SAFETY NOTICE: TO AVOID DANGER, KEEP PRODUCT AND PACKAGE AWAY FROM BABIES AND CHILDREN. THE PRODUCT IS NOT INTENDED FOR BABIES AND CHILDREN.

Size: px
Start display at page:

Download "SAFETY NOTICE: TO AVOID DANGER, KEEP PRODUCT AND PACKAGE AWAY FROM BABIES AND CHILDREN. THE PRODUCT IS NOT INTENDED FOR BABIES AND CHILDREN."

Transcription

1

2 Legal Notice Legal Notice SAFETY NOTICE: TO AVOID DANGER, KEEP PRODUCT AND PACKAGE AWAY FROM BABIES AND CHILDREN. THE PRODUCT IS NOT INTENDED FOR BABIES AND CHILDREN. Copyright Yoggie Security Systems Ltd. All rights reserved. Any and all intellectual property rights related to the Gatekeeper Pico and Gatekeeper Pico Pro products belongs solely to Yoggie Security Systems Ltd. and its licensors, and may not be used in any manner except as explicitly permitted by Yoggie Security Systems Ltd., in the Terms of Use Agreement. The technology and products described in this material are protected by registered and/or pending patents of Yoggie Security Systems Ltd. and/or its licensors. Yoggie, the Yoggie logo, Yoggie.com, Gatekeeper Pico, Gatekeeper Pico Pro, Yoggie Gatekeeper, Yoggie Pico, Yoggie SOHO, Yoggie Pico Personal, Yoggie Pico Pro and Yoggie Firestick Pico are trademarks or registered trademarks of Yoggie Security Systems Ltd. All other trademarks, service marks, and logos appearing in this material or on the product belong to their respective owners. Q GPUM ii Gatekeeper Pico

3 Table of Contents Table of Contents LEGAL NOTICE... II TABLE OF CONTENTS... III ABOUT THIS USER GUIDE... 5 INTRODUCTION... 6 GATEKEEPER PICO FEATURES... 7 MODES OF OPERATION... 7 Corporate (Managed) Mode... 7 Standalone Mode... 7 GATEKEEPER PICO DRIVER AND SOFTWARE... 8 PACKAGE CONTENTS... 9 SYSTEM REQUIREMENTS GETTING TO KNOW YOUR GATEKEEPER PICO GETTING STARTED CONNECTING GATEKEEPER PICO DRIVER INSTALLATION AND REGISTRATION YOGGIE MANAGEMENT CONSOLE ACCESSING THE MANAGEMENT CONSOLE VIA THE GATEKEEPER PICO ICON MANUALLY ACCESSING THE MANAGEMENT CONSOLE CHANGING THE INTERFACE LANGUAGE CHANGING YOUR PASSWORD CHANGING YOUR USER DETAILS CHANGING MODES CHANGING THE PRIVACY SETTINGS SETTING THE TIME ZONE MONITORING SECURITY ACTIVITY Viewing Security Status Viewing and Printing Reports Viewing the Security Log Viewing the System Log Viewing the VPN Log (Gatekeeper Pico Pro) CONFIGURING SECURITY User Guide iii

4 Table of Contents CONFIGURING GATEKEEPER PICO NETWORK SETTINGS Configuring Internal Network Settings Configuring Proxy Settings Configuring Additional Settings CONFIGURING VPN SETTINGS (GATEKEEPER PICO PRO) Enabling or Disabling a VPN Connection Configuring VPN Client Settings Configuring a Generic VPN Connection Configuring a CheckPoint VPN Connection Configuring a Cisco VPN Connection SPAM PROTECTION SETTINGS Configuring Spam Protection Settings Creating Custom Rules Changing the Order in which Rules are Applied Modifying, Activating/Deactivating, and Deleting Rules ADVANCED SECURITY SETTINGS Web Filtering / Parental Content Control Configuring Firewall Settings Size Policy Configuring Protocol Scanning Configuring IDS/IPS SUPPORT GENERATING A SUPPORT FILE RESET OPTIONS DIAGNOSTICS Running General Diagnostics Running Network Diagnostics Running a Virus Test GATEKEEPER PICO ENFORCEMENT DISABLING GATEKEEPER PICO ENFORCEMENT CHANGING THE ENFORCEMENT PASSWORD UNINSTALLING GATEKEEPER PICO iv Gatekeeper Pico

5 About this User Guide Gatekeeper Pico Features About this User Guide The following User Guide provides installation and usage instructions for the following Gatekeeper versions: Gatekeeper Pico Gatekeeper Pico Pro User Guide 5

6 Introduction Gatekeeper Pico Features Introduction Gatekeeper Pico is a miniature USB security appliance that protects your PC or laptop from malicious intrusion, including viruses, Trojans, spyware, worms, and other Internet attacks, by preventing them from ever reaching your computer. It empowers you with the freedom to connect your computer to the Internet anywhere and enjoy the highest level of protection the same corporate level, hardware-based security solutions used by highly guarded security organizations. Gatekeeper Pico combines best-of-breed enterprise-class software with proprietary patent pending developments to provide a comprehensive security solution for known and unknown threats. These solutions include: Adaptive Security Policy Multi-Layer Security Agent Layer-8 Security Engine URL Categorization and Filtering Anti-Spam Anti-Phishing Anti-Spyware Anti-Virus Transparent Proxies (POP3, SMTP) Transparent Web Proxies (HTTP; FTP) Intrusion Detection/Prevention VPN Client (available in Gatekeeper Pico Pro) Stateful Inspection Firewall Before any data is accepted for processing by the computer s operating system, a low-level driver redirects it to Gatekeeper Pico where a full security check is performed. Security breach attempts are identified and thwarted, and only safe, secure data is passed back to the computer. Gatekeeper Pico includes a web-based management console which provides status information, security logs, and reports and can be used to configure device settings, network settings and security policy. 6 Gatekeeper Pico

7 Introduction Gatekeeper Pico Features Gatekeeper Pico Features Gatekeeper Pico offers the following features: Extremely small size of a standard USB key Hardware-based security appliance with hardened Linux OS Physical separation between the laptop and the outside world System kernel resides on read-only memory section Plug and forget, and easy to carry Automatic updates All-in-one corporate grade security software Proprietary security software Real-time monitoring and comprehensive reports Remote management (Gatekeeper Pico Pro version) Modes of Operation Corporate (Managed) Mode In this mode, which is only available in Gatekeeper Pico Pro, the Gatekeeper unit is connected to a Yoggie Management Server. The Yoggie Management Server extends the IT manager s ability to manage and enforce security on traveling laptops. Installed in the IT server room, the Yoggie Management Server manages the fleet of traveling Gatekeeper Pico units as follows: Manages and propagates corporate security policies Manages firmware, signature, rule-base and any other updates Obtains local logs and events for complete visibility Standalone Mode In this mode, the Gatekeeper is not connected to a Yoggie Management Server and functions independently. In this case, security policy is set by the Gatekeeper user, while security updates are transparently downloaded directly from Yoggie Security Systems. User Guide 7

8 Introduction Gatekeeper Pico Driver and Software Gatekeeper Pico Driver and Software The supplied Gatekeeper Pico CD includes the Gatekeeper Pico driver and software. You install the driver and software the first time you connect the Gatekeeper Pico unit to the computer as described in Getting Started. The software and driver provide the following features and benefits: Redirection the ability to connect a laptop to a network (Internet or other) using a Wi-Fi (wireless) connection, analog modem, cellular modem, or any other network interface, and have all traffic redirected to the Gatekeeper unit. The Gatekeeper allows only safe and secure traffic to reach your laptop. Yoggie Enforcement the ability to connect to a network is disabled if Gatekeeper Pico is not connected to the laptop. If the Gatekeeper is physically disconnected from the laptop during use, all network connections are automatically and immediately terminated. Gatekeeper Pico icon located in the Windows notification area (icon tray). Right-clicking the icon provides: Quick access to the Gatekeeper Pico Management Console (see Yoggie Management Console ). The ability to temporarily disable protection (see Disabling Gatekeeper Pico Enforcement ). Protection status indication the Gatekeeper Pico icon is green when protection is enabled and red when protection is disabled. Notification balloons balloons from the icon contain information on the Gatekeeper status and events. Status notification tooltips can also be viewed by placing the mouse cursor over the icon. Disable protection (password required) in case of an emergency, for example, if a Gatekeeper Pico unit has been lost or damaged, the network can be accessed by disabling Gatekeeper Pico Enforcement (see Disabling Gatekeeper Pico Enforcement ). 8 Gatekeeper Pico

