 Check Point Safe@Office User Guide Using the SmartDefense Tree For convenience, SmartDefense is organized as a tree

Page 416 - Using Rules

Configuring SmartDefense Chapter 14: Using SmartDefense 457 To configure a SmartDefense node 1. Click Security in the main menu, and click the

Page 417 - Using Rules

SmartDefense Categories 458 Check Point Safe@Office User Guide a) Click Default. A confirmation message appears. b) Click OK. The fields are re

Page 418

SmartDefense Categories Chapter 14: Using SmartDefense 459 • Ping of Death on page 460 • Teardrop on page 459 Teardrop In a Teardrop attack, t

Page 419

SmartDefense Categories 460 Check Point Safe@Office User Guide Ping of Death In a Ping of Death attack, the attacker sends a fragmented PING requ

Page 420

SmartDefense Categories Chapter 14: Using SmartDefense 461 LAND In a LAND attack, the attacker sends a SYN packet, in which the source address an

Page 421

SmartDefense Categories 462 Check Point Safe@Office User Guide Non-TCP Flooding Advanced firewalls maintain state information about connections i

Page 422

SmartDefense Categories Chapter 14: Using SmartDefense 463 In this field… Do this… Max. Percent Non-TCP Traffic Type the maximum percentage of st

Page 423

Getting to Know Your Safe@Office 1000N ADSL Appliance 32 Check Point Safe@Office User Guide Getting to Know Your Safe@Office 1000N ADSL Appliance

Page 424 - 13. Click Finish

SmartDefense Categories 464 Check Point Safe@Office User Guide Table 84: Distributed Denial of Service Fields In this field… Do this… Action Spe

Page 425

SmartDefense Categories Chapter 14: Using SmartDefense 465 Packet Sanity Packet Sanity performs several Layer 3 and Layer 4 sanity checks. These

Page 426

SmartDefense Categories 466 Check Point Safe@Office User Guide In this field… Do this… Disable relaxed UDP length verification The UDP length ver

Page 427

SmartDefense Categories Chapter 14: Using SmartDefense 467 Max Ping Size PING (ICMP echo request) is a program that uses ICMP protocol to check w

Page 428 - Reordering Firewall Rules

SmartDefense Categories 468 Check Point Safe@Office User Guide IP Fragments When an IP packet is too big to be transported by a network link, it

Page 429 - Using Port-Based Security

SmartDefense Categories Chapter 14: Using SmartDefense 469 Table 87: IP Fragments Fields In this field… Do this… Forbid IP Fragments Specify whe

Page 430

SmartDefense Categories 470 Check Point Safe@Office User Guide Network Quota An attacker may try to overload a server in your network by establis

Page 431 - Using Port-Based Security

SmartDefense Categories Chapter 14: Using SmartDefense 471 In this field… Do this… Max. Connections/Second from Same Source IP Type the maximum n

Page 432

SmartDefense Categories 472 Check Point Safe@Office User Guide Table 89: Welchia Fields In this field… Do this… Action Specify what action to ta

Page 433

SmartDefense Categories Chapter 14: Using SmartDefense 473 Table 90: Cisco IOS DOS In this field… Do this… Action Specify what action to take w

Page 434

Getting to Know Your Safe@Office 1000N ADSL Appliance Chapter 1: Introduction 33 • If desired, you can connect your appliance to an external bro

Page 435 - Using Secure HotSpot

SmartDefense Categories 474 Check Point Safe@Office User Guide Null Payload Some worms, such as Sasser, use ICMP echo request packets with null p

Page 436 - Authentication on page 688

SmartDefense Categories Chapter 14: Using SmartDefense 475 Checksum Verification SmartDefense identifies any IP, TCP, or UDP packets with incorre

Page 437 - Setting Up Secure HotSpot

SmartDefense Categories 476 Check Point Safe@Office User Guide TCP This category allows you to configure various protections related to the TCP p

Page 438

SmartDefense Categories Chapter 14: Using SmartDefense 477 Table 93: Strict TCP In this field… Do this… Action Specify what action to take when

Page 439 - Customizing Secure HotSpot

SmartDefense Categories 478 Check Point Safe@Office User Guide Table 94: Small PMTU Fields In this field… Do this… Action Specify what action t

Page 440

SmartDefense Categories Chapter 14: Using SmartDefense 479 SynDefender In a SYN attack, the attacker sends many SYN packets without finishing the

Page 441 - Using NAT Rules

SmartDefense Categories 480 Check Point Safe@Office User Guide In this field… Do this… Log mode Specify upon which events logs should be issued,

Page 442 - Supported NAT Rule Types

SmartDefense Categories Chapter 14: Using SmartDefense 481 Sequence Verifier The Safe@Office appliance examines each TCP packet's sequence n

Page 443 - Adding and Editing NAT Rules

SmartDefense Categories 482 Check Point Safe@Office User Guide Flags The URG flag is used to indicate that there is urgent data in the TCP stream

Page 444

SmartDefense Categories Chapter 14: Using SmartDefense 483 Port Scan An attacker can perform a port scan to determine whether ports are open and

Page 445 - Using NAT Rules

 Do not expose the appliance to extreme high or low temperatures.  Do not disassemble or open the appliance. Failure to comply will void the war

Page 446

Getting to Know Your Safe@Office 1000N ADSL Appliance 34 Check Point Safe@Office User Guide Label Description DSL An RJ-11 ADSL port used for co

Page 447

SmartDefense Categories 484 Check Point Safe@Office User Guide Table 98: Port Scan Fields In this field… Do this… Number of ports accessed Smart

Page 448 - To view and delete NAT rules

SmartDefense Categories Chapter 14: Using SmartDefense 485 In this field… Do this… Track Specify whether to issue logs for scans, by selecting o

Page 449 - Using the EAP Authenticator

SmartDefense Categories 486 Check Point Safe@Office User Guide FTP Bounce When connecting to an FTP server, the client sends a PORT command speci

Page 450 - Workflows

SmartDefense Categories Chapter 14: Using SmartDefense 487 Block Known Ports You can choose to block the FTP server from connecting to well-known

Page 451

SmartDefense Categories 488 Check Point Safe@Office User Guide Block Port Overflow FTP clients send PORT commands when connecting to the FTP seve

Page 452 - Wireless Connections

SmartDefense Categories Chapter 14: Using SmartDefense 489 Blocked FTP Commands Some seldom-used FTP commands may compromise FTP server security

Page 453

SmartDefense Categories 490 Check Point Safe@Office User Guide To allow a specific FTP command 1. In the Blocked Commands box, select the desire

Page 454

SmartDefense Categories Chapter 14: Using SmartDefense 491 Table 102: Header Rejection Fields In this field… Do this… Action Specify what action

Page 455

SmartDefense Categories 492 Check Point Safe@Office User Guide Table 103: Worm Catcher Fields In this field… Do this… Action Specify what action

Page 456 - Connections

SmartDefense Categories Chapter 14: Using SmartDefense 493 Table 104: File Print and Sharing Fields In this field… Do this… Action Specify what

Page 457

Getting to Know Your Safe@Office 1000N ADSL Appliance Chapter 1: Introduction 35 Side Panel The side panel includes a slot for inserting an Expre

Page 458 - Clients

SmartDefense Categories 494 Check Point Safe@Office User Guide IGMP This category includes the IGMP protocol. IGMP is used by hosts and routers t

Page 459

SmartDefense Categories Chapter 14: Using SmartDefense 495 In this field… Do this… Specify whether to allow or block IGMP packets that are sent t

Page 460

SmartDefense Categories 496 Check Point Safe@Office User Guide SIP The SmartDefense SIP Application Level Gateway (ALG) processes the SIP protoco

Page 461

SmartDefense Categories Chapter 14: Using SmartDefense 497 H.323 H.323 telephony is used by various devices and applications, such as Microsoft N

Page 462

SmartDefense Categories 498 Check Point Safe@Office User Guide Peer-to-Peer SmartDefense can block peer-to-peer file-sharing traffic, by identify

Page 463 - Appliance

SmartDefense Categories Chapter 14: Using SmartDefense 499 Table 108: Peer to Peer Fields In this field… Do this… Action Specify what action to

Page 464

SmartDefense Categories 500 Check Point Safe@Office User Guide Instant Messaging Traffic SmartDefense can block instant messaging applications th

Page 465 - Using SmartDefense

SmartDefense Categories Chapter 14: Using SmartDefense 501 Table 109: Instant Messengers Fields In this field… Do this… Action Specify what acti

Page 466 - Configuring SmartDefense

SmartDefense Categories 502 Check Point Safe@Office User Guide Games This category includes XBox LIVE. XBox 360 requires gateways hosting XBox LI

Page 467 - Configuring SmartDefense

Resetting SmartDefense to its Defaults Chapter 14: Using SmartDefense 503 Resetting SmartDefense to its Defaults If desired, you can reset the S

