Check Point Zonealarm: User Guide
Check Point Zonealarm: User Guide
User Guide
Version 7.5
August 2007
COPYRIGHT & TRADEMARKS PREAMBLE
Copyright © 2007 SofaWare, All Rights Reserved. No part of this The licenses for most software are designed to take away your
document may be reproduced in any form or by any means without freedom to share and change it. By contrast, the GNU General Public
written permission from SofaWare. License is intended to guarantee your freedom to share and change
free software--to make sure the software is free for all its users. This
Information in this document is subject to change without notice and General Public License applies to most of the Free Software
does not represent a commitment on part of SofaWare Technologies Foundation's software and to any other program whose authors
Ltd. commit to using it. (Some other Free Software Foundation software is
SofaWare, Safe@Home and Safe@Office are trademarks, service covered by the GNU Library General Public License instead.) You
marks, or registered trademarks of SofaWare Technologies Ltd. can apply it to your programs, too.
Check Point, AlertAdvisor, Application Intelligence, Check Point When we speak of free software, we are referring to freedom, not
Express, Check Point Express CI, the Check Point logo, Check Point price. Our General Public Licenses are designed to make sure that you
Pointsec Protector, ClusterXL, Confidence Indexing, ConnectControl, have the freedom to distribute copies of free software (and charge for
Connectra, Connectra Accelerator Card, Cooperative Enforcement, this service if you wish), that you receive source code or can get it if
Cooperative Security Alliance, CoSa, DefenseNet, Dynamic Shielding you want it, that you can change the software or use pieces of it in new
Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia free programs; and that you know you can do these things.
Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, To protect your rights, we need to make restrictions that forbid anyone
FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, to deny you these rights or to ask you to surrender the rights. These
INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, restrictions translate to certain responsibilities for you if you distribute
Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, copies of the software, or if you modify it.
NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec,
Pointsec Mobile, Policy Lifecycle Management, Provider-1, For example, if you distribute copies of such a program, whether
SecureClient, SecureClient Mobile, SecureKnowledge, gratis or for a fee, you must give the recipients all the rights that you
SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, have. You must make sure that they, too, receive or can get the source
SecureUpdate, SecureXL, SecureXL Turbocard, Sentivist, code. And you must show them these terms so they know their rights.
SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter We protect your rights with two steps: (1) copyright the software, and
Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, (2) offer you this license which gives you legal permission to copy,
SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter distribute and/or modify the software.
Security, SmartLSM, SmartMap, SmartPortal, SmartUpdate,
Also, for each author's protection and ours, we want to make certain
SmartView, SmartView Monitor, SmartView Reporter, SmartView
that everyone understands that there is no warranty for this free
Status, SmartViewTracker, SofaWare, SSL Network Extender,
software. If the software is modified by someone else and passed on,
Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority,
we want its recipients to know that what they have is not the original,
User-to-Address Mapping, UTM-1, VPN-1, VPN-1 Accelerator Card,
so that any problems introduced by others will not reflect on the
VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power,
original authors' reputations.
VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1
SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, Finally, any free program is threatened constantly by software patents.
VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti- We wish to avoid the danger that redistributors of a free program will
Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security Suite, individually obtain patent licenses, in effect making the program
ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and proprietary. To prevent this, we have made it clear that any patent
the Zone Labs logo are trademarks or registered trademarks of Check must be licensed for everyone's free use or not licensed at all.
Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a The precise terms and conditions for copying, distribution and
Check Point Software Technologies, Inc. Company. All other product modification follow.
names mentioned herein are trademarks or registered trademarks of
their respective owners. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS
FOR COPYING, DISTRIBUTION AND MODIFICATION
The products described in this document are protected by U.S. Patent
No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 0. This License applies to any program or other work which
6,850,943, and 7,165,076 and may be protected by other U.S. Patents, contains a notice placed by the copyright holder saying it may be
foreign patents, or pending applications. Any reproduction of this alert distributed under the terms of this General Public License. The
other than as an unmodified copy of this file requires authorization "Program", below, refers to any such program or work, and a "work
from Check Point. Permission to electronically redistribute this alert in based on the Program" means either the Program or any derivative
its unmodified form is granted. All other rights, including the use of work under copyright law: that is to say, a work containing the
other media, are reserved by Check Point Software Technologies Inc. Program or a portion of it, either verbatim or with modifications
and/or translated into another language. (Hereinafter, translation is
included without limitation in the term "modification".) Each licensee
GNU GENERAL PUBLIC LICENSE is addressed as "you".
Version 2, June 1991 Activities other than copying, distribution and modification are not
covered by this License; they are outside its scope. The act of running
Copyright © 1989, 1991 Free Software Foundation, Inc. the Program is not restricted, and the output from the Program is
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA covered only if its contents constitute a work based on the Program
Everyone is permitted to copy and distribute verbatim copies of this (independent of having been made by running the Program). Whether
license document, but changing it is not allowed. that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's distributed under the terms of Sections 1 and 2 above on
source code as you receive it, in any medium, provided that you a medium customarily used for software interchange; or,
conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the notices b) Accompany it with a written offer, valid for at least
that refer to this License and to the absence of any warranty; and give three years, to give any third party, for a charge no more
any other recipients of the Program a copy of this License along with than your cost of physically performing source
the Program. distribution, a complete machine-readable copy of the
corresponding source code, to be distributed under the
You may charge a fee for the physical act of transferring a copy, and terms of Sections 1 and 2 above on a medium
you may at your option offer warranty protection in exchange for a customarily used for software interchange; or,
fee.
2. You may modify your copy or copies of the Program or any c) Accompany it with the information you received as to
portion of it, thus forming a work based on the Program, and copy and the offer to distribute corresponding source code. (This
distribute such modifications or work under the terms of Section 1 alternative is allowed only for noncommercial
above, provided that you also meet all of these conditions: distribution and only if you received the program in
object code or executable form with such an offer, in
a) You must cause the modified files to carry prominent accord with Subsection b above.)
notices stating that you changed the files and the date of
any change. The source code for a work means the preferred form of the work for
making modifications to it. For an executable work, complete source
b) You must cause any work that you distribute or code means all the source code for all modules it contains, plus any
publish, that in whole or in part contains or is derived associated interface definition files, plus the scripts used to control
from the Program or any part thereof, to be licensed as a compilation and installation of the executable. However, as a special
whole at no charge to all third parties under the terms of exception, the source code distributed need not include anything that
this License. is normally distributed (in either source or binary form) with the major
c) If the modified program normally reads commands components (compiler, kernel, and so on) of the operating system on
interactively when run, you must cause it, when started which the executable runs, unless that component itself accompanies
running for such interactive use in the most ordinary the executable.
way, to print or display an announcement including an If distribution of executable or object code is made by offering access
appropriate copyright notice and a notice that there is no to copy from a designated place, then offering equivalent access to
warranty (or else, saying that you provide a warranty) copy the source code from the same place counts as distribution of the
and that users may redistribute the program under these source code, even though third parties are not compelled to copy the
conditions, and telling the user how to view a copy of source along with the object code.
this License. (Exception: if the Program itself is 4. You may not copy, modify, sublicense, or distribute the Program
interactive but does not normally print such an except as expressly provided under this License. Any attempt
announcement, your work based on the Program is not otherwise to copy, modify, sublicense or distribute the Program is
required to print an announcement.) void, and will automatically terminate your rights under this License.
These requirements apply to the modified work as a whole. If However, parties who have received copies, or rights, from you under
identifiable sections of that work are not derived from the Program, this License will not have their licenses terminated so long as such
and can be reasonably considered independent and separate works in parties remain in full compliance.
themselves, then this License, and its terms, do not apply to those 5. You are not required to accept this License, since you have not
sections when you distribute them as separate works. But when you signed it. However, nothing else grants you permission to modify or
distribute the same sections as part of a whole which is a work based distribute the Program or its derivative works. These actions are
on the Program, the distribution of the whole must be on the terms of prohibited by law if you do not accept this License. Therefore, by
this License, whose permissions for other licensees extend to the modifying or distributing the Program (or any work based on the
entire whole, and thus to each and every part regardless of who wrote Program), you indicate your acceptance of this License to do so, and
it. all its terms and conditions for copying, distributing or modifying the
Thus, it is not the intent of this section to claim rights or contest your Program or works based on it.
rights to work written entirely by you; rather, the intent is to exercise 6. Each time you redistribute the Program (or any work based on
the right to control the distribution of derivative or collective works the Program), the recipient automatically receives a license from the
based on the Program. original licensor to copy, distribute or modify the Program subject to
In addition, mere aggregation of another work not based on the these terms and conditions. You may not impose any further
Program with the Program (or with a work based on the Program) on a restrictions on the recipients' exercise of the rights granted herein. You
volume of a storage or distribution medium does not bring the other are not responsible for enforcing compliance by third parties to this
work under the scope of this License. License.
3. You may copy and distribute the Program (or a work based on it, 7. If, as a consequence of a court judgment or allegation of patent
under Section 2) in object code or executable form under the terms of infringement or for any other reason (not limited to patent issues),
Sections 1 and 2 above provided that you also do one of the following: conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
a) Accompany it with the complete corresponding excuse you from the conditions of this License. If you cannot
machine-readable source code, which must be distribute so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence
you may not distribute the Program at all. For example, if a patent 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE
license would not permit royalty-free redistribution of the Program by LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT
all those who receive copies directly or indirectly through you, then HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY
the only way you could satisfy both it and this License would be to AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED
refrain entirely from distribution of the Program. ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING
If any portion of this section is held invalid or unenforceable under ANY GENERAL, SPECIAL, INCIDENTAL OR
any particular circumstance, the balance of the section is intended to CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
apply and the section as a whole is intended to apply in other INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT
circumstances. LIMITED TO LOSS OF DATA OR DATA BEING RENDERED
INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
It is not the purpose of this section to induce you to infringe any PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE
patents or other property right claims or to contest validity of any such WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR
claims; this section has the sole purpose of protecting the integrity of OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
the free software distribution system, which is implemented by public SUCH DAMAGES.
license practices. Many people have made generous contributions to
the wide range of software distributed through that system in reliance To receive the SofaWare GPL licensed code, contact
on consistent application of that system; it is up to the author/donor to [email protected].
decide if he or she is willing to distribute software through any other
system and a licensee cannot impose that choice.
SAFETY PRECAUTIONS
This section is intended to make thoroughly clear what is believed to
be a consequence of the rest of this License. Carefully read the Safety Instructions the Installation and Operating
Procedures provided in this User's Guide before attempting to install
8. If the distribution and/or use of the Program is restricted in
or operate the router. Failure to follow these instructions may result in
certain countries either by patents or by copyrighted interfaces, the
damage to equipment and/or personal injuries.
original copyright holder who places the Program under this License
may add an explicit geographical distribution limitation excluding Before cleaning the router, unplug the power cord. Use only a
those countries, so that distribution is permitted only in or among soft cloth dampened with water for cleaning.
countries not thus excluded. In such case, this License incorporates the When installing the router, ensure that the vents are not
limitation as if written in the body of this License. blocked.
9. The Free Software Foundation may publish revised and/or new Do not place this product on an unstable surface or support.
versions of the General Public License from time to time. Such new The product may fall, causing serious injury to a child or adult,
versions will be similar in spirit to the present version, but may differ as well as serious damage to the product.
in detail to address new problems or concerns.
Do not use the router outdoors.
Each version is given a distinguishing version number. If the Program
specifies a version number of this License which applies to it and "any Do not expose the router to liquid or moisture.
later version", you have the option of following the terms and Do not expose the router to extreme high or low temperatures.
conditions either of that version or of any later version published by Do not disassemble or open the router. Failure to comply will
the Free Software Foundation. If the Program does not specify a void the warranty.
version number of this License, you may choose any version ever
published by the Free Software Foundation. Do not use any accessories other than those approved by
Check Point. Failure to do so may result in loss of
10. If you wish to incorporate parts of the Program into other free performance, damage to the product, fire, electric shock or
programs whose distribution conditions are different, write to the injury, and will void the warranty.
author to ask for permission. For software which is copyrighted by the
Free Software Foundation, write to the Free Software Foundation; we Route power supply cords where they are not likely to be
sometimes make exceptions for this. Our decision will be guided by walked on or pinched by items placed on or against them. Pay
the two goals of preserving the free status of all derivatives of our free particular attention to cords where they are attached to plugs
software and of promoting the sharing and reuse of software generally. and convenience receptacles, and examine the point where
they exit the unit.
NO WARRANTY
Do not connect or disconnect power supply cables and data
11. BECAUSE THE PROGRAM IS LICENSED FREE OF transmission lines during thunderstorms.
CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO
THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT Do not overload wall outlets or extension cords, as this can
WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT result in a risk of fire or electric shock. Overloaded AC outlets,
HOLDERS AND/OR OTHER PARTIES PROVIDE THE extension cords, frayed power cords, damaged or cracked wire
PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, insulation, and broken plugs are dangerous. They may result in
EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT a shock or fire hazard. Periodically examine the cord, and if its
LIMITED TO, THE IMPLIED WARRANTIES OF appearance indicates damage or deteriorated insulation, have it
MERCHANTABILITY AND FITNESS FOR A PARTICULAR replaced by your service technician.
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND If the unit or any part of it is damaged, disconnect the power
PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD plug and inform the responsible service personnel. Non-
THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST observance may result in damage to the router.
OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
POWER ADAPTER
Operate this product only from the type of power source
indicated on the product’s marking label. If you are not sure of
the type of power supplied to your home, consult your dealer
or local power company.
Use only the power supply provided with your product. Check
whether the device’s set supply voltage is the same as the local
supply voltage.
To reduce risk of damage to the unit, remove it from the outlet
by holding the power adapter rather than the cord.
SECURITY DISCLAIMER
The router provides your network with the highest level of security.
However, no single security product can provide you with absolute
protection. We recommend using additional security measures to
secure highly valuable or sensitive information.
Contents
Contents
About This Guide ................................................................................................................................vii
Introduction...........................................................................................................................................1
About Your Check Point ZoneAlarm Router......................................................................................1
Product Features..................................................................................................................................2
Optional Security Services..................................................................................................................5
Software Requirements .......................................................................................................................6
Getting to Know Your ZoneAlarm Z100G Router .............................................................................6
Contacting Technical Support...........................................................................................................10
The ZoneAlarm Firewall ....................................................................................................................11
What Is a Firewall? ...........................................................................................................................11
Security Requirements ......................................................................................................................12
Old Firewall Technologies................................................................................................................12
Check Point Stateful Inspection Technology ....................................................................................14
Installing and Setting Up ZoneAlarm ...............................................................................................19
Before You Install the ZoneAlarm Router ........................................................................................19
Wall Mounting the ZoneAlarm Router .............................................................................................32
Securing the ZoneAlarm Router against Theft..................................................................................34
Router Installation.............................................................................................................................36
Setting Up the ZoneAlarm Router ....................................................................................................39
Getting Started ....................................................................................................................................43
Initial Login to the ZoneAlarm Portal...............................................................................................43
Logging on to the ZoneAlarm Portal ................................................................................................46
Accessing the ZoneAlarm Portal Remotely Using HTTPS...............................................................47
Using the ZoneAlarm Portal .............................................................................................................49
Logging off .......................................................................................................................................53
Contents i
Contents
Contents iii
Contents
Configuring HTTPS........................................................................................................................338
Setting the Time on the Router .......................................................................................................341
Using Diagnostic Tools...................................................................................................................344
Backing Up the ZoneAlarm Router Configuration .........................................................................358
Resetting the ZoneAlarm Router to Defaults ..................................................................................361
Running Diagnostics .......................................................................................................................364
Rebooting the ZoneAlarm Router ...................................................................................................365
Using Network Printers ....................................................................................................................367
Overview.........................................................................................................................................367
Setting Up Network Printers ...........................................................................................................368
Configuring Computers to Use Network Printers ...........................................................................371
Viewing Network Printers...............................................................................................................387
Changing Network Printer Ports .....................................................................................................387
Resetting Network Printers .............................................................................................................388
Troubleshooting ................................................................................................................................389
Connectivity ....................................................................................................................................389
Service Center and Upgrades ..........................................................................................................393
Other Problems ...............................................................................................................................394
Specifications .....................................................................................................................................395
Technical Specifications .................................................................................................................395
CE Declaration of Conformity ........................................................................................................398
Federal Communications Commission Radio Frequency Interference Statement ..........................400
Glossary of Terms .............................................................................................................................401
Index...................................................................................................................................................407
Contents v
About Your Check Point ZoneAlarm Router
Note: Notes are denoted by indented text and preceded by the Note icon.
Warning: Warnings are denoted by indented text and preceded by the Warning icon.
Chapter 1
Introduction
This chapter introduces the Check Point ZoneAlarm Secure Wireless Router Z100G and
this guide.