9 Introduction Package Contents Package Contents Gatekeeper Pico or Gatekeeper Pico Pro Gatekeeper Pico CD Quick Start Guide User Guide 9

10 Introduction System Requirements System Requirements USB Port and PC Running Windows XP or Vista 32 bit. 10 Gatekeeper Pico

11 Getting to Know Your Gatekeeper Pico System Requirements Getting to Know Your Gatekeeper Pico Power lights when Gatekeeper Pico is powered up. Security Events blinks when a security event occurs. Update blinks when updates are being downloaded. Do not remove Gatekeeper Pico during updates. Whenever Gatekeeper Pico boots, both the security and update indicators blink until the boot sequence is complete. User Guide 11

12 Getting Started Connecting Gatekeeper Pico Getting Started Getting started consists of connection, initial setup, and registration of the Gatekeeper Pico. Connecting Gatekeeper Pico To connect Gatekeeper Pico: 1. Remove the cap. 2. Insert Gatekeeper Pico into an available USB port. Gatekeeper Pico s LED indicators start blinking, indicating boot sequence. Windows may automatically detect the Gatekeeper unit as a new hardware device and ask to install a driver. Click Cancel to exit the driver installation wizard. Driver Installation and Registration It is recommended to disable any software-based Firewall or Internet protection suites. 1. Insert the Gatekeeper Pico CD. A menu screen appears. 2. Click Install Yoggie Software & Driver and follow the on-screen instructions. After installing the driver, your web browser opens and you are automatically prompted for a username and password to begin the registration process. 3. Enter the default login information (case-sensitive): User: Password: admin yoggie 12 Gatekeeper Pico

13 Getting Started Driver Installation and Registration The Interface Language screen appears. 4. Select your preferred language from the drop-down list and click Next. The End-User License Agreement (EULA) screen appears. 5. Read the EULA and click I Accept to proceed. The registration screen appears. User Guide 13

14 Getting Started Driver Installation and Registration 6. Do one of the following: If your laptop will be connected to the Yoggie Management Server (YMS), select the Corporate Mode setup option. If your laptop will not be working with the Yoggie Management Server, select the Standalone Mode setup option. 7. Click Next. The user information screen appears. 14 Gatekeeper Pico

15 Getting Started Driver Installation and Registration 8. Enter the following information: Your name Your address A valid license key, located on the CD sticker (Standalone Mode only) Settings for your corporate Yoggie Management Server IP address and password (Corporate Mode only) 9. Click Next. The Privacy screen appears. 10. Set your desired privacy settings (share security related information with Gatekeeper Pico for improved security). Then click Next. The password and time zone screen appears. User Guide 15

16 Getting Started Driver Installation and Registration 11. Set your new password for accessing the Management Console, and your local time zone. 12. Click Finish to complete the registration. The Gatekeeper Pico icon appears in the Windows notification area, and Gatekeeper Pico is now protecting your laptop. Take Gatekeeper Pico for a test drive Download EICAR s virus demo file from: Gatekeeper Pico downloads any required updates. During first time use, this process can take up to fifteen minutes, and you will not be able to use Gatekeeper Pico during this time. You can view the update progress via the Web-based Yoggie Management Console. 16 Gatekeeper Pico

17 Accessing the Management Console via the Gatekeeper Pico Icon Yoggie Management Console The Yoggie Management Console (Management Console) provides access to the Gatekeeper Pico management features through your Web browser. You can monitor security activity, view and print security reports and logs, view and configure security, system and user settings, view and print non-security event system logs, and more. The Management Console can be accessed in the following ways: Gatekeeper Pico icon Getting Started ). if the Gatekeeper Pico driver/software is installed (see Web browser if for some reason the Gatekeeper Pico icon is not available you can manually access the Management Console through a standard Web browser. Accessing the Management Console via the Gatekeeper Pico Icon The Gatekeeper Pico Management Console can be accessed via the Gatekeeper Pico icon. To access the Management Console via the Gatekeeper Pico icon: 1. In the Windows notification area, right-click the Gatekeeper Pico icon. 2. Select Open Management Console from the displayed pop-up menu. You can also double-click on the Gatekeeper Pico icon Management Console. to open the The Login dialog box opens. 3. Enter the following information: Username admin User Guide 17

18 Accessing the Management Console via the Gatekeeper Pico Icon Password enter your Gatekeeper Pico password (the default password is yoggie). 4. Click OK. The Management Console opens. Navigation pane 2 Display pane 18 Gatekeeper Pico

19 Manually Accessing the Management Console Manually Accessing the Management Console If, for some reason, the Gatekeeper Pico icon is not available, you can manually access the Management Console through a standard Web browser. The Management Console can be manually accessed by entering the Gatekeeper Pico Management Console URL into the address field of your Web. To manually access the Management Console: 1. Open a Web browser and enter the following Gatekeeper Pico Management Console URL into the address field of the browser: The Login dialog box opens. 2. Enter the following information: Username admin Password enter your Gatekeeper Pico password (the default password is yoggie). 3. Click OK. The Management Console opens. User Guide 19

20 Changing the Interface Language Changing the Interface Language You can change the language of the user interface (labels and dialogs) in your Gatekeeper Pico Management Console at any time. To change your Management Console interface language: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click the System tab. The Yoggie Details page appears in the Display pane. 3. Click Language. The Language Settings page appears. 4. Select the language you wish to use from the list. 5. Click Apply. The selected interface language will be used and the main Yoggie Details page appears. Changing Your Password You can change your Gatekeeper Pico Management Console password at any time. To change your Gatekeeper Pico Management Console password: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click the System tab. The Yoggie Details page appears in the Display pane. 3. Click Change Password. The Password Settings page appears. 4. Enter the following information: Current Password enter your current password New Password enter the new password Confirm Password enter the new password again 5. Click Apply. 20 Gatekeeper Pico

21 Your password is changed and the main Yoggie Details page appears. Changing Your User Details Yoggie Management Console Changing Your User Details Gatekeeper Pico user details consist of your username and address. These can be changed at any time. To change your Gatekeeper Pico user details: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click the System tab. The Yoggie Details page appears in the Display pane. 3. Under Yoggie Details, click Modify. 4. Enter your new username in the Name field, as required. 5. Enter your new address in the Address field, as required. 6. Click Apply. Your user details are changed and the Yoggie Details page appears. Changing Modes Gatekeeper Pico can be used as a standalone Pico (standalone mode) or as part of a fleet of Gatekeeper devices, managed by a Yoggie Management Server (YMS). The mode is set during registration but can be modified at any time. To change your Gatekeeper Pico mode: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click the System tab. The Yoggie Details page appears in the Display pane. 3. Under Yoggie Details, click Modify. 4. Select your desired mode: Standalone Mode enter the provided license number in the License field. Corporate Mode enter the Yoggie Management Server IP address in the Server Address field and the password in the Password field. 5. Click Apply. User Guide 21

