Sangfor Iag v13.0.19 User Manual en 20210927
Sangfor Iag v13.0.19 User Manual en 20210927
Sangfor Iag v13.0.19 User Manual en 20210927
19 User Manual
Sangfor IAG
User Manual
Document Version 01
Disclaimer
Due to product version upgrades or other reasons, the content of this document will
be updated from time to time. Unless otherwise agreed, this document is used for
reference only, and all statements, information, and recommendations therein do not
constitute any express or implied warranties.
Technical Support
For technical support, please visit: https://www.sangfor.com/en/about-
us/contact-us/technical-support
Intended Audience
This document is intended for:
⚫ Network design engineers
⚫ O&M personnel
Note Icons
English Icon Description
Change Log
Date Change Description
Contents
Technical Support............................................................................................................. 2
Change Log ........................................................................................................................ 3
1 IAG Installation ............................................................................................................ 15
1.1 Environment Requirement ............................................................................. 15
1.2 Power ................................................................................................................. 15
1.3 Product Appearance ........................................................................................ 15
1.4 Configuration and Management .................................................................... 16
1.5 Wiring Method of Standalone......................................................................... 17
1.6 Wiring Method of Redundant System ........................................................... 19
2 IAG Console .................................................................................................................. 20
2.1 Web UI Login ..................................................................................................... 20
2.1.1 Log into the Web Console .................................................................... 20
2.1.2 Remove the Certificate Alert Dialog .................................................... 23
2.2 Configuration .................................................................................................... 24
3 Functions ...................................................................................................................... 26
3.1 Value-added Services ....................................................................................... 26
3.1.1 Approach to Technology Community ................................................. 26
3.1.2 "Sangfor" Robot ..................................................................................... 27
3.2 Business Intelligence System .......................................................................... 28
3.2.1 Internet Access ....................................................................................... 31
3.2.1.1 Application Scenarios ................................................................. 31
3.2.1.2 Configuration Method ................................................................ 31
3.2.1.2.1 Contents .................................................................................. 33
3.2.1.2.2 Apps & Websites .................................................................... 35
3.2.1.2.3 Display Options ...................................................................... 36
3.2.1.3 Internet Access Analytics ........................................................... 38
3.2.2 Bandwidth Analytics .............................................................................. 39
3.2.2.1 Application Scenarios ................................................................. 39
3.2.2.2 Configuration Method ................................................................ 39
3.2.2.3 Data Analytics .............................................................................. 40
3.2.3 Electricity Waste Analytics .................................................................... 41
3.2.3.1 Application Scenarios ................................................................. 41
3.2.3.2 Configuration Method ................................................................ 41
3.2.3.3 Log Export .................................................................................... 42
3.2.4.1 Configuration Scheme................................................................ 42
3.2.4.2 Server Configuration .................................................................. 44
3.2.4.3 Log Option ................................................................................... 46
3.3 Real-time Status ................................................................................................ 47
3.3.1 Real-time Status ..................................................................................... 47
3.3.1.1 Dashboard ................................................................................... 47
1 IAG Installation
This chapter mainly describes the appearance and installation of the SANGFOR
IAG hardware device. After correct installation, you can configure and debug
the system.
⚫ Temperature: 0-45℃
⚫ Humidity: 5%-90%
The power supply should be properly grounded to ensure long-term and stable
running of the system, dustproof measures are taken, the working
environment well ventilated, and the indoor temperature kept stable. This
product conforms to the requirements on environment protection, and the
placement, usage, and discard of the product should comply with relevant
national law and regulation.
1.2 Power
The SANGFOR IAG device uses 110 ~ 230V alternating current (IAG) as its power
supply. Make sure it is well-grounded before being provided with a power
supply.
Above is the front panel of the SANGFOR IAG hardware gateway device. The
interfaces or indicators on the front panel are described respectively in the
following table.
1 CONSOLE Interface Used for Bypass Switch and sms modem connectivity
The CONSOLE interface is only for debugging by technical engineers. The end-users connect
to the device via the network interfaces.
The default IP address settings for the network interfaces are described below:
Interface IP Address
⚫ Use standard RJ-45 Ethernet cable to connect the LAN interface to the local
area network and then configure the IAG device.
⚫ Use standard RJ-45 Ethernet cable to connect the WAN1 interface with the
networking device, such as a router, optical fiber transceiver, ADSL Modem,
etc.
⚫ Use standard RJ-45 Ethernet cable to connect the DMZ interface to the DMZ
zone network. Generally, the Web server and Mail server providing services
to a wide area network (WAN) are placed at the DMZ zone. The IAG device
provides secure protection for these servers.
When wiring the interfaces, please use the correct cables for connection as
instructed below:
⚫ Use the straight-through cable to connect a WAN interface with the Modem
and a crossover cable to connect a WAN interface with the router.
⚫ Use the straight-through cable to connect the LAN interface with the switch
and a crossover cable to connect the LAN interface on the device with the
network interface on the computer.
After correct connections, log in to the console of the IAG device and configure
the deployment mode according to the network topology (see section 3.1.3.1
Deployment).
1. The multi-line function of the IAG device allows multiple Internet lines to
be connected. In this situation, connect the second networking device to
the WAN2 interface, the third networking device to the WAN3 interface,
and so on.
2. When the IAG gateway device runs, the POWER indicator (green) lights up,
and the WAN LINK and LAN LINK indicators (orange) light up. The ACT
indicator ( green) will be blinking if there is data flow. When the device is
starting, the ALARM indicator light is red due to system loading and then
goes out after one or two minutes, indicating the successful startup of the
device. After startup, the ALARM indicator may flash, which means the
device is writing logs. However, if the ALARM indicator stays lighted for a
long time and does not go out, please shut down the device and restart the
device after 5 minutes. If this situation remains after the restart, please
contact us.
⚫ Use standard RJ-45 Ethernet cable to connect the WAN1 interfaces of the
two IAG devices to the same switch (if multi-line function is applied, the
wiring method is the same: connect the WAN interfaces of the two devices
to the same external line), and then connect the switch to other networking
devices, such as a router, fiber optical transceiver and ADSL Modem, etc.
⚫ Use the Console cable (among the accessories) to connect the Console
interfaces of the two IAG devices.
⚫ Use RJ-45 Ethernet cable to connect the LAN interfaces (eth0) of the two IAG
devices to the same switch, and then connect the switch to the LAN switch,
connecting it to the LAN.
After the two devices are correctly wired, switch on the power for both devices
and then configure them. The procedures for configuring the redundant
system are the same as those for a standalone device. You need only configure
the active IAG device, automatically synchronizing its configurations to the
standby IAG device.
2 IAG Console
2.1 Web UI Login
The IAG device supports secure HTTPS login using the standard port of HTTPS
protocol. If you log into the Web Console of the IAG device for the first time,
type the default login address https://10.251.251.251 in the browser's address
bar.
Using HTTPS to log in to the WEBUI and manage the IAG device can avoid the potential risks
that the configurations may be intercepted during transmission.
Step 3. Type the username and password, read the Terms of Use and Privacy
Policy, select "I have read and agree to the Terms of Use and Privacy
Policy," and click Login to log into the IAG device console. The username and
password are admin by default. (If you have any questions about the Terms of
Use and Privacy Policy, please contact us).
If the password is not modified within 15 days, a compulsory password modification will
prompt on the next login.
To view the version of the current IAG gateway device, click Version.
You can log into the console without installing any ActiveX. Non-IE browsers are
also supported.
Login to the console, open the System > General > Advanced > Web UI page.
Specify the IP address (to which the certificate will be issued) in the Issue
Console SSL Cert. To field. Here, the IP address refers to that of the network
interface for login, and it is the IP address of the LAN interface by default. In
this example, we suppose that you have logged into the console through the
default address of the LAN interface.
After the certificate is installed, the alert dialog will not pop up when you login
through the default address of the LAN interface.
This alert dialog will be removed only when you login through the IP address specified in
Issue Console SSL Cert. To and the local computer has installed the certificate. If you login
through another address or the computer has not installed the certificate, the alert dialog
will still pop up.
2.2 Configuration
After logging in to the Web UI, you will see the following major modules:
System, Proxy, Objects, Users, Access Mgt, Bandwidth Mgt, Endpoint
Device, Security and System as shown below:
The following instructions for the buttons and icons apply to all the
configuration pages on the IAG device and will not be described again in the
subsequent sections:
changes to take effect. To make them take effect immediately, click the
icon at the bottom-right of the page.