This chapter includes the following topics:
About Your Check Point ZoneAlarm Router ...............................................1
Product Features ...........................................................................................2
Optional Security Services ...........................................................................5
Software Requirements ................................................................................6
Getting to Know Your ZoneAlarm Z100G Router.......................................6
Contacting Technical Support ....................................................................10
Chapter 1: Introduction 1
Product Features
Product Features
Table 1: ZoneAlarm Z100G Features
Capacity
Hardware Features
Print Server
Application Intelligence
SmartDefense™ (IPS)
Anti-spoofing
INSPECT Engine
Web Rules
VPN
Networking
Supported Internet Connection Static IP, DHCP, PPPoE, PPTP, Telstra, Cable
Methods
Chapter 1: Introduction 3
Product Features
Traffic Monitoring
MAC Cloning
Static NAT
Wireless
Wireless Protocols 802.11b (11 Mbps), 802.11g (54 Mbps), Super G* (108
Mbps)
Management
Local Diagnostics Tools Ping, WHOIS, Packet Sniffer, VPN Tunnel Monitor,
Connection Table Monitor, Wireless Monitor, My
Computers Display
Hardware Specifications
* Super G and XR mode are only available with select wireless network adapters. Actual
ranges are subject to change in different environments.
Chapter 1: Introduction 5
Software Requirements
Software Requirements
One of the following browsers:
• Microsoft Internet Explorer 6.0 or higher
• Netscape Navigator 6.0 and higher
• Mozilla Firefox
Note: For proper operation of the ZoneAlarm Portal, disable any pop-up blockers for
http://my.firewall.
Network Requirements
• 10BaseT or 100BaseT Network Interface Card installed on each computer
• CAT 5 STP (Category 5 Shielded Twisted Pair) Straight Through Ethernet cable
for each attached device
• An 802.11b, 802.11g or 802.11 Super G wireless card installed on each wireless
station
• A broadband Internet connection via cable or DSL modem with Ethernet
interface (RJ-45)
Rear Panel
All physical connections (network and power) are made via the rear panel of your
ZoneAlarm router.
Chapter 1: Introduction 7
Getting to Know Your ZoneAlarm Z100G Router
Label Description
PWR A power jack used for supplying power to the unit. Connect the supplied power
supply to this jack.
RESET A button used for rebooting the ZoneAlarm router or resetting the ZoneAlarm
router to its factory defaults. You need to use a pointed object to press this
button.
USB Two USB 2.0 ports used for connecting USB-based printers
WAN Wide Area Network: An Ethernet port (RJ-45) used for connecting your cable or
DSL modem, or for connecting a hub when setting up more than one Internet
connection
LAN 1-4 Local Area Network switch: Four Ethernet ports (RJ-45) used for connecting
computers or other network devices
Front Panel
The ZoneAlarm Z100G router includes several status LEDs that enable you to monitor the
router’s operation.
On (Red) Error
Chapter 1: Introduction 9
Contacting Technical Support
Chapter 2
What Is a Firewall?
The most effective way to secure an Internet link is to put a firewall between the local
network and the Internet. A firewall is a system designed to prevent unauthorized access to
or from a secured network. Firewalls act as locked doors between internal and external
networks: data that meets certain requirements is allowed through, while unauthorized data
is not.
To provide robust security, a firewall must track and control the flow of communication
passing through it. To reach control decisions for TCP/IP-based services, (such as whether
to accept, reject, authenticate, encrypt, and/or log communication attempts), a firewall
must obtain, store, retrieve, and manipulate information derived from all communication
layers and other applications.
Security Requirements
In order to make control decisions for new communication attempts, it is not sufficient for
the firewall to examine packets in isolation. Depending upon the communication attempt,
both the communication state (derived from past communications) and the application state
(derived from other applications) may be critical in the control decision. Thus, to ensure
the highest level of security, a firewall must be capable of accessing, analyzing, and
utilizing the following:
• Communication information - Information from all seven layers in the packet
• Communication-derived state - The state derived from previous communications.
For example, the outgoing PORT command of an FTP session could be saved so
that an incoming FTP data connection can be verified against it.
• Application-derived state - The state information derived from other applications.
For example, a previously authenticated user would be allowed access through
the firewall for authorized services only.
• Information manipulation - The ability to perform logical or arithmetic functions
on data in any part of the packet. For example, the ability to encrypt packets.
Packet Filters
Historically implemented on routers, packet filters filter user-defined content, such as IP
addresses. They examine a packet at the network or transport layer and are application-
independent, which allows them to deliver good performance and scalability.
Packet filters are the least secure type of firewall, as they are not application-aware,
meaning that they cannot understand the context of a given communication. This makes
them relatively easy targets for unauthorized entry to a network. A limitation of this type
of filtering is its inability to provide security for basic protocols.
Packet filters have the following advantages and disadvantages:
Advantages Disadvantages
Scalability
Application-Layer Gateways
Application-layer gateways improve security by examining all application layers, bringing
context information into the decision-making process. However, the method they use to do
this disrupts the client/server model, reducing scalability. Ordinarily, a client sends
requests for information or action according to a specific protocol, and the server responds,
all in one connection. With application-layer gateways, each client/server communications
requires two connections: one from a client to a proxy, and one from a proxy to a server. In
addition, each proxy requires a different process (or daemon), making support for new
applications a problem.
Application-layer gateways have the following advantages and disadvantages:
Advantages Disadvantages
The fact that both of the channels are established by the client presents a challenge for the
firewall protecting the FTP server: while a firewall can easily be configured to identify
incoming command connections over the default port 21, it must also be able to handle
incoming data connections over a dynamic port that is negotiated randomly as part of the
FTP client-server communication. The following table examines how different firewall
technologies handle this challenge:
Packet Filter Packet filters can handle outbound FTP connections in either of the
following ways:
Since the FTP-data pending request list is dynamic, the firewall can
ensure that only the required FTP ports open. When the session is
closed, the firewall immediately closes the ports, guaranteeing the
FTP server's continued security.
Chapter 3
Windows Vista
Checking the TCP/IP Installation
1. Click Start > Control Panel.
The Control Panel window appears.
2. Under Network and Internet, click View network status and tasks.
5. Click Properties.
6. Check if Internet Protocol Version 4 (TCP/IPv4) appears in the list box and if it
is properly configured with the Ethernet card installed on your computer.
TCP/IP Settings
1. In the Local Area Connection Properties window, double-click the Internet
Protocol Version 4 (TCP/IPv4) component, or select it and click Properties.
The Internet Protocol Version 4 (TCP/IPv4) Properties window appears.
(Note that 192.168.10 is the default value, and it may vary if you changed it in the
Network > My Network page.)
Windows 2000/XP
Checking the TCP/IP Installation
1. Click Start > Settings > Control Panel.
The Control Panel window appears.
3. Right-click the icon and select Properties from the pop-up menu that
opens.
4. In the above window, check if TCP/IP appears in the components list and if it is
properly configured with the Ethernet card installed on your computer. If
TCP/IP does not appear in the Components list, you must install it as described
in the next section.
TCP/IP Settings
1. In the Local Area Connection Properties window, double-click the Internet
Protocol (TCP/IP) component, or select it and click Properties.
The Internet Protocol (TCP/IP) Properties window opens.
(Note that 192.168.10 is the default value, and it may vary if you changed it in the
Network > My Network page.)
Mac OS
Use the following procedure for setting up the TCP/IP Protocol.
1. Choose Apple Menus -> Control Panels -> TCP/IP.
The TCP/IP window appears.
Mac OS-X
Use the following procedure for setting up the TCP/IP Protocol.
1. Choose Apple -> System Preferences.
The System Preferences window appears.
2. Click Network.
The Network window appears.
3. Click Configure.
4. Click the Configure IPv4 drop-down list, and select Using DHCP.
5. Click Apply Now.
Note: Mounting the router with the ports facing upwards is not recommended, as dust
might accumulate in unused ports.
3. Mark two drill holes on the wall, in accordance with the following sketch:
Note: The conical anchors you received with your ZoneAlarm router are suitable for
concrete walls. If you want to mount the router on a plaster wall, you must use
anchors that are suitable for plaster walls.
6. Insert the two screws you received with your ZoneAlarm router into the plastic
conical anchors, and turn them until they protrude approximately 5 mm from
the wall.
7. Align the holes on the ZoneAlarm router's underside with the screws on the
wall, then push the router in and down.
Your ZoneAlarm router is wall mounted. You can now connect it to your computer.
Note: Anti-theft security devices are available at most computer hardware stores.
This procedure explains how to install a looped security cable on your router. A looped
security cable typically includes the parts shown in the diagram below.
While these parts may differ between devices, all looped security cables include a bolt with
knobs, as shown in the diagram below:
5. Thread the anti-theft device's pin through the bolt’s holes, and insert the pin
into the main body of the anti-theft device, as described in the documentation
that came with your device.
Router Installation
Installing the ZoneAlarm Router
To install the ZoneAlarm router
1. Verify that you have the correct cable type.
For information, see Network Requirements on page 7.
2. Connect the LAN cable:
• Connect one end of the Ethernet cable to one of the LAN ports at the back of
the unit.
• Connect the other end to PCs, hubs, or other network devices.
3. Connect the WAN cable:
• Connect one end of the Ethernet cable to the WAN port at the back of the unit.
• Connect the other end of the cable to a cable modem, DSL modem, or office
network.
4. Connect the power supply to the power socket, labeled PWR, at the back of the
ZoneAlarm router.
5. Plug the power supply into the wall electrical outlet.
Warning: The ZoneAlarm router power supply is compatible with either 100, 120 or
230 VAC input power. Verify that the wall outlet voltage is compatible with the
voltage specified on your power supply. Failure to observe this warning may result
in injuries or damage to equipment.
Warning: Verify that the USB devices' power requirement does not exceed the
router's USB power supply capabilities. Failure to observe this warning may cause
damage to the router and void the warranty.
For information on setting up network printers, see Setting up Network Printers on page
368.
You can access the Setup Wizard at any time after initial setup, using the procedure below.
Chapter 4
Getting Started
This chapter contains all the information you need in order to get started using your
ZoneAlarm router.
This chapter includes the following topics:
Initial Login to the ZoneAlarm Portal ........................................................43
Logging on to the ZoneAlarm Portal..........................................................46
Accessing the ZoneAlarm Portal Remotely Using HTTPS........................47
Using the ZoneAlarm Portal.......................................................................49
Logging off.................................................................................................53
2. Type a password both in the Password and the Confirm password fields.
Note: You can change your username and password at any time. For further
information, see Changing Your Password on page 311.
3. Click OK.
The ZoneAlarm Setup Wizard opens, with the Welcome page displayed.
• Internet Wizard
The Internet Wizard is the first part of the Setup Wizard, and it takes you through
basic Internet connection setup, step by step. For information on using the
Internet Wizard, see Using the Internet Wizard on page 56.
After you have completed the Internet Wizard, the Setup Wizard continues to
guide you through router setup. For more information, see Setting Up the
ZoneAlarm Router on page 39.
• Internet Setup
Internet Setup offers advanced setup options. To use Internet Setup, click Cancel
and refer to Using Internet Setup on page 64.
• Configure a specific firewall rule to allow access from the WLAN. See
Using Rules on page 172.
Or
• Enable HTTPS access from the Internet. See Configuring HTTPS on
page 338.
• Browse to http://my.firewall.
Or
• To log on through HTTPS (locally or remotely), follow the procedure
Accessing the ZoneAlarm Portal Remotely on page 47.
The login page appears.
Note: In order to access the ZoneAlarm Portal remotely using HTTPS, you must first
do both of the following:
Note: Your browser must support 128-bit cipher strength. To check your browser's
cipher strength, open Internet Explorer and click Help > About Internet Explorer.
Element Description
Main menu Used for navigating between the various topics (such as Reports, Security,
and Setup).
Main frame Displays information and controls related to the selected topic. The main
frame may also contain tabs that allow you to view different pages related to
the selected topic.
Status bar Shows your Internet connection and managed services status.
Main Menu
The main menu includes the following submenus.
Security Provides controls and options for setting the security of any computer in
the network.
Network Allows you to manage and configure your network settings and Internet
connection.
Setup Provides a set of tools for managing your ZoneAlarm router. Allows you
to upgrade your license and firmware and to configure HTTPS access to
your ZoneAlarm router.
Main Frame
The main frame displays the relevant data and controls pertaining to the menu and tab you
select.
Status Bar
The status bar is located at the bottom of each page. It displays the fields below, as well as
the date and time.
Logging off
Logging off terminates your administration session. Any subsequent attempt to connect to
the ZoneAlarm Portal will require re-entering of the administration password.
• If you are connected through HTTP, click Logout in the main menu.
The Login page appears.
• If you are connected through HTTPS, the Logout option does not appear in
the main menu. Close the browser window.
Chapter 5
Overview
In order to access the Internet through your ZoneAlarm router, you must configure an
Ethernet-based connection on the WAN port. The Ethernet-based connection can be
connected to another network by means of a switch, a router, a bridge, or an Ethernet-
enabled broadband modem.
You can configure your Internet connection using any of the following setup tools:
• Setup Wizard. Guides you through the ZoneAlarm router setup step by step. The
first part of the Setup Wizard is the Internet Wizard. For further information on
the Setup Wizard, see Setting Up the ZoneAlarm Router on page 39.
• Internet Wizard. Guides you through the Internet connection configuration
process step by step. For further information, see Using the Internet Wizard on
page 56.
• Internet Setup. Offers advanced setup options. For further information, see Using
Internet Setup on page 64.
Note: The first time you log on to the ZoneAlarm Portal, the Internet Wizard starts
automatically as part of the Setup Wizard. In this case, you should skip to step 3 in
the following procedure.
3. Click Next.
4. Select the Internet connection method you want to use for connecting to the
Internet.
If you are uncertain regarding which connection method to use contact your xDSL
provider.
Note: If you selected PPTP or PPPoE, do not use your dial-up software to connect to
the Internet.
5. Click Next.
If you chose PPPoE, continue at Using a PPPoE Connection on page 58.
If you chose PPTP, continue at Using a PPTP Connection on page 60.
If you chose Cable Modem, continue at Using a Cable Modem Connection on page
61.
If you chose Static IP, continue at Using a Static IP Connection on page 62.
If you chose DHCP, continue at Using a DHCP Connection on page 63.
3. Click Next.
The system attempts to connect to the Internet via the specified connection.
The Connecting… screen appears.
At the end of the connection process the Connected screen appears.
4. Click Finish.
Internal IP Type the local IP address required for accessing the PPTP modem.
Subnet Mask Select the subnet mask that applies to the static IP address of your
ZoneAlarm router.
1. Complete the fields using the relevant information in Internet Setup Fields on
page 75.
2. Click Apply.
The ZoneAlarm router attempts to connect to the Internet, and the Status Bar displays
the Internet status “Connecting”. This may take several seconds.
Once the connection is made, the Status Bar displays the Internet status “Connected”.
1. Complete the fields using the relevant information in Internet Setup Fields on
page 75.
New fields appear, depending on the check boxes you selected.
2. Click Apply.
The ZoneAlarm router attempts to connect to the Internet, and the Status Bar displays
the Internet status “Connecting”. This may take several seconds.
Once the connection is made, the Status Bar displays the Internet status “Connected”.
1. Complete the fields using the relevant information in Internet Setup Fields on
page 75.
2. Click Apply.
The ZoneAlarm router attempts to connect to the Internet, and the Status Bar displays
the Internet status “Connecting”. This may take several seconds.
Once the connection is made, the Status Bar displays the Internet status “Connected”.
1. Complete the fields using the relevant information in Internet Setup Fields on
page 75.
2. Click Apply.
The ZoneAlarm router attempts to connect to the Internet, and the Status Bar displays
the Internet status “Connecting”. This may take several seconds.
Once the connection is made, the Status Bar displays the Internet status “Connected”.
1. Complete the fields using the relevant information in Internet Setup Fields on
page 75.
2. Click Apply.
The ZoneAlarm router attempts to connect to the Internet, and the Status Bar displays
the Internet status “Connecting”. This may take several seconds.
Once the connection is made, the Status Bar displays the Internet status “Connected”.
Configuring No Connection
1. In the Port drop-down list, select None.
The fields disappear.
2. Click Apply.
PPP Settings
If your ISP has not provided you with a service name, leave this field
empty.
Server IP If you selected PPTP, type the IP address of the PPTP server as given
by your ISP.
Obtain IP address Clear this option if you do not want the ZoneAlarm router to obtain an IP
automatically address automatically using DHCP.
(using DHCP)
Subnet Mask Select the subnet mask that applies to the static IP address of your
ZoneAlarm router.
Connect on Select this option if you do not want the router to be constantly connected
demand to the Internet. The router will establish a connection only under certain
conditions.
On outgoing Select this option to specify that the router should only establish a
activity connection if there is outgoing activity (that is, packets need to be
transmitted to the Internet). If the connection times out, the router will
disconnect.
Idle timeout Type the amount of time (in minutes) that the connection can remain idle.
Once this period of time has elapsed, the router will disconnect.
Delay before Type the amount of time (in seconds) that the router should wait to re-
connecting connect to the Internet, if the connection goes down.
Name Servers
Obtain Domain Clear this option if you want the ZoneAlarm router to obtain an IP
Name Servers address automatically using DHCP, but not to automatically configure
automatically DNS servers.