22 Changing the Privacy Settings Your mode is changed and the Yoggie Details page appears. Changing the Privacy Settings Gatekeeper Pico collects only security related information in order to improve the quality of the products and service. It is highly recommended that you use the default privacy settings. Yoggie will never share any private information with a third-party or make any other use of this information. To change the privacy settings: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click the System tab. The Yoggie Details page appears in the Display pane. 3. Click Privacy. The Privacy Settings page appears. 4. Choose if you want to register your name and with Yoggie. 5. Select your privacy setting from the drop-down list. You may choose one of the following options: Share security logs with Yoggie share all the security events collected by the Gatekeeper Pico logs with Yoggie Security Systems. Hide specific spam and URL information do not share security events that contain the source and destination of spam s or destination URL. Share all other security events collected by the Gatekeeper Pico logs with Yoggie Security Systems. Do not share any security events do not share any security events collected by the Gatekeeper Pico logs with Yoggie Security Systems. 6. Click Apply. The Yoggie Details page appears. Setting the Time Zone The current date and time are displayed in the main Settings page of the Management Console. This information is updated via the Yoggie server according to the time zone set in the Management Console. To change the time, set a new time zone the time and date are instantly updated and displayed. 22 Gatekeeper Pico

23 Monitoring Security Activity To set the Time Zone: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click the System tab. The Yoggie Details page appears in the Display pane. 3. Under Time Zone, click Modify. The Time Zone Settings page appears. 4. Select your location from the Time Zone drop-down list. 5. Click Apply. The selected time zone is displayed, and the current date and time are updated. The Yoggie Details page appears. Monitoring Security Activity The Management Console provides several options for monitoring security activity. You can view the following: Current security status Security activity charts (including 3D charts) Security and system logs You can also view and print security activity reports. Viewing Security Status The Status page of the Management Console enables you to view your current risk level (a rating based on current activity) and security events. The Status page contains a risk level gauge, as well as event counters that indicate the number of security breach attempts thwarted by your Gatekeeper Pico during the last 15 minutes during which the Pico was connected and working. The Status page does not show the Gatekeeper Pico security level, but the intensity of security breach attempts. Gatekeeper Pico protects your laptop at all risk levels. To view security status: Click Status in the Navigation pane of the Management Console. User Guide 23

24 Monitoring Security Activity The Status page appears in the Display pane, as shown below. The Status page displays the following gauges, which enable you to monitor security activity: Risk Level displays your current security risk level, based on the Gatekeeper Pico analysis of all firewall, IDS/IPS, and malware security events. Firewall Events displays the number of attempted firewall attacks that took place over the last 15 minutes. IDS/IPS Events displays the number of attempted security breaches detected and defeated by the Intrusion Detection System/Intrusion Protection System (IDS/IPS) over the last 15 minutes. Malware Events displays the number of virus, spyware, active content, and other similar execution attempts that took place over the last 15 minutes. The digital gauges (event counters) under each event gauge display the total of each type of security breach attempt. The number displayed is the number of attempts since the last reset. For information about resetting the event counters, see Reset Options. 24 Gatekeeper Pico

25 Monitoring Security Activity Viewing and Printing Reports Gatekeeper Pico provide reports about types of security events in the form of graphic charts. These charts reflect information gathered during the last 24 hours of operation. You can click a chart to view it as a 3D graph, and then click and drag it to change its orientation. You can also navigate through the charts, view them in 2D, replay animations, and print them. To view reports: 1. Click Reports in the Navigation pane of the Management Console. The main chart page of the Charts tab appears in the Display pane, as shown below. The Charts tab displays the following graphic charts: All charts display information gathered during the last 24 hours of operation. Total displays the total number of security breach events. Firewall displays the total attempted firewall attacks. User Guide 25

26 Monitoring Security Activity IDS/IPS displays the total number of attempted security breaches detected and defeated by the IDS/IPS. displays total phishing, spam, and other threats. Malware displays the total virus, spyware, active content, and other similar execution attempts. Spam displays the spam distribution score (the number of messages that are likely to be spam). 2. In the Charts tab, click a chart to display it in 3D, as shown in the example below. 3. In the 3D display, click: Replay reruns an animation 2D displays the chart in 2D Print prints the 3D chart Prev displays the previous chart in 3D Next displays the next chart in 3D Charts returns to the main chart page 26 Gatekeeper Pico

27 Monitoring Security Activity Viewing the Security Log The Gatekeeper Pico Security Log displays security event information. You can view the initial log and details for each event. To view the security log: 1. Click Reports in the Navigation pane of the Management Console. The main chart page of the Charts tab appears in the Display pane. 2. Click the Security Log tab. The security log is displayed, as shown below. 3. To display the details of an event, click it. A small window pops up displaying the details. To close the window, click the X in the upper right corner. 4. To navigate to subsequent/previous Security Log pages as required, click the right/left arrow buttons. 5. To export the Security Log, click the Export link. A file save dialog appears. User Guide 27

28 Monitoring Security Activity 6. Navigate to the location where the compressed security log file will be saved on your PC, and click Save. The log file is saved to your computer. 28 Gatekeeper Pico

29 Monitoring Security Activity Viewing the System Log The system log displays all important, non-security system events. To view the system log: 1. Click Reports in the Navigation pane of the Management Console. The main chart page of the Charts tab appears in the Display pane. 2. Click the System Log tab. The system log is displayed. 3. Click the right/left arrow buttons to navigate to subsequent/previous System Log pages, as required. User Guide 29

30 Monitoring Security Activity Viewing the VPN Log (Gatekeeper Pico Pro) The VPN log displays VPN-related events. To view the VPN log: 1. Click Reports in the Navigation pane of the Management Console. The main chart page of the Charts tab appears in the Display pane. 2. Click the VPN Log tab. The VPN log is displayed. 3. Click the right/left arrow buttons to navigate to subsequent/previous VPN Log pages, as required. 30 Gatekeeper Pico

31 Configuring Security Configuring Security Configuring Gatekeeper Pico security policy is simple and intuitive. There are three levels of security: High Policy the most secure policy. Provides the highest security, but may reduce functionality. Med Policy the recommended policy. It provides the recommended level of security, while maintaining functionality. Low Policy least secure policy. This policy provides minimal security, while providing maximum functionality. To set the security policy: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane, as shown below. Security Level Bar 2. Click the desired security level on the Security Level Bar. Apply and Cancel buttons appear. 3. Click Apply. The security policy is set. User Guide 31

32 Configuring Gatekeeper Pico Network Settings Configuring Gatekeeper Pico Network Settings Your current network settings are displayed under the Network tab in the Settings menu. If you normally connect to the Internet through a Proxy Server, this server must be defined in the Yoggie Management Console. Configuring Internal Network Settings You can change your internal network settings as needed. To configure Internal Network Settings: 1. Click Settings in the Navigation pane of the Management Console. The main Settings page appears. 2. Click the Network tab. The Internal Network Settings page appears in the display area. 3. Click Modify. The IP Address and Subnet Mask fields appear. 32 Gatekeeper Pico

33 Configuring Gatekeeper Pico Network Settings 4. In the IP Address field, enter the new device IP address. 5. In the Subnet Mask field, enter the new device subnet mask. 6. Click Apply. Configuring Proxy Settings If you connect to the Internet using a proxy server, you must configure basic settings. To configure Proxy Settings: 1. Click Settings in the Navigation pane of the Management Console. The main Settings page appears. 2. Click the Network tab. The Network Settings page appears in the display area. User Guide 33

34 Configuring Gatekeeper Pico Network Settings 3. Click Advanced. The Proxy Settings page appears. 4. Select Manual proxy configuration. 5. In the HTTP Proxy field, enter the web address of the proxy server. 6. In the Port field, enter the port number on which the proxy server is providing service. 7. Configure Additional Settings if needed. See Configuring Additional Settings. 8. Click Apply. 34 Gatekeeper Pico