⚫ Most of the configuration pages include the icon. When you put your
mouse cursor over this icon, a brief description of the current configuration
item will pop up.
When you modify the settings on the System > Network > Deployment page or System >
System Time page or default encoding on the System > General > Advanced > Web UI
Options page, the IAG device will restart and you need to re-login.
For most of the pages that display the configuration information and status in
List View, you can select the columns to be shown to quickly get your desired
information and sort the information in ascending or descending order
1. On the Members page, you can select the columns that you want to
display, and the page will only display the information of the selected
columns, as shown below:
2. You can select Sort Ascending or Sort Descending to sort the information
in ascending or descending order by the corresponding column on the
Online Users page.
3 Functions
3.1 Value-added Services
There is an entry for accessing the technology community on the console page
of device, including functions of posting for helps, consulting online and
When the device can access the Internet, click the robot:
The internal gateway offers App experiences including Internet access, report
center, bandwidth analytics, data leakage tracking analytics and electricity
waste analytics.
Click Internet Access Analytics icon to directly enter the Internet Access
Analytics system.
As shown above, click Current Region at the top right corner of map, and set
current Region as your region; click OK to save the settings. The map displays
conditions that current device accesses other network addresses.
3.2.1.2.1 Contents
Enabling method: Click Enable, and fill in external report center IP address,
external report center port and password.
Display Panels: It is divided into Traffic Analytics and Security Analytics. The
checked contents will be displayed on the Dashboard page. The more the
checked contents, the greater the display density. It is suggested to select a
screen with proper resolution for displaying.
Layout: The overall layout model is adjusted as per demands including large
image left-aligned, large image center-aligned, and large image right-aligned.
Panel Name: As shown above, define tile names of all panels displayed on the
Dashboard page. As shown below, Panel displays the name of each panel, and
double click the row where a panel to be modified is, to edit the panel name
displayed underneath Name; after changing, click OK to save the settings.
View Data: Define the data of recent several hours in that day for querying.
Auto Refresh: Define the time interval for data refreshing in seconds (180
seconds by default, 60 seconds at minimum and 3,600 seconds at maximum).
Display Trigger: Define the percentage of notorious App traffic threshold, i.e.,
the unit status is displayed as abnormal when the proportion of notorious App
traffic exceeds the defined threshold. Define the percentage of notorious
website visit threshold, i.e., the unit status is displayed as abnormal when the
number of notorious website visits exceeds the defined threshold.
Display Entries: As shown below, define the top number of display objects in
each panel on the Dashboard page. Panel: Define the name of each panel,
and double click the row where a panel to be modified is, to edit the Top; after
changing, click OK to save the settings.
Affected by the size and aesthetics of display box, please adjust the number of objects to be
displayed as per actual situations.
As shown above, move the mouse cursor to the display panel to query detailed
data of display contents of this panel.
The box in red displays the Most Active Users Slideshow contents and displays
each active user's usage in a slideshow manner, with a default unit of group. If
it is required to change the unit to the user, change in View By in Display
Options. After changing, the whole Internet Access Analytics system takes
the user as the unit.
When the O&M personnel wants to know whether the LAN bandwidth is
enough and what bandwidth-intensive Apps, they should know about the
traffic usage from the aspects of Apps and users, to adjust and analyze the LAN
bandwidth timely. After each branch docks with External Report Center or
business intelligence system (BI) successfully, a single device will be analyzed
through the bandwidth analytics App.
Select Bandwidth Analytics in the App Store, and then choose Apps -> click
Bandwidth Analytics.
Select a branch device to be viewed at the upper right corner to view daily,
weekly, and monthly data, and click Options.
As per set conditions, the user can view bandwidth data analytics in last one
week. A certain App with greater traffic of the branch can be subject to traffic
control management in accordance with bandwidth analytics results.
As the initiator of the electricity waste analytics App ("Visual electric meter")
that is green and environmentally friendly and aims at saving enterprises'
resources, Sangfor identifies users who did dot shut down the PCs by analyzing
their Internet access behaviors and provides reference data for the enterprises
to optimize resources in the enterprises.
Firstly, click Electricity Waste Analytics, and then click Specify Now button to
set corresponding organizational structures.
Effect Analytics
There are massive logs to be analyzed along with the increase of cyber security
devices. Usually, IAG audit logs need to be sent to a third-party log platform
and other devices for unified analysis or personalized log analysis. Sangfor IAG
offers a method for realizing the requirements.
Prepare an IAG Internet access audit policy. The Internet access behavior can
be audited normally, and logs can be viewed on Internal BI or External BI.
Internal BI (i.e., IAG device) or External BI can communicate with the third-party
log platform (equipped with a Syslog server or FTP server interface).
⚫ or enter Report Center, and choose System -> Settings -> Log Export.
⚫ Enter the Log Export page where functions are not enabled by default.
⚫ In System -> Settings -> Log Export, default functions are not enabled.
Check Enable log export.
Support two external servers, including Syslog and FTP. The settings of Internal
BI or External BI are identical.
External Syslog
2. To ensure logs can be analyzed and displayed correctly, please set the
coded format of the Syslog server as UTF-8.
Fill in server address, server port, and export to the path of FTP server, and fill
in authentication information when authentication is required. After basic
settings are completed, the validity of FTP servers can be tested.
* Filling descriptions for export to the path: If the FTP work path is d: test and
the external access path is ftp://200.200.2.2/test, fill in "/test" in the row of
"Export to Path"; if the external access path is ftp://10.10.10.68/, fill in "/" in the
row of "Export to Path".
Advanced Settings: When the FTP server is abnormal, set an email alarm server
for alarming; the uploaded log files support compression in rar, 7z and zip
formats.
Display logs following the organizational structure of Logs, and this function is
not enabled by default.
it to the status .
Check detailed fields at the right side of log categories as per demands. The
system recommends Common Fields by default. Check Other Fields as per
demands.
Select logs in multiple categories and export, transmit them to the server in
the form of one category in one csc file, for example, "Website Browsing" and
"Sending & Receiving Emails" are enabled at the same time on the server:
/Export to Path/Data/action/. There are two subdirectories (URL and mail) in
the directory, representing website browsing log and email sending and
receiving logs.
3.3.1.1 Dashboard
System Resources are displayed on the Dashboard page, including the graph of
Throughput on All WAN Interfaces, Web-Access Connection Monitoring, Top
Application by Traffic, SaaS Applications, Top Users by Traffic, Application
Bandwidth Distribution, Network Interface, Security Events, Internet Activities,
and Regional/Overseas Traffic.
On the Dashboard page, click Restore Default Panels to show the following
default panels: System Resources, Throughput on ALL WAN Interfaces, Top
Applications by Traffic, Regional/Overseas Traffic, and Saas Applications.
Click to set whether to enable automatic refresh and the automatic refresh
interval. See the following figure.
Click Internal Report Center to access the homepage of the data center
embedded in the device and perform operations such as log query and
measurement.
You can set Period to display the data forwarding conditions of interfaces at a
specific time. Data Unit specifies the traffic unit, and Interface specifies the
interface whose data forwarding conditions are to be displayed.
The Top Applications by Traffic panel displays the top 10 applications by traffic.
You can rank the applications by outbound traffic, inbound traffic, or
bidirectional traffic.
Click to set the automatic refresh time. Set the username and application
type to view details about the user that uses the application.
The Top Users by Traffic panel displays the top 10 users by traffic. You can
rank the users by outbound traffic, inbound traffic, or session quantity.
Click to set the automatic refresh time. Set the username to view details
about the applications used by the user.
Set the traffic rate unit in Data Unit, select All Lines, Line 1, or Line 2 in Line,
and Bidirectional, Outbound, or Inbound in Type.
The Network Interface panel displays the status, cable connection, real-time
transmitted and received traffic of each network interface. See the following
figure.
The Security Events panel displays the number of times that insecure
behaviors are detected. See the following figure.
The Internet Activities panel displays real-time information about the online
behaviors of users. See the following figure.
