WatchGuard Technologies V10.0 инструкция обслуживания

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38

Идти на страницу of

Хорошее руководство по эксплуатации

Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации WatchGuard Technologies V10.0. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции WatchGuard Technologies V10.0 или обучающее видео для пользователей. Условием остается четкая и понятная форма.

Что такое руководство?

Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции WatchGuard Technologies V10.0 можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.

К сожалению немного пользователей находит время для чтения инструкций WatchGuard Technologies V10.0, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.

Из чего должно состоять идеальное руководство по эксплуатации?

Прежде всего в инструкции WatchGuard Technologies V10.0 должна находится:
- информация относительно технических данных устройства WatchGuard Technologies V10.0
- название производителя и год производства оборудования WatchGuard Technologies V10.0
- правила обслуживания, настройки и ухода за оборудованием WatchGuard Technologies V10.0
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам

Почему мы не читаем инструкций?

Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск WatchGuard Technologies V10.0 это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок WatchGuard Technologies V10.0 и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта WatchGuard Technologies, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания WatchGuard Technologies V10.0, как это часто бывает в случае бумажной версии.

Почему стоит читать инструкции?

Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства WatchGuard Technologies V10.0, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.

После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции WatchGuard Technologies V10.0. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.

Содержание руководства

  • Страница 1

    W atchGuard®Mobile VPN with IPSec Administrator Guide W atchGuard Mobile VPN v10.0 R evised: November 28, 2007[...]

  • Страница 2

    ii Mobile User VPN ADDRESS: 505 Fifth Avenue South Suite 500 Seattle, W A 98104 SUPPORT : www .w atchguard.com/suppor t U.S. and Canada +877.232.3531 All Other Countries +1.206.521.3575 SALES: U.S. and Canada +1.800.734.9905 All Other Countries +1.206.613.0895 ABOUT WA TCHGUARD WatchGuard is a leading provider of networ k security solutions for sma[...]

  • Страница 3

    Administrator Guide 1 1 Configure the Firebox X Edge to use Mobile VPN with IPSec The W atchGuard® Mobi le VPN with IPSec clien t is a software applica tion that is ins talled on a r emote computer . The client makes a secur e connection from the remote c omputer to your pr otected network through an unsecured network. The Mobile VPN client uses I[...]

  • Страница 4

    Enabling Mobil e VPN for a Fir ebox User Account 2 Mobile User VPN The F irebox X Edge creates a .wgx file for a user when a Fir ebox user ’ s account i s configured f or Mobile VPN, as described in this chapter . If you want to lock the profiles for mobile users by making them read- only , see “Configuring Global Mobile VPN Client Settings” [...]

  • Страница 5

    Administrator Guide 3 Configur ing Global Mobi le VPN Client Settings 10 Set MUVPN key exp iration in kilobytes and/or ho urs. The d efault values are 81 92 KB and 24 hours. T o remov e a size and/or time ex piration, set the v alue to zer o (0). 11 Make su re the VPN Client T ype drop- down list is set to Mobile User . This is true whether you use[...]

  • Страница 6

    Distributing the Software and Profiles 4 Mobile User VPN 1 Y ou can choose to make the .wgx file r ead- only so that the user cannot change the secu rity polic y file. T o do this, select the Make the MUVPN client security polic y r ead- only check box. 2 Mobile VPN clients use shared Windows Internet Naming Service ( WINS) and Domain Name Syst em [...]

  • Страница 7

    Administrator Guide 5 Distributing the Softwar e and Profiles • The end-user p rofile This file contains the user name, shared key , and settings that enable a remote computer t o connect securely over the Internet to a protected, private computer network . F or information on how to get the profile fr om the Edge, see “ Get the user’ s .wgx [...]

  • Страница 8

    Distributing the Software and Profiles 6 Mobile User VPN[...]

  • Страница 9

    Administrator Guide 7 2 Using Fireware Policy Manager to Configure Mobile VPN with IPSec The W atchGuard® Mobi le VPN with IPSec clien t is a software applica tion that is ins talled on a r emote computer . The client makes a secur e connection from the remote c omputer to your pr otected network through an unsecured network. The Mobile VPN client[...]

  • Страница 10

    About Mobile VPN Client Configuration Files 8 Mobile User VPN About Mobile VPN Client Configuration Files With Mobile VPN with IPSec, the network security administrator contr ols end-user profiles. P olicy Man- ager is used to set the name of the end user and create a clien t configura tion file , or profil e, with the file extension .wgx. The .wgx[...]

  • Страница 11

    Administrator Guide 9 Configuring the Firebox for Mobile VPN 3 Use the instruc tions pro vided here to go through each screen of the wizard. Click Next after each step . 4 Select a user aut hentica tion server Select an authentication ser ver fr om the Authentica tion Ser v er drop- down list. Y ou can authenticat e users with the internal F irebo [...]