35 Configuring Gatekeeper Pico Network Settings The proxy settings are configured. Configuring Additional Settings Gatekeeper Pico includes two additional settings for optimizing performance. MTU - If you use a PPPOE dialer to establish an internet connection, or if you have trouble sending or receiving , browsing the internet, or receiving updates to Gatekeeper Pico, you might need to adjust the MTU (Maximum Transmission Unit) setting. This is because the Windows MTU setting might be configured to less than the standard MTU, which is Gatekeeper Pico must be configured to the same MTU as Windows. Web Filtering RPC Mode - Some firewalls restrict access to UDP port 9020, which is used by Gatekeeper Pico s Web Filtering engine. To overcome this problem, Gatekeeper Pico can allow the Web Filtering engine to operate on the well-known HTTP port 443, which is always open on the Firewall. This mode of operation is called Remote Procedure Call (RPC) mode. This feature might slow browsing a bit, so you should only enable it if necessary. To configure MTU and RPC settings: 1. Click Settings in the Navigation pane of the Management Console. The main Settings page appears. 2. Click the Network tab. The Network Settings page appears in the display area. User Guide 35

36 Configuring Gatekeeper Pico Network Settings 3. Click Advanced. The Additional Settings page appears. 4. To change the MTU, check the Custom MTU checkbox and enter the new MTU (default is 1500 bytes). Start at 1400 MTU, and then try lower numbers if necessary. 5. To enable RPC mode, check the Web Filtering RPC mode checkbox. 6. Click Apply. 36 Gatekeeper Pico

37 Configuring VPN Settings (Gatekeeper Pico Pro) The settings are saved, and the main Network Settings page appears. Configuring VPN Settings (Gatekeeper Pico Pro) Gatekeeper Pico Pro includes a generic VPN Client that enables you to safely connect to various remote IPsec VPN Servers. You can enable or disable the VPN client at any time. Enabling or Disabling a VPN Connection To enable/disable the VPN Connection: 1. Click Settings in the Navigation pane of the Management Console. The main Settings page appears. 2. Click the VPN tab. 3. Do one of the following: To disable the VPN connection, select VPN Connection Disabled To enable the VPN connection, click VPN Connection Enabled. A confirmation message is displayed. 4. Click OK. The VPN Status, displayed below the two options, changes. Configuring VPN Client Settings Gatekeeper Pico Pro supports a number of VPN clients. The following table lists each client and which procedure to follow to configure the client. Client Cisco CheckPoint NetASQ Jupiter Zywall P1 IPCop Generic See Configuring a Cisco VPN Connection Configuring a CheckPoint VPN Connection Configuring a Generic VPN Connection Configuring a Generic VPN Connection Configuring a Generic VPN Connection Configuring a Generic VPN Connection Configuring a Generic VPN Connection User Guide 37

38 Configuring VPN Settings (Gatekeeper Pico Pro) Configuring a Generic VPN Connection The following procedure is used to configure a NetASQ, Jupiter, Zywall P1, IPCop, or Generic VPN connection. To configure the Generic VPN Connection: 1. Click Settings in the Navigation pane of the Management Console. The main Settings page appears. 2. In the VPN tab click View Settings. The VPN Settings screen appears. 3. In the VPN Type drop-down list, select one of the following VPN Types: NetASQ, Juniper, Zywall P1, IPCop, Generic. 4. In the Connection Type field, select one of the following connection types: IPSec Tunnel IPSec Transport 5. In the VPN Gateway Address field, enter the IP Address of the remote VPN server. 6. In the Remote Network Address field, enter the remote network address. 7. In the Remote Network Mask field, enter the remote network subnet mask. 8. In the Local ID field, enter the local ID as configured on the remote VPN server. 9. In the Remote ID field, enter the remote ID as configured on the remote VPN server. 38 Gatekeeper Pico

39 Configuring VPN Settings (Gatekeeper Pico Pro) 10. If required by the remote VPN server, enable PFS (Perfect Forward Secrecy) by selecting the PFS checkbox. 11. If required by the remote VPN server, enable Aggressive Mode by selecting the Aggressive Mode checkbox. 12. Under Authentication Method do one of the following: If the authentication method between the client and the server uses a Preshared key, select Preshared Key and enter the key. If the authentication method between the client and the server uses a certificate, select Certificate and click Browse to select and upload the certificate file. 13. The default VPN settings use the DES algorithm for encryption and SHA1 message digest for authentication. However, you can set the encryption and authentication methods manually. To set the encryption and authentication methods manually, select the Use Manual Settings checkbox, and then select the Encryption Method and Authentication Method from the drop-down lists. 14. Click Apply. Configuring a CheckPoint VPN Connection To configure the CheckPoint VPN Connection: 1. Click Settings in the Navigation pane of the Management Console. The main Settings page appears. 2. In the VPN tab click View Settings. The VPN Settings screen appears. 3. In the VPN Type drop-down list, select CheckPoint. User Guide 39

40 Configuring VPN Settings (Gatekeeper Pico Pro) 4. In the VPN Gateway Address field, enter the IP Address of the remote VPN server. 5. In the Remote Network Address field, enter the remote network address. 6. In the Remote Network Mask field, enter the remote network subnet mask. 7. In the User Name and User Password fields, enter your VPN user name and password. 8. In the Certificate field, click the Browse button to select and upload the certificate file. 9. Click Apply. Configuring a Cisco VPN Connection To configure the Cisco VPN Connection: 1. Click Settings in the Navigation pane of the Management Console. The main Settings page appears. 2. In the VPN tab click View Settings. The VPN Settings screen appears. 3. In the VPN Type drop-down list, select Cisco. 40 Gatekeeper Pico

41 Spam Protection Settings 4. In the Gateway field, enter the IP Address of the remote VPN server. 5. In the Group Name field, enter the name of the IPSec group to which you belong. This entry is case-sensitive. 6. In the Group Password field, enter the password for your IPSec group. This entry is case-sensitive. 7. In the User Name and User Password fields, enter your user name and password for accessing the VPN server. 8. Select the NAT-T box. (This option enables the VPN Client and the VPN device to automatically detect when to use IPSec over UDP to work properly in Port Address Translation (PAT) environments). 9. Click Apply. Spam Protection Settings Spam is unsolicited , often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups. Phishing is an Internet scam designed to trick recipients into revealing credit card numbers, passwords, Social Security numbers, and other personal information to individuals who intend to use them for fraudulent purposes. Gatekeeper Pico provides protection against Spam and Phishing by integrating the powerful MailShell engine. Every , incoming or outgoing, is scanned by the Gatekeeper Pico to identify and neutralize any security threats in the same manner as all network data is scanned. This includes viruses, spyware, and active content. These User Guide 41

42 Spam Protection Settings s are tagged by Yoggie, and one of the following is inserted into the subject line: [Spam] [Probably Spam] [Phishing] If needed, you can supplement the tagging of the MailShell engine with your own Custom rules. For further information, see Creating Custom Rules. Gatekeeper Pico also generates two spam header files, which can be found in the message source and include the following information: X-Yoggie-SpamLevel Indicates Spam, Probably Spam, Phishing, or empty if not spam. X-Yoggie-SpamScore the exact spam score, is definitely spam, 0 is definitely not spam. Using these header files, you can create rules in your program to handle these tagged s. For example, you could create rules to automatically delete all e- mails tagged by Yoggie as Spam, or move all messages tagged as Probably Spam to a special folder. See your program documentation for further information. 42 Gatekeeper Pico

43 Spam Protection Settings Configuring Spam Protection Settings To configure the spam protection settings: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click the tab. The Settings screen appears. 3. If you want Gatekeeper Pico to tag subject lines of suspicious spam s, select the Tag Subject lines of suspicious spam checkbox. 4. Click Apply. Creating Custom Rules You can configure your own spam definitions by creating Custom Rules. To add a Custom Rule: 1. Click the + (plus) button. The Custom Web Rules dialog box appears. User Guide 43

44 Spam Protection Settings 2. In the Rule Name field, enter a descriptive name for the rule. 3. In the If the following condition is met: section, define the condition under which action will be taken. 4. In the Perform the following action: section, select the action to perform if the condition is met: Allow Does nothing to the (generally used to create exceptions to other rules). Tag with Tags the message with the text you enter in the text box. 5. Click OK. The rule is added to the rule list. 6. Click Apply. The rule is saved. Defining a rule adds it to the rule list, but it is saved only when you click Apply. Therefore, if you attempt to move to another screen in the Gatekeeper Pico Management Console before clicking Apply, you will receive a warning that you must first save your work. 44 Gatekeeper Pico