Obtain WINS Clear this option if you want the ZoneAlarm router to obtain an IP
Server address automatically using DHCP, but not to automatically configure the
automatically WINS server.
Advanced
External IP If you selected PPTP, type the IP address of the PPTP client as given by
your ISP.
If you selected PPPoE, this field is optional, and you do not have to fill it
in unless your ISP has instructed you to do so.
MTU This field allows you to control the maximum transmission unit size.
Host Name If your ISP requires a specific hostname for authentication, type it in this
field.
The ISP will supply you with the proper hostname, if needed. Most ISPs
do not require a specific hostname.
MAC Cloning A MAC address is a 12-digit identifier assigned to every network device. If
your ISP restricts connections to specific, recognized MAC addresses, you
must select this option to clone a MAC address.
Hardware MAC This field displays the ZoneAlarm router's MAC address.
Address
This field is read-only.
For an explanation of the fields on this page, see the following table.
2. To view activity information for a connection, mouse-over the information
icon next to the desired connection.
A tooltip displays the number of bytes sent and received bytes through the connection.
3. To refresh the information on this page, click Refresh.
Field Description
Duration Indicates the connection duration, if active. The duration is given in the
format hh:mm:ss, where:
hh=hours
mm=minutes
ss=seconds
Chapter 6
Changing IP Addresses
If desired, you can change your ZoneAlarm router’s internal IP address, or the entire range
of IP addresses in your internal network.
To change IP addresses
1. Click Network in the main menu, and click the My Network tab.
The My Network page appears.
2. In the desired network's row, click Edit.
The Edit Network Settings page appears.
3. To change the ZoneAlarm router’s internal IP address, enter the new IP
address in the IP Address field.
4. To change the internal network range, enter a new value in the Subnet Mask
field.
Note: The internal network range is defined both by the ZoneAlarm router’s internal
IP address and by the subnet mask.
5. Click Apply.
A warning message appears.
6. Click OK.
• The ZoneAlarm router's internal IP address and/or the internal network range
are changed.
• A success message appears.
7. Do one of the following:
Note: If Hide NAT is disabled, you must obtain a range of Internet IP addresses
from your ISP. Hide NAT is enabled by default.
Note: The DHCP server only serves computers that are configured to obtain an IP
address automatically. If a computer is not configured to obtain an IP address
automatically, it is recommended to assign it an IP address outside of the DHCP
address range. However, if you do assign the computer an IP address within the
DHCP address range, the DHCP server will detect this and will not assign this IP
address to another computer.
If you already have a DHCP server in your internal network, and you want to use it instead
of the ZoneAlarm DHCP server, you must disable the ZoneAlarm DHCP server, since you
cannot have two DHCP servers or relays on the same network segment.
If you want to use a DHCP server on the Internet or via a VPN, instead of the ZoneAlarm
DHCP server, you can configure DHCP relay. When in DHCP relay mode, the ZoneAlarm
router relays information from the desired DHCP server to the devices on your network.
Note: You can perform DHCP reservation using network objects. For information,
see Using Network Objects on page 95.
• To allow the DHCP server to set the IP address range, select the Automatic
DHCP range check box.
• To set the DHCP range manually:
1) Clear the Automatic DHCP range check box.
The DHCP IP range fields appear.
Note: DHCP relay will not work if the router is located behind a NAT device.
4. In the Primary DHCP Server IP field, type the IP address of the primary DHCP
server.
5. In the Secondary DHCP Server IP field, type the IP address of the DHCP server
to use if the primary DHCP server fails.
6. Click Apply.
A warning message appears.
7. Click OK.
A success message appears
8. If your computer is configured to obtain its IP address automatically (using
DHCP), and either the ZoneAlarm DHCP server or another DHCP server is
enabled, restart your computer.
Your computer obtains an IP address in the DHCP address range.
4. Complete the fields using the relevant information in the following table.
5. Click Apply.
6. If your computer is configured to obtain its IP address automatically (using
DHCP), restart your computer.
Your computer obtains an IP address in the DHCP address range.
Domain Name Type a default domain suffix that should be passed to DHCP clients.
The DHCP client will automatically append the domain suffix for the
resolving of non-fully qualified names. For example, if the domain suffix
is set to "mydomain.com", and the client tries to resolve the name
“mail”, the suffix will be automatically appended to the name, resulting
in “mail.mydomain.com”.
Name Servers
Automatically assign Clear this option if you do not want the gateway to act as a DNS relay
DNS server server and pass its own IP address to DHCP clients.
(recommended)
Normally, it is recommended to leave this option selected.
DNS Server 1, 2 Type the IP addresses of the Primary and Secondary DNS servers to
pass to DHCP clients instead of the gateway.
Automatically assign Clear this option if you do not want DHCP clients to be assigned the
WINS server same WINS servers as specified by the Internet connection
configuration (in the Internet Setup page).
WINS Server 1, 2 Type the IP addresses of the Primary and Secondary WINS servers to
use instead of the gateway.
Automatically assign Clear this option if you do not want the DHCP server to pass the
default gateway current gateway IP address to DHCP clients as the default gateway's
IP address.
Default Gateway Type the IP address to pass to DHCP clients as the default gateway,
instead of the current gateway IP address.
Other Services
Time Server 1, 2 To use Network Time Protocol (NTP) servers to synchronize the time
on the DHCP clients, type the IP address of the Primary and
Secondary NTP servers.
Call Manager 1, 2 To assign Voice over Internet Protocol (VoIP) call managers to the IP
phones, type the IP address of the Primary and Secondary VoIP
servers.
TFTP Server Trivial File Transfer Protocol (TFTP) enables booting diskless
computers over the network.
TFTP Boot File Type the boot file to use for booting DHCP clients via TFTP.
Avaya IP Phone To enable Avaya IP phones to receive their configuration, type the
phone's configuration string.
Nortel IP Phone To enable Nortel IP phones to receive their configuration, type the
phone's configuration string.
Thomson IP Phone To enable Thomson IP phones to receive their configuration, type the
phone's configuration string.
Note: The ZoneAlarm router supports Proxy ARP (Address Resolution Protocol).
When an external source attempts to communicate with such a computer, the
ZoneAlarm router automatically replies to ARP queries with its own MAC address,
thereby enabling communication. As a result, the Static NAT Internet IP addresses
appear to external sources to be real computers connected to the WAN interface.
The ZoneAlarm Network Object Wizard opens, with the Step 1: Network Object Type
dialog box displayed.
The Step 2: Computer Details dialog box appears. If you chose Single Computer, the
dialog box includes the Reserve a fixed IP address for this computer option.
If you chose Network, the dialog box does not include this option.
If a computer has not yet been added as a network object, the Add button appears next
to it. If a computer has already been added as a network object, the Edit button appears
next to it.
2. Do one of the following:
4. Click Next.
The Step 2: Computer Details dialog box appears.
The computer's IP address and MAC address are automatically filled in.
5. Complete the fields using the information in the tables below.
6. Click Next.
The Step 3: Save dialog box appears with the network object's name. If you are adding
a new network object, this name is the computer's name.
7. To change the network object name, type the desired name in the field.
8. Click Finish.
The new object appears in the Network Objects page.
IP Address Type the IP address of the local computer, or click This Computer to
specify your computer.
Reserve a fixed IP Select this option to assign the network object's IP address to a MAC
address for this address, and to allow the network object to connect to the WLAN
computer when MAC Filtering is used. For information about MAC Filtering, see
Configuring a Wireless Network on page 113.
MAC Address Type the MAC address you want to assign to the network object's IP
address, or click This Computer to specify your computer's MAC
address.
Perform Static NAT Select this option to map the local computer's IP address to an
(Network Address Internet IP address.
Translation)
You must then fill in the External IP field.
External IP Type the Internet IP address to which you want to map the local
computer's IP address.
Exclude this computer Select this option to exclude this computer from the Web Filtering
from Web Filtering service and Web rule enforcement.
Perform Static NAT Select this option to map the network's IP address range to a range of
(Network Address Internet IP addresses of the same size.
Translation)
You must then fill in the External IP Range field.
External IP Range Type the Internet IP address range to which you want to map the
network's IP address range.
Exclude this network Select this option to exclude this network from the Web Filtering
from Web Filtering service and Web rule enforcement.
The Network Services page appears with a list of network service objects.
The ZoneAlarm Network Service Wizard opens, with the Step 1: Network Service Details
dialog box displayed.
6. Click Finish.
If you select Other, the Protocol Number field appears. If you select TCP
or UDP, the Port Ranges field appears.
a. In the desired network service object's row, click the Erase icon.
A confirmation message appears.
b. Click OK.
The network service object is deleted.
Managing Ports
The ZoneAlarm router allows you to restrict the LAN1-4 ports and the WAN port to a
specific link speed and duplex setting. If desired, you can also disable ports.
The page displays the information for each port, as described in the following table.
2. To refresh the display, click Refresh.
For example, if the LAN1 port is not assigned to a network, the field
displays "None".
Status The port's current status. This can be any of the following:
• The detected link speed (10 Mbps or 100 Mbps) and duplex (Full
Duplex or Half Duplex)
• No Link. The router does not detect anything connected to the
port.
• Disabled. The port is disabled. For example, the LAN1 port's
status will be "Disabled" if the port is assigned to "None".
• Connected (number). Printers are connected to the USB ports.
The number of connected printers appears in parentheses.
This status is relevant for the USB ports only.
• Not Connected. No printers are connected to the USB ports.
This status is relevant for the USB ports only.
Enabling/Disabling Ports
You can enable ports by assigning them to the LAN network, or disable them by assigning
them to no network.
To enable/disable a port
1. Click Network in the main menu, and click the Ports tab.
The Ports page appears.
2. Next to the desired port, click Edit.
Chapter 7
Overview
In addition to the LAN network, you can define a wireless internal network called a
WLAN (wireless LAN) network. You can configure a WLAN network in either of the
following ways:
• Wireless Configuration Wizard. Guides you through the WLAN setup step by
step.
See Using the Wireless Configuration Wizard on page 116.
• Manual configuration. Offers advanced setup options.
See Manually Configuring a WLAN on page 122.
Note: It is recommended to configure the WLAN via Ethernet and not via a wireless
connection, because the wireless connection could be broken after making a
change to the configuration.
For information on default security policy rules controlling traffic to and from the WLAN,
see Default Security Policy on page 168.
Security Description
Protocol
Security Description
Protocol
WEP encryption In the WEP (Wired Equivalent Privacy) encryption security method, wireless
stations must use a pre-shared key to connect to your network. This method
is not recommended, due to known security flaws in the WEP protocol. It is
provided for compatibility with existing wireless deployments.
Note: The router and the wireless stations must be configured with the same
WEP key.
WPA-Personal: The WPA-Personal (Wi-Fi Protected Access) security method (also called
password WPA-PSK) uses MIC (message integrity check) to ensure the integrity of
authentication, messages, and TKIP (Temporal Key Integrity Protocol) to enhance data
encryption encryption. WPA-Personal periodically changes and authenticates encryption
keys. This is called rekeying.
Note: The router and the wireless stations must be configured with the same
passphrase.
WPA2 (802.11i) The WPA2 security method uses the more secure Advanced Encryption
Standard (AES) cipher, instead of the RC4 cipher used by WPA and WEP.
When using the WPA-Personal security methods, the ZoneAlarm enables you
to restrict access to the WLAN network to wireless stations that support the
WPA2 security method. If this setting is not selected, the ZoneAlarm router
allows clients to connect using both WPA and WPA2.
5. Select the Enable wireless networking check box to enable the WLAN.
The fields are enabled.
6. Complete the fields using the information in Basic WLAN Settings Fields on
page 126.
7. Click Next.
8. The Wireless Security dialog box appears.
• To bridge the LAN and WLAN networks so that they appear as a single
unified network, click Bridge Mode.
Traffic from the WLAN to the LAN will be allowed to pass freely, and the LAN
and WLAN will share a single IP address range.
Note: This option creates a bridge called "default-bridge", which includes the WLAN
and the LAN. If desired, you can later remove this bridge by running the Wireless
Configuration Wizard again, and choosing Firewall Mode. For information on bridges,
see Using Bridges on page 139.
WPA-Personal
If you chose WPA-Personal, the Wireless Configuration-WPA-Personal dialog box appears.
Do the following:
1. In the text box, type the passphrase for accessing the network, or click Random
to randomly generate a passphrase.
This must be between 8 and 63 characters. It can contain spaces and special
characters, and is case-sensitive.
2. Click Next.
3. Click Next.
4. The Wireless Security Complete dialog box appears.
5. Click Finish.
The wizard closes.
6. Prepare the wireless stations.
WEP
If you chose WEP, the Wireless Configuration-WEP dialog box appears.
Do the following:
1. Choose a WEP key length.
The possible key lengths are:
4. Click Next.
The Wireless Security Complete dialog box appears.
5. Click Finish.
The wizard closes.
6. Prepare the wireless stations.
No Security
The Wireless Security Complete dialog box appears.
• Click Finish.
The wizard closes.
Note: Some wireless cards have "Infrastructure" and "Ad-hoc" modes. These modes
are also called "Access Point" and "Peer to Peer". On the wireless client, choose
the "Infrastructure" or "Access Point" mode.
You can set the wireless cards to either "Long Preamble" or "Short Preamble".
Wireless Settings
Network Name Type the network name (SSID) that identifies your wireless network. This
(SSID) name will be visible to wireless stations passing near your access point,
unless you enable the Hide the Network Name (SSID) option.
You can prevent older wireless stations from slowing down your network,
by choosing an operation mode that restricts access to newer wireless
stations.
Note: The actual data transfer speed is usually significantly lower than the
maximum theoretical bandwidth and degrades with distance.
Important: The station wireless cards must support the selected operation
mode. For a list of cards supporting 802.11g Super, refer to
http://www.super-ag.com.
Channel Select the radio frequency to use for the wireless connection:
Security Select the security protocol to use. For information on the supported
security protocols, see Wireless Security Protocols on page 114.
If you select WPA-Personal, the Passphrase, Require WPA2 (802.11i), and WPA
Encryption fields appear.
Passphrase Type the passphrase for accessing the network, or click Random to
randomly generate a passphrase.
For the highest security, choose a long passphrase that is hard to guess,
or use the Random button.
Require WPA2 Specify whether you want to require wireless stations to connect using
(802.11i) WPA2, by selecting one of the following:
Note: AES is more secure than TKIP; however, some devices do not
support AES.
WEP Keys If you selected WEP encryption, you must configure at least one WEP key.
The wireless stations must be configured with the same key, as well.
Key 1, 2, 3, 4 radio Click the radio button next to the WEP key that this gateway should use for
button transmission.
The selected key must be entered in the same key slot (1-4) on the station
devices, but the key need not be selected as the transmit key on the
stations.
Key 1, 2, 3, 4 Select the WEP key length from the drop-down list.
length
The possible key lengths are:
Key 1, 2, 3, 4 text Type the WEP key, or click Random to randomly generate a key matching
box the selected length. The key is composed of hexadecimal characters 0-9
and A-F, and is not case-sensitive.
Advanced Security
Hide the Network Specify whether you want to hide your network's SSID, by selecting one of
Name (SSID) the following:
MAC Address Specify whether you want to enable MAC address filtering, by selecting one
Filtering of the following:
Note: MAC address filtering does not provide strong security, since MAC
addresses can be spoofed by a determined attacker. Therefore, it is not
recommended to rely on this setting alone for security.
Station-to-Station Specify whether you want to allow wireless stations on this network to
Traffic communicate with each other, by selecting one of the following:
Wireless Transmitter
The default value is Full. It is not necessary to change this value, unless
there are other access points in the vicinity.
Antenna Selection Multipath distortion is caused by the reflection of Radio Frequency (RF)
signals traveling from the transmitter to the receiver along more than one
path. Signals that were reflected by some surface reach the receiver after
non-reflected signals and distort them.
Use manual diversity control (ANT 1 or ANT 2), if there is only one antenna
connected to the router.
Fragmentation Type the smallest IP packet size (in bytes) that requires that the IP packet
Threshold be split into smaller fragments.
RTS Threshold Type the smallest IP packet size for which a station must send an RTS
(Request To Send) before sending the IP packet.
If multiple wireless stations are in range of the access point, but not in range
of each other, they might send data to the access point simultaneously,
thereby causing data collisions and failures. RTS ensures that the channel
is clear before the each packet is sent.
If your network is congested, and the users are distant from one another,
set the RTS threshold to a low value (around 500).
Multimedia QoS Specify whether to use the Wireless Multimedia (WMM) standard to
(WMM) prioritize traffic from WMM-compliant multimedia applications. This can
have the following values:
Note: You can observe any changes in the wireless reception in the My Computers
page. Make sure to refresh the page after making a change.
Note: Professional companies are available for help in setting up reliable wireless
networks, with access to specialized testing equipment and procedures.
There are excessive collisions between wireless stations. What should I do?
If you have many concurrently active wireless stations, there may be collisions between
them. Such collisions may be the result of a "hidden node" problem: not all of the stations
are within range of each other, and therefore are "hidden" from one another. For example,
if station A and station C do not detect each other, but both stations detect and are detected
by station B, then both station A and C may attempt to send packets to station B
simultaneously. In this case, the packets will collide, and Station B will receive corrupted
data.