Page 468

Getting to Know Your Safe@Office 1000N ADSL Appliance 36 Check Point Safe@Office User Guide Flashing quickly (Red) High temperature or system f

Page 470 - 9. Click Finish

Overview Chapter 15: Using Antivirus and Antispam Filtering 505 Chapter 15 This chapter explains how to use antivirus and antispam filtering. Thi

Page 471 - This level…

Overview 506 Check Point Safe@Office User Guide VStream Antivirus Email Antivirus Point of Enforcement VStream Antivirus scans for viruses in t

Page 472 - Using the SmartDefense Tree

Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 507 Using VStream Antivirus The Safe@Office appliance includes VStr

Page 473

Using VStream Antivirus 508 Check Point Safe@Office User Guide If a virus if found in this protocol... VStream Antivirus does this... The protoco

Page 474 - SmartDefense Categories

Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 509 Enabling/Disabling VStream Antivirus To enable/disable VStream An

Page 475 - Teardrop

Using VStream Antivirus 510 Check Point Safe@Office User Guide Viewing VStream Antivirus Signature Database Information VStream Antivirus mainta

Page 476 - Ping of Death

Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 511 Configuring the VStream Antivirus Policy VStream Antivirus includ

Page 477 - Table 82: LAND Fields

Using VStream Antivirus 512 Check Point Safe@Office User Guide The Safe@Office appliance will process rule 1 first, passing outgoing SMTP traffic

Page 478 - Non-TCP Flooding

Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 513 The Antivirus Policy page appears. 2. Do one of the following: •

Page 479 - DDoS Attack

Getting to Know Your Safe@Office 1000N ADSL Appliance Chapter 1: Introduction 37 1000Mbps On (Green), LINK/ACT Flashing (Green) 1000 Mbps link e

Page 480 - IP and ICMP

Using VStream Antivirus 514 Check Point Safe@Office User Guide The VStream Policy Rule Wizard opens, with the Step 1: Rule Type dialog box displa

Page 481 - Packet Sanity

Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 515 5. Complete the fields using the relevant information in the foll

Page 482

Using VStream Antivirus 516 Check Point Safe@Office User Guide 8. Complete the fields using the relevant information in the following table. 9.

Page 483 - Max Ping Size

Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 517 In this field… Do this… Custom Service Click this option to speci

Page 484 - IP Fragments

Using VStream Antivirus 518 Check Point Safe@Office User Guide In this field… Do this… Data Direction Select the direction of connections to whi

Page 485

Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 519 Enabling/Disabling VStream Antivirus Rules You can temporarily di

Page 486 - Network Quota

Using VStream Antivirus 520 Check Point Safe@Office User Guide Viewing and Deleting VStream Antivirus Rules To view or delete an existing VStrea

Page 487 - Welchia

Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 521 The Advanced Antivirus Settings page appears. 2. Complete the fi

Page 488 - Cisco IOS DOS

Using VStream Antivirus 522 Check Point Safe@Office User Guide Table 117: Advanced Antivirus Settings Fields In this field… Do this… File Types

Page 489 - Table 90: Cisco IOS DOS

Using VStream Antivirus Chapter 15: Using Antivirus and Antispam Filtering 523 In this field… Do this… • WMA/WMV/ASF • RealMedia file • JPEG

Page 490 - Null Payload

Getting to Know Your Safe@Office 1000NW Appliance 38 Check Point Safe@Office User Guide Getting to Know Your Safe@Office 1000NW Appliance Packa

Page 491 - Checksum Verification

Using VStream Antivirus 524 Check Point Safe@Office User Guide In this field… Do this… When archived file exceeds limit or extraction fails Speci

Page 492 - Strict TCP

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 525 Updating VStream Antivirus When you are subscribed to the VStream

Page 493 - Small PMTU

Using VStream Antispam 526 Check Point Safe@Office User Guide attacks on your gateway or mail server. If you do not have a mail server in your ne

Page 494 - Table 94: Small PMTU Fields

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 527 IP Reputation Content Based Antispam and Block List Detection Met

Page 495 - SynDefender

Using VStream Antispam 528 Check Point Safe@Office User Guide How VStream Antispam Works VStream Antispam works as follows: 1. A TCP connection

Page 496

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 529  If the spam score exceeds the configured confidence level, VStre

Page 497 - Sequence Verifier

Using VStream Antispam 530 Check Point Safe@Office User Guide Header Marking VStream Antispam adds the following headers to each email that is sc

Page 498 - Table 97: Flags Fields

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 531 Enabling/Disabling VStream Antispam You must enable at least one V

Page 499 - Port Scan

Using VStream Antispam 532 Check Point Safe@Office User Guide Table 119: VStream Antispam Fields In this field… Do this… Content Based Antispam

Page 500 - Table 98: Port Scan Fields

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 533 In this field… Do this… IP Reputation Checking Specify the IP Reput

Page 501

Getting to Know Your Safe@Office 1000NW Appliance Chapter 1: Introduction 39 Rear Panel All physical connections (network and power) are made via

Page 502 - FTP Bounce

Using VStream Antispam 534 Check Point Safe@Office User Guide This field… Displays... Spam The number of SMTP and POP3 email messages that the C

Page 503 - Block Known Ports

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 535 Configuring the Content Based Antispam Engine You can configure ho

Page 504 - Block Port Overflow

Using VStream Antispam 536 Check Point Safe@Office User Guide 4. Click Apply. Table 121: Content Based Antispam Settings Fields In this field… D

Page 505 - Blocked FTP Commands

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 537 In this field… Do this… Track Specify whether VStream Antispam sho

Page 506 - Header Rejection

Using VStream Antispam 538 Check Point Safe@Office User Guide In this field… Do this… Money the Easy Way". The default value is [SUSPECTED S

Page 507 - Worm Catcher

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 539 Configuring the Block List Engine You can configure a list of emai

Page 508 - Microsoft Networks

Using VStream Antispam 540 Check Point Safe@Office User Guide The Blocked Sender List page appears. 3. Click Add. The Add Email to List dialog

Page 509

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 541 5. Click OK. The sender appears in the Block Sender List table. V

Page 510 - Table 105: IGMP Fields

Using VStream Antispam 542 Check Point Safe@Office User Guide The Antispam Block List Settings page appears. 3. Complete the fields using the i

Page 511

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 543 Table 122: Antispam Block List Settings Fields In this field… Do th

Page 512 - Table 106: SIP Fields

Getting to Know Your Safe@Office 1000NW Appliance 40 Check Point Safe@Office User Guide Label Description Internet. Serial A serial (RS-232) por

Page 513 - Table 107: H.323 Fields

Using VStream Antispam 544 Check Point Safe@Office User Guide Configuring the IP Reputation Engine You can configure how VStream Antispam should

Page 514 - Peer-to-Peer

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 545 4. Click Apply. Table 123: Antispam IP Reputation Settings Fields

Page 515

Using VStream Antispam 546 Check Point Safe@Office User Guide In this field… Do this… Action Specify the action VStream Antispam should take upo

Page 516 - Instant Messaging Traffic

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 547 Configuring the VStream Antispam Policy VStream Antispam includes

Page 517

Using VStream Antispam 548 Check Point Safe@Office User Guide The Safe@Office appliance will process rule 1 first, passing outgoing SMTP traffic

Page 518 - Table 110: XBox LIVE Fields

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 549 The Antispam Policy page appears. 2. Do one of the following: •

Page 519

Using VStream Antispam 550 Check Point Safe@Office User Guide The VStream Antispam Policy Rule Wizard opens, with the Step 1: Rule Type dialog bo

Page 520

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 551 6. Click Next. The Step 3: Done dialog box appears. 7. If desire

Page 521

Using VStream Antispam 552 Check Point Safe@Office User Guide In this field… Do this… The connection source is Select the source of the connectio

Page 522 - Antispam Filtering Solutions

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 553 Enabling/Disabling VStream Antispam Rules You can temporarily disa

Page 523 - Using VStream Antivirus

Getting to Know Your Safe@Office 1000NW Appliance Chapter 1: Introduction 41 Front Panel The Safe@Office 1000NW appliance includes several status

Page 524 - Default Antivirus Policy

Using VStream Antispam 554 Check Point Safe@Office User Guide Viewing and Deleting VStream Antispam Rules To view or delete an existing VStream

Page 525 - Using VStream Antivirus

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 555 The Safe Sender List page appears. 2. Click Add. The Add Email to

Page 526 - Information

Using VStream Antispam 556 Check Point Safe@Office User Guide 4. Click OK. The sender appears in the Safe Senders table. Viewing and Deleting S

Page 527

Using VStream Antispam Chapter 15: Using Antivirus and Antispam Filtering 557 Configuring VStream Antispam Advanced Settings To configure VStrea