45 Changing the Order in which Rules are Applied Yoggie Management Console Spam Protection Settings If you create multiple rules, you can determine the order in which the rules are applied. The rule at the top of the list is applied first. To change the order of Custom Rules: Select a rule and click to move the rule up in the list or to move the rule down in the list. Modifying, Activating/Deactivating, and Deleting Rules You can modify existing rules and delete them when they are no longer needed. You can also temporarily deactivate a rule. To modify a Custom Rule: 1. Double-click the rule you want to modify. The Custom Web Rules dialog box appears. 2. Edit the relevant fields. (See Creating Custom Rules for more information). 3. Click OK. 4. Click Apply. The selected rule is modified. Edits to a rule are saved only when you click Apply. Therefore, if you attempt to move to another screen in the Gatekeeper Pico Management Console before clicking Apply, you will receive a warning that you must first save your work. To activate or deactivate a Custom Rule: Select or clear the checkbox in the Active column of the rule you want to activate or deactivate. User Guide 45

46 Spam Protection Settings To delete a Custom Rule: 1. Select the rule you want to delete. 2. Click the - (minus) button. The rule is deleted from the rule list 3. Click Apply. The deletion is saved. Deleting a rule removes it from the rule list, but the deletion is saved only when you click Apply. Therefore, if you attempt to move to another screen in the Gatekeeper Pico Management Console before clicking Apply, you will receive a warning that you must first save your work. 46 Gatekeeper Pico

47 Advanced Security Settings Advanced Security Settings Gatekeeper Pico includes a number of advanced security settings that give you maximum protection and flexibility: Web Filtering/Parental Content Control Gatekeeper Pico can block unwanted web content. This advanced configuration option enables you to specify the unwanted content categories to be blocked. Firewall Gatekeeper Pico can block unwanted outbound traffic using lists of port numbers, or a whitelist or blacklist. Size Policy Gatekeeper Pico can scan files up to 10 MB. You can specify that Gatekeeper Pico block files larger than 10 MB or scan to the size limit. Protocols Gatekeeper Pico uses application layer scanners (Anti-virus, Antispyware, Anti-spam, anti-phishing, web filtering, etc.) on different incoming communication protocols. This advanced configuration option enables you to enable or disable application-level scanning of certain protocols. IDS/IPS Gatekeeper Pico features IDS/IPS protection. This advanced configuration option enables you to specify the security policies for each activity. Web Filtering / Parental Content Control Gatekeeper Pico can block unwanted web content. You can determine which types of content should be blocked by selecting from an extensive list of categories. You can also create your own categories by creating Custom Web Rules. Once created, these rules can be modified, disabled temporarily, and deleted when no longer relevant. To configure web filtering categories: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click Advanced. 3. Click Web Filtering. The Web Filtering screen appears. User Guide 47

48 Advanced Security Settings 4. Select the Web Filtering enabled checkbox, to enable web filtering. 5. Select the checkbox of the categories you wish to filter. To select all categories, click Block All. To clear all categories, click Allow All. 6. Click Apply. To add a Custom Web Rule: 1. In the Web Filtering screen, click the Custom Web Rules link. The Custom Web Rules window appears. 48 Gatekeeper Pico

49 Advanced Security Settings 2. Click the + (plus) button. The Add Rule dialog box appears. 3. In the Rule Name field, enter a descriptive name for the rule. 4. In the If the following condition is met: section, define the condition under which action will be taken. 5. In the Perform the following action: section, select whether to allow or block the site from the drop-down list. 6. Click OK. The rule is added to the rule list. 7. Click Apply to save your settings. Defining a rule adds it to the rule list, but it is saved only when you click Apply. Therefore, if you attempt to move to another screen in the Gatekeeper Pico Management Console before clicking Apply, you will receive a warning that you must first save your work. To modify a Custom Web Rule: 1. Double-click the rule you want to modify. The Custom Web Rules dialog box appears. User Guide 49

50 Advanced Security Settings 2. Edit the relevant fields. 3. Click OK. 4. Click Apply. The selected rule is modified. Edits to a rule are saved only when you click Apply. Therefore, if you attempt to move to another screen in the Gatekeeper Pico Management Console before clicking Apply, you will receive a warning that you must first save your work. To activate or deactivate a Cus tom Web Rule: Select or clear the checkbox in the Active column of the rule you want to activate or deactivate. To delete a Custom Web Rule: 1. Select the rule you want to delete. 2. Click the - (minus) button. The rule is deleted from the rule list. 3. Click Apply. The deletion is saved. Deleting a rule removes it from the rule list, but the deletion is saved only when you click Apply. Therefore, if you attempt to move to another screen in the Gatekeeper Pico Management Console before clicking Apply, you will receive a warning that you must first save your work. Configuring Firewall Settings Gatekeeper Pico can block unwanted inbound and outbound traffic using the following methods: Direction Method Description Outbound Blacklist List of ports over which traffic is blocked. Outbound Whitelist List of ports over which traffic is allowed (i.e. all outbound traffic is blocked except the ports on this list). Inbound and outbound Rules Individual ports or port ranges that you either allow or block. 50 Gatekeeper Pico

51 Advanced Security Settings The default predefined security policy specifies that: All inbound connections are blocked All outbound connections are allowed, with the exception of the predefined blacklist. To modify the policy, you can: For both inbound and outbound traffic, add manual policy rules. For outbound traffic, modify the Blacklist, or specify the Whitelist (list of acceptable ports) to be used. The following precedence convention is applied: When there are two or more rules, a rule positioned higher in the list takes precedence over lower ones. Rules override (i.e., take precedence over) the Blacklist/Whitelist specifications, both predefined and customized. If both the Whitelist and the Blacklist are enabled, the Whitelist overrides any specifications in the Blacklist. To enable/disable Blacklist/Whitelist-based blocking: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click Advanced. 3. Click Firewall. The firewall screen appears. User Guide 51

52 Advanced Security Settings 4. Do either of the following: Uncheck the Blacklist checkbox to disable outbound port blocking (i.e., to allow ALL traffic except as specified in the Rules in the bottom portion of the screen), Check the Whitelist checkbox to block outbound traffic based on the Whitelist (i.e., to allow traffic ONLY on ports checked in the Whitelist, except as specified in the Rules in the bottom portion of the screen). The Whitelist overrides the Blacklist, thus when the Whitelist is checked, it does not matter whether the Blacklist is checked. 5. To modify the Blacklist or Whitelist, see the procedures below. 6. Click Apply. The security policy is set. (Note that the blacklist settings will be ignored if a whitelist is used.) To modify the Blacklist: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click Advanced. 3. Click Firewall. 52 Gatekeeper Pico

53 Advanced Security Settings The firewall screen appears. 4. Click the blacklist link. The Blacklist screen opens. User Guide 53

54 Advanced Security Settings 5. Check all ports to be blocked and uncheck all ports to be allowed. 6. Click Apply. The security policy is set. Blacklist settings are ignored if a Whitelist is used. (See the procedure above to enable/disable Blacklist-based blocking.) To modify the Whitelist: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click Advanced. 3. Click Firewall. The firewall screen appears: 4. Click the whitelist link. The Whitelist screen opens. 54 Gatekeeper Pico

55 Advanced Security Settings 5. Check all ports to be allowed and uncheck all ports to be blocked. 6. Click Apply. The security policy is set. (See the procedure above to enable/disable Whitelistbased blocking.) To create and sequence Firewall Rules: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click Advanced. 3. Click Firewall. The firewall screen appears. User Guide 55

56 Advanced Security Settings 4. Click the + (plus) button. The Add firewall rule dialog appears. 5. Specify the following Rule components: Direction: Inbound or outbound traffic. Remote IP address: For Inbound traffic, select Any or select the option below Any and enter the IP address of the source. For Outbound traffic, specify Any or select the option below Any and enter the IP address of the destination. 56 Gatekeeper Pico