If the system fails to identify the location (For example, the device cannot
access the internet or another special network environment), the user can
manually select the region. In advance, the system will identify the location
based on the selection of the user. (Automatic identify function no longer
active)
3.3.1.2.1 Endpoints
Endpoints are to view the status of internal network equipment. When the
endpoint scan function is not enabled, the interface is as follows:
After enabled and configured the endpoint scanning function, the interface is
as follows:
Here you can see all the internal network endpoint IP addresses, MAC address,
user, group, endpoint device, operating system, first detected time, last login
time, and operations on them.
Click to view details, and you can see the detailed information of the endpoint
as follows:
Status: Online refers to whether there is the same IP of the endpoint in the
online user list. The presence of the IP indicates that the user has used the
endpoint to go online. At the same time, it will display the information of the
user and the status of the group. Offline means that the endpoint IP is
currently not used by users.
Enter keywords in the Search column on the Local Users page to search for
the endpoint and query the status of the corresponding endpoint.
search for the specified endpoint in Status > User. The interface is as follows:
Click the filter, and you can set the specified condition to view the
corresponding endpoint. The interface is as follows:
First Detected can choose a built-in time range, including all, the last day, the
last seven days, the last 30 days, or a custom time range.
3.3.1.2.1.3 IP Ranges
IP Ranges is to view the live IP status of the intranet, as shown in the figure
below:
IP Ranges displays the 24-bit address segment where the surviving IP address
of the intranet is located, with a maximum of 1024 C segments.
The specific IP survival status in the segment is displayed on the right, and the
following figure will be displayed when the mouse hovers on a particular IP:
Normal use: Refers to whether this IP has been scanned alive within a period
(the default is 30 days, configurable). Online refers to whether there is the
endpoint’s IP in the online user list. If there is, it means the user has used the
endpoint to go online, and it will display the user and group information at the
same time.
Long-offline: Refers to the IP that has been scanned alive before, but after a
certain period (the default is 30 days, configurable, specify the time for long-
offline status through small “i” icon as shown in the figure below) the IP did not
scan to be alive, and it will be defined as offline.
Endpoint Scan is to enable and set the entire network endpoint scan function,
as shown below:
The endpoint list will show the endpoint status only after you check the Enable
endpoint scan function.
SNMP v1/v2: For network equipment, you need to configure SNMP, configure
the corresponding name and community name. The type can be v1 or v2
protocol as shown in the figure:
MAC Address Acquisition: There are two ways to get MAC across layer three.
The first method: acquire the MAC of intranet users through mirroring
(recommended)
Principle: The device will periodically send the SNMP request to the Layer 3
switch to request the MAC table of the switch and save it in the device memory.
At this time, if computers in other network segments of the Layer 3 switch go
online through the device, for example, a PC 192.168.1.2 (not the same
network segment as the device lan port) goes online through the device. The
PC data packet passes through the device, and the device verifies this data
packet is the MAC address of the layer three switch and will not process this
MAC address. The actual MAC address is searched in the memory according to
the IP of 192.168.1.2 to realize the verification of the user's real MAC.
Step 2. Click to enter Access Mgt > Correlation Connection > MAC Address
Acquistion to set and check Enable MAC acquisition across L3 network on the
device interface:
Step 3. Set SNMP Servers to add the information of the Layer 3 switch that
needs to obtain the MAC address:
MAC OID: Fill in the OID corresponding to the MAC in the SNMP information.
Timeout: Set the timeout period for IAG to obtain SNMP information.
Interval: Set how often the IAG sends SNMP requests to obtain information.
Max MAC Addresses: Set the maximum number of SNMP entries obtained
each time.
Click Server Details to view the SNMP information on the SNMP server (the
switch).
Step 4. Fill in the MAC address of the internal network switch to prevent this
part of the MAC from being bound by the user, as shown in the figure:
Step 5. In addition to manually filling in the MAC address of the switch in the
previous step, the device can also automatically discover the MAC address of
the Layer 3 switch. The principle is: count the number of IP addresses
corresponding to the MAC every 10 minutes. If it is the MAC of a layer three
switch, one MAC will correspond to multiple IP addresses.
Click MAC Address Calculation to view the statistical results of each MAC.
3.3.1.3 Users
Users can view username (Alias), group, IP address, MAC address (need to
select manually), endpoint device, Auth method, ingress client, check result,
time logged in/locked, online duration, and operation of all online users
passing the device authentication.
Click Filter to set specified conditions to view the corresponding users. The
page shown in the following figure is displayed.
Endpoint Device: Select All, Mobile Endpoint, PC and PC, and mobile device.
Object: After checking this option, select to enter the specified username, IP
address, and MAC address for filtering in accordance with Username, IP
Address or MAC Address, and click Commit after the settings are completed.
Select one or more users and click Lock to end the network connections of the
selected users. The procedure is as follows:
Step 2. Click Lock in the Operation column. The page shown in the following
figure is displayed.
Step 3. After setting the Lockout Period, click Commit. The status of the locked
user changes, as shown in the following figure.
The administrator can forcibly log out online users, excluding temporary users,
USB Key users, and those that do not require authentication. For example,
suppose the administrator attempts to forcibly log out a temporary user, a USB
KEY user, or a user that does not require authentication. In that case, the
message shown in the following figure will prompt out.
Step 2. Click LogOut. The prompt shown in the following figure is displayed.
View the details to see the specific problem description and troubleshooting
suggestions, as shown in the figure below:
Rule Check checks the compliance status of the endpoint, as shown in the
figure below:
Click on Filter, and you can set the specified condition to view the
corresponding user. The interface is as follows:
Filter can be selected from all, failed, passed, and error, and click Commit after
setting.
At the same time, the upper right corner also supports filtering based on the
rule name and check result, as shown in the figure:
3.3.1.5.1 Network
Solution: Please check whether the network topology changes form a loop.
Please isolate devices of the corresponding IP and perform virus detection on
the device.
ARP Issues
Introduction: ARP issue was detected xx times. There are ARP requests not
replied to or reply errors.
Solution: Please check the operation status and connectivity of the gateway
device.
PPS Issues
Introduction: PPS Overrun was detected xx times, which will cause the failure
of all control and audit functions of the device.
Solution: When the device exceeds the PPS limit, it indicates that the current
device performance is insufficient. It is recommended to split the traffic
passing the device or contact the business channel to use a higher-end
platform device instead.
The line chart can be dragged. Zoom in to show the particular period. The reset
button is on the right side.
Customizable detections:
After the Internet policy is configured, the user matching issues cannot be
detected by engineers. It can only be searched slowly through straight-through
mode, and it is low efficiency. To solve the problems, Sangfor has launched the
"Access Control Troubleshooting" tool.
The tool is to check the match between the user and the Internet access policy.
When the user matching the policy does not meet the actual expectations, the
operation and maintenance personnel or engineers can use this function to
check.
Enter the IP address of the abnormal user in the input box and click Start to
see all the policies that the user matches. Find the issue based on the
comparison with actual expectations and adjust the policies.
You can see the App Category matched, five-tuple of each, whether it is
matched, and whether it is specially released (overall exclusion)
3.3.1.5.3 Authentication
After the LAN user is associated with the authentication policy, the user
matching issues cannot be detected by engineers. It can only be searched
slowly through straight-through mode, and it is low efficiency. You may contact
400 engineers for remote investigation, but it lacks autonomy. To solve the
The tool checks issues during the authentication process. It displays the result
to the console so that the operation and maintenance personnel or engineers
can locate and solve them.
Enter the username/IP address/mac address of the abnormal user in the input
box and click Search, you can see the issue during the authentication process,
follow up prompts and adjust the issued configuration or environment.
Select Enable web access connection monitoring and choose Yes according
to the prompt.
There are three default quality definitions: excellent, good, and poor. Users can
customize the monitoring percentage.
When the number of active users is less than N, the statistic can be
customized. The default is ten users, and you can enter a number between 1
and 100.
When the total time of all-day quality monitoring exceeds N minutes, the
network quality is poor. The default value is 30 minutes, and a number
between 10 and 300 is allowed.
Choose Date: You can check the connection quality in recent weeks.
Move the mouse to the waveform, and a floating box will appear. You can see
the detailed network quality status. When the network quality is poor, you can
click to view and check the slow user list.
The x-coordinate is time, and each coordinate point is five minutes: 00:00,
00:05, 00:10 and shows the user information summary within the previous 5
minutes. For example, if the x-coordinate is 00:05, the coordinate point shows
the summary of 00:00 to 00:05.