Page 528

Using Centralized Email Filtering 558 Check Point Safe@Office User Guide • To specify that VStream Antivirus should not log email sent by addres

Page 529

Using Centralized Email Filtering Chapter 15: Using Antivirus and Antispam Filtering 559 Enabling/Disabling Email Filtering To enable/disable Em

Page 530

Using Centralized Email Filtering 560 Check Point Safe@Office User Guide Selecting Protocols for Scanning If you are locally managed, you can de

Page 531

Using Centralized Email Filtering Chapter 15: Using Antivirus and Antispam Filtering 561 2. Next to the Bypass scanning if Service Center is una

Page 532

Using Centralized Email Filtering 562 Check Point Safe@Office User Guide • The Snooze button changes to Resume. • The Email Filtering Off popu

Page 533

Using Centralized Email Filtering Chapter 15: Using Antivirus and Antispam Filtering 563

Page 534

Getting to Know Your Safe@Office 1000NW Appliance 42 Check Point Safe@Office User Guide Flashing quickly (Green) System boot in progress Flash

Page 536

Overview Chapter 16: Using Web Content Filtering 565 Chapter 16 This chapter explains how to use Web content filtering. This chapter includes the

Page 537

Overview 566 Check Point Safe@Office User Guide Web Rules Web Filtering Subscription and Connection Requirement Web rules are included with the

Page 538

Using Web Rules Chapter 16: Using Web Content Filtering 567 Using Web Rules You can block or allow access to specific Web pages, by defining Web

Page 539

Using Web Rules 568 Check Point Safe@Office User Guide The Safe@Office appliance will process rule 1 first, allowing access to the desired page,

Page 540

Using Web Rules Chapter 16: Using Web Content Filtering 569 The Web Rules page appears. 2. Do one of the following: • To add a new rule, click

Page 541 - Using VStream Antispam

Using Web Rules 570 Check Point Safe@Office User Guide The Safe@Office Web Rule Wizard opens, with the Step 1: Rule Type dialog box displayed. 3

Page 542 - Block List

Using Web Rules Chapter 16: Using Web Content Filtering 571 The example below shows a Block rule. 5. To configure advanced settings, click Show

Page 543

Using Web Rules 572 Check Point Safe@Office User Guide The Step 3: Confirm Rule dialog box appears. 8. Click Finish. The new rule appears in th

Page 544 - How VStream Antispam Works

Using Web Rules Chapter 16: Using Web Content Filtering 573 In this field… Do this… Log allowed connections / Log blocked connections Select thi

Page 545 - Using VStream Antispam

Getting to Know Your Safe@Office 1000NW Appliance Chapter 1: Introduction 43 VPN Off No VPN tunnel established On (Green) VPN idle / No acti

Page 546 - Default Antispam Policy

Using Web Rules 574 Check Point Safe@Office User Guide Viewing and Deleting Web Rules To view or delete an existing Web rule 1. Click Security

Page 547

Using Web Filtering Chapter 16: Using Web Content Filtering 575 Using Web Filtering When the Web Filtering service is enabled, access to Web con

Page 548

Using Web Filtering 576 Check Point Safe@Office User Guide The Web Filtering page appears. 2. Drag the On/Off lever upwards or downwards. Web F

Page 549

Using Web Filtering Chapter 16: Using Web Content Filtering 577 Selecting Categories for Blocking You can define which types of Web sites should

Page 550

Using Web Filtering 578 Check Point Safe@Office User Guide 2. Next to the Bypass scanning if Service Center is unavailable option, specify how t

Page 551

Using Web Filtering Chapter 16: Using Web Content Filtering 579 • The Snooze button changes to Resume. • The Web Filtering Off popup window op

Page 552

Using Web Filtering 580 Check Point Safe@Office User Guide • The service is re-enabled for all internal network computers. • If you clicked Res

Page 553

Using Web Filtering Chapter 16: Using Web Content Filtering 581 The Web Filtering Automatic Snooze Settings page appears. 3. Do one of the foll

Page 554

Customizing the Access Denied Page 582 Check Point Safe@Office User Guide Resetting Web Filtering Categories to Defaults If desired, you can res

Page 555 - Adding Blocked Senders

Customizing the Access Denied Page Chapter 16: Using Web Content Filtering 583 The Customize Access Denied Page page appears. In the following ex

Page 557 - To delete a blocked sender

Getting to Know Your Safe@Office 1000NW ADSL Appliance 44 Check Point Safe@Office User Guide Getting to Know Your Safe@Office 1000NW ADSL Applian

Page 559

Overview Chapter 17: Updating the Firmware 585 Chapter 17 This chapter explains how to update the Safe@Office appliance's firmware. This cha

Page 560

Using Software Updates 586 Check Point Safe@Office User Guide Using Software Updates Checking for Software Updates when Remotely Managed If you

Page 561

Using Software Updates Chapter 17: Updating the Firmware 587 The system checks for new updates and installs them. Checking for Software Updates

Page 562

Updating the Firmware Manually 588 Check Point Safe@Office User Guide Note: When the Software Updates service is set to Automatic, you can stil

Page 563

Updating the Firmware Manually Chapter 17: Updating the Firmware 589 The Firmware Update page appears. 3. Click Browse. A browse window appea

Page 565

Connecting to a Service Center Chapter 18: Using Subscription Services 591 Chapter 18 This chapter explains how to connect your Safe@Office appli

Page 566

Connecting to a Service Center 592 Check Point Safe@Office User Guide The Account page appears. 2. In the Service Account area, click Connect.

Page 567

Connecting to a Service Center Chapter 18: Using Subscription Services 593 The Safe@Office Services Wizard opens, with the Service Center dialog

Page 568

Getting to Know Your Safe@Office 1000NW ADSL Appliance Chapter 1: Introduction 45 • A splitter with a micro-filter, installed on all the jacks c

Page 569

Connecting to a Service Center 594 Check Point Safe@Office User Guide • If the Service Center requires authentication, the Service Center Login

Page 570 - Adding Safe Senders

Connecting to a Service Center Chapter 18: Using Subscription Services 595 6. Click Next. The Done screen appears with a success message. 7.

Page 571

Connecting to a Service Center 596 Check Point Safe@Office User Guide • The services to which you are subscribed are now available on your Safe@

Page 572

Viewing Services Information Chapter 18: Using Subscription Services 597 Viewing Services Information The Account page displays the following

Page 573

Refreshing Your Service Center Connection 598 Check Point Safe@Office User Guide Refreshing Your Service Center Connection This option restarts

Page 574

Configuring Your Account Chapter 18: Using Subscription Services 599 Configuring Your Account This option allows you to access your Service Cent

Page 575

Disconnecting from Your Service Center 600 Check Point Safe@Office User Guide 4. Click Next. The Done screen appears with a success message. 5.

Page 576

Overview Chapter 19: Working With VPNs 601 Chapter 19 This chapter describes how to use your Safe@Office appliance as a Remote Access VPN Client,

Page 577

Overview 602 Check Point Safe@Office User Guide • SecuRemote Internal VPN Server. SecuRemote can also be used from your internal networks, allow

Page 578

Overview Chapter 19: Working With VPNs 603 Site-to-Site VPNs A Site-to-Site VPN consists of two or more Site-to-Site VPN Gateways that can commun

Page 579

Getting to Know Your Safe@Office 1000NW ADSL Appliance 46 Check Point Safe@Office User Guide Table 12: Safe@Office 1000NW ADSL Appliance Rear Pan

Page 580

Overview 604 Check Point Safe@Office User Guide To create a Site-to-Site VPN with two VPN sites 1. On the first VPN site’s Safe@Office applianc

Page 581 - Using Web Content Filtering

Overview Chapter 19: Working With VPNs 605 Remote Access VPNs A Remote Access VPN consists of one Remote Access VPN Server or Site-to-Site VPN Ga

Page 582 - Web Filtering

Overview 606 Check Point Safe@Office User Guide To create a Remote Access VPN with two VPN sites 1. On the remote user VPN site's Safe@Off

Page 583 - Using Web Rules

Setting Up Your Safe@Office Appliance as a VPN Server Chapter 19: Working With VPNs 607 For information on setting up your Safe@Office appliance

Page 584 - Adding and Editing Web Rules

Setting Up Your Safe@Office Appliance as a VPN Server 608 Check Point Safe@Office User Guide Note: The use of all Remote VPN Clients is subject

Page 585 - Using Web Rules

Setting Up Your Safe@Office Appliance as a VPN Server Chapter 19: Working With VPNs 609 See Setting Up Remote VPN Access for Users on page 687.