57 Advanced Security Settings Port Range: Enter the range of port numbers (min 1 and max 65535). For a single port, use the same port number in both (do not leave one of the two fields blank). Type: Select UDP, TCP, or Both. Action: Select Allow or Block. Comment: Enter any free text needed for your personal use. This text appears in a column in the summary table in the Security tab. Number of characters permitted is Click OK. The Rule is added to the list. 7. Repeat the above steps for all Rules you wish to define. For example, you can create several blocking Rules, and then add one at the end that blocks all other traffic. 8. To re-sequence the list of Rules: Select a Rule and click to move the rule up in the list or to move the rule down in the list. (Remember that Rules higher in the list take precedence over lower ones.) Repeat for any other Rules to be repositioned. 9. Click Apply to save and apply the changes. To delete a Firewall Rule: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click Advanced. 3. Click Firewall. The firewall screen appears. User Guide 57

58 Advanced Security Settings 4. Select the Rule you want to delete. 5. Click the - (minus) button. The rule is deleted from the rule list. 4. Click Apply. The deletion is saved. Deleting a rule removes it from the rule list, but the deletion is saved only when you click Apply. Therefore, if you attempt to move to another screen in the Gatekeeper Pico Management Console before clicking Apply, you will receive a warning that you must first save your work. Size Policy Gatekeeper Pico can scan files up to 10 MB. You can specify that Gatekeeper Pico block files larger than 10 MB or scan to the size limit. To configure the size policy: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 58 Gatekeeper Pico

59 Advanced Security Settings 2. Click Advanced. 3. Click Size Policy. The Size Policy screen appears. 4. If you want Gatekeeper Pico to block all files larger than 10 MB downloaded from the web (HTTP), select the checkbox. (Not selecting this option means these files will go through but will be scanned for up to 10 MB of their size). 5. Click Apply. Gatekeeper Pico blocks or allows large files from the web according to the specified settings Configuring Protocol Scanning Gatekeeper Pico uses application layer scanners and engines (Anti-virus, Antispyware, Anti-spam, Anti-phishing, Web Filtering, etc.) on different incoming communication protocols. The Component configuration option lets you enable or disable application-level scanning of certain protocols and activate or deactivate application-level engines. To configure protocol scanning: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click Advanced. 3. Click Components. The Components screen appears. User Guide 59

60 Advanced Security Settings 4. Select the checkboxes of the protocols you want Gatekeeper Pico to scan. 5. Select the checkbox of the Security Engine you want Gatekeeper Pico to use: Select Mailshell if you want to activate spam mail checks. Select Yoggie`s patent-pending L-8 Security Agent if you wish to activate Layer-8 protection. 6. Click Apply. Gatekeeper Pico scans the protocols according to the specified settings. Configuring IDS/IPS Gatekeeper Pico features IDS/IPS protection. In this advanced configuration option you can specify the security policies for each activity. To configure IDS/IPS protection: 1. Click Settings in the Navigation pane of the Management Console. The Security tab appears in the Display pane. 2. Click Advanced. 3. Click IDS/IPS. The IDS/IPS Policy screen appears. 60 Gatekeeper Pico

61 Advanced Security Settings 4. Select the IDS/IPS Enabled check box. 5. For each activity/threat, select one of the following settings from the drop-down list: Allow Gatekeeper Pico allows this activity and does not log it. Log Gatekeeper Pico allows this activity and logs it. Block Gatekeeper Pico blocks the activity logs it. 6. Click Apply. Gatekeeper Pico runs the IPS/IDS protection according to the specified settings. User Guide 61

62 Support Generating a Support File Support In rare cases, you may need to generate a support file, restart, or shutdown the Gatekeeper Pico system, as described in this section. Generating a Support File You can generate and save a support file that contains all Gatekeeper Pico logs, configuration data, and other relevant information. This file can then be sent to a Gatekeeper Pico support expert for analysis. To generate a support file: 1. Click Support in the Navigation pane of the Management Console. The main Support page appears. 2. Click the Support Tools tab. 3. Click the Support File button. The support file is generated and the File Download dialog box opens. 62 Gatekeeper Pico

63 Support Reset Options 4. Note the file name and click Save. The Save As dialog box appears. 5. Navigate to the location to which you want to save the support file and click Save. Reset Options You may need to reset logs and counters for troubleshooting. To reset device counters: 1. Click Support in the Navigation pane of the Management Console. The main Support page appears. 2. In the Support Tools tab, click the Reset Options button. A list of reset options appears: User Guide 63

64 Support Diagnostics 3. Select the logs or counters you want to clear and click Apply. The selected items are cleared. Diagnostics You can ensure that your Gatekeeper Pico is protecting your laptop by running a diagnostics check. You may be required to run the following diagnostic test during a support session: General Diagnostics runs diagnostic tests on Gatekeeper Pico s security applications. Network Diagnostics runs a ping and a trace test. Virus Test - As part of this test, a sample but harmless virus file is downloaded and Gatekeeper Pico blocks it from reaching your laptop. Running General Diagnostics To run general diagnostics: 1. Click Support in the Navigation pane of the Management Console. The main Support page appears. 2. Click the Diagnostics tab: 64 Gatekeeper Pico

65 Support Diagnostics 3. In the General Diagnostics section, click the Run button. The general diagnostics dialog opens with results of the various tests. 4. After reviewing the results of the tests, click Close. User Guide 65

66 Support Diagnostics Running Network Diagnostics To run network diagnostics: 1. Click Support in the Navigation pane of the Management Console. The main Support page appears. 2. Click the Diagnostics tab. 3. In the Network Diagnostics section, enter the IP Address or computer name in the field next to the Ping button. 4. Click Ping. A window opens and the IP address or computer name is pinged. 66 Gatekeeper Pico

67 Support Diagnostics 5. To perform a trace, enter the IP Address or computer name in the field next to the Trace button. 6. Click Trace. A window opens and the trace is performed. User Guide 67

68 Support Diagnostics Running a Virus Test To run the virus test file: 1. Click Support in the Navigation pane of the Management Console. The main Support page appears. 2. Click the Diagnostics tab, 3. In the Virus Test section, click the Virus Test button. The file is downloaded, blocked by Gatekeeper Pico and the following message appears: 68 Gatekeeper Pico

69 Gatekeeper Pico Enforcement Disabling Gatekeeper Pico Enforcement Gatekeeper Pico Enforcement One of the outstanding features provided by the Gatekeeper Pico driver and software is Gatekeeper Pico Enforcement. This feature prevents or disables connection to a network when Gatekeeper Pico is not connected to your laptop. Situations may arise when you need to disable Enforcement, for example if the Gatekeeper Pico has been damaged or lost. Once disabled, you are able to continue working with a network connection. However, this should be used with caution as all Gatekeeper Pico protection is disabled. Disabling Gatekeeper Pico Enforcement To disable Gatekeeper Pico protection: 1. Right-click the Gatekeeper Pico icon in the notification area. 2. Select Disable Protection from the displayed pop-up menu. The Disable Protection dialog box opens. 3. Enter the disable-protection password in the Password field. The default disable-protection password is yoggie. If you are a corporate user, contact your system administrator to obtain the password. The password you will receive will be temporary. Changing the Enforcement Password You may change the enforcement password (the password used for disabling the enforcement) at any time. To change the enforcement password: 1. Right-click the Gatekeeper Pico icon in the notification area. 2. Select Change Password from the displayed pop-up menu. User Guide 69

70 Gatekeeper Pico Enforcement Changing the Enforcement Password The Change Password dialog box opens. 3. Enter the current disable password in the Current Password field. 4. Enter the new disable password in the New Password field. 5. Enter the new disable password once again in the Verify Password field. 6. Click OK. The new disable password is set. 70 Gatekeeper Pico

NetExtender for SSL-VPN

NetExtender for SSL-VPN NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following

More information

Training UNIFIED SECURITY. Signature based packet analysis

Training UNIFIED SECURITY. Signature based packet analysis Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that

More information

CHAPTER 7 ADVANCED ADMINISTRATION PC

CHAPTER 7 ADVANCED ADMINISTRATION PC ii Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband ADSL Router Features... 1 Package Contents... 3 Physical Details... 4 CHAPTER 2 INSTALLATION... 6 Requirements... 6 Procedure... 6 CHAPTER 3 SETUP...