The y-coordinate is the number of online users, and it is the sum of users with
excellent network quality and users with the poor network quality.
Move the mouse to the waveform to check the number of users with excellent
and poor network quality at the current time.
Assessment can be used to check the detailed network quality and show you
several reasons for poor network quality:
2. Insufficient bandwidth (If HTTP traffic occupies 90% of the bandwidth for
ten consecutive minutes of the day).
For example: When user A is listed on the slow network list, you can enter the
username or IP address in user-based detection - user or click Select User and
select user from the following group structure:
Terminal page redirection: You can choose to access Baidu to redirect to the
test page or redirect all web access to the test page.
When the user visits www.google.com, they will be redirected to the test page.
After clicking Start, the user will start the detection. There will be a time prompt
during the test.
The Traffic Statistics panel displays traffic information about online users and
applications, status information about Bandwidth Management channels, and
connection monitoring information.
The Top Users by Traffic panel displays the bandwidth usage of online users.
See the following figure.
As shown in the preceding figure, you can rank users by the outbound or
inbound traffic rate. The displayed information includes the username, group,
outbound, inbound traffic rates, bidirectional traffic, number of sessions,
locking status, the button for obtaining the machine name, and traffic details.
In the Lock column, click to restrict a user from Internet access. In the
Obtain column, click Obtain to obtain the computer name of the
corresponding user. In the Top Apps column, click an application to display
the traffic information about the user.
Set the line and application in the Type pane. See the following figure.
Line specifies the line to be viewed, and App Category specifies the application
to be viewed. After setting the line and application, click Commit. The page
shown in the following figure is displayed.
You can set the specific user or IP address in the Objects pane. See the
following figure.
The User Group Filter, Username and IP address option buttons in the Objects
pane are mutually exclusive. Below Group Filter, the slash (/) indicates all
groups. After you click Select, the page shown in the following figure is
displayed.
In the Show pane, you can set the number of displayed users ranked by traffic.
See the following figure.
You can end a user connection by locking the user, and this user cannot access
the Internet within a period. Specifically, select a user in Top Users by Traffic,
click Lock, and set the lockout period in minutes. See the following figure.
To unlock a user, click Unlock Users. The Online Users page is displayed. See
the following figure.
In the user list, select the user to be unlocked and click Unlock.
As shown in the preceding figure, you can filter applications by bandwidth. The
displayed information includes the application type, outbound, and inbound
traffic rates, bidirectional traffic, line, occupied bandwidth in percentage, and
user details about the application. Click a user in the Top User column.
Click Auto Refresh: 5 seconds to set the refresh interval. Click Refresh to
refresh the information immediately.
Click Filter to specify the conditions for filtering applications. See the following
figure.
In the Objects pane, set the line and user group. In Show, set the number of
displayed applications ranked by traffic. Then click Commit.
The Flow Control Status is mainly used to check flow control settings, channel
flow information, etc., provided that the flow control channel has been
enabled. The interface is as follows:
Analysis Method:
2. After completing the channel configuration, you can link to Flow Control
through the Line X of Bandwidth Management-Bandwidth Channel
page.
IT administrators linked to Flow Control can check several core elements first:
Check the flow usage of the uplink and downlink of the line, including the
guaranteed channel and the restricted channel, and support the transfer to the
topN primary channel to evaluate whether the channel occupancy meets
expectations.
Users can check the real-time flow and number of users through Details and
Users can determine the overall status of the channel by checking the current
real-time speed, uplink and downlink usage, number of apps, number of users,
and idle line bandwidth.
If the overall line is idle but the flow usage is high, you can click Settings to
modify the channel configuration.
The IT administrator can directly click on the subchannel in the flow rate details
to view its details or use the left tab to jump to any other subchannel and
check the flow details.
Scenario:
After the Flow Control is enabled, the administrator cannot check the flow
usage in the Enable Bandwidth Management System due to the lack of
visualization. The administrator cannot evaluate the flow control configuration
or adjust the channel configuration to distribute the flow better.
Analysis Method:
If you deploy in bridge mode, you need to configure the Virtual Line Rules first.
Check the flow usage of the uplink and downlink of the whole line. The
administrator can view the 24-hour bandwidth idle condition of the line (the
line bandwidth in the above figure minus the highest point of the area map)
and the Top when the traffic usage ratio is high (guaranteed channel/ limited
channel) channel condition.
The difference between the used bandwidth and the line bandwidth (i.e., the
bandwidth of the current line idle) can be visually seen from the diagram.
For example, the flow usage of the guaranteed channel has been too small,
and the user can check the flow throughput in the guaranteed channel (the
area map of the guaranteed channel/ limited can be clicked to jump to the top
three area map of the corresponding type of channel).
Check the Realtime Rate to view the real-time rate of the channel list. It can be
combined with the line bandwidth usage and real-time usage rate to determine
the specified channel for viewing.
Click to check the channel, and the real-time rate is high. View the throughput
of the primary channel and the user/app ranking.
If you enter the guaranteed bandwidth, you can see the usage information of
the guaranteed bandwidth in the line and provide four reference lines: used
bandwidth, line bandwidth, maximum available bandwidth, latest guaranteed
bandwidth.
After checking the throughput and comparing the bandwidth used, the
administrator can adjust some channel configurations and increase the
bandwidth utilization.
Click Edit Channel, enter the maximum available value, and click OK.
As the business cloudlization, the original LAN app moves to the Internet, or
new Internet services appear. As a result, IT administrators need to protect
new services and face the problem of redistributing bandwidth.
Analysis Method:
The administrator can check the usage of the current channel and the overall
line's idleness to ensure that the new configuration is reasonable.
Status seen from the figure can be decomposed into four parts: 1., 2., 3., 4.:
1. You can see the channel names and the active shows which channel is
in use.
2. You can see instantaneous uplink and downlink rate, channel bandwidth
usage, which applications are using bandwidth (click on the number to
view the specific application), and the number of users in the channel in
use.
3. You can see the real-time or 24-hour uplink and downlink trend in the
trend diagram section in the middle. You can check the three reference
lines to the user: the bandwidth used, line bandwidth, and the maximum
available bandwidth.
For example, this is a limited bandwidth, its speed is limited to 32MB/s, and the
occupied bandwidth is continuously lower than the maximum available
You can also see the topN of user flow ranking and application flow ranking in
the channel.
After the operation above, the IT administrator can quickly guarantee the new
services, check the historical channel congestion Flow Control Status when
the whole line is busy, allocate and adjust the flow, or upgrade the bandwidth.
3.3.1.6.4 Connection
192.168.19.14 and click . As a result, it will display the page shown in the
following figure.
You can view the information about the entered IP address connections,
including the source IP address, destination IP address, protocol, application
type, application name, and direction.
Quota Usage allows you to view the usage of a specified user or quota policy
and execute the reset operation. See the following figure.
Configure and enable Policies -> Web Access -> Quota Policy in advance.
Select query conditions: Support querying in accordance with the quota policy
or the user.
Support resetting: Select a user to be reset, and support resetting daily flow,
resetting monthly flow, and resetting duration.
The link load balancing status can display the current link status (normal, busy,
offline, no data), the TOP5 link bandwidth utilization (outbound, inbound), and
the distribution of policy traffic.
The administrator can also view the real-time information of the link load
balancing policy, including the real-time and cumulative traction of the day.
The administrator can click on any policy name or details to redirect to the
policy details description.
The administrator can display the current business traffic conditions, including
business IP ports, outbound, and inbound flow rates, the number of
connections, users, and specific content can be further viewed by clicking
Details.
You can view the online behaviors, access time, IP address, application type,
application name, and details.
Click Filter to specify the conditions for filtering online behaviors. See the
following figure.
In the Type pane, set the users whose online behaviors are to be viewed. You
can select any of the User Group, Username, and IP address.
In the Objects pane, set the network behaviors to be viewed. The available
options include Search Term, Forum and Microblog, Emails, Outgoing File,
IM Chats, Websites Browsing, and Others.
In Action, set the actions to be viewed. The available options include Reject,
Log, and Alert.
The Locked Users panel displays the users that are recently locked. See the
following figure.
Select a locked user and click Unlock to relieve the user. Click Unlock All to
relieve all users.