Page 586

Setting Up Your Safe@Office Appliance as a VPN Server 610 Check Point Safe@Office User Guide 4. To allow authenticated users connecting from the

Page 587

Setting Up Your Safe@Office Appliance as a VPN Server Chapter 19: Working With VPNs 611 Configuring the Endpoint Connect VPN Server To configure

Page 588

Setting Up Your Safe@Office Appliance as a VPN Server 612 Check Point Safe@Office User Guide Configuring the L2TP VPN Server To configure the L2

Page 589 - Reordering Web Rules

Setting Up Your Safe@Office Appliance as a VPN Server Chapter 19: Working With VPNs 613 Installing SecuRemote If you configured the SecuRemote I

Page 590

Getting to Know Your Safe@Office 1000NW ADSL Appliance Chapter 1: Introduction 47 Label Description firmware to the version that shipped with the

Page 591 - Using Web Filtering

Setting Up Your Safe@Office Appliance as a VPN Server 614 Check Point Safe@Office User Guide 3. Follow the online instructions to complete insta

Page 592

Setting Up Your Safe@Office Appliance as a VPN Server Chapter 19: Working With VPNs 615 The New Connection Wizard opens displaying the Welcome to

Page 593 - To allow/block a category

Setting Up Your Safe@Office Appliance as a VPN Server 616 Check Point Safe@Office User Guide 7. The Network Connection dialog box appears. 8.

Page 594

Setting Up Your Safe@Office Appliance as a VPN Server Chapter 19: Working With VPNs 617 The Public Network dialog box appears. 12. Choose Do no

Page 595 - Using Web Filtering

Setting Up Your Safe@Office Appliance as a VPN Server 618 Check Point Safe@Office User Guide The Completing the New Connection Wizard screen appe

Page 596 - Configuring Automatic Snooze

Setting Up Your Safe@Office Appliance as a VPN Server Chapter 19: Working With VPNs 619 The Advanced Security Settings dialog box opens. 19. In

Page 597

Setting Up Your Safe@Office Appliance as a VPN Server 620 Check Point Safe@Office User Guide 28. In the Type of VPN drop-down list, select L2TP

Page 598

Adding and Editing VPN Sites Chapter 19: Working With VPNs 621 Adding and Editing VPN Sites To add or edit VPN sites 1. Click VPN in the main

Page 599

Adding and Editing VPN Sites 622 Check Point Safe@Office User Guide The Safe@Office VPN Site Wizard opens, with the Welcome to the VPN Site Wizar

Page 600

Adding and Editing VPN Sites Chapter 19: Working With VPNs 623 Configuring a Remote Access VPN Site If you selected Remote Access VPN, the VPN Ga

Page 601 - Updating the Firmware

Getting to Know Your Safe@Office 1000NW ADSL Appliance 48 Check Point Safe@Office User Guide Front Panel The Safe@Office 1000NW ADSL appliance in

Page 602 - Using Software Updates

Adding and Editing VPN Sites 624 Check Point Safe@Office User Guide The VPN Network Configuration dialog box appears. 4. Specify how you want t

Page 603 - Using Software Updates

Adding and Editing VPN Sites Chapter 19: Working With VPNs 625 • If you chose Specify Configuration, a second VPN Network Configuration dialog b

Page 604

Adding and Editing VPN Sites 626 Check Point Safe@Office User Guide In the Backup Gateway IP field, type the name of the VPN site to use if the p

Page 605

Adding and Editing VPN Sites Chapter 19: Working With VPNs 627 Username and Password Authentication Method If you selected Username and Password,

Page 606

Adding and Editing VPN Sites 628 Check Point Safe@Office User Guide Do the following: 1) To try to connect to the Remote Access VPN Server, sele

Page 607 - Using Subscription Services

Adding and Editing VPN Sites Chapter 19: Working With VPNs 629 The VPN Site Created screen appears. 5. Click Finish. The VPN Sites page reappea

Page 608 - The Account page appears

Adding and Editing VPN Sites 630 Check Point Safe@Office User Guide Certificate Authentication Method If you selected Certificate, the Connect di

Page 609

Adding and Editing VPN Sites Chapter 19: Working With VPNs 631 The Site Name dialog box appears. 3. Enter a name for the VPN site. You may cho

Page 610

Adding and Editing VPN Sites 632 Check Point Safe@Office User Guide 5. Click Finish. The VPN Sites page reappears. If you added a VPN site, the

Page 611

Adding and Editing VPN Sites Chapter 19: Working With VPNs 633 The VPN Site Created screen appears. 3. Click Finish. The VPN Sites page reappea

Page 612

Getting to Know Your Safe@Office 1000NW ADSL Appliance Chapter 1: Introduction 49 GbE Status (LAN 1-4 / DMZ/WAN2) 1000Mbps Off, LINK/ACT Off No

Page 613 - Viewing Services Information

Adding and Editing VPN Sites 634 Check Point Safe@Office User Guide In this field… Do this… Specify Configuration Click this option to provide th

Page 614

Adding and Editing VPN Sites Chapter 19: Working With VPNs 635 In this field… Do this… Subnet mask Select the subnet masks for the destination n

Page 615 - Configuring Your Account

Adding and Editing VPN Sites 636 Check Point Safe@Office User Guide In this field… Do this… the appropriate user name and password have been ente

Page 616

Adding and Editing VPN Sites Chapter 19: Working With VPNs 637 1. Complete the fields using the information in VPN Gateway Address Fields on pag

Page 617 - Working With VPNs

Adding and Editing VPN Sites 638 Check Point Safe@Office User Guide • If you chose Specify Configuration, a second VPN Network Configuration dia

Page 618

Adding and Editing VPN Sites Chapter 19: Working With VPNs 639 In the Backup Gateway IP field, type the name of the VPN site to use if the primar

Page 619 - Site-to-Site VPNs

Adding and Editing VPN Sites 640 Check Point Safe@Office User Guide 5. Complete the fields using the information in Authentication Methods Field

Page 620

Adding and Editing VPN Sites Chapter 19: Working With VPNs 641 Shared Secret Authentication Method If you selected Shared Secret, the Authenticat

Page 621 - Remote Access VPNs

Adding and Editing VPN Sites 642 Check Point Safe@Office User Guide The Security Methods dialog box appears. 2. To configure advanced security

Page 622 - Internal VPN Server

Adding and Editing VPN Sites Chapter 19: Working With VPNs 643 The Connect dialog box appears. 4. To try to connect to the Remote Access VPN Se

Page 623

Getting to Know Your Safe@Office 1000NW ADSL Appliance 50 Check Point Safe@Office User Guide VPN Off No VPN tunnel established On (Green) VP

Page 624

Adding and Editing VPN Sites 644 Check Point Safe@Office User Guide • The Site Name dialog box appears. 6. Type a name for the VPN site. You

Page 625

Adding and Editing VPN Sites Chapter 19: Working With VPNs 645 • If you selected Keep this site alive, and previously you chose Download Configu

Page 626

Adding and Editing VPN Sites 646 Check Point Safe@Office User Guide Certificate Authentication Method If you selected Certificate, the following

Page 627

Adding and Editing VPN Sites Chapter 19: Working With VPNs 647 1. To configure advanced security settings, click Show Advanced Settings. New fie

Page 628

Adding and Editing VPN Sites 648 Check Point Safe@Office User Guide 3. To try to connect to the Remote Access VPN Server, select the Try to Conn

Page 629 - Installing Endpoint Connect

Adding and Editing VPN Sites Chapter 19: Working With VPNs 649 • If you selected Keep this site alive, and previously you chose Download Configu

Page 630 - Configuring L2TP VPN Clients

Adding and Editing VPN Sites 650 Check Point Safe@Office User Guide Table 133: VPN Gateway Address Fields In this field… Do this… Gateway Address

Page 631

Adding and Editing VPN Sites Chapter 19: Working With VPNs 651 Table 135: Authentication Methods Fields In this field… Do this… Shared Secret Se

Page 632

Adding and Editing VPN Sites 652 Check Point Safe@Office User Guide Table 137: Security Methods Fields In this field… Do this… Phase 1 Security

Page 633

Adding and Editing VPN Sites Chapter 19: Working With VPNs 653 In this field… Do this… Perfect Forward Secrecy Specify whether to enable Perfect

Page 634

Getting to Know Your Safe@Office 500 Appliance Chapter 1: Introduction 51 Getting to Know Your Safe@Office 500 Appliance Package Contents The S

Page 635

Viewing and Deleting VPN Sites 654 Check Point Safe@Office User Guide Viewing and Deleting VPN Sites To view or delete a VPN site 1. Click VPN

Page 636 - 29. Click OK

Logging in to a Remote Access VPN Site Chapter 19: Working With VPNs 655 Note: Disabling a VPN site eliminates the tunnel and erases the netwo

Page 637 - To add or edit VPN sites

Logging in to a Remote Access VPN Site 656 Check Point Safe@Office User Guide Logging in through the Safe@Office Portal Note: You can only log

Page 638

Logging in to a Remote Access VPN Site Chapter 19: Working With VPNs 657 Logging in through the my.vpn page To manually log in to a VPN site thr

Page 639

Logging Out of a Remote Access VPN Site 658 Check Point Safe@Office User Guide • Once the Safe@Office appliance has finished connecting, the Sta

Page 640

Using Certificates Chapter 19: Working With VPNs 659 Safe@Office VPN Server for the first time, the entity should check that the VPN peer's

Page 641

Using Certificates 660 Check Point Safe@Office User Guide Generating a Self-Signed Certificate To generate a self-signed certificate 1. Click V

Page 642

Using Certificates Chapter 19: Working With VPNs 661 The Safe@Office Certificate Wizard opens, with the Certificate Wizard dialog box displayed.