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

AccessEnforcer Version 4.0 Features List

AccessEnforcer Version 4.0 Features List AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect

More information

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats. AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver LevelOne FBR-1416 1W, 4L 10/100 Mbps ADSL Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 FBR-1416 Features... 1 Package Contents... 3 Physical Details... 3 CHAPTER 2

More information

SonicWALL / Toshiba General Installation Guide

SonicWALL / Toshiba General Installation Guide SonicWALL / Toshiba General Installation Guide SonicWALL currently maintains two operating systems for its Unified Threat Management (UTM) platform, StandardOS and EnhancedOS. When a SonicWALL is implemented

More information

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1

More information

Wireless-G Router User s Guide

Wireless-G Router User s Guide Wireless-G Router User s Guide 1 Table of Contents Chapter 1: Introduction Installing Your Router System Requirements Installation Instructions Chapter 2: Preparing Your Network Preparing Your Network

More information

OneSecure VPN Remote User Installation & Configuration Guide

OneSecure VPN Remote User Installation & Configuration Guide OneSecure VPN Remote User Installation & Configuration Guide 3/11/2015 CONTENTS Download Client Software 02 Install Client Software 03 Enable Client Software 07 Configure the Connection 08 WELCOME Welcome

More information

Comodo Dome Shield - Admin Guide

Comodo Dome Shield - Admin Guide rat Comodo Dome Shield Software Version 1.12 Administrator Guide Guide Version 1.12.111717 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo Dome

More information

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Protegent Total Security Solution USER GUIDE 2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Table of Contents PROTEGENT TOTAL SECURITY...3 INSTALLATION...4 REGISTERING PROTEGENT TOTAL SECURITY...

More information

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Quick Heal AntiVirus Pro. Tough on malware, light on your PC. Tough on malware, light on your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware tools. Signature based detection Detects

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

McAfee Internet Security Suite Quick-Start Guide

McAfee Internet Security Suite Quick-Start Guide Enjoy a Worry Free Online Experience McAfee Internet Security Suite protects your PC, identity and online experience. It also includes PC and network tools, plus McAfee SiteAdvisor for safe surfing. Internet

More information

SonicWALL TZ 150 Getting Started Guide

SonicWALL TZ 150 Getting Started Guide SonicWALL TZ 150 Getting Started Guide SonicWALL TZ 150 Security Appliance Getting Started Guide The SonicWALL TZ 150 is a total security platform delivering true layered security by integrating gateway

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

SonicWALL Security Appliances. SonicWALL SSL-VPN 200 Getting Started Guide

SonicWALL Security Appliances. SonicWALL SSL-VPN 200 Getting Started Guide SonicWALL Security Appliances SonicWALL SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide This Getting Started Guide contains installation procedures and configuration

More information

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE (4/20/07) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium sized networks,

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents

More information

Cisco s Appliance-based Content Security: IronPort and Web Security

Cisco s Appliance-based Content Security: IronPort  and Web Security Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.

More information

Managing SonicWall Gateway Anti Virus Service

Managing SonicWall Gateway Anti Virus Service Managing SonicWall Gateway Anti Virus Service SonicWall Gateway Anti-Virus (GAV) delivers real-time virus protection directly on the SonicWall security appliance by using SonicWall s IPS-Deep Packet Inspection

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 User Guide Guide Version 2.12.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

SonicOS Standard Release Notes SonicWALL Secure Anti-Virus Router 80 Series SonicWALL, Inc. Software Release: March 15, 2007

SonicOS Standard Release Notes SonicWALL Secure Anti-Virus Router 80 Series SonicWALL, Inc. Software Release: March 15, 2007 SonicOS Standard 3.8.0.1 SonicWALL Secure Anti-Virus Router 80 Series SonicWALL, Inc. Software Release: March 15, 2007 CONTENTS PLATFORM COMPATIBILITY KEY FEATURES KNOWN ISSUES UPGRADING SONICOS STANDARD

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email

More information

SecureAPlus User Guide. Version 3.4

SecureAPlus User Guide. Version 3.4 SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

RX3041. User's Manual

RX3041. User's Manual RX3041 User's Manual Table of Contents 1 Introduction... 2 1.1 Features and Benefits... 3 1.2 Package Contents... 3 1.3 Finding Your Way Around... 4 1.4 System Requirements... 6 1.5 Installation Instruction...

More information

Parallels Remote Application Server

Parallels Remote Application Server Parallels Remote Application Server Parallels Client for Mac User's Guide v16 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved. User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System

More information

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide Mission Control for the Microsoft Cloud 5nine Cloud Security Web Portal Version 12.o Getting Started Guide 2018 5nine Software Inc. All rights reserved. All trademarks are the property of their respective

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Implementing DVN. directpacket Product Guide

Implementing DVN. directpacket Product Guide Implementing DVN directpacket Product Guide directpacket Research www.directpacket.com 2 1 DVN and the IPC Community The Secure Dedicated Versatile Network (DVN) Server is a hardened internet facing device

More information

Avira Ultimate Protection Suite. Short guide

Avira Ultimate Protection Suite. Short guide Avira Ultimate Protection Suite Short guide 01 Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand

More information

SonicOS Enhanced Release Notes

SonicOS Enhanced Release Notes SonicOS Contents Platform Compatibility... 1 Known Issues... 2 Resolved Known Issues... 3 Upgrading SonicOS Enhanced Image Procedures... 4 Related Technical Documentation...7 Platform Compatibility The

More information

Comodo Comodo Dome Antispam MSP Software Version 2.12

Comodo Comodo Dome Antispam MSP Software Version 2.12 Comodo Comodo Dome Antispam MSP Software Version 2.12 User Guide Guide Version 2.12.111517 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Dome

More information

ForeScout Extended Module for Carbon Black

ForeScout Extended Module for Carbon Black ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent

More information

CYAN SECURE WEB Installing on Windows

CYAN SECURE WEB Installing on Windows CYAN SECURE WEB September 2009 Applies to: 1.7 and above Table of Contents 1 Introduction... 2 2 Preparation... 2 3 Network Integration... 3 3.1 Out-of-line Deployment... 3 3.2 DMZ Deployment... 3 4 Proxy

More information

Sophos Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017

Sophos  Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017 Sophos Email Appliance Configuration Guide Product Version 4.3 Sophos Limited 2017 ii Contents Sophos Email Appliance Contents 1 Copyrights and Trademarks...4 2 Setup and Configuration Guide...5 3 Product

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information

KYOCERA Net Viewer User Guide Supplement

KYOCERA Net Viewer User Guide Supplement KYOCERA Net Viewer User Guide Supplement Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual GFI MailSecurity 2011 for Exchange/SMTP Administration & Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and

More information

IP806GA/GB Wireless ADSL Router

IP806GA/GB Wireless ADSL Router IP806GA/GB Wireless ADSL Router 802.11g/802.11b Wireless Access Point ADSL Modem NAT Router 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless ADSL Router Features...

More information

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free: EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install

More information

ForeScout Extended Module for Symantec Endpoint Protection

ForeScout Extended Module for Symantec Endpoint Protection ForeScout Extended Module for Symantec Endpoint Protection Version 1.0.0 Table of Contents About the Symantec Endpoint Protection Integration... 4 Use Cases... 4 Additional Symantec Endpoint Protection

More information

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1 Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

CE APPROVED.4 INTRODUCTION.5 PACKAGE CONTENTS. 6 PRE - INSTALLATION CHECKLIST. 6 SYSTEM REQUIREMENTS. 6 FEATURES AND BENEFITS.11 SETUP WIZARD.