The solution to this problem lies in the use of the RTS protocol. Before sending a certain
size IP packet, a station sends an RTS (Request To Send) packet. If the recipient is not
currently receiving packets from another source, it sends back a CTS (Clear To Send)
packet, indicating that the station can send the IP packet. Try setting the RTS Threshold
parameter in the wireless network's advanced settings to a lower value. This will cause
stations to use RTS for smaller IP packets, thus decreasing the likeliness of collisions.
In addition, try setting the Fragmentation Threshold parameter in the wireless network's
advanced settings to a lower value. This will cause stations to fragment IP packets of a
certain size into smaller packets, thereby reducing the likeliness of collisions and
increasing network speed.
Note: Reducing the RTS Threshold and the Fragmentation Threshold too much can
have a negative impact on performance.
Note: Setting an RTS Threshold value equal to the Fragmentation Threshold value
effectively disables RTS.
Chapter 8
Using Bridges
This chapter describes how to connect multiple network segments at the data-link layer,
using a bridge.
This chapter includes the following topics:
Overview ..................................................................................................139
Workflow..................................................................................................140
Adding and Editing Bridges .....................................................................141
Adding Internal Networks to Bridges.......................................................145
Deleting Bridges.......................................................................................150
Overview
The ZoneAlarm router allows you to connect the LAN and the WLAN network segments
at the data-link layer, by configuring a bridge between them. A bridge allows you to
choose whether to enable the firewall between the LAN and WLAN:
• If you enable the firewall, the WLAN and LAN will be assigned separate,
isolated IP networks, and the gateway will operate as a regular firewall between
the LAN and WLAN, inspecting traffic and dropping or blocking unauthorized
or unsafe traffic according to the defined firewall policy.
• If you disable the firewall between the LAN and WLAN, they will appear as a
single unified network; that is, the two network segments will share the same IP
address range, and traffic will flow freely between them. Only traffic from the
LAN and WLAN to the Internet will be inspected by the firewall.
The ZoneAlarm router allows you to configure anti-spoofing for the bridged network
segments. When anti-spoofing is configured for a segment, only IP addresses within a
specific IP address range can be sent from that network segment. For example, if you
configure anti-spoofing for the LAN network segment, the following things happens:
Note: The ZoneAlarm router license allows configuring one bridge; however, STP
can be used in situations where multiple bridge devices exist on the same network.
Workflow
To use a bridge
1. Add a bridge.
See Adding and Editing Bridges on page 141.
2. Add the LAN and WLAN networks to the bridge.
See Adding Internal Networks to Bridges on page 145.
3. If you enabled the firewall between networks on this bridge, add security rules
and VStream Antivirus rules as needed.
For information on adding security rules, see Adding and Editing Rules on page 176.
For information on adding VStream Antivirus rules, see Adding and Editing Vstream
Antivirus Rules on page 252.
Firewall Between Members Specify whether the firewall should be enabled between
networks on this bridge, by selecting one of the following:
Non IP Traffic Specify how the firewall should handle non-IP protocol traffic
between networks on this bridge, by selecting one of the
following:
Note: If you select the same priority for all bridges, the root
bridge will be elected based on MAC address.
IP Address Type the IP address to use for this gateway on this bridge.
5. Click Apply.
A warning message appears.
6. Click OK.
A success message appears.
In the My Network page, the internal network appears indented under the bridge.
Assign to Bridge Select the bridge to which the connection should be assigned.
Allowed IP Range Type the range of IP addresses that should be allowed on this
network.
Note: If you select the same priority for all ports, the root port
will be elected based on the port's logical number.
Deleting Bridges
To delete a bridge
1. Remove all internal networks from the bridge, by doing the following for each
network:
a. Click Network in the main menu, and click the My Network tab.
The My Network page appears.
b. Click Edit in the desired network's row.
c. In the Mode drop-down list, select Enabled.
d. Click Apply.
2. Click Network in the main menu, and click the My Network tab.
The My Network page appears.
Chapter 9
Viewing Reports
This chapter describes the ZoneAlarm Portal reports.
This chapter includes the following topics:
Viewing the Event Log.............................................................................151
Using the Traffic Monitor ........................................................................154
Viewing Computers..................................................................................158
Viewing Connections ...............................................................................160
Viewing Wireless Statistics ......................................................................161
Blue Changes in your setup that you have made yourself or as a result of
a security update implemented by your Service Center.
You can create firewall rules specifying that certain types of connections should be logged,
whether the connections are incoming or outgoing, blocked or accepted. For information,
see Using Rules on page 172.
The logs detail the date and the time the event occurred, and its type. If the event is a
communication attempt that was rejected by the firewall, the event details include the
source and destination IP address, the destination port, and the protocol used for the
communication attempt (for example, TCP or UDP). If the event is a connection made or
attempted over a VPN tunnel, the event is marked by a lock icon in the VPN column.
This information is useful for troubleshooting. You can export the logs to an *.xls
(Microsoft Excel) file, and then store it for analysis purposes or send it to technical
support.
Note: You can configure the ZoneAlarm router to send event logs to a Syslog server.
For information, see Configuring Syslog Logging on page 336.
You can export a detailed traffic report for all enabled networks, using the procedure
Exporting General Traffic Reports on page 157.
2. In the Traffic Monitor Report drop-down list, select the network interface for
which you want to view a report.
The list includes all currently enabled networks. For example, if the WLAN network
is enabled, it will appear in the list.
The selected report appears in the Traffic Monitor page.
3. To refresh all traffic reports, click Refresh.
4. To clear all traffic reports, click Clear.
Note: The firewall blocks broadcast packets used during the normal operation of
your network. This may lead to a certain amount of traffic of the type "Traffic
blocked by firewall" that appears under normal circumstances and usually does not
indicate an attack.
3. In the Sample monitoring data every field, type the interval (in seconds) at
which the ZoneAlarm router should collect traffic data.
The default value is one sample every 1800 seconds (30 minutes).
4. Click Apply.
Viewing Computers
This option allows you to view the currently active computers on your network. The
computers are graphically displayed, each with its name, IP address, and settings (DHCP,
Static, etc.). You can also view node limit information.
If you enabled the wireless network, the wireless stations are shown under the WLAN.
For information on viewing statistics for these computers, see Viewing Wireless
Statistics on page 161. If a wireless station has been blocked from accessing the
Internet through the ZoneAlarm router, the reason why it was blocked is shown in red.
If you are exceeding the maximum number of computers allowed by your license, a
warning message appears, and the computers over the node limit are marked in red.
These computers are still protected, but they are blocked from accessing the Internet
through the ZoneAlarm router.
Note: Computers that did not communicate through the firewall are not counted for
node limit purposes, even though they are protected by the firewall and appear in
the My Computers table.
Note: To increase the number of computers allowed by your license, you can
upgrade your product. For further information, see Upgrading Your Software
Product on page 335.
If Remote Desktop is enabled, a link appears next to each computer, enabling you to
access its desktop remotely. For information on using Remote Desktop, see Using
Remote Desktop on page 319.
Next to each computer, an Add button enables you to add a network object for the
computer, or an Edit button enables you to edit an existing network object for the
computer. For information on adding and editing network objects, see Adding and
Editing Network Objects on page 97.
2. To refresh the display, click Refresh.
3. To view node limit information, do the following:
a. Click Node Limit.
The Node Limit window appears with installed software product and the number
of nodes used.
Viewing Connections
This option allows you to view currently active connections between your networks, as
well as those from your networks to the Internet.
Status
Wireless Mode The operation mode used by the WLAN, followed by the transmission rate
in Mbps
Frames OK The total number of frames that were successfully transmitted and received
Errors The total number of transmitted and received frames for which an error
occurred
Wrong The total number of received packets that were dropped, because they
NWID/ESSID were destined for another access point
Invalid Encryption The total number of transmitted and received packets with the wrong
Key encryption key
Missing Fragments The total number of packets missed during transmission and reception that
were dropped, because fragments of the packet were lost
Discarded Retries The total number of discarded retry packets that were transmitted and
received
Discarded Misc The total number of transmitted and received packets that were discarded
for other reasons
Frames OK The total number of frames that were successfully transmitted and received
Errors The total number of transmitted and received frames for which an error
occurred
QoS Indicates whether the client is using Multimedia QoS (WMM). Possible values
are:
XR Indicates whether the wireless client supports Extended Range (XR) mode.
Possible values are:
Chapter 10
Low Enforces basic control on All inbound traffic is blocked to the external
incoming connections, ZoneAlarm router IP address, except for ICMP
while permitting all echoes ("pings").
outgoing connections.
All outbound connections are allowed.
Block All Blocks all access between All inbound traffic from the Internet and all
networks. outbound traffic to the Internet is blocked.
The definitions of firewall security levels provided in this table represent the ZoneAlarm
router’s default security policy.
You can easily override the default security policy, by creating user-defined firewall rules.
For further information, see Using Rules on page 172.
Note: If the security policy is remotely managed, this lever might be disabled.
Note: Security updates downloaded from a Service Center may alter the security
policy and change these definitions.
For example, if you want to block all outgoing FTP traffic, except traffic from a specific IP
address, you can create a rule blocking all outgoing FTP traffic and move the rule down in
the Rules table. Then create a rule allowing FTP traffic from the desired IP address and
move this rule to a higher location in the Rules table than the first rule. In the figure below,
the general rule is rule number 2, and the exception is rule number 1.
The ZoneAlarm router will process rule 1 first, allowing outgoing FTP traffic from the
specified IP address, and only then it will process rule 2, blocking all outgoing FTP traffic.
Rule Description
Rule Description
The ZoneAlarm Firewall Rule wizard opens, with the Step 1: Rule Type dialog box
displayed.
5. Complete the fields using the relevant information in the following table.
6. Click Next.
The Step 3: Destination & Source dialog box appears.
8. Complete the fields using the relevant information in the following table.
9. Click Next.
The Step 4: Rule Options dialog box appears.
10. Complete the fields using the relevant information in the following table.
11. Click Next.
Any Service Click this option to specify that the rule should apply to any service.
Standard Click this option to specify that the rule should apply to a specific standard
Service service or a network service object.
You must then select the desired service or network service object from the
drop-down list.
Custom Service Click this option to specify that the rule should apply to a specific non-
standard service.
The Protocol and Port Range fields are enabled. You must fill them in.
Protocol Select the protocol for which the rule should apply (ESP, GRE, TCP, UDP,
ICMP, IGMP, or OSPF).
To specify that the rule should apply for any protocol, select ANY.
Port Range To specify the port range to which the rule applies, type the start port
number in the left text box, and the end port number in the right text box.
Note: If you do not enter a port range, the rule will apply to all ports. If you
enter only one port number, the range will include only that port.
Protocol Type the number of the protocol for which the rule should apply.
Number
To specify an IP address range, select Specified Range and type the desired
IP address range in the fields provided.
Destination Select the destination of the connections you want to allow or block.
To specify an IP address range, select Specified Range and type the desired
IP address range in the fields provided.
If the current time Select this option to specify that the rule should be applied only during
is certain hours of the day.
You must then use the fields and drop-down lists provided, to specify the
desired time range.
Forward the Select the destination to which matching connections should be forwarded.
connection to
To specify an IP address, select Specified IP and type the desired IP address
in the text box.
This field only appears when defining an Allow and Forward rule.
Redirect to port Select this option to redirect the connections to a specific port.
You must then type the desired port in the field provided.
This option is called Port Address Translation (PAT), and is only available
when defining an Allow and Forward rule.
Log accepted Select this option to log the specified blocked or allowed connections.
connections /
By default, accepted connections are not logged, and blocked connections
Log blocked
are logged. You can modify this behavior by changing the check box's state.
connections
• Click next to the desired rule, to move the rule up in the table.
• Click next to the desired rule, to move the rule down in the table.
The rule's priority changes accordingly.
Configuring Servers
Note: If you do not intend to host any public Internet servers in your network (such
as a Web Server, Mail Server, or an exposed host), you can skip this section.
The ZoneAlarm router enables you to configure the following types of public Internet
servers:
• Servers for specific services
You can allow all incoming connections of a specific service and forward them to a
particular host in your network. For example, you can set up your own Web server,
Mail server, or FTP server.
Note: Configuring servers is equivalent to creating simple Allow and Forward rules
for common services, where the destination is This Gateway. For information on
creating more complex rules, see Using Rules on page 172.
• Exposed host
If you need to allow unlimited incoming and outgoing connections between the
Internet and a particular host, you can define an exposed host. An exposed host is not
protected by the firewall, and it receives all traffic that was not forwarded to another
computer by use of Allow and Forward rules.
Warning: Defining an exposed host is not recommended unless you are fully aware of
the security risks. For example, an exposed host may be vulnerable to hacker
attacks.
In this Do this…
column…
Allow Select the check box next to the public server you want to configure. This
can be either of the following:
In this Do this…
column…
Host IP Type the IP address of the computer that will run the service (one of your
network computers), or click the corresponding This Computer button to
allow your computer to host the service.
VPN Only Select this option to allow only connections made through a VPN.
Note: Web rules affect outgoing traffic only and cannot be used to allow or limit
access from the Internet to internal Web servers.
Note: Web rules differ from the Web Filtering subscription service in the following
ways:
The ZoneAlarm router processes Web rules in the order they appear in the Web Rules table,
so that rule 1 is applied before rule 2, and so on. This enables you to define exceptions to
rules, by placing the exceptions higher up in the Web Rules table.
For example, if you want to block all the pages of a particular Web site, except a specific
page, you can create a rule blocking access to all of the Web site's pages and move the rule
down in the Web Rules table. Then create a rule allowing access to the desired page and
move this rule to a higher location in the Web Rules table than the first rule. In the figure
below, the general rule is rule number 2, and the exception is rule number 1.
The ZoneAlarm router will process rule 1 first, allowing access to the desired page, and
only then it will process rule 2, blocking access to the rest of the site.
The following rule types exist:
Rule Description
Allow This rule type enables you to specify that a specific Web page should be
allowed.
Block This rule type enables you to specify that a specific Web page should be
blocked.
The ZoneAlarm Web Rule Wizard opens, with the Step 1: Rule Type dialog box
displayed.
5. Complete the fields using the relevant information in the following table.
6. Click Next.
The Step 3: Confirm Rule dialog box appears.
7. Click Finish.
The new rule appears in the Web Rules page.
Block/Allow Type the URL or IP address to which the rule should apply.
access to the
Wildcards (*) are supported. For example, to block all URLs that start with
following URL
"http://www.casino-", set this field's value to: http://www.casino-
*
Log allowed Select this option to log the specified blocked or allowed connections.
connections /
By default, allowed Web pages are not logged, and blocked Web pages are
Log blocked
logged.
connections
If the connection Select the source of the connections you want to allow/block.
source is
To specify an IP address, select Specified IP and type the desired IP address
in the field provided.
To specify an IP address range, select Specified Range and type the desired IP
address range in the fields provided.
• Click next to the desired rule, to move the rule up in the table.
• Click next to the desired rule, to move the rule down in the table.
The rule's priority changes accordingly.
• Click Security in the main menu, and click the Web Rules tab.
The Web Rules page appears.
• Click Services in the main menu, and click the Web Filtering tab.
The Web Filtering page appears.
2. Click Settings.
The Customize Blocked Page page appears. In the following example, this page was
accessed via the Web Rules page.
3. In the text box, type the message that should appear when a user attempts to
access a blocked Web page.
Chapter 11
Using SmartDefense
This chapter explains how to use Check Point SmartDefense Services.
This chapter includes the following topics:
Overview ..................................................................................................197
Configuring SmartDefense .......................................................................198
SmartDefense Categories .........................................................................205
Resetting SmartDefense to its Defaults ....................................................246
Overview
The ZoneAlarm router includes Check Point SmartDefense Services, based on Check Point
Application Intelligence. SmartDefense provides a combination of attack safeguards and
attack-blocking tools that protect your network in the following ways:
• Validating compliance to standards
• Validating expected usage of protocols (Protocol Anomaly Detection)
• Limiting application ability to carry malicious data
• Controlling application-layer operations
In addition, SmartDefense aids proper usage of Internet resources, such as FTP, instant
messaging, Peer-to-Peer (P2P) file sharing, file-sharing operations, and File Transfer
Protocol (FTP) uploading, among others.
Configuring SmartDefense
You can configure SmartDefense using the following tools:
• SmartDefense Wizard. Resets all SmartDefense settings to their defaults, and then
creates a SmartDefense security policy according to your network and security
preferences. See Using the SmartDefense Wizard on page 198.
• SmartDefense Tree. Enables you to fine tune individual settings in the
SmartDefense policy. You can use the SmartDefense tree instead of, or in
addition to, the wizard. See Using the SmartDefense Tree on page 203.
After using the wizard, you can fine tune the policy settings using the SmartDefense tree.
See Using the SmartDefense Tree on page 203.
5. Select the check boxes next to the types of public servers that are running on
your network.
6. Click Next.
The Step 3: Application Blocking dialog box appears.