Page 643

Using Certificates 662 Check Point Safe@Office User Guide The Safe@Office appliance generates the certificate. This may take a few seconds. The

Page 644

Using Certificates Chapter 19: Working With VPNs 663 • The starting and ending dates between which the gateway's certificate and the CA&apo

Page 645

Getting to Know Your Safe@Office 500 Appliance 52 Check Point Safe@Office User Guide The following table lists the Safe@Office 500 appliance&apo

Page 646

Using Certificates 664 Check Point Safe@Office User Guide Table 138: Certificate Fields In this field… Do this… Country Select your country fro

Page 647

Using Certificates Chapter 19: Working With VPNs 665 The Import Certificate dialog box appears. 4. Click Browse to open a file browser from whi

Page 648

Using Certificates 666 Check Point Safe@Office User Guide 6. Type the pass-phrase you received from the network security administrator. 7. Clic

Page 649

Using Certificates Chapter 19: Working With VPNs 667 Uninstalling a Certificate If you uninstall the certificate, no certificate will exist on t

Page 650

Using Certificates 668 Check Point Safe@Office User Guide Exporting Certificates The Safe@Office appliance allows you to export the following ce

Page 651

Using Certificates Chapter 19: Working With VPNs 669 The certificate is exported as a *.p12 file and saved to the specified directory. Note: T

Page 652

Viewing VPN Tunnels 670 Check Point Safe@Office User Guide Viewing VPN Tunnels You can view a list of currently established VPN tunnels. VPN tun

Page 653

Viewing VPN Tunnels Chapter 19: Working With VPNs 671 The VPN Tunnels page appears with a table of open VPN tunnels. The VPN Tunnels page inclu

Page 654

Viewing VPN Tunnels 672 Check Point Safe@Office User Guide This field… Displays… Destination The IP address or address range of the entity to wh

Page 655

Viewing IKE Traces for VPN Connections Chapter 19: Working With VPNs 673 This icon… Represents… A network for which an IKE Phase-2 tunnel was n

Page 656

Getting to Know Your Safe@Office 500 Appliance Chapter 1: Introduction 53 Label Description WAN Wide Area Network: An Ethernet port (RJ-45) used

Page 657

Viewing VPN Topology 674 Check Point Safe@Office User Guide To view the IKE trace for a connection 1. Establish a VPN tunnel to the VPN site wit

Page 658

Viewing VPN Topology Chapter 19: Working With VPNs 675 The VPN Topology page appears displaying a tree of VPN sites to which the appliance is con

Page 659

Viewing VPN Topology 676 Check Point Safe@Office User Guide Table 141: VPN Topology Page Fields This field… Displays… Split DNS The VPN site&apo

Page 660

Changing Your Login Credentials Chapter 20: Managing Users 677 Chapter 20 This chapter describes how to manage Safe@Office appliance users. You c

Page 661

Changing Your Login Credentials 678 Check Point Safe@Office User Guide The Internal Users page appears. 2. In the row of your username, click E

Page 662

Changing Your Login Credentials Chapter 20: Managing Users 679 The Account Wizard opens displaying the Set User Details dialog box. 3. Edit the

Page 663

Adding and Editing Users 680 Check Point Safe@Office User Guide The Set User Permissions dialog box appears. 6. Click Finish. Your changes are

Page 664

Adding and Editing Users Chapter 20: Managing Users 681 The Account Wizard opens displaying the Set User Details dialog box. 3. Complete the fi

Page 665

Adding and Editing Users 682 Check Point Safe@Office User Guide The options that appear on the page are dependant on the software and services yo

Page 666

Adding and Editing Users Chapter 20: Managing Users 683 Table 143: Set User Permissions Fields In this field... Do this... Administrator Level

Page 667

Contents Contents i Contents About This Guide ...

Page 668

Getting to Know Your Safe@Office 500 ADSL Appliance 54 Check Point Safe@Office User Guide LED State Explanation Flashing (Red) Hacker attack bl

Page 669

Adding Quick Guest HotSpot Users 684 Check Point Safe@Office User Guide Remote Desktop Access Select this option to allow the user to log in to t

Page 670 - To enable/disable a VPN site

Adding Quick Guest HotSpot Users Chapter 20: Managing Users 685 Adding Quick Guest HotSpot Users The Safe@Office appliance provides a shortcut f

Page 671

Viewing and Deleting Users 686 Check Point Safe@Office User Guide The Account Wizard opens displaying the Save Quick Guest dialog box. 3. In th

Page 672

Setting Up Remote VPN Access for Users Chapter 20: Managing Users 687 a) In the desired user’s row, click . A confirmation message appears. b)

Page 673

Using RADIUS Authentication 688 Check Point Safe@Office User Guide Using RADIUS Authentication You can use Remote Authentication Dial-In User Se

Page 674 - Using Certificates

Using RADIUS Authentication Chapter 20: Managing Users 689 to analyze RADIUS accounting data and generate performance reports for Secure HotSpot

Page 675 - Installing a Certificate

Using RADIUS Authentication 690 Check Point Safe@Office User Guide 2. Complete the fields using the following table. 3. Click Apply. 4. To res

Page 676

Using RADIUS Authentication Chapter 20: Managing Users 691 In this field… Do this… Realm If your organization uses RADIUS realms, type the realm

Page 677 - Using Certificates

Using RADIUS Authentication 692 Check Point Safe@Office User Guide In this field… Do this… Administrator Level Select the level of access to th

Page 678

Using RADIUS Authentication Chapter 20: Managing Users 693 In this field… Do this… Remote Desktop Access Select this option to allow all users au

Page 679

Getting to Know Your Safe@Office 500 ADSL Appliance Chapter 1: Introduction 55 Getting to Know Your Safe@Office 500 ADSL Appliance Package Cont

Page 680 - Importing a Certificate

Configuring RADIUS Attributes 694 Check Point Safe@Office User Guide Configuring RADIUS Attributes To configure a timeout for Secure HotSpot ses

Page 681

Configuring RADIUS Attributes Chapter 20: Managing Users 695 Table 145: VSA Syntax Permission Description Attribute Number Attribute Format Att

Page 682

Configuring RADIUS Attributes 696 Check Point Safe@Office User Guide Permission Description Attribute Number Attribute Format Attribute Values

Page 683 - Uninstalling a Certificate

Configuring RADIUS Attributes Chapter 20: Managing Users 697 Permission Description Attribute Number Attribute Format Attribute Values Notes

Page 685 - Exporting the CA Certificate

Overview Chapter 21: Using Remote Desktop 699 Chapter 21 This chapter describes how to remotely access the desktop of each of your computers, usi

Page 686 - Viewing VPN Tunnels

Workflow 700 Check Point Safe@Office User Guide Workflow To use Remote Desktop 1. Configure Remote Desktop. See Configuring Remote Desktop on p

Page 687

Configuring Remote Desktop Chapter 21: Using Remote Desktop 701 Configuring Remote Desktop To configure Remote Desktop 1. Click Setup in the ma

Page 688 - Represents…

Configuring Remote Desktop 702 Check Point Safe@Office User Guide New fields appear. • To disable Remote Desktop, clear the Allow remote deskto

Page 689

Configuring Remote Desktop Chapter 21: Using Remote Desktop 703 Table 146: Remote Desktop Options In this field… Do this… Sharing Share local

Page 690 - Viewing VPN Topology

Getting to Know Your Safe@Office 500 ADSL Appliance 56 Check Point Safe@Office User Guide • If desired, you can connect your appliance to an ext

Page 691 - Viewing VPN Topology

Configuring the Host Computer 704 Check Point Safe@Office User Guide Configuring the Host Computer To enable remote users to connect to a compute

Page 692

Configuring the Host Computer Chapter 21: Using Remote Desktop 705 The Remote tab appears. 5. Select the Allow users to connect remotely to thi

Page 693 - Managing Users

Configuring the Host Computer 706 Check Point Safe@Office User Guide The Select Users dialog box appears. b. Type the desired user's usern