Click Filter to specify the punishment conditions. See the following figure.
In the Objects pane, set the users to be filtered. You can select any of the User
Group, Username, and IP address.
Along with the rise of the Internet, more and more software providers offer
SaaS services in the evolution process from Web2.0 to Html5.0 to support the
users' usage of the Internet, bringing convenience but causing the risks of
Shadow IT.
Shadow IT: All applications not involving IT organizations and applications not
covered by IT service management are all in the scope of Shadow IT.
The DHCP Status panel displays the DHCP assignment conditions after DHCP
is enabled.
Users: Infected user is in red, and the user likely infected is in orange.
Security Event: Display Botnet, Malicious URL, Inside Dos Attack, and Virus.
Hot Events: Access to the Sangfor cloud nerve to get top 10 security events. If
the event occurs, the cloud diagram will turn red, and the user can click to
check details.
Information List: You can check the exact user and security event here.
Users: Click on the user name to enter the user tab. You can see the specific
occurrence time, description, data packets, risk information, and details.
Details:
Security Events:
Click the Journal to link to Security Event Details, and check the data packet,
threat information, and details.
3.4 Proxy
The IAG unit can function as a proxy server. By enabling and
configuring this unit as a proxy server in a web browser, internal
users can access the Internet through that unit. Therefore, this unit
Check Enable HTTP Proxy, and then the user can set HTTP proxy and set the
proxy port. Support filling in 5 ports at maximum, which are separated by
commas.
To use PAC script, select the option Use Proxy Auto-Config (PAC)
Script. A PAC script determines whether web browsers choose the
proxy server for fetching a given URL. More specifically, only the access
to the URLs specified in the script will use the proxy.
3.4.2 Proxies
Proxies fall into three categories: HTTTP proxy, SOCKS4 proxy, and
SOCKS5 proxy to meet various requirements. On the Proxies page, you
can perform the following operations: Add, Delete, Enable, Disable,
Move Up and Move Down.
To add an HTTP proxy, click Add, select HTTP Proxy and configure the fields on
the following page:
Object: It allows you to specify the source IP group and destination domain for
Source: Specifies the source IP group that this HTTP proxy applies. The IP
groups specified in Objects > IP Group are selectable. Default is the All group.
Note that if baidu.com is specified as the DST domain, it includes zhidao.baidu.com and
music.baidu.com. If www.baidu.com is specified as the DST domain, the DST domain is
www.baidu.com only.
ICAP server group. For more information about the ICAP server group,
refer to the ICAP Server Groups section in this Chapter.
Proxy IP: Specifies the IP address of the outgoing interface that proxy
data go through. If you select Auto, the proxy IP address will be
automatically chosen. You can also select a specific IP address from
the pull-down list. In the list, there are IP addresses of VLAN interfaces,
WAN interfaces, bridge interfaces, DMZ interfaces, and interfaces for
Single Arm mode (exclusive of IP addresses of LAN interfaces).
If this unit is deployed in Route mode, multiline is supported. If a specific proxy IP address is
selected, a corresponding outgoing line will be chosen. If Auto is selected, the outgoing line
is determined by policy-based routing.
To add a new SOCKS4 proxy, click Add, select SOCKS4 Proxy, and
configure the fields on the following page:
Object: It allows you to specify the source IP group for this SOCKS4 proxy.
Source: Specifies the IP group. Default is the All group. You can also
select one or more IP groups specified in Objects > IP Group.
Options: It allows you to specify action and proxy IP address for this SOCKS4
proxy.
Proxy IP: Specifies the IP address of the outgoing interface that proxy
data go through. If you select Auto, the proxy IP address will be
automatically chosen. You can also select a specific IP address from
the pull-down list. In the list, there are IP addresses of VLAN interfaces,
WAN interfaces, bridge interfaces, DMZ interfaces, and the interfaces
for Single Arm mode (exclusive of IP addresses of LAN interfaces).
To add a new SOCKS5 proxy, click Add, select SOCKS5 Proxy, and
configure the fields on the following page:
Source: Specifies the IP group. Default is the All group. You can also
select one or more IP groups specified in Objects > IP Group.
Options: It allows you to specify action and proxy IP address for this SOCKS5
proxy.
Proxy IP: Specifies the IP address of the outgoing interface that proxy
data go through. If you select Auto, the proxy IP address will be
automatically chosen. You can also select a specific IP address from
the pull-down list. In the list, there are IP addresses of VLAN interfaces,
WAN interface, bridge interfaces, DMZ interfaces, and the interfaces
for Single Arm mode (exclusive of IP addresses of LAN interfaces ).
If none of the proxy services (HTTP proxy, SOCKS4 proxy, and SOCKS5 proxy) is enabled,
there is a prompt on the Proxies page, showing No proxy will take effect, for no proxy
service is enabled.
⚫ Proxy is matched from top to bottom, and only one proxy will be matched
by one connection.
You can configure at most 64 ICAP server groups, and each server group can
contain one or more ICAP servers. In an ICAP server group, servers are selected
in a round-robin, which means the requests are sent to each ICAP server in the
server group by round-robin. An ICAP server is given an unique IP address and
port and must not exist in two different ICAP server groups.
To add a new ICAP server group, click Add and configure the following fields:
Request Type: Options are POST and GET. Users’ requests can be modified on
this unit, but responses from the ICAP server cannot be changed.
You can configure 32 ICAP servers for each ICAP server group and
perform operations against an individual server, such as enable,
disable, delete. The Status column displays the status of individual
ICAP servers, enabled or disabled.
To add an ICAP server, click Add Server and configure the following fields.
Server IP: Specifies the address of this ICAP server. It cannot exceed
96 characters. IPv6 address is supported as well.
Port: Specifies the port of this ICAP server. It should be an integer between 1
and 65535.
Negotiate: Click Negotiate to test the validity of the ICAP server and
negotiate parameters with that server.
required.
3.4.5 Forward
Forward applies to HTTP proxy, HTTPS proxy, and SOCKS proxy. With
the help of Forward, the data destined to a specific IP address and port
can be forwarded to a corresponding IP address and port. Therefore,
when internal users access internal resources through the proxy
server, requests could be forwarded directly to the corresponding LAN
server.
Note that the destination address can be the IP address or domain name, but the forward IP
address can only be an IP address.
Health Check Options: You can specify health check method, L4 health
check, or L7 health check, and action if forward refuses to work, Stop
forwarding data, or Continue forwarding data. HTTP or HTTPS probe
packets are required to perform the L7 health check.
To specify health check interval, click Advanced Settings on the Forward page, as
shown below:
The users on the IAG are classified into three types: local users, AD
domain users, and temporary users. Local users: Users can be
managed and configured on the page displayed after you choose
Users > Local Users > Local Users.
The following introduces how to configure an Internet Access Policy for temporary users.
Network access permission is specified on the Authentication Policy page. As shown in the
following figure, select a group in Add Non-Local/Domain Users to Group. Then the
Internet Access Policy of the specified group will be applied to temporary users.
Local groups/users can manage and configure IAG local user groups
and users and add, delete, batch edit, import, and export, and move
users to the user group.
By default, there will be a built-in group of the device, which is the root
group, this group cannot be deleted, and the group name cannot be
modified. The newly added groups are all subgroups of the root group.
The root group is the first-level group, and the newly added group
under the root group is the second-level group, and so on. The local
group supports up to 16 levels of organizational structure, including
the root group. This design is more in line with the company's
organizational structure and facilitates management. For example:
Add an engineer group under the root group.
Step 1. Select the user group that needs to add a subgroup in the local users
and enter the management interface on the right. Click the Add button in the
member list and select the new type Group.
Step 2. Set the name as Engineer and description information of the group
name list.
Step 3. After the configuration is complete, click Submit, and subgroups can
be added to the member list.
Step 4. After successfully adding a subgroup, you can import user information
belonging to the group under the group or add users.
New users are divided into two categories: ordinary users and multi-
users. Since the device comes with a default policy (password
authentication), the administrator can directly add user information
and access the Internet through password authentication.
Step 2. When the administrator selects Enable this user, fill in the login name
(required), description, display name, mobile phone number, email (not
required, fill in according to requirements), the current group.
Step 3. The administrator sets the user attributes, selects the local password,
and sets the login password. If the user uses an external password for
authentication, there is no need to tick it.