  • Страница 12

    Configuring the Firebox for Mobile VPN 10 Mobile User VPN 6 Direct the flow of Internet traffic: Select an option for Internet tr affic . Y ou can allow all Internet traffic between th e Mobile VPN client and the Inte rnet to use the ISP of t he client, or you can make all Internet traffic use th e VPN tunnel. If you choose to force all Internet tr[...]

  • Страница 13

    Administrator Guide 11 Configuring the Firebox for Mobile VPN 8 Create the virtual IP address pool: Click Add to add one IP address or an IP address r ange. Repeat this step to add more virtua l IP addr esse s . Mobile VPN users will be assigned one of these IP a dd res se s w he n t he y co nn ec t t o yo ur ne tw or k. The number of IP addresses [...]

  • Страница 14

    Modifying an Existing Mobile VPN Profile 12 Mobile User VPN Adding Users to a Firebox Mobile VPN Group T o create an Mobile VPN tunnel with the F irebox, remote users type their user nam e and passwor d to authenticate. W atchGuard® Sy stem Mana ger software uses this information to authenticate the u ser t o the Fir ebox®. T o authenticate, user[...]

  • Страница 15

    Administrator Guide 13 Modifying an Existing Mobile VPN Profile 3 Click Edit . The Edit MUVPN Extended Authentication Group dialog box appears. Use the following fields to edit the gr oup profile: Authentication Server Select the authentication server to use for this Mobile VPN group . T o configure y our authentication ser ver , select Setup > [...]

  • Страница 16

    Modifying an Existing Mobile VPN Profile 14 Mobile User VPN timeouts for the Mobile VPN group are always ignored because you set timeouts in the individual F irebox user ac counts. The session and idle timeouts cannot be longer than the value in th e SA Lif e field. T o set this field, from the IPSec T unnel tab of the Edit MUVPN Extended Authentic[...]

  • Страница 17

    Administrator Guide 15 Modifying an Existing Mobile VPN Profile Phase2 Settings Select the proposal and key expiration sett ings f or the Mobile VPN tunnel. Y ou can also enable P er fect F or war d Secrecy ( PFS) or set the Diffie-Hellman group. T o change other proposal settings, click the Proposal button, and see the procedure de scribed in “D[...]

  • Страница 18

    Modifying an Existing Mobile VPN Profile 16 Mobile User VPN Defining advanced Phase 1 settings T o define advanced Phase 1 set tings f or an Mobile VPN user profile: 1 Fro m th e IP Sec T unnel tab of the Edit MUVPN Extended A uthentication Group dialog box, select Adva nced . The Phase1 Advanced Settings dialog box appears. 2 T o change the SA (se[...]

  • Страница 19

    Administrator Guide 17 Configuring WINS and DNS Servers 2 Fro m th e Ty p e drop- down list, select ESP or AH as the proposal method. Only ESP is suppor ted at this time. 3 Fro m th e Authentication drop- do wn list, select SHA1 or MD5 for the authenti cation method. 4 Fro m th e Encr yption drop-down list, select the encr yption method . The optio[...]

  • Страница 20

    Locking Down an End-User Profile 18 Mobile User VPN Locking Down an End-User Profile Y ou can use the advanced se ttings to lock down th e end-user profile so that u sers can see some set- tings but not change them, and hide other settings so that users cannot change them. W e recommend that you lock down all pr ofiles so that users cannot make cha[...]

  • Страница 21

    Administrator Guide 19 Configuring Policies to Filter Mobile VPN T raffic Configuring Policies to Filter Mobile VPN T raffic In a default configuration, Mobile VPN with I PSec users have full access privileges through a Fir ebox®, with the Any policy . T o put limits on Mobile VPN users, you must add policies to the MUVPN tab in Po li c y Ma n ag [...]

  • Страница 22

    Re-creating E nd-User Profiles 20 Mobile User VPN Under MUVPN Group , Po lic y Manager di splays the authen tication server , in parentheses, f or the Mobil e VPN g roup . Using the Any Policy The Any policy i s added to all Mobile VPN use r gr oups by def ault. The Any policy allows traffic on all por ts and prot ocols between the Mobile VPN user [...]

  • Страница 23

    Administrator Guide 21 Distributing the Softwar e and Profiles Distributing the Sof tware and Profiles W atchGuard® r ecommends distrib uting end-user profiles b y encr ypted email or with some other secure method. Each client computer must hav e: • Soft ware installation pack age The packages are locat ed on the W atchGuard LiveSecurity® Ser v[...]