Page 694

Accessing a Remote Computer's Desktop Chapter 21: Using Remote Desktop 707 Accessing a Remote Computer's Desktop Note: The client co

Page 695

Accessing a Remote Computer's Desktop 708 Check Point Safe@Office User Guide • The Remote Desktop Connection Security Warning dialog box ap

Page 696 - Adding and Editing Users

Accessing a Remote Computer's Desktop Chapter 21: Using Remote Desktop 709 You can use the following keyboard shortcuts during the Remote D

Page 698

Overview Chapter 22: Controlling the Appliance via the Command Line 711 Chapter 22 This chapter describes various ways of controlling your Safe@O

Page 699 - Do this

Using the Safe@Office Portal 712 Check Point Safe@Office User Guide Using the Safe@Office Portal You can control your appliance via the Safe@Off

Page 700

Using the Safe@Office Portal Chapter 22: Controlling the Appliance via the Command Line 713 The Command Line page appears. 3. In the upper fiel

Page 701

Getting to Know Your Safe@Office 500 ADSL Appliance Chapter 1: Introduction 57 Label Description Serial An RJ-45 serial (RS-232) port used for c

Page 702 - Viewing and Deleting Users

Using the Serial Console 714 Check Point Safe@Office User Guide Using the Serial Console You can connect a console to the Safe@Office applianc

Page 703

Using the Serial Console Chapter 22: Controlling the Appliance via the Command Line 715 The Ports page appears. 3. Next to the Serial port, cli

Page 704 - Using RADIUS Authentication

Using the Serial Console 716 Check Point Safe@Office User Guide The Port Setup page appears. 4. In the Assign to drop-down list, select Console

Page 705 - The RADIUS page appears

Configuring SSH Chapter 22: Controlling the Appliance via the Command Line 717 Configuring SSH Safe@Office appliance users can control the appli

Page 706

Configuring SSH 718 Check Point Safe@Office User Guide If you selected Internal Networks + IP Range, additional fields appear. 3. If you select

Page 707

Configuring SSH Chapter 22: Controlling the Appliance via the Command Line 719 Table 148: SSH Access Options Select this option… To allow access

Page 708

Viewing Firmware Status 720 Check Point Safe@Office User Guide Chapter 23 This chapter describes the tasks required for maintenance and diagnosis

Page 709

Viewing Firmware Status Chapter 23: Maintenance 721 The Firmware page appears. The Firmware page displays the following information: Table 149:

Page 710

Upgrading Your Software Product 722 Check Point Safe@Office User Guide This field… Displays… For example… Uptime The time that elapsed from the

Page 711 - Table 145: VSA Syntax

Upgrading Your Software Product Chapter 23: Maintenance 723 The Safe@Office Licensing Wizard opens, with the Install Product Key dialog box displ

Page 712

Getting to Know Your Safe@Office 500 ADSL Appliance 58 Check Point Safe@Office User Guide Front Panel The Safe@Office 500 ADSL appliance includes

Page 713

Configuring a Gateway Hostname 724 Check Point Safe@Office User Guide 6. Click Finish. Configuring a Gateway Hostname You can define a gateway

Page 714

Configuring Syslog Logging Chapter 23: Maintenance 725 The Gateway Name page appears. 3. In the Gateway Name field, type the desired hostname.

Page 715 - Using Remote Desktop

Configuring Syslog Logging 726 Check Point Safe@Office User Guide Configuring Syslog Logging You can configure the Safe@Office appliance to send

Page 716

Configuring Syslog Logging Chapter 23: Maintenance 727 The Logging page appears. 2. Complete the fields using the information in the following

Page 717 - Configuring Remote Desktop

Configuring HTTPS 728 Check Point Safe@Office User Guide Configuring HTTPS You can enable Safe@Office appliance users to access the Safe@Office

Page 718

Configuring HTTPS Chapter 23: Maintenance 729 2. Specify from where HTTPS access to the Safe@Office Portal should be granted. See Access Option

Page 719

Configuring SNMP 730 Check Point Safe@Office User Guide Table 151: Access Options Select this option… To allow access from… Internal Networks T

Page 720

Configuring SNMP Chapter 23: Maintenance 731 • IP-MIB All SNMP access is read-only. Note: Configuring SNMP is equivalent to creating a simple

Page 721

Configuring SNMP 732 Check Point Safe@Office User Guide 3. If you selected Internal Networks + IP Range, enter the desired IP address range in t

Page 722

Configuring SNMP Chapter 23: Maintenance 733 If you selected the Send SNMP Traps check box, additional fields appear. 6. Click Apply. The SNMP

Page 723

Getting to Know Your Safe@Office 500 ADSL Appliance Chapter 1: Introduction 59 LED State Explanation LINK/ACT On, 100 On 100 Mbps link establis

Page 724

Setting the Time on the Appliance 734 Check Point Safe@Office User Guide In this field... Do this… SNMP Port Type the port to use for SNMP. The

Page 725 - This shortcut…

Setting the Time on the Appliance Chapter 23: Maintenance 735 Setting the Time on the Appliance You set the time displayed in the Safe@Office Po

Page 726

Setting the Time on the Appliance 736 Check Point Safe@Office User Guide The following things happen in the order below: • If you selected Speci

Page 727 - Command Line

Setting the Time on the Appliance Chapter 23: Maintenance 737 • The Date and Time Updated screen appears. 5. Click Finish. Table 153: Set Tim

Page 728

Using Diagnostic Tools 738 Check Point Safe@Office User Guide Table 154: Time Servers Fields In this field… Do this… Primary Server Type the IP

Page 729

Using Diagnostic Tools Chapter 23: Maintenance 739 Use this tool… To do this… For information, see... Packet Sniffer Capture network traffic. Th

Page 730 - Using the Serial Console

Using Diagnostic Tools 740 Check Point Safe@Office User Guide The IP Tools window opens and displays a list of routers used to make the connectio

Page 731

Using Diagnostic Tools Chapter 23: Maintenance 741 Table 156: IP Tools Fields In this field… Do this… Tool Select the desired tool. Source Addre

Page 732

Using Diagnostic Tools 742 Check Point Safe@Office User Guide direction will be indicated by i (input) or o (output). To use Packet Sniffer 1. C

Page 733 - Configuring SSH

Using Diagnostic Tools Chapter 23: Maintenance 743 7. Browse to a destination directory of your choice. 8. Type a name for the configuration fi

Page 734

Getting to Know Your Safe@Office 500W Appliance 60 Check Point Safe@Office User Guide Getting to Know Your Safe@Office 500W Appliance Package

Page 735 - To allow access from…

Using Diagnostic Tools 744 Check Point Safe@Office User Guide Filter String Syntax The following represents a list of basic filter string element

Page 736 - Maintenance

Using Diagnostic Tools Chapter 23: Maintenance 745 EXAMPLE The following filter string saves packets that both originate from IP address is 192.1

Page 737

Using Diagnostic Tools 746 Check Point Safe@Office User Guide PARAMETERS port Integer. The port to which the packet is sent. EXAMPLE The followi

Page 738 - To install a Product Key

Using Diagnostic Tools Chapter 23: Maintenance 747 host PURPOSE The host element captures all incoming and outgoing packets for a specific comput

Page 739 - Chapter 23: Maintenance 723

Using Diagnostic Tools 748 Check Point Safe@Office User Guide or PURPOSE The or element is used to alternate between string elements. The filtere

Page 740

Using Diagnostic Tools Chapter 23: Maintenance 749 EXAMPLE The following filter string saves all packets that either originated from port 80, or

Page 741 - Chapter 23: Maintenance 725

Using Diagnostic Tools 750 Check Point Safe@Office User Guide PARAMETERS port Integer. The port from which the packet is sent. EXAMPLE The follo

Page 742 - Configuring Syslog Logging

Using Diagnostic Tools Chapter 23: Maintenance 751 EXAMPLE 1 The following filter string captures all TCP packets: tcp EXAMPLE 2 The following f

Page 743 - 3. Click Apply

Backing Up and Restoring the Safe@Office Appliance Configuration 752 Check Point Safe@Office User Guide EXAMPLE 1 The following filter string ca

Page 744 - Configuring HTTPS

Backing Up and Restoring the Safe@Office Appliance Configuration Chapter 23: Maintenance 753 Backing Up the Appliance Configuration Exporting the

Page 745 - Chapter 23: Maintenance 729

Getting to Know Your Safe@Office 500W Appliance Chapter 1: Introduction 61 Network Requirements • 10BaseT or 100BaseT Network Interface Card i

Page 746 - Configuring SNMP

Backing Up and Restoring the Safe@Office Appliance Configuration 754 Check Point Safe@Office User Guide Backing Up the Appliance Configuration to

Page 747 - To configure SNMP

Backing Up and Restoring the Safe@Office Appliance Configuration Chapter 23: Maintenance 755 The Safe@Office appliance creates the folder <MAC

Page 748

Backing Up and Restoring the Safe@Office Appliance Configuration 756 Check Point Safe@Office User Guide Restoring the Appliance Configuration Imp

Page 749 - 6. Click Apply

Backing Up and Restoring the Safe@Office Appliance Configuration Chapter 23: Maintenance 757 4. Click Upload. A confirmation message appears. 5.