Step 4. The administrator can display the currently configured policies in the
policy list, create new policies or remove policies. In the advanced properties,
you can set the logout window after the password authentication is successful,
allow multiple people to log in with the account simultaneously, and modify the
local password.
If you want to restrict some IP logins, select Restrict login within the
following address range, and then fill in the restrictions required IP address.
The breaches list can display the breach information of the user.
Password must be changed upon the first login: The user must
change the initial password after passing the initial authentication.
When the user is a public account (that is, multiple people are allowed
Step 5. The administrator clicks Add User Binding to bind information such as
IP, MAC.
New user binding: to set the binding relationship between user IP and
MAC. Fill in the description, binding purpose, binding object, and
binding validity period. The binding purpose can select auto
authentication, correlated login with an account, auto authentication,
and correlated login with an account. Fill in the bound IP and MAC in
the binding object.
Step 6. Click Commit to complete the user addition, and the newly created
user will be displayed in the member list.
Step 7. After the creation is successful, you can enter the username and
password through the local password authentication method to authenticate.
Add multiple users allows you to add multiple users at the same time.
However, unlike the newly added users, the Endpoint Binding in the
advanced properties cannot be set when adding multiple users, IP, and
MAC binding. Because this setting is unique, you cannot set it when
adding multiple users.
The attributes and policies of multiple users set by the newly added
users are exactly the same, except for the username. Configure
multiple usernames in the user name list, separated by commas.
When adding multiple users, because the initial passwords of multiple
users are the same, you can set the requirement that the user must
change the password during the first authentication. Other
configurations are the same as Add New User as above.
The IAG obtains domain users from the AD server in real-time. The
organization structure of domain users on the IAG is the same as that
on the AD server. Before obtaining the organization structure on the
AD server, choose Users > External Auth Server and add an AD
server.
On the Members tab page, you can view details about each user group
and user. Domain users differ from local users in that domain users
cannot be edited, moved, or deleted on the IAG.
You can view the Internet access policies associated with AD users and
user groups on the Policies tab page, as shown in the following figure.
The Internet access policies are displayed on the Policies tab page in
the same sequence as the Access Mgt > Policies page. Network
access policies are matched in sequence. To change the sequence,
click Up or Down on the Access Mgt > Policies page.
In the Policies, you can view only the name of Internet access policies,
and you need to click a policy to view the details. The policy result set
provides an easier way for the administrator to view details about
Internet access policies referenced by users and user groups. Click
User binding: When you need to restrict a user name to only log in on
a specific IP or MAC address, and require the bound IP or MAC to be
used only by this user, you need to use the user binding function.
IP/MAC binding: Binding the user's IP address and MAC address can
facilitate the administrator's unified management of intranet users
and realize one-person, one-machine real-name management. In
addition, the IP address and MAC address are bound in two directions.
When the user is authenticated, it will verify whether the user's IP and
MAC comply with the binding relationship. If one item is incorrect, the
authentication will fail. To prevent users from modifying the IP at will
on the intranet.
Manual binding: The administrator can bind the users when adding
users in User Management/Local Users. Please refer to Add New
User section. The user binding configuration instructions are as
follows.
Step 2. Check Enable and set the bound username and description. The
username can add binding relationships to users in the local IAG organizational
structure and add binding relationships to users who are authenticated by a
third-party server. If these users are not added to the IAG's organizational
structure, the binding relationship is still valid as long as the username is
known.
Step 3. Select the binding purpose for auto authentication, including auto
authentication, correlated login with an account, auto authentication, and
Step 4. Set binding object: select whether the user is bound to IP or MAC.
If the administrator does not know the MAC address of the endpoint used by the user when
binding the MAC, click Auto assigned and enter the IP address of the user endpoint to
obtain the MAC address automatically.
Step 5. Set the binding validity period: You can choose to set never to expire
or expiration time.
Example file: You can click to download the sample template and fill
it in according to the prompts and examples.
View user binding error report: You can view the user binding error
report during the authentication process.
binding relationship here. If one of them is wrong, it will not pass the
authentication to prevent users from modifying the IP at will on the
intranet.
When the IAG works with a database or the H3C CAMS system for
authentication, the automatic user synchronization function is used to
synchronize users in the database or CAMS system to the local
organization structure on the IAG.
2. Choose Access Mgt > Users Mgt > User Sync, click Add, and set
synchronization parameters in the displayed Sync User Accounts from
Database window.
Set the policy name and policy description. Select Automatic User
Sync and set the synchronization interval. As shown in the above
figure, the synchronization interval is set to 24 hours.
Click Test Validity to list the information about obtained users and
user groups and the SQL statement execution time.
Access the User Sync page, select a synchronization policy, and click
Delete. After a synchronization policy is deleted, the users and user
groups that are synchronized to the IAG by using this policy remain
unaffected.
Users and user groups in the H3C CAMS system can be automatically
synchronized to the local organization structure on the IAG. You need
to set the synchronization interval.
1. Set information about the H3C CAMS system from which the
information is to be synchronized to the IAG, including the IP address,
port, login username, and login password.
2. Choose Access Mgt > User Mgt > User Sync, click Add, and set
synchronization parameters in the displayed Sync User Accounts from
H3C CAMS Server window.
Set the policy name and policy description. Select Automatic User
Sync and set the synchronization interval. As shown in the above
figure, set the synchronization interval to 24 hours.
In Local Group Path, specify the path for saving the synchronized user
information on the IAG.
Access the User Sync page, select a synchronization policy, and click
Delete. After a synchronization policy is deleted, the users and user
groups that are synchronized to the IAG by using this policy remain
unaffected.
registration.
3.5.1.6.3 Prerequisites
Scenarios:
Add New Field: Define contents, the default value (can be left blank), and
whether the new field is required.
Added To Group: The local user can specify the specific groups.
Advanced: You can set the account expiration. In addition, the account
Access the webpage and redirect to the authentication page. Since there is no
account, click Register at the lower right corner.
After receiving the notifications, the administrator logs in to the device console
to see the account registration and audit information in the approval list:
After the registration is approved, the user uses the registered account
password to authenticate (The quick login is configured, and the authentication
can be completed using the quick login method).
If the registration is rejected, the user uses the registered account password to
authenticate, prompting that the username and password are incorrect.
3.5.1.6.3.1 Scenarios
Open Authentication
Configuration Method:
When approval is not required, the user can directly access the Internet after
typing in the information.
When approval is required, the user needs to wait for the approval result after
typing in the information.
Scenarios
How to Access
1. http://IAGIP/homepage/index.html?_FLAG=1.
For binding the endpoint, only the following page is allowed to view:
Advanced -> User Profile Change -> Allow user to change user profile
One is approval not required, which indicates that the account takes effect
after a successful registration. The other is approval required, which indicates
that the account can take effect only if it is approved by the administrator
having the corresponding group permission.
After logging in to the device, the administrator can view the registration
request submitted by the user in the approval list and select Approve or
Reject. When Approve is selected, the registration request takes effect
immediately; when Reject is selected, the registration request does not take
effect. The user needs to submit the registration request again.
Public API service includes public API and open LDAP API services, and
the device itself provides services.
When a third-party device needs to fetch the relevant data of the IAG
device, it needs to use the API interface to perform it. The interface
type is Restful interface. Please refer to the help document for the use
of the interface.
Shared Secret: To verify the connected devices, the shared key of both
parties must be consistent.
Root Domain: The local users who enable the LDAP service
authentication will exist in the branch IAG through domain users in the
managed authentication scenario.
Port: fill in the port used to open the LDAP service. The default is 389,
which can be customized.
1. The LDAP API service is a public function to open LDAP services to the
outside world. The external user information that supports LDAP
3.5.1.8 Advanced
There are two types of USB Keys. One is a green USB Key to generate
authentication-free users. A user can insert a green USB Key into a PC
and enter the USB Key password to pass authentication on the IAG
Example: Add a privileged USB Key user and demonstrate the login process.
1. On the USB Key User page, click Add. It will display the Add USB Key
User window shown in the following figure.
Set the password that is needed when the user gets authenticated
with a USB Key. In Permissions, select the privileges of the user. For
example, you can select No Audit and No Control.
2. Click Commit. The user information starts writing into the USB Key.
You can also download the USB Key client on the authentication page.