7. Select the check boxes next to the types of applications you want to block
from running on your network.
8. Click Next.
The Step 4: Confirmation dialog box appears.
9. Click Finish.
Existing SmartDefense settings are cleared, and the security policy is applied.
Minimal Disables all SmartDefense protections, except those that cannot be disabled.
• Teardrop
• Ping of Death
• LAND
• Packet Sanity
• Max Ping Size (set to 1500)
• Welchia
• Cisco IOS
• Null Payload
• IGMP
• Small PMTU (Log Only)
High Enables the same protections as Normal level, as well as the following:
Extra Strict Enables the same protections as High level, as well as the following:
When a category is expanded, the settings it contains appear as nodes. For information on
each category and the nodes it contains, see SmartDefense Categories on page 205.
Each node represents an attack type, a sanity check, or a protocol or service that is
vulnerable to attacks. To control how SmartDefense handles a specific attack, you must
configure the relevant node's settings.
a) Click Default.
A confirmation message appears.
b) Click OK.
The fields are reset to their default values, and your changes are saved.
SmartDefense Categories
SmartDefense includes the following categories:
• Denial of Service on page 205
• FTP on page 232
• HTTP on page 237
• IGMP on page 243
• Instant Messaging Traffic on page 244
• IP and ICMP on page 211
• Microsoft Networks on page 241
• Peer-to-Peer on page 239
• Port Scan on page 230
• TCP on page 223
Denial of Service
Denial of Service (DoS) attacks are aimed at overwhelming the target with spurious data,
to the point where it is no longer able to respond to legitimate service requests.
This category includes the following attacks:
• DDoS Attack on page 210
• LAND on page 208
• Non-TCP Flooding on page 209
• Ping of Death on page 207
• Teardrop on page 206
Teardrop
In a Teardrop attack, the attacker sends two IP fragments, the latter entirely contained
within the former. This causes some computers to allocate too much memory and crash.
You can configure how Teardrop attacks should be handled.
Action Specify what action to take when a Teardrop attack occurs, by selecting one
of the following:
Track Specify whether to log Teardrop attacks, by selecting one of the following:
Ping of Death
In a Ping of Death attack, the attacker sends a fragmented PING request that exceeds the
maximum IP packet size (64KB). Some operating systems are unable to handle such
requests and crash.
You can configure how Ping of Death attacks should be handled.
Action Specify what action to take when a Ping of Death attack occurs, by selecting
one of the following:
Track Specify whether to log Ping of Death attacks, by selecting one of the
following:
LAND
In a LAND attack, the attacker sends a SYN packet, in which the source address and port
are the same as the destination (the victim computer). The victim computer then tries to
reply to itself and either reboots or crashes.
You can configure how LAND attacks should be handled.
Action Specify what action to take when a LAND attack occurs, by selecting one of
the following:
Track Specify whether to log LAND attacks, by selecting one of the following:
Non-TCP Flooding
Advanced firewalls maintain state information about connections in a State table. In Non-
TCP Flooding attacks, the attacker sends high volumes of non-TCP traffic. Since such
traffic is connectionless, the related state information cannot be cleared or reset, and the
firewall State table is quickly filled up. This prevents the firewall from accepting new
connections and results in a Denial of Service (DoS).
You can protect against Non-TCP Flooding attacks by limiting the percentage of state table
capacity used for non-TCP connections.
Action Specify what action to take when the percentage of state table capacity used
for non-TCP connections reaches the Max. percent non TCP traffic threshold.
Select one of the following:
Track Specify whether to log non-TCP connections that exceed the Max. Percent
Non-TCP Traffic threshold, by selecting one of the following:
Max. Percent Type the maximum percentage of state table capacity allowed for non-TCP
Non-TCP Traffic connections.
DDoS Attack
In a distributed denial-of-service attack (DDoS attack), the attacker directs multiple hosts
in a coordinated attack on a victim computer or network. The attacking hosts send large
amounts of spurious data to the victim, so that the victim is no longer able to respond to
legitimate service requests.
You can configure how DDoS attacks should be handled.
Action Specify what action to take when a DDoS attack occurs, by selecting one of
the following:
Track Specify whether to log DDoS attacks, by selecting one of the following:
IP and ICMP
This category allows you to enable various IP and ICMP protocol tests, and to configure
various protections against IP and ICMP-related attacks. It includes the following:
• Checksum Verification on page 222
• Cisco IOS DOS on page 219
• IP Fragments on page 215
• Max Ping Size on page 214
• Network Quota on page 217
• Null Payload on page 221
• Packet Sanity on page 212
• Welchia on page 218
Packet Sanity
Packet Sanity performs several Layer 3 and Layer 4 sanity checks. These include verifying
packet size, UDP and TCP header lengths, dropping IP options, and verifying the TCP
flags.
You can configure whether logs should be issued for offending packets.
Action Specify what action to take when a packet fails a sanity test, by selecting
one of the following:
Track Specify whether to issue logs for packets that fail the packet sanity tests, by
selecting one of the following:
Disable relaxed The UDP length verification sanity check measures the UDP header length
UDP length and compares it to the UDP header length specified in the UDP header. If
verification the two values differ, the packet may be corrupted.
Specify whether the ZoneAlarm router should relax the UDP length
verification sanity check or not, by selecting one of the following:
Action Specify what action to take when an ICMP echo response exceeds the Max
Ping Size threshold, by selecting one of the following:
Track Specify whether to log ICMP echo responses that exceed the Max Ping Size
threshold, by selecting one of the following:
Max Ping Size Specify the maximum data size for ICMP echo response.
IP Fragments
When an IP packet is too big to be transported by a network link, it is split into several
smaller IP packets and transmitted in fragments. To conceal a known attack or exploit, an
attacker might imitate this common behavior and break the data section of a single packet
into several fragmented packets. Without reassembling the fragments, it is not always
possible to detect such an attack. Therefore, the ZoneAlarm router always reassembles all
the fragments of a given IP packet, before inspecting it to make sure there are no attacks or
exploits in the packet.
You can configure how fragmented packets should be handled.
Forbid IP Fragments Specify whether all fragmented packets should be dropped, by selecting
one of the following:
Max Number of Type the maximum number of fragmented packets allowed. Packets
Incomplete Packets exceeding this threshold will be dropped.
Timeout for When the ZoneAlarm router receives packet fragments, it waits for
Discarding additional fragments to arrive, so that it can reassemble the packet.
Incomplete Packets Type the number of seconds to wait before discarding incomplete
packets.
Network Quota
An attacker may try to overload a server in your network by establishing a very large
number of connections per second. To protect against Denial Of Service (DoS) attacks,
Network Quota enforces a limit upon the number of connections per second that are
allowed from the same source IP address.
You can configure how connections that exceed that limit should be handled.
Action Specify what action to take when the number of network connections
from the same source reaches the Max. Connections/Second per Source IP
threshold. Select one of the following:
Track Specify whether to log connections from a specific source that exceed
the Max. Connections/Second per Source IP threshold, by selecting one of
the following:
Max. Type the maximum number of network connections allowed per second
Connections/Second from the same source IP address.
from Same Source IP
The default value is 100.
Note: Setting this value too low can lead to false alarms.
Welchia
The Welchia worm uses the MS DCOM vulnerability or a WebDAV vulnerability. After
infecting a computer, the worm begins searching for other live computers to infect. It does
so by sending a specific ping packet to a target and waiting for the reply that signals that
the target is alive. This flood of pings may disrupt network connectivity.
You can configure how the Welchia worm should be handled.
Action Specify what action to take when the Welchia worm is detected, by selecting
one of the following:
Track Specify whether to log Welchia worm attacks, by selecting one of the
following:
Action Specify what action to take when a Cisco IOS DOS attack occurs,
by selecting one of the following:
Track Specify whether to log Cisco IOS DOS attacks, by selecting one of
the following:
Number of Hops to Protect Type the number of hops from the enforcement module that Cisco
routers should be protected.
Action Protection for Specify what action to take when an IPv4 packet of the specific
SWIPE - Protocol 53 / protocol type is received, by selecting one of the following:
IP Mobility - Protocol 55 /
• Block. Drop the packet. This is the default.
SUN-ND - Protocol 77 / • None. No action.
PIM - Protocol 103
Null Payload
Some worms, such as Sasser, use ICMP echo request packets with null payload to detect
potentially vulnerable hosts.
You can configure how null payload ping packets should be handled.
Action Specify what action to take when null payload ping packets are detected, by
selecting one of the following:
Track Specify whether to log null payload ping packets, by selecting one of the
following:
Checksum Verification
SmartDefense identifies any IP, TCP, or UDP packets with incorrect checksums. You can
configure how these packets should be handled.
Action Specify what action to take when packets with incorrect checksums are
detected, by selecting one of the following:
Track Specify whether to log packets with incorrect checksums, by selecting one of
the following:
TCP
This category allows you to configure various protections related to the TCP protocol. It
includes the following:
• Flags on page 229
• Sequence Verifier on page 228
• Small PMTU on page 224
• Strict TCP on page 223
• SynDefender on page 226
Strict TCP
Out-of-state TCP packets are SYN-ACK or data packets that arrive out of order, before the
TCP SYN packet.
Note: In normal conditions, out-of-state TCP packets can occur after the ZoneAlarm
restarts, since connections which were established prior to the reboot are unknown.
This is normal and does not indicate an attack.
Action Specify what action to take when an out-of-state TCP packet arrives, by
selecting one of the following:
Track Specify whether to log null payload ping packets, by selecting one of the
following:
Small PMTU
Small PMTU (Packet MTU) is a bandwidth attack in which the client fools the server into
sending large amounts of data using small packets. Each packet has a large overhead that
creates a "bottleneck" on the server.
You can protect against this attack by specifying a minimum packet size for data sent over
the Internet.
Action Specify what action to take when a packet is smaller than the Minimal MTU
Size threshold, by selecting one of the following:
Track Specify whether to issue logs for packets are smaller than the Minimal MTU
Size threshold, by selecting one of the following:
Minimal MTU Type the minimum value allowed for the MTU field in IP packets sent by a
Size client.
An overly small value will not prevent an attack, while an overly large value
might degrade performance and cause legitimate requests to be dropped.
SynDefender
In a SYN attack, the attacker sends many SYN packets without finishing the three-way
handshake. This causes the attacked host to be unable to accept new connections.
You can protect against this attack by specifying a maximum amount of time for
completing handshakes.
Action Specify what action to take when a SYN attack occurs, by selecting one of
the following:
Track Specify whether to issue logs for the events specified by the Log Mode
parameter, by selecting one of the following:
Log Mode Specify upon which events logs should be issued, by selecting one of the
following:
Maximum time for Type the maximum amount of time in seconds after which a TCP handshake
completing the is considered incomplete.
handshake
The default value is 10 seconds.
Protect external Specify whether SynDefender should be enabled for external (WAN)
interfaces only interfaces only, by selecting one of the following:
Sequence Verifier
The ZoneAlarm router examines each TCP packet's sequence number and checks whether
it matches a TCP connection state. You can configure how the router handles packets that
match a TCP connection in terms of the TCP session but have incorrect sequence numbers.
Action Specify what action to take when TCP packets with incorrect sequence
numbers arrive, by selecting one of the following:
Track Specify whether to log TCP packets with incorrect sequence numbers, by
selecting one of the following:
Flags
The URG flag is used to indicate that there is urgent data in the TCP stream, and that the
data should be delivered with high priority. Since handling of the URG flag is inconsistent
between different operating systems, an attacker can use the URG flag to conceal certain
attacks.
You can configure how the URG flag should be handled.
URG Flag Specify whether to clear or allow the URG flag, by selecting one of the
following:
• Clear. Clear the URG flag on all incoming packets. This is the
default.
• Allow. Allow the URG flag.
Port Scan
An attacker can perform a port scan to determine whether ports are open and vulnerable to
an attack. This is most commonly done by attempting to access a port and waiting for a
response. The response indicates whether or not the port is open.
This category includes the following types of port scans:
• Host Port Scan. The attacker scans a specific host's ports to determine which of
the ports are open.
• Sweep Scan. The attacker scans various hosts to determine where a specific port
is open.
You can configure how the ZoneAlarm router should react when a port scan is detected.
Number of ports SmartDefense detects ports scans by measuring the number of ports
accessed accessed over a period of time. The number of ports accessed must exceed
the Number of ports accessed value, within the number of seconds specified by
the In a period of [seconds] value, in order for SmartDefense to consider the
activity a scan.
Type the minimum number of ports that must be accessed within the In a
period of [seconds] period, in order for SmartDefense to detect the activity as
a port scan.
For example, if this value is 30, and 40 ports are accessed within a specified
period of time, SmartDefense will detect the activity as a port scan.
For Host Port Scan, the default value is 30. For Sweep Scan, the default
value is 50.
Type the maximum number of seconds that can elapse, during which the
Number of ports accessed threshold is exceeded, in order for SmartDefense to
detect the activity as a port scan.
For example, if this value is 20, and the Number of ports accessed threshold is
exceeded for 15 seconds, SmartDefense will detect the activity as a port
scan. If the threshold is exceeded for 30 seconds, SmartDefense will not
detect the activity as a port scan.
Track Specify whether to issue logs for scans, by selecting one of the following:
Detect scans Specify whether to detect only scans originating from the Internet, by
from Internet only selecting one of the following:
• False. Do not detect only scans from the Internet. This is the
default.
• True. Detect only scans from the Internet.
FTP
This category allows you to configure various protections related to the FTP protocol. It
includes the following:
• Block Known Ports on page 234
• Block Port Overflow on page 235
• Blocked FTP Commands on page 236
• FTP Bounce on page 233
FTP Bounce
When connecting to an FTP server, the client sends a PORT command specifying the IP
address and port to which the FTP server should connect and send data. An FTP Bounce
attack is when an attacker sends a PORT command specifying the IP address of a third
party instead of the attacker's own IP address. The FTP server then sends data to the victim
machine.
You can configure how FTP bounce attacks should be handled.
Action Specify what action to take when an FTP Bounce attack occurs, by selecting
one of the following:
Track Specify whether to log FTP Bounce attacks, by selecting one of the
following:
Note: Known ports are published ports associated with services (for example, SMTP
is port 25).
This provides a second layer of protection against FTP bounce attacks, by preventing such
attacks from reaching well-known ports.
Action Specify what action to take when the FTP server attempts to connect to a
well-known port, by selecting one of the following:
Action Specify what action to take for PORT commands containing a number
greater than 255, by selecting one of the following:
HTTP
This category allows you to configure various protections related to the HTTP protocol. It
includes the following:
• Header Rejection on page 237
• Worm Catcher on page 238
Header Rejection
Some exploits are carried in standard HTTP headers with custom values (for example, in
the Host header), or in custom HTTP headers. You can protect against such exploits by
rejecting HTTP requests that contain specific headers and header values.
Worm Catcher
A worm is a self-replicating malware (malicious software) that propagates by actively
sending itself to new machines. Some worms propagate by using security vulnerabilities in
the HTTP protocol.
You can specify how HTTP-based worm attacks should be handled.
Peer-to-Peer
SmartDefense can block peer-to-peer file-sharing traffic, by identifying the proprietary
protocols and preventing the initial connection to the peer-to-peer networks. This prevents
not only downloads, but also search operations.
This category includes the following nodes:
• BitTorrent
• eMule
• Gnutella
• KaZaA
• Winny
Note: SmartDefense can detect peer-to-peer traffic regardless of the TCP port being
used to initiate the session.
In each node, you can configure how peer-to-peer connections of the selected type should
be handled, using the following table.
Block proprietary Specify whether proprietary protocols should be blocked on all ports, by
protocols on all ports selecting one of the following:
Block masquerading Specify whether to block using the peer-to-peer application over HTTP,
over HTTP protocol by selecting one of the following:
Microsoft Networks
This category includes File and Print Sharing.
Microsoft operating systems and Samba clients rely on Common Internet File System
(CIFS), a protocol for sharing files and printers. However, this protocol is also widely used
by worms as a means of propagation.
You can configure how CIFS worms should be handled.
Action Specify what action to take when a CIFS worm attack is detected, by
selecting one of the following:
Track Specify whether to log CIFS worm attacks, by selecting one of the
following:
IGMP
This category includes the IGMP protocol.
IGMP is used by hosts and routers to dynamically register and discover multicast group
membership. Attacks on the IGMP protocol usually target a vulnerability in the multicast
routing software/hardware used, by sending specially crafted IGMP packets.
You can configure how IGMP attacks should be handled.
Action Specify what action to take when an IGMP attack occurs, by selecting
one of the following:
Track Specify whether to log IGMP attacks, by selecting one of the following:
Enforce IGMP to According to the IGMP specification, IGMP packets must be sent to
multicast addresses multicast addresses. Sending IGMP packets to a unicast or broadcast
address might constitute and attack; therefore the ZoneAlarm router
blocks such packets.
Specify whether to allow or block IGMP packets that are sent to non-
multicast addresses, by selecting one of the following:
Note: SmartDefense can detect instant messaging traffic regardless of the TCP port
being used to initiate the session.