CE APPROVED.4 INTRODUCTION.5 PACKAGE CONTENTS. 6 PRE - INSTALLATION CHECKLIST. 6 SYSTEM REQUIREMENTS. 6 FEATURES AND BENEFITS.11 SETUP WIZARD. Web Edition Dec. 2002 Contents CE APPROVED...4 INTRODUCTION...5 PACKAGE CONTENTS... 6 PRE - INSTALLATION CHECKLIST... 6 SYSTEM REQUIREMENTS... 6 FEATURES AND BENEFITS... 7 4 - PORT CABLE/XDSL ROUTER...9

More information

SOLUTION MANAGEMENT GROUP

SOLUTION MANAGEMENT GROUP InterScan Messaging Security Virtual Appliance 8.0 Reviewer s Guide February 2011 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com

More information

Comodo Korugan Software Version 1.8

Comodo Korugan Software Version 1.8 rat Comodo Korugan Software Version 1.8 Unified Threat Management Administrator Guide Guide Version 1.8.050515 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows BackupVault Desktop & Laptop Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Blueraq Networks Ltd, 2017. All rights reserved. Trademarks - Microsoft, Windows, Microsoft

More information

Moxa Remote Connect Server Software User s Manual

Moxa Remote Connect Server Software User s Manual User s Manual Edition 1.0, April 2018 www.moxa.com/product 2018 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.0.622 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

MikroWall Hotspot Router and Firewall System

MikroWall Hotspot Router and Firewall System MikroWall Hotspot Router and Firewall System Installation and configuration guide Contents: 1.0 The Device:...2 1.1 The MikroWall Wireless...2 1.2 MikroWall Standard...2 2.0 Installation...2 2.1 Before

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 2 Contents Chapter 1: Introduction...7 1.1 System requirements...8 1.1.1 Policy Manager Server...8 1.1.2 Policy Manager Console...8

More information

Sophos Mobile Control SaaS startup guide. Product version: 7

Sophos Mobile Control SaaS startup guide. Product version: 7 Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login

More information

WatchGuard System Manager Fireware Configuration Guide. WatchGuard Fireware Pro v8.1

WatchGuard System Manager Fireware Configuration Guide. WatchGuard Fireware Pro v8.1 WatchGuard System Manager Fireware Configuration Guide WatchGuard Fireware Pro v8.1 Notice to Users Information in this guide is subject to change without notice. Companies, names, and data used in examples

More information

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 2 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

Broadband Router DC-202. User's Guide

Broadband Router DC-202. User's Guide Broadband Router DC-202 User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details...3 CHAPTER 2 INSTALLATION... 5 Requirements...

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Server Edition USER MANUAL. For Microsoft Windows

Server Edition USER MANUAL. For Microsoft Windows Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft Windows

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 AntiMalware User Guide Version 7.0 English January 6, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Deployment Guide: Routing Mode with No DMZ

Deployment Guide: Routing Mode with No DMZ Deployment Guide: Routing Mode with No DMZ March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a router-firewall device on your network with

More information

NSG50/100/200 Nebula Cloud Managed Security Gateway

NSG50/100/200 Nebula Cloud Managed Security Gateway NSG50/100/200 The Zyxel is built with remote management and ironclad security for organizations with multiple distributed sites. With an extensive suite of security features including ICSAcertified firewall,

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 6.5 Copyright 2012. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver LevelOne WBR-3407 11g Wireless ADSL VPN Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless ADSL Router Features... 1 Package Contents... 5 Physical Details... 6 CHAPTER

More information

SonicOS Release Notes

SonicOS Release Notes SonicOS Contents Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 4 Upgrading SonicOS Enhanced Image Procedures... 5 Related Technical Documentation... 10 Platform Compatibility The SonicOS

More information

Server Edition. V8 Peregrine User Manual. for Microsoft Windows

Server Edition. V8 Peregrine User Manual. for Microsoft Windows Server Edition V8 Peregrine User Manual for Microsoft Windows Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft

More information

The Malwarebytes Protection Strategy

The Malwarebytes Protection Strategy Malwarebytes Breach Remediation (Mac) Administrator Guide Version 1.3.1 27 September 2017 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions

More information

User Guide. Version R95. English

User Guide. Version R95. English Anti-Malware (Classic) User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Barracuda Firewall Release Notes 6.6.X

Barracuda Firewall Release Notes 6.6.X Please Read Before Upgrading Before installing the new firmware version, back up your configuration and read all of the release notes that apply to the versions that are more current than the version that

More information

Unified Threat Management

Unified Threat Management G H I J ECS Enter Unified Threat Management CR500ia-1F QUICK START GUIDE CR500ia-1F Appliance Document Version: PL QSG500ia-1F/96000/10.02.0.0.473/08082012 G H I J CR500ia-1F ECS Enter DEFAULTS Default

More information

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System

More information

Sophos Mobile SaaS startup guide. Product version: 7.1

Sophos Mobile SaaS startup guide. Product version: 7.1 Sophos Mobile SaaS startup guide Product version: 7.1 Contents 1 About this guide...4 2 What are the key steps?...5 3 Change your password...6 4 Change your login name...7 5 Activate SMC Advanced licenses...8

More information

Avira Premium Security Suite User Manual

Avira Premium Security Suite User Manual Avira Premium Security Suite User Manual Trademarks and Copyright Trademarks AntiVir is a registered trademark of Avira GmbH. Windows is a registered trademark of the Microsoft Corporation in the United

More information

Business Connect Secure Remote Access Service (SRAS) Customer Information Package

Business Connect Secure Remote Access Service (SRAS) Customer Information Package Business Connect Secure Remote Access Service (SRAS) Customer Information Package Table of Contents 1.0 Introduction... 1 1.1 Overview... 1 1.2 Scope and Audience... 1 1.3 Design Deliverables... 1 1.4

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.1.746 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

Configuring VPN from Proventia M Series Appliance to NetScreen Systems

Configuring VPN from Proventia M Series Appliance to NetScreen Systems Configuring VPN from Proventia M Series Appliance to NetScreen Systems January 13, 2004 Overview This document describes how to configure a VPN tunnel from a Proventia M series appliance to NetScreen 208

More information

Integrate Cisco IronPort Security Appliance (ESA)

Integrate Cisco IronPort  Security Appliance (ESA) Integrate Cisco IronPort Email Security Appliance (ESA) Publication Date: January 4, 2017 Abstract This guide provides instructions to configure Cisco IronPort Email Security Appliance (ESA) to send the

More information

Service Managed Gateway TM. Configuring IPSec VPN

Service Managed Gateway TM. Configuring IPSec VPN Service Managed Gateway TM Configuring IPSec VPN Issue 1.2 Date 12 November 2010 1: Introduction 1 Introduction... 3 1.1 What is a VPN?... 3 1.2 The benefits of an Internet-based VPN... 3 1.3 Tunnelling

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Using CSC SSM with Trend Micro Damage Cleanup Services

Using CSC SSM with Trend Micro Damage Cleanup Services APPENDIXD Using CSC SSM with Trend Micro Damage Cleanup Services Trend Micro InterScan for CSC SSM works with Trend Micro Damage Cleanup Services (DCS) as part of an enterprise protection strategy. The

More information

F5 WANJet 200. Quick Start Guide. Quick Start Overview

F5 WANJet 200. Quick Start Guide. Quick Start Overview F5 WANJet 200 Quick Start Guide Quick Start Overview Following is a high level overview of the steps required to successfully install and configure your F5 WANJet 200 appliance. For detailed instructions

More information

Configuring the VPN Client

Configuring the VPN Client Configuring the VPN Client This chapter explains how to configure the VPN Client. To configure the VPN Client, you enter values for a set of parameters known as a connection entry. The VPN Client uses

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information