4. After installing the USB Key client, turn on the PC. In the dialog box that is
displayed, enter the password and select Save Password. Then you can
insert a USB Key without entering the password for future login.
5. Click Login. An authentication success message will pop out in the lower
right corner if the entered password is correct.
If Text is selected, you can manually set the attribute value when
editing the user, as shown in the following figure.
If SN is selected, set several sequence values. For example, set the Name to
Gender, set sequence values to Male and Female.
The sequence values can be left blank. Other modules will automatically collect
attribute values.
3.5.2 Authentication
Authentication is an important step for users to access the network.
Only after authentication is completed then the corresponding
policies can be made based on users.
1. Open Auth.
3. SSO.
displayed after you choose Access Mgt > User Management >
Advanced > USB Key User. No authentication policy needs to be
independently set for USB Key users. USB Key authentication has the
highest priority. A USB Key-authenticated user can forcibly log out
another user authenticated in another mode. Suppose an IP address
or MAC address range is prevented from authentication. In that case,
USB Key users cannot be successfully authenticated by using any of
these IP addresses or MAC addresses.
Open Auth
Password-based
1. Choose Access Mgt > Authentication > Web Authentication > Auth
Server and set related server information.
2. The system searches for user tests among local users. If the user exists
and has a local password (Local user database is selected in user
properties), the system checks whether the local password of this user is
correct. If yes, the authentication succeeds. If no, the authentication fails.
3. If the user does not exist in the local user database, but the Local user
database and external authentication server are selected in user
properties, the system will check whether the username and password are
correct on the external authentication server. If multiple external
authentication servers are selected, the system will perform the check on
all selected servers. If any server returns an authentication success
message, the user is authenticated successfully. If no server returns such a
message, the authentication fails.
To sum up, the system performs local authentication first and then external
authentication.
1. Choose Access Mgt > Authentication > Web Authentication > Auth
Server and set related information about the SMS server.
5. Enter the verification code carried in the SMS message and click Log In.
The username displayed on the IAG is the mobile phone number.
⚫ Scan authentication process: A user starts WeChat and scans the QR code
of a store. The authentication page is automatically displayed.
1. Choose Access Mgt > Authentication > Web Authentication > Auth
Server and set related information about the WeChat server.
When the QR code-based approved login is used, the following two points shall
be configured in advance:
The mobile phone user for scanning QR code should be a user checked in QR code-based
approved login server - Approver. Otherwise, the user has no audit permission.
When the QR code registered login is used, the following two points shall be
configured in advance:
3. Set information related to the QR code registered login in Access Mgt >
Authentication > Web Authentication > Auth Server.
The same username and password are used for authentication on the IAG and
the third-party authentication server.
The supported SSO types include AD domain SSO, Radius SSO, proxy SSO,
POP3 SSO, Web SSO, database SSO, and SSO on SANGFOR devices and other
third-party devices Ruijie SAM system, H3C CAMS system, and HTTP/HTTPS
authentication system of CITY HOT. Before performing SSO, perform the
following steps:
1. Choose Access Mgt > Authentication > Web Authentication > Auth
2. Choose Access Mgt > Authentication > Web Authentication > Single
Sign-On and set related SSO information.
Click Add and add an authentication policy, as shown in the following figure.
Select Device: Select all or according to needs. Select the device range for which
the authentication policy takes effect. The applicable range is to set the range of
endpoints and users that match the authentication policy and set the IP, IP
segment, MAC address, or VLAN ID. Users who match these address segments use
the settings in this policy.
Auth Range: Set an applicable object of this authentication policy. The range is
specified through IP address, MAC address, VLAN ID, and key value, and
supports adding description in <>.
Key value: This matching condition is usually used for a PORTAL controller
docking scenario. Example: When executing portal docking, the wireless
controller can carry SSID parameter information. The authentication policy is
specified as "SSID=ztest-wifi" which is an authentication range condition for
authenticating wireless users meeting SSID=ztest-wifi in batch parameters.
KEY=VALUE matching condition is identical with IP, MAC, and VLAN levels, and
has no priority relationship with them.
Set IP, IP range, MAC address, or VLAN ID in Applicable Range, and users
matching these address ranges can be authenticated using the authentication
method in this authentication policy.
In Login Redirection, specify the page the user jumps after being
authenticated using a password. The configuration page is shown in
the following figure.
If a Specified URL is selected, the user will jump to the custom webpage after
authentication.
If both Login successful webpage and Log Out user if the page is
closed are selected, the user will be logged out after the
authentication page is closed.
User Profile: If this option is checked, jump to the User Profile page after user
authentication is successful, and then view personal basics.
1. Choose Access Mgt > Authentication > Web Authentication > Auth
Server and set information about the external authentication server
on which SSO is enabled. This step is not required for some SSO
modes. For details, see section 4.1.
2. Choose Access Mgt > Authentication > Web Authentication > Single
Sign-On and set related SSO information Users that fail SSO can be
handled in any of the following ways:
You can also specify whether authenticated users are added to the
local organization structure as public users or private users.
Click Advanced.
Use this permission before authentication: Set to match the Internet access
permission of a certain group before user authentication.
Forcibly authenticate all HTTP accesses: If this option is selected, all Internet
accesses shall be authenticated before the user authentication. If not, only
HTTP accesses rejected by the group policy need authentication.
Show Terms of Use: Users meeting the Open Auth policy can access
the Internet without authentication. You can select this option so that
a reminder page is displayed before such users access the Internet.
After setting the authentication policy, click Commit to save the settings.
1. Select Test.
2. Click Delete and confirm your operation in the displayed dialog box. The
policy is deleted successfully.
You can edit all attributes of authentication policies except the name
and authentication scope in batches.
Example: Change the Auth Method of test1 and test2 to Open Auth, take
hostname as the username, incorporate new users to the local organization
structure and add them to the engineer group. The procedure is as follows:
Select Add user account to local user database. Then new users are
automatically added to the engineer group, with the computer name as
the username.
3. Click Commit.
During Edit, if only the Auth Method is edited, the follow-up processing policies remain
unchanged after batch editing. Likewise, if only Action information is edited, the Auth
Method remains unchanged.
Click Move Up or Move Down. Or click Move To and set the priority of the
policy.
If there are many authentication policies, you can import them from a
.csv table. As shown in the following figure, click Example File and edit
authentication policies based on the example file format.
Example file: Edit the policy file to be imported based on the example file, click
Import, and select the policy file.
To synchronize data with all LDAP servers, click Sync with all LDAP servers.
When the LAN user uses this authentication method, a verification message
will be sent to the client using an SMS modem, SMS gateway, or SMS platform
connected to the IAG device. The client authenticates accessing the Internet
using the SMS verification code. The SMS-based authentication can be
implemented to add an SMS server in the External Auth Server page and
configuring correct parameters.
Click Restore initial contents to restore the contents of custom SMS into
default value.
Validity Period: Set the validity for no need for repeated login.
In this case, we need to enable the development mode for the public
WeChat platform. Code needs to be deployed on a local or leased
server for responding to all kinds of events. For details about the
deployment description and code, see the example code.
Enable Connect to Wi-Fi via WeChat : This scheme is implemented using the
following two authentication methods:
1. Access endpoint to SSID -> select Connect to Wi-Fi via WeChat on the
browser -> click to pull up WeChat client on the endpoint and click
Connect Now.
2. Link the endpoint to Wi-Fi and scan the QR code downloaded from
WeChat official account. Then the page prompt of Enable Connect to
Wi-Fi via WeChat by single click will be popped up. Follow the WeChat
official account using the endpoint to complete the authentication.
bssid: bassid is the MAC address of any AP in LAN or keeps a default value.
appid: the unique evidence for third-party users. After adding the device on
the WeChat public platform, view the device upgrading information to obtain
appid.
secretkey: the unique evidence for third-party users. After adding the device
on the WeChat public platform, view the device upgrading information to
obtain appsecret.
All users are online by default. Please set Force users to follow our official
account, if official account following is compulsory.
Set Force users to follow our official account: Setting this function is to force
users to follow our official amount when accessing the Internet. After this
function is enabled, the user account will log off automatically after one minute
if the user does not follow the official account.
You can use this function only if the official account has passed the authentication.
appid: the unique evidence for third-party users. After adding the device on
the WeChat public platform, view the device upgrading information to obtain
addid.
appsecret: the unique evidence for third-party users. After adding the device
on the WeChat public platform, view the device upgrading information to
obtain appsecret.