In each node, you can configure how instant messaging connections of the selected type
should be handled, using the following table.
Block proprietary Specify whether proprietary protocols should be blocked on all ports, by
protocol / selecting one of the following:
Block proprietary
• Block. Block the proprietary protocol on all ports. This in effect
protocols on all ports prevents all communication using this instant messenger
application. This is the default.
• None. Do not block the proprietary protocol on all ports.
Block masquerading Specify whether to block using the instant messenger application over
over HTTP protocol HTTP, by selecting one of the following:
Chapter 12
Overview
The ZoneAlarm router includes VStream Antivirus, an embedded stream-based antivirus
engine based on Check Point Stateful Inspection and Application Intelligence technologies,
that performs virus scanning at the kernel level.
VStream Antivirus scans files for malicious content on the fly, without downloading the
files into intermediate storage. This means minimal added latency and support for
unlimited file sizes; and since VStream Antivirus stores only minimal state information per
connection, it can scan thousands of connections concurrently. In order to scan archive
files on the fly, VStream Antivirus performs real-time decompression and scanning of ZIP,
TAR, and GZ archive files, with support for nested archive files.
When VStream Antivirus detects malicious content, the action it takes depends on the
protocol in which the virus was found. See the following table. In each case, VStream
Antivirus blocks the file and writes a log to the Event Log.
TCP and UDP • Terminates the Generic TCP and UDP ports,
connection
other than those listed above
Note: In protocols that are not listed in this table, VStream Antivirus uses a "best
effort" approach to detect viruses. In such cases, detection of viruses is not
guaranteed and depends on the specific encoding used by the protocol.
If you are subscribed to the VStream Antivirus subscription service, VStream Antivirus
virus signatures are automatically updated, so that security is always up-to-date, and your
network is always protected.
Note: VStream Antivirus differs from the Email Antivirus subscription service (part of
the Email Filtering service) in the following ways:
You can use either antivirus solution or both in conjunction. For information on
Email Antivirus, see Email Filtering on page 282.
Main database The date and time at which the main database was last updated,
followed by the version number.
Daily database The date and time at which the daily database was last updated, followed
by the version number.
Next update The next date and time at which the ZoneAlarm router will check for
updates.
Status The current status of the database. This includes the following statuses:
The ZoneAlarm router will process rule 1 first, passing outgoing SMTP traffic from the
specified IP address, and only then it will process rule 2, scanning all outgoing SMTP
traffic.
The following rule types exist:
Rule Description
Pass This rule type enables you to specify that VStream Antivirus should not scan
traffic matching the rule.
Scan This rule type enables you to specify that VStream Antivirus should scan traffic
matching the rule.
5. Complete the fields using the relevant information in the following table.
6. Click Next.
8. Complete the fields using the relevant information in the following table.
9. Click Next.
Any Service Click this option to specify that the rule should apply to any service.
Standard Click this option to specify that the rule should apply to a specific standard
Service service or network service object.
You must then select the desired service or network service object from the
drop-down list.
Custom Service Click this option to specify that the rule should apply to a specific non-
standard service.
The Protocol and Port Range fields are enabled. You must fill them in.
Protocol Select the protocol (TCP, UDP, or ANY) for which the rule should apply.
Port Range To specify the port range to which the rule applies, type the start port
number in the left text box, and the end port number in the right text box.
Note: If you do not enter a port range, the rule will apply to all ports. If you
enter only one port number, the range will include only that port.
To specify an IP address range, select Specified Range and type the desired
IP address range in the fields provided.
And the Select the destination of the connections you want to allow or block.
destination is
To specify an IP address, select Specified IP and type the desired IP address
in the text box.
To specify an IP address range, select Specified Range and type the desired
IP address range in the fields provided.
To specify the ZoneAlarm Portal and network printers, select This Gateway.
Data Direction Select the direction of connections to which the rule should apply:
If the current time Select this option to specify that the rule should be applied only during
is certain hours of the day.
You must then use the fields and drop-down lists provided, to specify the
desired time range.
• Click next to the desired rule, to move the rule up in the table.
• Click next to the desired rule, to move the rule down in the table.
The rule's priority changes accordingly.
File Types
Block potentially unsafe Select this option to block all emails containing potentially unsafe
file types in email attachments.
messages
Unsafe file types are:
Pass safe file types Select this option to accept common file types that are known to
without scanning be safe, without scanning them.
• GIF
• BMP
• JFIF standard
• EXIF standard
• PNG
• RIFF
• RIFX
• MPEG video stream
• MPEG sys stream
• Ogg Stream
• MP3 file with ID3 version 2
• MP3
• PDF
• PostScript
• WMA/WMV/ASF
• RealMedia file
• JPEG - only the header is scanned, and the rest of
the file is skipped
To view a list of safe file types, click Show next to this option.
Maximum Nesting Level Type the maximum number of nested content levels that
VStream Antivirus should scan.
Maximum Compression Fill in the field to complete the maximum compression ratio of
Ratio 1:x files that VStream Antivirus should scan.
When archived file Specify how VStream Antivirus should handle files that exceed
exceeds limit or extraction the Maximum nesting level or the Maximum compression ratio, and
fails files for which scanning fails. Select one of the following:
When a corrupt file is Specify how VStream Antivirus should handle corrupt files and
found or decoding fails protocol anomalies, by selecting one of the following:
Chapter 13
Note: Check with your reseller regarding availability of subscription services, or surf
to www.sofaware.com/servicecenters to locate a Service Center in your area.
The ZoneAlarm Services Wizard opens, with the Service Center dialog box displayed.
• If the Service Center requires authentication, the Service Center Login dialog
box appears.
Enter your gateway ID and registration key in the appropriate fields, as given to
you by your service provider, then click Next.
• The Connecting screen appears.
• The Confirmation dialog box appears with a list of services to which you are
subscribed.
6. Click Next.
The Done screen appears with a success message.
7. Click Finish.
The following things happen:
• The services to which you are subscribed are now available on your
ZoneAlarm router and listed as such on the Account page. See Viewing
Services Information on page 273 for further information.
• The Services submenu includes the services to which you are subscribed.
Service Center The name of the Service Center to which you are connected (if known).
Name
Subscription will The date on which your subscription to services will end.
end on
• Subscribed
• Not Subscribed
If you are subscribed to Dynamic DNS, this field displays your gateway's
domain name.
For further information, see Web Filtering on page 276, Virus Scanning
on page 282, and Automatic and Manual Updates on page 287.
Note: If no additional settings are available from your Service Center, this button will
not appear.
5. Click Finish.
The following things happen:
Web Filtering
When the Web Filtering service is enabled, access to Web content is restricted according to
the categories specified under Allow Categories. If a user attempts to access a blocked page,
the Access Denied page appears. For information on customizing this page, see
Customizing the Access Denied Page on page 195.
If desired, you can permit specific users to override Web Filtering. Such users will be able
to view Web pages without restriction, after they have provided their username password
via the Access Denied page. For information on granting Web Filtering override
permissions, see Adding and Editing Users on page 313.
In addition, you can choose to exclude specific network objects from Web Filtering
enforcement. Users connecting from these network objects will be able to view Web pages
without restriction, regardless of whether they have Web Filtering override permissions.
For information on configuring network objects, see Using Network Objects on page 95.
Note: The Web Filtering service is only available if you are connected to a Service
Center and subscribed to this service.
Note: The Web Filtering subscription service differs from Web rules in the following
ways:
Note: If the ZoneAlarm router is remotely managed, contact your Service Center
administrator to change these settings.
Note: The list of supported categories may vary, depending on the Service Center to
which the ZoneAlarm router is connected.
To allow/block a category
1. Click Services in the main menu, and click the Web Filtering tab.
The Web Filtering page appears.
Note: If the ZoneAlarm router is remotely managed, contact your Service Center
administrator to change these settings.
This ensures that users will not gain access to undesirable Web sites, even when
the Service Center is unavailable.
3. To re-enable the service, click Resume, either in the popup window, or on the
Web Filtering page.
• If you clicked Resume in the Web Filtering Off popup window, the popup
window closes.
Email Filtering
There are two Email Filtering services:
• Email Antivirus
When the Email Antivirus service is enabled, your email is automatically scanned for
the detection and elimination of all known viruses and vandals. If a virus is detected, it
is removed and replaced with a warning message.
Note: The Email Antivirus subscription service differs from VStream Antivirus in the
following ways:
You can use either antivirus solution or both in conjunction. For information on
VStream Antivirus, see Using VStream Antivirus on page 247.
• Email Antispam
When the Email Antispam service is enabled, your email is automatically scanned for
the detection of spam. If spam is detected, the email’s Subject line is modified to
indicate that it is suspected spam. You can create rules to divert such messages to a
special folder.
Note: Email Filtering services are only available if you are connected to a Service
Center and subscribed to the services.
Protocols marked with will be scanned, while those marked with will not.
Note: If the ZoneAlarm router is remotely managed, contact your Service Center
administrator to change these settings.
Note: If the ZoneAlarm router is remotely managed, contact your Service Center
administrator to change these settings.
• Email Antivirus and Email Antispam are temporarily disabled for all internal
network computers.
• The Snooze button changes to Resume.
3. To re-enable Email Antivirus and Email Antispam, click Resume, either in the
popup window, or on the Email Filtering page.
Note: Software Updates are only available if you are connected to a Service Center
and subscribed to this service.
2. To set the ZoneAlarm router to automatically check for and install new
software updates, drag the Automatic/Manual lever upwards.
The ZoneAlarm router checks for new updates and installs them according to its
schedule.
Note: When the Software Updates service is set to Automatic, you can still manually
check for updates.
3. To set the ZoneAlarm router so that software updates must be checked for
manually, drag the Automatic/Manual lever downwards.
The ZoneAlarm router does not check for software updates automatically.
4. To manually check for software updates, click Update Now.
The system checks for new updates and installs them.
Chapter 14
Overview
You can configure your ZoneAlarm router as a Remote Access VPN Server. A Remote
Access VPN (virtual private network) Server allows you to connect to your home or home
office network from a remote location, while securing the traffic with data encryption and
strong authentication.
The ZoneAlarm VPN Server accepts connections from devices installed with Check Point
SecureClient/SecuRemote VPN Client software, or from other Check Point security
appliances which include a built-in SecuRemote VPN Client, such as Check Point
Safe@Office.
ZoneAlarm allows a single VPN user to connect. If you need to allow VPN remote access
to multiple users, consider purchasing a Check Point Safe@Office gateway.
Note: A locally managed Remote Access VPN Server must have a static IP address.
If you need a Remote Access VPN Server with a dynamic IP address, you must use
SofaWare Security Management Portal (SMP) management.
Note: This chapter explains how to define a VPN locally. However, if your router is
centrally managed by a Service Center, then the Service Center can automatically
deploy VPN configuration for your router.
2. Select the Allow SecuRemote users to connect from the Internet check box.
Installing SecuRemote
If you configured the ZoneAlarm SecuRemote VPN Server, then authorized remote access
users can connect to your network using SecureClient/SecuRemote VPN Client software.
Users can download the necessary software from http://www.checkpoint.com.
Alternatively, authorized ZoneAlarm users can use the following procedure to download
and install SecureClient/SecuRemote software.
To install SecureClient/SecuRemote
1. Connect to the ZoneAlarm Portal using HTTPS.
See Accessing the ZoneAlarm Portal Remotely Using HTTPS on page 47.
2. Click VPN in the main menu, and click the VPN Server tab.
The VPN Server page appears.
3. Click the Download link.
The VPN-1 SecuRemote for ZoneAlarm page opens in a new window.
4. Follow the online instructions to complete installation.
SecureClient/SecuRemote is installed.
For information on using SecureClient/SecuRemote, see the User Help. To access
SecureClient/SecuRemote User Help, right-click on the VPN Client icon in the
taskbar, select Settings, and then click Help.
Installing a Certificate
A digital certificate is a secure means of authenticating the ZoneAlarm router to Remote
Access VPN Clients. The certificate is issued by the Certificate Authority (CA) to entities
such as gateways, users, or computers. The entity then uses the certificate to identify itself
and provide verifiable information.
For instance, the certificate includes the Distinguished Name (DN) (identifying
information) of the entity, as well as the public key (information about itself). After two
entities exchange and validate each other's certificates, they can begin encrypting
information between themselves using the public keys in the certificates.
The certificate also includes a fingerprint, a unique text used to identify the certificate. You
can email your certificate's fingerprint to the remote user. Upon connecting to the
ZoneAlarm VPN Server for the first time, the entity should check that the VPN peer's
fingerprint displayed in the SecureClient/SecuRemote VPN Client is identical to the
fingerprint received.
A certificate is required for the correct functioning of the ZoneAlarm VPN Server. When
the gateway is started for the first time, a self-signed certificate is automatically generated
for your gateway; therefore, you usually do not need to install a certificate and can skip
this section.
In the event that you need to install a certificate, you must use a certificate encoded in the
PKCS#12 (Personal Information Exchange Syntax Standard) format. Your ZoneAlarm
router enables you to install such certificates in the following ways:
• By generating a self-signed certificate.
See Generating a Self-Signed Certificate on page 298.
• By importing a certificate.
The PKCS#12 file you import must have a ".p12" file extension. If you do not have
such a PKCS#12 file, obtain one from your network security administrator.
See Importing a Certificate on page 302.
The ZoneAlarm Certificate Wizard opens, with the Certificate Wizard dialog box
displayed.
6. Click Finish.
The ZoneAlarm router installs the certificate. If a certificate is already installed, it is
overwritten.
The Certificate Wizard closes.
The Certificates page displays the following information:
• The starting and ending dates between which the gateway's certificate and the
CA's certificate are valid
Gateway Name Type the gateway's name. This name will appear on the certificate, and will
be visible to remote users inspecting the certificate.
Valid Until Use the drop-down lists to specify the month, day, and year when this
certificate should expire.
Importing a Certificate
To install a certificate
1. Click VPN in the main menu, and click the Certificate tab.
The Certificate page appears.
2. Click Install Certificate.
The ZoneAlarm Certificate Wizard opens, with the Certificate Wizard dialog box
displayed.
3. Click Import a security certificate in PKCS#12 format.
The Import Certificate dialog box appears.
4. Click Browse to open a file browser from which to locate and select the file.
The filename that you selected is displayed.
5. Click Next.
The Import-Certificate Passphrase dialog box appears. This may take a few moments.
6. Type the pass-phrase you received from the network security administrator.
7. Click Next.
The Done dialog box appears, displaying the certificate's details.
8. Click Finish.
The ZoneAlarm router installs the certificate. If a certificate is already installed, it is
overwritten.
The Certificate Wizard closes.
The Certificates page displays the following information:
• The starting and ending dates between which the gateway's certificate and the
CA's certificate are valid
Uninstalling a Certificate
A certificate is required for the correct functioning of the VPN Server. If you uninstall the
certificate, VPN Clients configured for certificate authentication will not be able to connect
to the VPN Server.
To uninstall a certificate
1. Click VPN in the main menu, and click the Certificate tab.
The Certificate page appears with the name of the currently installed certificate.
2. Click Uninstall.
A confirmation message appears.
3. Click OK.
The certificate is uninstalled.
A success message appears.
4. Click OK.
The VPN Tunnels page includes the information described in the following table.
2. To refresh the table, click Refresh.
Source The IP address or address range of the entity from which the tunnel
originates.
The entity's type is indicated by an icon. See VPN Tunnel Icons on page
307.
Destination The IP address or address range of the entity to which the tunnel is
connected.
The entity's type is indicated by an icon. See VPN Tunnel Icons on page
307.
Security The type of encryption used to secure the connection, and the type of
Message Authentication Code (MAC) used to verify the integrity of the
message. This information is presented in the following format: Encryption
type/Authentication type.
In addition, if IPSec compression is enabled for the tunnel, this field displays
the icon.
Note: All VPN settings are automatically negotiated between the two sites.
The encryption and authentication schemes used for the connection are the
strongest of those used at the two sites.
Your ZoneAlarm router supports AES, 3DES, and DES encryption schemes,
and MD5 and SHA authentication schemes.
hh=hours
mm=minutes
ss=seconds
This gateway
• The ZoneAlarm router stores traces for all recent IKE negotiations. If
you want to view only new IKE trace data, clear all IKE trace data
currently stored on the ZoneAlarm router.
• Close all existing VPN tunnels except for the problematic tunnel, so as
to make it easier to locate the problematic tunnel's IKE negotiation
trace in the exported file.
Chapter 15
Managing Users
This chapter describes how to manage ZoneAlarm router users. You can define multiple
users, set their passwords, and assign them various permissions.
This chapter includes the following topics:
Changing Your Login Credentials............................................................311
Adding and Editing Users ........................................................................313
Viewing and Deleting Users.....................................................................317
Setting Up Remote VPN Access for Users...............................................318
5. Click Next.
The Set User Permissions dialog box appears.
6. Click Finish.
Your changes are saved.
3. Complete the fields using the information in Set User Details Fields on page
315.
4. Click Next.
The Set User Permissions dialog box appears.
The options that appear on the page are dependant on the software and services you
are using.