Page 750

Backing Up and Restoring the Safe@Office Appliance Configuration 758 Check Point Safe@Office User Guide Restoring the Appliance Configuration fro

Page 751 - To set the time

Using Rapid Deployment Chapter 23: Maintenance 759 Note: If the appliance's IP address changed as a result of the configuration import, yo

Page 752

Using Rapid Deployment 760 Check Point Safe@Office User Guide Preparing the USB Flash Drive for Rapid Deployment Before performing a rapid deplo

Page 753

Using Rapid Deployment Chapter 23: Maintenance 761 Table 158: Rapid Deployment File Names This file... Should be named... The primary firmware pr

Page 754 - Using Diagnostic Tools

Resetting the Safe@Office Appliance to Defaults 762 Check Point Safe@Office User Guide • If the deploy folder exists, the appliance loads shared

Page 755 - Using IP Tools

Resetting the Safe@Office Appliance to Defaults Chapter 23: Maintenance 763 When resetting the appliance via the Safe@Office Portal, you can choo

Page 756

Getting to Know Your Safe@Office 500W Appliance 62 Check Point Safe@Office User Guide Table 18: Safe@Office 500W Appliance Rear Panel Elements L

Page 757 - Using Packet Sniffer

Resetting the Safe@Office Appliance to Defaults 764 Check Point Safe@Office User Guide • The Please Wait screen appears. • The Safe@Office app

Page 758 - To use Packet Sniffer

Running Diagnostics Chapter 23: Maintenance 765 Running Diagnostics You can view technical information about your Safe@Office appliance’s hard

Page 759

Rebooting the Safe@Office Appliance 766 Check Point Safe@Office User Guide Rebooting the Safe@Office Appliance If your Safe@Office appliance is

Page 760 - Filter String Syntax

Overview Chapter 24: Using Network Printers 767 Chapter 24 This chapter describes how to set up and use network printers. This chapter includes t

Page 761 - Chapter 23: Maintenance 745

Setting Up Network Printers 768 Check Point Safe@Office User Guide Setting Up Network Printers To set up a network printer 1. Connect the netwo

Page 762

Setting Up Network Printers Chapter 24: Using Network Printers 769 The USB Devices page appears. If the Safe@Office appliance detected the printe

Page 763 - Chapter 23: Maintenance 747

Setting Up Network Printers 770 Check Point Safe@Office User Guide The Printer Setup page appears. 6. Write down the port number allocated to t

Page 764

Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 771 See Configuring Computers to Use Network Printers on page 77

Page 765 - Chapter 23: Maintenance 749

Configuring Computers to Use Network Printers 772 Check Point Safe@Office User Guide The Control Panel window opens. 3. Under Hardware and Soun

Page 766

Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 773 The Printers screen appears. 4. Click Add a printer. The A

Page 767 - Chapter 23: Maintenance 751

Getting to Know Your Safe@Office 500W Appliance Chapter 1: Introduction 63 Label Description LAN 1-4 Local Area Network switch: Four Ethernet po

Page 768 - Appliance Configuration

Configuring Computers to Use Network Printers 774 Check Point Safe@Office User Guide The Choose a printer port dialog box appears. 7. Click Cre

Page 769 - Chapter 23: Maintenance 753

Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 775 12. In the Port name field, type the port name. 13. Select

Page 770

Configuring Computers to Use Network Printers 776 Check Point Safe@Office User Guide The Configure Standard TCP/IP Port Monitor dialog box opens.

Page 771 - Chapter 23: Maintenance 755

Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 777 • If your printer does not appear in the lists, insert the

Page 772

Configuring Computers to Use Network Printers 778 Check Point Safe@Office User Guide Windows 2000/XP This procedure is relevant for computers w

Page 773 - Chapter 23: Maintenance 757

Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 779 The Local or Network Printer dialog box appears. 6. Click

Page 774

Configuring Computers to Use Network Printers 780 Check Point Safe@Office User Guide The Add Standard TCP/IP Port Wizard opens with the Welcome d

Page 775 - Using Rapid Deployment

Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 781 The Add Standard TCP/IP Printer Port Wizard opens, with the

Page 776

Configuring Computers to Use Network Printers 782 Check Point Safe@Office User Guide 19. Click Next. The Completing the Add Standard TCP/IP Prin

Page 777 - Should be named

Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 783 The printer appears in the Printers and Faxes window. 24. R

Page 778

Contents ii Check Point Safe@Office User Guide Wall Mounting the Safe@Office Appliance ...

Page 779 - Chapter 23: Maintenance 763

Getting to Know Your Safe@Office 500W Appliance 64 Check Point Safe@Office User Guide LED State Explanation On (Red) Error Flashing (Orange)

Page 780

Configuring Computers to Use Network Printers 784 Check Point Safe@Office User Guide MAC OS-X This procedure is relevant for computers with the

Page 781 - Running Diagnostics

Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 785 The Print & Fax window appears. 5. In the Printing ta

Page 782

Configuring Computers to Use Network Printers 786 Check Point Safe@Office User Guide New fields appear. 7. In the first drop-down list, select

Page 783 - Using Network Printers

Configuring Computers to Use Network Printers Chapter 24: Using Network Printers 787 A list of models appears. 12. In the Model Name list, sel

Page 784 - Setting Up Network Printers

Viewing Network Printers 788 Check Point Safe@Office User Guide Viewing Network Printers To view network printers 1. Click Network in the mai

Page 785

Changing Network Printer Ports Chapter 24: Using Network Printers 789 Changing Network Printer Ports When you set up a new network printer, the

Page 786

Resetting Network Printers 790 Check Point Safe@Office User Guide Resetting Network Printers You can cause a network printer to restart the cu

Page 787

Connectivity Chapter 25: Troubleshooting 791 Chapter 25 This chapter provides solutions to common problems you may encounter while using the Safe

Page 788

Connectivity 792 Check Point Safe@Office User Guide • Check if you have defined firewall rules which block your Internet connectivity. • Check

Page 789

Connectivity Chapter 25: Troubleshooting 793 I cannot access http://my.firewall or http://my.vpn. What should I do? • Verify that the Safe@Offic

Page 790

Getting to Know Your Safe@Office 500W ADSL Appliance Chapter 1: Introduction 65 Getting to Know Your Safe@Office 500W ADSL Appliance Package Co

Page 791

Connectivity 794 Check Point Safe@Office User Guide I am using the Safe@Office appliance behind another NAT device, and I am having problems with

Page 792

Service Center and Upgrades Chapter 25: Troubleshooting 795 I cannot connect to the LAN network from the DMZ or primary WLAN network. What should

Page 793

Other Problems 796 Check Point Safe@Office User Guide Other Problems I have forgotten my password. What should I do? Reset your Safe@Office appli

Page 794

Technical Specifications Chapter 26: Specifications 797 Chapter 26 This chapter includes the following topics: Technical Specifications ...

Page 795

Technical Specifications 798 Check Point Safe@Office User Guide Power Adapter Nominal Output 12VDC @ 2 A 12VDC @ 2 A Max. Power Consumption 15W

Page 796

Technical Specifications Chapter 26: Specifications 799 Non-ADSL Model Attributes Table 160: Safe@Office Non-ADSL Model Attributes Attribute Safe

Page 797

Technical Specifications 800 Check Point Safe@Office User Guide Humidity: Storage/Operation 10 ~ 90% / 10 ~ 90% (non-condensed) 10 ~ 90% / 10 ~

Page 798

Technical Specifications Chapter 26: Specifications 801 Wireless Attributes Table 161: Safe@Office Wireless Attributes Attribute Safe@Office 100

Page 799

Technical Specifications 802 Check Point Safe@Office User Guide Safe@Office 500 and 500W Table 162: Safe@Office ADSL Models Attributes Attribute

Page 800 - MAC OS-X

Technical Specifications Chapter 26: Specifications 803 Temperature: Operation 0÷C ~ 40÷C 0÷C ~ 40÷C Humidity: Storage/Operation 10 ~ 95% / 10

Page 801

Getting to Know Your Safe@Office 500W ADSL Appliance 66 Check Point Safe@Office User Guide • If desired, you can connect your appliance to an ex

Page 802

Technical Specifications 804 Check Point Safe@Office User Guide 5V Power Adapter Unit Power Adapter Nominal Input In: 100~240VAC @ 0.5A In: 1

Page 803

Technical Specifications Chapter 26: Specifications 805 RF N/A FCC15C,TELCO Table 164: Table 165: Safe@Office Non-ADSL Models Attributes Attr