  • Страница 24

    Additional Mobile VPN T opics 22 Mobile User VPN T erminating IPSec connections T o fully stop VPN connections, the F irebo x must be restarted. Removing the IPSec polic y do es not stop current connections. Global VPN settings Global VPN settings on your F irebo x apply to al l manual BOVPN tunnels, managed tunnels, and Mobile VPN tunnels. Y ou ca[...]

  • Страница 25

    Administrator Guide 23 3 Mobile VPN Client Inst allation and Connection The W at chGuard® Mobile VPN with IPSec client is installed on an em plo yee computer , whether the employee travels or works from home. The employee uses a standard Internet connectio n and acti- vates the Mobil e VPN client. The Mobile VP N client then creates an encrypted t[...]

  • Страница 26

    Installing the Mobile VPN with IPSec Client 24 Mobile User VPN > W indows F irewall > Change Settings > Exceptions ) for UDP port 4500. This will enable Mobile VPN keep -alive packets from the Fir ebox® to reach y our client and keep the VPN tunnel up. • W e recommend that y ou check to make sure all available ser vice packs are install[...]

  • Страница 27

    Administrator Guide 25 Installing the Mobile VPN with IPSec Client Importing the end-user profile When the co mputer restarts, the W at chGuard Mobile VPN C onnection Monitor dialog box opens. When the soft war e star ts for the first time after you install it, you get this message: There is no profile for the VPN dial-up! Do you want to use the Co[...]

  • Страница 28

    Connecting the Mobile VPN Client 26 Mobile User VPN If the password you use is y our password on an Active Directory or LDAP server and you choose to store it, the password becomes inv alid when it changes on the authentic ation server . 7 Click Fin ish . The computer is now r eady to use Mobile VPN with IPSec. Selecting a certificate and entering [...]

  • Страница 29

    Administrator Guide 27 Connecting the Mobile VPN Client Star t y our connec tion to the Internet through a Dial-Up Net w ork ing connection or LAN connection. Then, use the instructions below or select your prof ile, c onnect, and disconnec t by righ t- clicking the Mobile VPN icon on your W indows toolbar . 1 F rom your Wi ndows desktop , select S[...]

  • Страница 30

    Seeing Mobile VPN Log Messages 28 Mobile User VPN 4 Use the Connection Mode drop- down list to set the connection behavior you want for this profile. - Manual - When you select manual connection mode, the cl ient does not try to restart the VPN tunnel automatically if the VPN tunnel goes down. T o restart the VPN tunnel, you must click the Con ne c[...]

  • Страница 31

    Administrator Guide 29 Securing Y our Computer with the Mobile VPN Firewall Securing Y our Computer with the Mobile VPN Firewall The W at chGuard® Mobile VPN with IPSec cl ient in cludes two fir ewall compone nts: Link firew all The link firewall is not enabled b y default. When the link firewall is enabled, your computer will discard any packets [...]

  • Страница 32

    Securing Y our Computer with the Mobile VPN Firewall 30 Mobile User VPN 4 Fro m th e Stateful Inspec tion dr op- down list, select when connected or always . If y ou s ele ct when connected , the link fir ewall operat es only when the VPN tunnel is active f or this profile. If y ou s ele ct alway s , the link firewall is always active , whether the[...]

  • Страница 33

    Administrator Guide 31 Securing Y our Computer with the Mobile VPN Firewall 3 Define friendly net works and create firewall rules as described in the subsequent sections. Defining friendly networks Use the Friendly Netw orks tab to define sp ecific known networks for which you want to generate a firewall r ule set. For ex ample, if you want to us e[...]

  • Страница 34

    Securing Y our Computer with the Mobile VPN Firewall 32 Mobile User VPN T o create a rule, click New . Use the four tabs in the Fir ewa ll Ru le En tr y dialog box to defi ne the traffic you want to control. Each tab is described below. General tab On the Gener al tab, you define the basic proper ties of your rule . Rule Name T ype a descriptiv e n[...]

  • Страница 35

    Administrator Guide 33 Securing Y our Computer with the Mobile VPN Firewall Loc al ta b Use the Local tab to define the local IP address and por ts that are controlled by this rule, if any . We r ec- ommend that, in any rule, you configure the Local IP Addr esses setting to enable the Any IP address radio button. If you are configur ing an incoming[...]

  • Страница 36

    Securing Y our Computer with the Mobile VPN Firewall 34 Mobile User VPN Remote tab Use the Remote tab to define the remote IP address or addr esses and ports that are controlled by this rule, if any . For example, if your firewa ll is set to deny all traffic and you want to create a rule to allow outgoing POP3 con nections, you would add th e IP ad[...]

  • Страница 37

    Administrator Guide 35 Securing Y our Computer with the Mobile VPN Firewall[...]

  • Страница 38

    Securing Y our Computer with the Mobile VPN Firewall 36 Mobile User VPN[...]