5. Complete the fields using the information in Set User Permissions Fields on
page 316.
6. Click Finish.
The user is saved.
Password Enter a password for the user. Use five to 25 characters (letters or
numbers) for the new password.
Expires On To specify an expiration time for the user, select this option and specify
the expiration date and time in the fields provided.
When the user account expires, it is locked, and the user can no longer
log on to the ZoneAlarm router.
If you do not select this option, the user will not expire.
Administrator Level Select the user’s level of access to the ZoneAlarm Portal.
VPN Remote Select this option to allow the user to connect to this ZoneAlarm router
Access using their VPN Client.
Web Filtering Select this option to allow the user to override the Web Filtering service
Override and Web rules.
Remote Desktop Select this option to allow the user to log on to the my.firewall portal,
Access view the Active Computers page, and remotely access computers'
desktops, using the Remote Desktop feature.
Note: The user can perform these actions, even if their level of
administrative access is "No Access".
Chapter 16
Overview
Your ZoneAlarm router includes an integrated client for Microsoft Terminal Services,
allowing you to remotely access the desktop of each of your computers from anywhere, via
the ZoneAlarm Portal. You can even redirect your printers or ports to a remote computer,
so that you can print and transfer files with ease.
Remote Desktop sessions use the Microsoft Remote Desktop Protocol (RDP) on TCP port
3389. This port is opened dynamically between the Remote Desktop client and the Remote
Desktop server as needed, meaning that the port is not exposed to the Internet, and your
constant security is ensured.
Note: By default, the Microsoft RDP protocol is secured with 128-bit RC4 encryption.
For the strongest possible security, it is recommended to use Remote Desktop over
an IPSec VPN connection. For information on VPNs, see Working With VPNs on
page 291.
Workflow
• To enable Remote Desktop, select the Allow remote desktop access check
box.
• To disable Remote Desktop, clear the Allow remote desktop access check box.
Fields disappear.
3. Complete the fields using the information in the following table.
4. Click Apply.
Sharing
Share local drives Select this option to allow the host computer to access hard drives on
the client computer. This enables remote users to access their local hard
drives when logged on to the host computer.
Share local printers Select this option to allow the host computer to access printers on the
client computer. This enables remote users to access their local printer
when logged on to the host computer.
Share local Select this option to allow the host computer to access smartcards on
smartcards the client computer. This enables remote users to access their local
smartcards when logged on to the host computer.
Share local COM Select this option to allow the host computer to access COM ports on
ports the client computer. This enables remote users to access their local
COM ports when logged on to the host computer.
Advanced
Full screen mode Select this option to open Remote Desktop sessions on the whole
screen.
Optimize Select this option to optimize Remote Desktop sessions for slow links.
performance for slow
Bandwidth-consuming options, such as wallpaper and menu animations,
links
will be disabled.
Note: The host computer must have one of the following operating systems installed:
5. Select the Allow users to connect remotely to this computer check box.
6. Click Select Remote Users.
The Remote Desktop Users dialog box appears.
7. Do the following for each remote user who should be allowed to access this
computer:
a. Click Add.
8. Click OK.
9. Click OK.
• If you are prompted to install the Remote Desktop Active X Control, then
install it.
ALT+INSERT Cycles through running programs in the order that they were started
CTRL+ALT+BREAK Toggles between displaying the session in a window and on the full
screen
Chapter 17
Maintenance
This chapter describes the tasks required for maintenance and diagnosis of your
ZoneAlarm router.
This chapter includes the following topics:
Viewing Firmware Status .........................................................................332
Updating the Firmware.............................................................................333
Upgrading Your License ..........................................................................335
Configuring Syslog Logging ....................................................................336
Configuring HTTPS .................................................................................338
Setting the Time on the Router.................................................................341
Using Diagnostic Tools ............................................................................344
Backing Up the ZoneAlarm Router Configuration...................................358
Resetting the ZoneAlarm Router to Defaults ...........................................361
Running Diagnostics ................................................................................364
Rebooting the ZoneAlarm Router ............................................................365
3. Click Browse.
A browse window appears.
4. Select the image file and click Open.
The Firmware Update page reappears. The path to the firmware update image file
appears in the Browse text box.
5. Click Upload.
Your ZoneAlarm router firmware is updated.
Updating may take a few minutes. Do not power off the router.
At the end of the process the ZoneAlarm router restarts automatically.
Note: To determine whether product or node upgrades are available, contact your
ZoneAlarm router provider. Alternatively, you can click Upgrades & Services in the
Welcome page to view and purchase available upgrades.
To upgrade your product, you must install the new Product Key.
6. Click Finish.
Syslog Server Type the IP address of the computer that will run the Syslog service
(one of your network computers), or click This Computer to allow your
computer to host the service.
Default Click to reset the Syslog Port field to the default (port 514 UDP).
Configuring HTTPS
You can enable ZoneAlarm router users to access the ZoneAlarm Portal from the Internet.
To do so, you must first configure HTTPS.
Note: Configuring HTTPS is equivalent to creating a simple Allow rule, where the
destination is This Gateway. To create more complex rules for HTTPS, such as
allowing HTTPS connections from multiple IP address ranges, define Allow rules for
TCP port 443, with the destination This Gateway. For information, see Using Rules
on page 172.
To configure HTTPS
1. Click Setup in the main menu, and click the Management tab.
The Management page appears.
2. Specify from where HTTPS access to the ZoneAlarm Portal should be granted.
See Access Options on page 340 for information.
Note: You can use HTTPS to access the ZoneAlarm Portal from your internal
network, by surfing to https://my.firewall.
3. If you selected Internal Networks + IP Range, enter the desired IP address range
in the fields provided.
4. Click Apply.
The HTTPS configuration is saved. If you configured remote HTTPS, you can now
access the ZoneAlarm Portal through the Internet, using the procedure Accessing the
ZoneAlarm Portal Remotely on page 47.
3. Complete the fields using the information in Set Time Wizard Fields on page
343.
4. Click Next.
• If you selected Specify date and time, the Specify Date and Time dialog box
appears.
Set the date, time, and time zone in the fields provided, then click Next.
• If you selected Use a Time Server, the Time Servers dialog box appears.
Complete the fields using the information in Time Servers Fields on page 344,
then click Next.
• The Date and Time Updated screen appears.
5. Click Finish.
Your computer's clock Set the router time to your computer’s system time.
Use a Time Server Synchronize the router time with a Network Time Protocol (NTP)
server.
Specify date and time Set the router to a specific date and time.
Select your time zone Select the time zone in which you are located.
Ping Check that a specific IP address or DNS Using IP Tools on page 345
name can be reached via the Internet.
Traceroute Display a list of all routers used to Using IP Tools on page 345
connect from the ZoneAlarm router to a
specific IP address or DNS name.
WHOIS Display the name and contact information Using IP Tools on page 345
of the entity to which a specific IP address
or DNS name is registered. This
information is useful in tracking down
hackers.
Packet Sniffer Capture network traffic. This information is Using Packet Sniffer on page
useful troubleshooting network problems. 347
Using IP Tools
To use an IP tool
1. Click Setup in the main menu, and click the Tools tab.
The Tools page appears.
2. In the Tool drop-down list, select the desired tool.
3. In the Address field, type the IP address or DNS name for which to run the
tool.
4. Click Go.
The Packet Sniffer window displays the name of the interface, the number of packets
collected, and the percentage of storage space remaining on the router for storing the
packets.
The list includes the primary Internet connection, the ZoneAlarm router
ports, and all defined networks.
Filter String Type the filter string to use for filtering the captured packets. Only
packets that match the filter condition will be saved.
For a list of basic filter strings elements, see Filter String Syntax on
page 350.
If you do not specify a filter string, Packet Sniffer will save all packets on
the selected interface.
Capture only traffic Select this option to capture incoming and outgoing packets for this
to/from this gateway gateway only.
If this option is not selected, Packet Sniffer will collect packets for all
traffic on the interface.
and
PURPOSE
The and element is used to concatenate filter string elements. The filtered packets must
match all concatenated filter string elements.
SYNTAX
element and element [and element...]
element && element [&& element...]
PARAMETERS
EXAMPLE
The following filter string saves packets that both originate from IP address is
192.168.10.1 and are destined for port 80:
src 192.168.10.1 and dst port 80
dst
PURPOSE
The dst element captures all packets with a specific destination.
SYNTAX
dst destination
PARAMETERS
• An IP address
• A host name
EXAMPLE
The following filter string saves packets that are destined for the IP address 192.168.10.1:
dst 192.168.10.1
dst port
PURPOSE
The dst port element captures all packets destined for a specific port.
SYNTAX
dst port port
Note: This element can be prepended by tcp or udp. For information, see tcp on
page 356 and udp on page 357.
PARAMETERS
EXAMPLE
The following filter string saves packets that are destined for port 80:
dst port 80
ether proto
PURPOSE
The ether proto element is used to capture packets of a specific ether protocol type.
SYNTAX
ether proto \protocol
PARAMETERS
host
PURPOSE
The host element captures all incoming and outgoing packets for a specific computer.
SYNTAX
host host
PARAMETERS
• An IP address
• A host name
EXAMPLE
The following filter string saves all packets that either originated from IP address
192.168.10.1, or are destined for that same IP address:
host 192.168.10.1
not
PURPOSE
The not element is used to negate filter string elements.
SYNTAX
not element
! element
PARAMETERS
EXAMPLE
The following filter string saves packets that are not destined for port 80:
not dst port 80
or
PURPOSE
The or element is used to alternate between string elements. The filtered packets must
match at least one of the filter string elements.
SYNTAX
element or element [or element...]
element || element [|| element...]
PARAMETERS
EXAMPLE
The following filter string saves packets that either originate from IP address 192.168.10.1
or IP address 192.168.10.10:
src 192.168.10.1 or src 192.168.10.10
port
PURPOSE
The port element captures all packets originating from or destined for a specific port.
SYNTAX
port port
Note: This element can be prepended by tcp or udp. For information, see tcp on
page 356 and udp on page 357.
PARAMETERS
EXAMPLE
The following filter string saves all packets that either originated from port 80, or are
destined for port 80:
port 80
src
PURPOSE
The src element captures all packets with a specific source.
SYNTAX
src source
PARAMETERS
• An IP address
• A host name
EXAMPLE
The following filter string saves packets that originated from IP address 192.168.10.1:
src 192.168.10.1
src port
PURPOSE
The src port element captures all packets originating from a specific port.
SYNTAX
src port port
Note: This element can be prepended by tcp or udp. For information, see tcp on
page 356 and udp on page 357.
PARAMETERS
EXAMPLE
The following filter string saves packets that originated from port 80:
src port 80
tcp
PURPOSE
The tcp element captures all TCP packets. This element can be prepended to port-related
elements.
Note: When not prepended to other elements, the tcp element is the equivalent of
ip proto tcp.
SYNTAX
tcp
tcp element
PARAMETERS
EXAMPLE 1
The following filter string captures all TCP packets:
tcp
EXAMPLE 2
The following filter string captures all TCP packets destined for port 80:
tcp dst port 80
udp
PURPOSE
The udp element captures all UDP packets. This element can be prepended to port-related
elements.
Note: When not prepended to other elements, the udp element is the equivalent of
ip proto udp.
SYNTAX
udp
udp element
PARAMETERS
EXAMPLE 1
The following filter string captures all UDP packets:
udp
EXAMPLE 2
The following filter string captures all UDP packets destined for port 80:
udp dst port 80
• In the Import Settings field, type the full path to the configuration file.
Or
Note: If the router's IP address changed as a result of the configuration import, your
computer may be disconnected from the network; therefore you may not be able to
see the results.
Warning: This operation erases all your settings and password information. You will
have to set a new password and reconfigure your ZoneAlarm router for Internet
connection. For information on performing these tasks, see Setting Up the
ZoneAlarm Router on page 39.
This operation also resets your router to its default Product Key. Therefore, if you
upgraded your license, you should save your Product Key before resetting to defaults.
You can view the installed Product Key by in the ZoneAlarm Licensing Wizard. For
information on accessing this wizard, see Upgrading Your License on page 335.
You can reset the ZoneAlarm router to defaults via the Web management interface
(software) or by manually pressing the Reset button (hardware) located at the back of the
ZoneAlarm router.
When resetting the router via the ZoneAlarm Portal, you can choose to keep the current
firmware or to revert to the firmware version that shipped with the ZoneAlarm router. In
contrast, using the Reset button automatically reverts the firmware version.
To reset the ZoneAlarm router to factory defaults via the Web interface
1. Click Setup in the main menu, and click the Tools tab.
The Tools page appears.
2. Click Factory Settings.
3. To revert to the firmware version that shipped with the router, select the check
box.
4. Click OK.
To reset the ZoneAlarm router to factory defaults using the Reset button
1. Make sure the ZoneAlarm router is powered on.
2. Using a pointed object, press the RESET button on the back of the ZoneAlarm
router steadily for seven seconds and then release it.
3. Allow the ZoneAlarm router to boot-up until the system is ready.
For information on the router's front and rear panels, see the Getting to Know Your
Router section in Introduction on page 1.
Warning: If you choose to reset the ZoneAlarm router by disconnecting the power cable
and then reconnecting it, be sure to leave the ZoneAlarm router disconnected for at
least three seconds. Disconnecting and reconnecting the power without waiting might
cause permanent damage.
Running Diagnostics
You can view technical information about your ZoneAlarm router’s hardware, firmware,
license, network status, and Service Center.
This information is useful for troubleshooting. You can export it to an *.html file and send
it to technical support.
Chapter 18
Overview
The ZoneAlarm Z100G router includes a built-in print server, enabling you to connect
USB-based printers to the router and share them across the network.
Note: When using computers with a Windows 2000/XP operating system, the
ZoneAlarm router supports connecting up to four USB-based printers to the router.
When using computers with a MAC OS-X operating system, the ZoneAlarm router
supports connecting one printer.
The router automatically detects printers as they are plugged in, and they immediately
become available for printing. Usually, no special configuration is required on the
ZoneAlarm router.
Note: The ZoneAlarm print server supports printing via "all-in-one" printers. Copying
and scanning functions are not supported.
The USB Devices page appears. If the ZoneAlarm router detected the printer, the
printer is listed on the page.
If the printer is not listed, check that you connected the printer correctly, then click
Refresh to refresh the page.
5. Next to the printer, click Edit.
The Printer Setup page appears.
Note: Printer port numbers may not overlap, and must be high ports.
b. Click Apply.
You may want to change the port number if, for example, the printer you are setting
up is intended to replace another printer. In this case, you should change the
replacement printer's port number to the old printer's port number, and you can skip
the next step.
8. Configure each computer from which you want to enable printing to the
network printer.
See Configuring Computers to Use Network Printers on page 371.
Windows Vista
This procedure is relevant for computers with a Windows Vista operating system.
Do the following:
1) Click Custom.
2) Click Settings.
Windows 2000/XP
This procedure is relevant for computers with a Windows 2000/XP operating system.
5. Click Next.
Note: Do not select the Automatically detect and install my Plug and Play printer check
box.
7. Click Next.
The Select a Printer Port dialog box appears.
The Add Standard TCP/IP Port Wizard opens with the Welcome dialog box displayed.
12. In the Printer Name or IP Address field, type the ZoneAlarm router's LAN IP
address, or "my.firewall".
You can find the LAN IP address in the ZoneAlarm Portal, under Network > My
Network.
The Port Name field is filled in automatically.
13. Click Next.
The Add Standard TCP/IP Printer Port Wizard opens, with the Additional Port
Information Required dialog box displayed.
16. In the Port Number field, type the printer's port number, as shown in the
Printers page.
17. In the Protocol area, make sure that Raw is selected.
18. Click OK.
The Add Standard TCP/IP Printer Port Wizard reappears.
23. Complete the remaining dialog boxes in the wizard as desired, and click
Finish.
The printer appears in the Printers and Faxes window.
24. Right-click the printer and click Properties in the popup menu.
The printer's Properties dialog box opens.
25. In the Ports tab, in the list box, select the port you added.
The port's name is IP_<LAN IP address>.
MAC OS-X
This procedure is relevant for computers with the latest version of the MAC OS-X
operating system.
Note: This procedure may not apply to earlier MAC OS-X versions.
6. Click Add.
14. In the Printer List window, select the newly added printer, and click Make
Default.
Note: Each printer port number must be different, and must be a high port.
Chapter 19
Troubleshooting
This chapter provides solutions to common problems you may encounter while using the
ZoneAlarm router.
Connectivity
I cannot access the Internet. What should I do?
• Verify that the ZoneAlarm router is operating. If not, check the power
connection to the ZoneAlarm router.
• Check if the LED for the WAN port is green. If not, check the network cable to
the modem and make sure the modem is turned on.
• Check if the LED for the LAN port used by your computer is green. If not,
check if the network cable linking your computer to the ZoneAlarm router is
connected properly. Try replacing the cable or connecting it to a different LAN
port.
• Using your Web browser, go to http://my.firewall and see whether "Connected"
appears on the Status Bar. Make sure that your ZoneAlarm router network
settings are configured as per your ISP directions.