Page 804 - Viewing Network Printers

Technical Specifications 806 Check Point Safe@Office User Guide Temperature: Operation 0ºC ~ 40ºC 0ºC ~ 40ºC Humidity: Storage/Operation 10%

Page 805

CE Declaration of Conformity Chapter 26: Specifications 807 DBPSK WPA Authentication Modes EAP-TLS, EAP-TTLS, PEAP (EAP-GTC), PEAP (EAP-MSCHAP V2

Page 806 - Resetting Network Printers

CE Declaration of Conformity 808 Check Point Safe@Office User Guide Table 167: Safe@Office CE Compliance Standards Attribute 500 500 ADSL 500

Page 807 - Troubleshooting

CE Declaration of Conformity Chapter 26: Specifications 809 Attribute 500 500 ADSL 500W ADSL 500W ETSI TS 101 388 V V ITU-T G.703 V V

Page 808 - Connectivity

CE Declaration of Conformity 810 Check Point Safe@Office User Guide Attribute 1000N 1000NW 1000N ADSL 1000NW ADSL EN 61000-3-2 V V V V EN 6100

Page 809 - Network page

CE Declaration of Conformity Chapter 26: Specifications 811 Attribute 1000N 1000NW 1000N ADSL 1000NW ADSL EN 300 328 V V EN 301 489-1 V V EN

Page 810

CE Declaration of Conformity 812 Check Point Safe@Office User Guide This device complies with Part 15 of the FCC Rules. Operation is subject to t

Page 811 - Service Center and Upgrades

CE Declaration of Conformity Chapter 26: Specifications 813 Attribute 500 500 ADSL 500W ADSL 500W C22.2 No. 60950 V V V V K60950 V V V

Page 812 - Other Problems

Getting to Know Your Safe@Office 500W ADSL Appliance Chapter 1: Introduction 67 Label Description Serial An RJ-45 serial (RS-232) port used for

Page 813 - Specifications

CE Declaration of Conformity 814 Check Point Safe@Office User Guide Attribute 1000N 1000NW 1000N ADSL 1000NW ADSL EMC: FCC Part 15, Class B

Page 814 - Technical Specifications

CE Declaration of Conformity Chapter 26: Specifications 815 China China RoHS, RoHS & WEEE Declaration and Certification These systems have be

Page 815 - Non-ADSL Model Attributes

CE Declaration of Conformity 816 Check Point Safe@Office User Guide • Tributyl tin (TBT) and triphenyl tin (TPT) compounds Additional Materials

Page 816

CE Declaration of Conformity Chapter 26: Specifications 817 AC Mains O O O O O O Accessories O O O O O O Cables O O O O O O Ta

Page 817 - Wireless Attributes

CE Declaration of Conformity 818 Check Point Safe@Office User Guide Crystal Lead (Pb) 11800 Lead in high melting temperature type solders (i.e

Page 818 - Safe@Office 500 and 500W

Glossary of Terms Glossary of Terms 819 A ADSL Modem A device connecting a computer to the Internet via an existing phone line. ADSL (Asymmetric

Page 819 - Technical Specifications

Glossary of Terms 820 Check Point Safe@Office User Guide D DHCP Any machine requires a unique IP address to connect to the Internet using Interne

Page 820

Glossary of Terms Glossary of Terms 821 HTTPS Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL. A protocol for accessing a

Page 821

Glossary of Terms 822 Check Point Safe@Office User Guide M MAC Address The MAC (Media Access Control) address is a computer's unique hardwar

Page 822

Glossary of Terms Glossary of Terms 823 PPTP The Point-to-Point Tunneling Protocol (PPTP) allows extending a local network by establishing privat

Page 823 - CE Declaration of Conformity

Getting to Know Your Safe@Office 500W ADSL Appliance 68 Check Point Safe@Office User Guide Front Panel The Safe@Office 500W ADSL appliance includ

Page 824

Glossary of Terms 824 Check Point Safe@Office User Guide At the other end (the client program in your computer), TCP reassembles the individual p

Page 825

Index Index 825 8 802.1x configuring for a wireless network • 309 configuring for ports • 411 excluding network objects from • 225 A Access Denie

Page 826 - 1000NW ADSL

Index 826 Check Point Safe@Office User Guide certificate explained • 654 exporting • 663 exporting CA • 664 exporting device • 663 generating sel

Page 827 - North America

Index Index 827 Email Antispam • 556 Email Antivirus • 556 enabling/disabling • 557 selecting protocols for • 558 snoozing • 559 temporarily disa

Page 828

Index 828 Check Point Safe@Office User Guide configuring • 279 explained • 279 Host Port Scan • 481 HTTPS configuring • 724 explained • 819 using

Page 829

Index Index 829 configuring • 608 LAN cable • 99 configuring a connection • 123 configuring High Availability for • 279 explained • 819 ports • 9

Page 830

Index 830 Check Point Safe@Office User Guide Network Interface Monitor viewing bridge statistics • 370 viewing general network statistics • 360 v

Page 831

Index Index 831 configuring • 303 defined • 822 printers changing ports • 787 configuring computers to use • 769 resetting • 788 setting up • 766

Page 832

Index 832 Check Point Safe@Office User Guide NAT • 423 VStream Antispam • 545 VStream Antivirus • 509 Web • 563 S Safe Senders adding • 553 delet

Page 833

Index Index 833 setting the time • 732 setting up • 107 status • 343 technical specifications • 795 Safe@Office appliance configuration backing u

Page 834

Getting to Know Your Safe@Office 500W ADSL Appliance Chapter 1: Introduction 69 LED State Explanation LINK/ACT On, 100 On 100 Mbps link establi

Page 835 - Glossary of Terms

Index 834 Check Point Safe@Office User Guide Service Center connecting to • 587 disconnecting from • 595 refreshing a connection to • 594 service

Page 836

Index Index 835 explained • 587 starting • 587 viewing information • 593 Sweep Scan • 481 SynDefender • 477 Syslog logging configuring • 722 expl

Page 837 - Glossary of Terms 821

Index 836 Check Point Safe@Office User Guide configuring • 509 virtual access points (VAPs) about • 214 adding and editing • 331 deleting • 221 V

Page 838

Index Index 837 reordering • 551 types • 546 VStream Antivirus about • 505 configuring • 505 configuring advanced settings • 518 configuring poli

Page 839 - Glossary of Terms 823

Index 838 Check Point Safe@Office User Guide wireless protocols supported • 309 wireless stations viewing • 368 Worm Catcher • 489 X XBox LIVE •

Page 840

Contacting Technical Support 70 Check Point Safe@Office User Guide Contacting Technical Support In case of a problem with your Safe@Office applia

Page 841 - Index 825

Introduction to Information Security Chapter 2: Safe@Office Security 71 Chapter 2 This chapter explains the basic security concepts on which Safe

Page 842 - Index

Introduction to Information Security 72 Check Point Safe@Office User Guide • Commercial companies store information about their revenues, busine

Page 843 - Index 827

Introduction to Information Security Chapter 2: Safe@Office Security 73 Information Security Challenges The challenges of information security ca

Page 844

Contents Contents iii Using Bridges ...

Page 845 - Index 829

Introduction to Information Security 74 Check Point Safe@Office User Guide In order for a security policy be effective, it must be accompanied b

Page 846

Introduction to Information Security Chapter 2: Safe@Office Security 75 • Applications are hosted on a main computer rather than on personal wor

Page 847 - Index 831

The Safe@Office Firewall 76 Check Point Safe@Office User Guide • Large businesses have the funds and expertise to constantly enhance their secur

Page 848

The Safe@Office Firewall Chapter 2: Safe@Office Security 77 Security Requirements In order to make control decisions for new communication attemp

Page 849 - Index 833

The Safe@Office Firewall 78 Check Point Safe@Office User Guide Packet filters have the following advantages and disadvantages: Table 22: Packet F

Page 850

The Safe@Office Firewall Chapter 2: Safe@Office Security 79 Check Point Stateful Inspection Technology Invented by Check Point, Stateful Inspecti

Page 851 - Index 835

The Safe@Office Firewall 80 Check Point Safe@Office User Guide The Safe@Office firewall examines IP addresses, port numbers, and any other inform

Page 852

The Safe@Office Firewall Chapter 2: Safe@Office Security 81 Step Channel Type Description Source TCP Source Port Destination TCP Destination Port

Page 853 - Index 837

The Safe@Office Firewall 82 Check Point Safe@Office User Guide FTP client-server communication. The following table examines how different firewa

Page 854

The Safe@Office Firewall Chapter 2: Safe@Office Security 83 Firewall Technology Action Stateful Inspection Firewall A Stateful Inspection firewa

Commentaires sur ces manuels

Pas de commentaire