• Check your TCP/IP configuration according to Installing and Setting up the
ZoneAlarm Router on page 19.
• If Web Filtering or Email Filtering are on, try turning them off.
• Check if you have defined firewall rules which block your Internet connectivity.
• Check with your ISP for possible service outage.
• Check whether you are exceeding the maximum number of computers allowed
by your license, by viewing the My Computers page.
Note: 192.168.10 is the default value, and it may vary if you changed it in the My
Network page.
I changed the network settings to incorrect values and am unable to correct my error. What
should I do?
Reset the network to its default settings using the button on the back of the ZoneAlarm
router unit. See Resetting the ZoneAlarm Router to Defaults on page 361.
I am using the ZoneAlarm router behind another NAT device, and I am having problems with
some applications. What should I do?
By default, the ZoneAlarm router performs Network Address Translation (NAT). It is
possible to use the ZoneAlarm router behind another device that performs NAT, such as a
DSL router or Wireless router, but the device will block all incoming connections from
reaching your ZoneAlarm router.
To fix this problem, do ONE of the following. (The solutions are listed in order of
preference.)
• Consider whether you really need the router. The ZoneAlarm router can be used
as a replacement for your router, unless you need it for some additional
functionality that it provides.
• If possible, disable NAT in the router. Refer to the router’s documentation for
instructions on how to do this.
• If the router has a “DMZ Computer” or “Exposed Host” option, set it to the
ZoneAlarm router’s external IP address.
• Open the following ports in the NAT device:
• UDP 9281/9282
• UDP 500
• UDP 2746
• TCP 256
• TCP 264
• ESP IP protocol 50
• TCP 981
I cannot receive audio or video calls through the ZoneAlarm router. What should I do?
To enable audio/video, you must configure an IP Telephony (H.323) virtual server. For
instructions, see Configuring Servers on page 185.
I run a public Web server at home but it cannot be accessed from the Internet. What should I
do?
Configure a virtual Web Server. For instructions, see Configuring Servers on page 185.
I cannot connect to the LAN network from the WLAN network. What should I do?
By default, connections from the WLAN network to the LAN network are blocked. To
allow traffic from the WLAN to the LAN, configure appropriate firewall rules. For
instructions, see Using Rules on page 172.
While trying to connect to a Service Center, I received the message “The Service Center did
not respond”. What should I do?
• If you are using a Service Center other than the Check Point Service Center,
check that the Service Center IP address is typed correctly.
• The ZoneAlarm router connects to the Service Center using UDP ports
9281/9282. If the ZoneAlarm router is installed behind another firewall, make
sure that these ports are open.
Other Problems
I have forgotten my password. What should I do?
Reset your ZoneAlarm router to factory defaults using the Reset button as detailed in
Resetting the ZoneAlarm Router to Defaults on page 361.
In the ZoneAlarm Portal, I do not see the pop-up windows that the guide describes. What
should I do?
Disable any pop-up blockers for http://my.firewall.
Chapter 20
Specifications
This chapter includes the following topics:
Technical Specifications.......................................................................... 395
CE Declaration of Conformity................................................................. 398
Federal Communications Commission Radio Frequency Interference
Statement ................................................................................................. 400
Technical Specifications
Check Point is committed to protecting the environment. The ZoneAlarm unified threat
management router is compliant with the RoHS Directive, meeting the European Union's
strict restrictions on hazardous substances.
RoHS & WEEE Declaration and Certification
The ZoneAlarm router has been verified to comply with the following directives,
throughout the design, development, and supply chain stages:
• Directive of the European Parliament and of the Council, of 27 January 2003, on
the Restriction of the Use of Certain Hazardous Substances in Electrical and
Electronic Equipment (RoHS – 2002/95/EC)
• Directive of the European Parliament and of the Council, of 27 January 2003, on
Waste Electrical and Electronic Equipment (WEEE – 2002/96/CE)
For a copy of the original signed declaration (in full conformance with EN45014), contact
SofaWare technical support at www.sofaware.com/support.
Physical Attributes
Environmental Conditions
Applicable Standards
RF R&TTE .FCC15C,TELCO
Wireless Attributes
Modulation OFDM, DSSS, 64QAM, 16QAM, QPSK, BPSK, CCK, DQPSK, DBPSK
CE Declaration of Conformity
SofaWare Technologies Ltd., 3 Hilazon St., Ramat-Gan Israel, hereby declares that this
equipment is in conformity with the essential requirements specified in Article 3.1 (a) and
3.1 (b) of:
• Directive 89/336/EEC (EMC Directive)
• Directive 73/23/EEC (Low Voltage Directive – LVD)
• Directive 99/05/EEC (Radio Equipment and Telecommunications Terminal
Equipment Directive)
In accordance with the following standards:
EMC EN 55022
EN 61000-3-2
EN 61000-3-3
EN 61000-4-2
EN 61000-4-3
EN 61000-4-4
EN 61000-4-5
EN 61000-4-6
EN 61000-4-8
EN 61000-4-11
ENV50204
EN 61000-4-5
EN 61000-4-6
EN 61000-4-7
EN 61000-4-8
EN 61000-4-9
EN 61000-4-10
EN 61000-4-11
EN 61000-4-12
Safety EN 60950
IEC 60950
The "CE" mark is affixed to this product to demonstrate conformance to the R&TTE
Directive 99/05/EEC (Radio Equipment and Telecommunications Terminal Equipment
Directive) and FCC Part 15 Class B.
The product has been tested in a typical configuration. For a copy of the Original Signed
Declaration (in full conformance with EN45014), please contact SofaWare at the above
address.
Glossary of Terms
A Certificate Authority
The Certificate Authority (CA) issues
ADSL Modem
certificates to entities such as gateways,
A device connecting a computer to the
users, or computers. The entity later
Internet via an existing phone line.
uses the certificate to identify itself and
ADSL (Asymmetric Digital Subscriber
provide verifiable information. For
Line) modems offer a high-speed
instance, the certificate includes the
'always-on' connection.
Distinguished Name (DN) (identifying
C information) of the entity, as well as the
public key (information about itself),
CA and possibly the IP address.
The Certificate Authority (CA) issues
certificates to entities such as gateways, After two entities exchange and validate
users, or computers. The entity later each other's certificates, they can begin
uses the certificate to identify itself and encrypting information between
provide verifiable information. For themselves using the public keys in the
instance, the certificate includes the certificates.
Distinguished Name (DN) (identifying
information) of the entity, as well as the Cracking
public key (information about itself), An activity in which someone breaks
and possibly the IP address. into someone else's computer system,
bypasses passwords or licenses in
After two entities exchange and validate computer programs; or in other ways
each other's certificates, they can begin intentionally breaches computer
encrypting information between security. The end result is that whatever
themselves using the public keys in the resides on the computer can be viewed
certificates. and sensitive data can be stolen without
anyone knowing about it. Sometimes,
Cable Modem tiny programs are 'planted' on the
A device connecting a computer to the computer that are designed to watch out
Internet via the cable television for, seize and then transmit to another
network. Cable modems offer a high- computer, specific types of data.
speed 'always-on' connection.
D E
DHCP Exposed Host
Any machine requires a unique IP An exposed host allows one computer
address to connect to the Internet using to be exposed to the Internet. An
Internet Protocol. Dynamic Host example of using an exposed host
Configuration Protocol (DHCP) is a would be exposing a public server,
communications protocol that assigns while preventing outside users from
Internet Protocol (IP) addresses to getting direct access form this server
computers on the network. back to the private network.
DHCP uses the concept of a "lease" or
amount of time that a given IP address
F
will be valid for a computer. Firmware
Software embedded in a device.
DMZ
A DMZ (demilitarized zone) is an G
internal network defined in addition to Gateway
the LAN network and protected by the A network point that acts as an entrance
ZoneAlarm appliance. to another network.
DNS
The Domain Name System (DNS)
H
refers to the Internet domain names, or Hacking
easy-to-remember "handles", that are An activity in which someone breaks
translated into IP addresses. into someone else's computer system,
bypasses passwords or licenses in
An example of a Domain Name is computer programs; or in other ways
'www.sofaware.com'. intentionally breaches computer
security. The end result is that whatever
Domain Name System resides on the computer can be viewed
Domain Name System. The Domain and sensitive data can be stolen without
Name System (DNS) refers to the anyone knowing about it. Sometimes,
Internet domain names, or easy-to- tiny programs are 'planted' on the
remember "handles", that are translated computer that are designed to watch out
into IP addresses. for, seize and then transmit to another
An example of a Domain Name is computer, specific types of data.
'www.sofaware.com'.
HTTPS IP Spoofing
Hypertext Transfer Protocol over Secure A technique where an attacker attempts
Socket Layer, or HTTP over SSL. to gain unauthorized access through a
false source address to make it appear as
A protocol for accessing a secure Web
though communications have originated
server. It uses SSL as a sublayer under
in a part of the network with higher
the regular HTTP application. This
access privileges. For example, a packet
directs messages to a secure port
originating on the Internet may be
number rather than the default Web port
masquerading as a local packet with the
number, and uses a public key to
source IP address of an internal host.
encrypt data
The firewall can protect against IP
HTTPS is used to transfer confidential spoofing attacks by limiting network
user information. access based on the gateway interface
from which data is being received.
Hub
A device with multiple ports, IPSEC
connecting several PCs or network IPSEC is the leading Virtual Private
devices on a network. Networking (VPN) standard. IPSEC
enables individuals or offices to
I establish secure communication
IP Address channels ('tunnels') over the Internet.
An IP address is a 32-bit number that
identifies each computer sending or ISP
receiving data packets across the An ISP (Internet service provider) is a
Internet. When you request an HTML company that provides access to the
page or send e-mail, the Internet Internet and other related services.
Protocol part of TCP/IP includes your
IP address in the message and sends it
L
to the IP address that is obtained by LAN
looking up the domain name in the A local area network (LAN) is a group
Uniform Resource Locator you of computers and associated devices
requested or in the e-mail address you're that share a common communications
sending a note to. At the other end, the line and typically share the resources of
recipient can see the IP address of the a single server within a small
Web page requestor or the e-mail sender geographic area.
and can respond by sending another
message using the IP address it
received.
N PPPoE
PPPoE (Point-to-Point Protocol over
NAT Ethernet) enables connecting multiple
Network Address Translation (NAT) is computer users on an Ethernet local area
the translation or mapping of an IP network to a remote site or ISP, through
address to a different IP address. NAT common customer premises equipment
can be used to map several internal IP (e.g. modem).
addresses to a single IP address, thereby
sharing a single IP address assigned by
the ISP among several PCs.
Router T
A router is a device that determines the TCP
next network point to which a packet TCP (Transmission Control Protocol) is
should be forwarded toward its a set of rules (protocol) used along with
destination. The router is connected to the Internet Protocol (IP) to send data in
at least two networks. the form of message units between
computers over the Internet. While IP
S takes care of handling the actual
Server delivery of the data, TCP takes care of
A server is a program (or host) that keeping track of the individual units of
awaits and requests from client data (called packets) that a message is
programs across the network. For divided into for efficient routing
example, a Web server is the computer through the Internet.
program, running on a specific host, that For example, when an HTML file is
serves requested HTML pages or files. sent to you from a Web server, the
Your browser is the client program, in Transmission Control Protocol (TCP)
this case. program layer in that server divides the
file into one or more packets, numbers
Stateful Inspection the packets, and then forwards them
Stateful Inspection was invented by individually to the IP program layer.
Check Point to provide the highest level Although each packet has the same
of security by examining every layer destination IP address, it may get routed
within a packet, unlike other systems of differently through the network.
inspection. Stateful Inspection extracts
information required for security
At the other end (the client program in resource depends on the Internet
your computer), TCP reassembles the application protocol. On the Web
individual packets and waits until they (which uses the Hypertext Transfer
have arrived to forward them to you as a Protocol), an example of a URL is
single file. 'http://www.sofaware.com'.
TCP/IP V
TCP/IP (Transmission Control
VPN
Protocol/Internet Protocol) is the
A virtual private network (VPN) is a
underlying communication protocol of
private data network that makes use of
the Internet.
the public telecommunication
U infrastructure, maintaining privacy
through the use of a tunneling protocol
UDP and security procedures.
UDP (User Datagram Protocol) is a
communications protocol that offers a VPN tunnel
limited amount of service when A secure connection between a Remote
messages are exchanged between Access VPN Client and a Remote
computers in a network that uses the Access VPN Server.
Internet Protocol (IP). UDP is an
alternative to the Transmission Control W
Protocol (TCP) and, together with IP, is WLAN
sometimes referred to as UDP/IP. Like A WLAN is a wireless local area
the Transmission Control Protocol, network protected by the ZoneAlarm
UDP uses the Internet Protocol to router.
actually get a data unit (called a
datagram) from one computer to
another. Unlike TCP, however, UDP
does not provide the service of dividing
a message into packets (datagrams) and
reassembling it at the other end.
UDP is often used for applications such
as streaming data.
URL
A URL (Uniform Resource Locator) is
the address of a file (resource)
accessible on the Internet. The type of
Index
cable modem
A
connection • 61, 68
Access Denied page
explained • 401
customizing • 195
cable type • 36
account, configuring • 275
certificate
active computers, viewing • 158
explained • 297
active connections, viewing • 160
generating self-signed • 298
ADSL
importing • 302
modem • 401
installing • 297
Allow and Forward rules, explained • 176
uninstalling • 304
Allow rules, explained • 176
Checksum Verification • 222
B Cisco IOS DOS • 219
Block Known Ports • 234
D
Block Port Overflow • 235
DDoS Attack • 210
Block rules, explained • 176
DHCP
Blocked FTP Commands • 236
configuring • 86
bridges
connection • 63
adding and editing • 141
explained • 401
adding networks to • 145
options • 90
deleting • 150
DHCP Server
multiple • 140
enabling/disabling • 86
using • 139
explained • 86
C diagnostic tools
CA, explained • 401 Packet Sniffer • 347
Index 407
Index
Index 409
Index
configuring • 81 password
configuring DHCP options • 90 changing • 311
configuring the WLAN • 113 setting up • 43
enabling DHCP Server on • 86 Peer to Peer • 239
enabling Hide NAT • 85 Ping • 344
installation on • 36 Ping of Death • 207
managing • 81 ports
objects • 95 managing • 108
network objects modifying assignments • 109
adding and editing • 97 modifying link configurations • 111
using • 95 resetting to defaults • 112
viewing and deleting • 104 viewing statuses • 108
Network Quota • 217 PPPoE
network service objects connection • 58, 69
adding and editing • 104 explained • 404
viewing and deleting • 107 PPTP
node limit, viewing • 158 connection • 60, 71
Non-TCP Flooding • 209 explained • 404
Null Payload • 221 print server • 367
printers
P
changing ports • 387
package contents • 6
configuring computers to use • 371
packet • 78, 344, 403, 404
resetting • 388
Packet Sanity • 212
setting up • 368
Packet Sniffer
using • 367
filter string syntax • 350
viewing • 387
using • 347
Pass rules, explained • 252
R explained • 291
rebooting • 365 security
Remote Access VPN Clients • 291 configuring servers • 185
Remote Access VPN Servers • 291 creating firewall rules • 172
Remote Desktop defining a computer as an exposed host •
185
accessing a remote desktop • 327
firewall • 169
configuring • 321
SmartDefense • 197
configuring the host computer • 324
security policy
using • 319
about • 167
reports
default • 168
active computers • 158
enforcement • 168
active connections • 160
implementation • 168
event log • 151
setting up • 167
node limit • 158
Sequence Verifier • 228
traffic • 154
servers
viewing • 151
configuring • 185
wireless statistics • 161
explained • 405
routers • 344, 389, 405
Remote Access VPN • 291
rules
Web • 95, 185, 389
firewall • 172
Service Center
VStream Antivirus • 251
connecting to • 267
S disconnecting from • 275
Scan rules, explained • 252 refreshing a connection to • 274
SecuRemote services
installing • 296 Email Filtering • 282
SecuRemote Remote Access VPN Server software updates • 287
configuring • 294 Web Filtering • 276
Index 411
Index
V W
Vendor-Specific Attribute WAN
configuring • 251 cable • 36
VPN ports • 36
explained • 291, 406 Web Filtering
tunnnels • 305 customizing the Access Denied page •
195
viewing IKE traces • 308
enabling/disabling • 277
VPN tunnels
selecting categories for • 279
creation and closing of • 305
snoozing • 280
explained • 291, 406
temporarily disabling • 280
viewing • 305
Web rules
VStream Antivirus
adding and editing • 190
about • 247
changing priority of • 194
configuring • 251
customizing the Access Denied page •
configuring advanced settings • 261
195
configuring policy • 251
using • 187
enabling/disabling • 249
viewing and deleting • 194
rules • 252
Welchia • 218
updating • 265
WEP • 113
viewing database information • 250
WHOIS • 344
VStream Antivirus rules
wireless hardware • 114
adding and editing • 252
wireless networks
changing priority • 259
troubleshooting connectivity • 135
deleting • 260
viewing statistics for • 161
enabling/disabling • 259
wireless stations
types • 252
viewing • 161
WLAN
Index 413
Index