Select Acquire mobile phone number of connecting WeChat users, and fill
in decryption key of the WeChat public platform; click How to Apply Options,
and fill in the information to apply for the decryption key from Tencent, with
the help of Sangfor Technologies.
Validity Period: Set the validity for no need for repeated login, with the value
of 1-100 days.
QR Code Based Approved Login: In the scenario of external guests, they can
access the Internet normally after internal employees' approval. Thus, good
experience is brought for external guests and can be effectively managed by
the internal employees. It is recommended to use the QR code based
approved login method, and the internal employees scan the QR code of each
guest, thus implementing this scenario.
⚫ Guest logs in the name of approver who scans QR code. If there is no need
to collect guest information, select this method to give the guest approver's
permission.
Suppose there is no need to do more operations by the client. In that case, the
internal employees are responsible for filling in the information, and online
users can view specific information of the approver, select this method.
2. The IAG device searches the server via the QR code ID, then reads the
server's settings, and returns the information item for filling in by the user.
3. Fill in the information item on the user side, and commit to login.
Online User Group: After the QR code registered login, the users go online to
obtain the specific group.
QR Code Name: Give the QR code for the conference room a name.
Max Online Users: The number of users in one conference room is limited,
and you can manage the crowd effectively by limiting the joining users.
Validity Period: You can define the validity period of the QR code as No
expiration or Specified expiration time.
Choose System -> System Config -> Advanced -> Notification to enable a real name
authentication function by mobile phone number
Before performing LDAP SSO or using the LDAP server for authentication, add
an LDAP server on the Auth Server page and set related parameters.
After adding the LDAP server, configure it on the following three tab pages:
Basics:
Port: port to which the LDAP server is connected. For example, the
authentication port is 389 in the AD domain.
Search: This option can be selected when the LDAP server supports
Enable encryption: When the LDAP server enables SSL/TLS encryption, the
IAG connection also needs to enable encryption. And the authentication port
needs to be changed after encryption is turned on. When the AD domain uses
SSL encryption, the default is 636.
Verify certificate: Verify the legitimacy of the certificate. If the LDAP server
needs to verify the certificate, configure the domain name, and the IAG can
access the domain name. (Fill in the IP resolved to the domain name in
System/Network/Advanced/Hosts.
BaseDN: start point of the domain search path. This start point
determines the applicable scope of the LDAP rule. If a user is outside
the specified BaseDN, the user cannot get authenticated on the
external server, and the configured policy is ineffective to this user.
Therefore, you can define the jurisdiction areas of different
administrators by using the BaseDN field.
Sync Options:
Advanced:
Auto update of security groups: If this option is selected, the IAG will
request the LDAP server to synchronize required contents in real-time.
It will increase the pressure on the LDAP server. This option is valid
only in the AD domain.
Attribute: This field is valid only when Allow security group nesting
is selected. This field specifies the attribute that identifies a group to
be searched in recursive mode. If Group based is selected, this field
must be set to the same value as Attribute. If User based is selected,
this field must be set to the child group attribute saved by the group
on the LDAP server. For example, the member attribute in the AD
domain identifies the child groups of a group. Therefore, the member
attribute is used to search the child groups of a group.
Paged Search: An extended API is used for search on the LDAP server. The
default setting is recommended.
Page Size: The value 0 indicates that the page size is not limited. The default
setting is recommended.
The global catalog needs to be enabled for all sub-domains on the parent domain. When
adding an LDAP server, the settings are the same as above. Set Authentication Port to
3268 and IP Address to the IP address of the parent domain. See the following figure.
Before using the Radius server for authentication, add a Radius server on the
Auth Server page and set related parameters.
Before performing POP3 SSO, add a POP3 server on the Auth Server
page and set related parameters.
POP3 Server: Set the server IP address, authentication port, and timeout
duration.
Along with the development of the Internet, users require great authentication
scenarios. IAG also supports mainstream applications such as DingTalk,
Enterprise WeChat, Pocket Assistant, Facebook, Twitter, Line, and Gmail, and
authentication is implemented through the OAUTH interface.
Implementation process:
OAUTH protocol provides a safe, open, and simple standard for authorizing
user resources. OAUTH does not enable the third party to access the user's
account information (such as username and password), i.e., a third party can
apply for the authentication of user resources without accessing the user's
username and password.
(A) After the user opens the client, the client requires the user to grant
authentication.
(C) The client uses the authentication obtained in the last step to apply for an
access token from the authentication server.
(E) The client uses the access token to apply for resources from the resource
server.
(F) After confirming that the access token is correct, the resource server agrees
to open the resources to the client.
Note: all screenshots in this chapter will be in Chinese word due to the developer
platform.
Select Apps and Applets, click Create App in Create and fill Access the
Internet in the application name.
Effect Rendering:
PC Effect
https://open.work.weixin.qq.com/wwopen/sso/qrConnect?appid=ww9c6d66e1
5efc420c&agentid=1000002&redirect_uri=http://oauthservice.net/ac_portal/oa
uth_callback.html&state=qywechat-4122d678a7c142fb67d1a20a19751b36
to skip to the QR code scan page and use the mobile Enterprise WeChat to
scan the QR code (the mobile phone does not need to access the network).
After the mobile Enterprise WeChat scans the QR code to pass the
authorization, the current page will be accessed:
Mobile Effect
After the mobile phone accesses the Wi-Fi, open one page on the browser and
redirect to the authorization page; click Enterprise WeChat Authentication to
jump to Login Failed page and complete the authorization in the Enterprise
WeChat client. Manually enter the Enterprise WeChat app, click Workbench on
the lower navigation bar; pull it down to the bottom until Access the Internet
is displayed, and click to complete the authorization. After completion, the user
can access the Internet.
Note: all screenshots in this chapter will be in Chinese word due to the developer
platform.
Enter Access Mobile Apps in App Development, and then click Login.
Create Scan QR code to authorize App login, to obtain appid and appsecret.
3. Effect Rendering
PC Effect
Scan the QR code using mobile DingTalk to log in (the mobile phone does not
need to access the network).
After the mobile DingTalk scans the QR code to complete the authentication,
the current page will be accessed:
Mobile Effect
After the mobile phone accesses the Wi-Fi, open one page on the browser and
redirect to the authorization page; click DingTalk Authentication to wake up
the DingTalk app. After the user logs in through the app, the authentication is
completed.
After the completion of authentication, it will display the list of online users:
The Pocket Assistant does not offer an open developer platform, and please
contact Sangfor after-sale service hotline (beginning with 400) or region to
obtain parameters for authentication.
Authentication Process:
After the user select the authentication method, the page will skip to OA
account based authentication page to complete the authentication.
After the authentication, the authentication platform will call back IAG in
accordance with URL parameters filled into the platform. Then IAG can obtain
the user's authentication information on the third-party platform, enabling the
user to log in on IAG.
Mobile Effect
Different from the other two Apps, the Pocket Assistant app does not need to
be pulled up. When accessing the webpage using the browser, click the Pocket
Assistant authentication icon to skip to the Pocket Assistant Login page; and
enter the mobile phone number and password to complete the authentication.
A lot of websites can be logged in via FaceBook account, Twitter account, and
Google account. These social media accounts are very convenient for users.
Users can log in without registering an account. IAG users also hope to pass
authentication by using their social media accounts. It is very convenient to log
in abroad using the FaceBook account, Twitter account, and Google account.
The requirements of using social media accounts in public Internet scenarios
are met. The device supports the authentication realization of these four social
media accounts, including Facebook, Gmail, Line, and Twitter.
Access Mgt > Authentication > Web Authentication > Auth Server, click
Add and check Social Media Account.
1. Developer Platform
Fill in the Privacy Policy URL: The Privacy Policy URL is required to fill in your
company's homepage. This parameter is not for OAuth authentication. You can
even write an URL that doesn't exist.
Finally, fill in the privacy policy’s URL, then commit all settings.
External Auth Server configuration: just need to fill in AppID and AppSecret.
Access Mgt > Authentication > Web Authentication > Auth Server >Access
Mgt > Authentication > Web Authentication > Authentication Policy >Add
Policy. Fill in Authentication Range, Choose Facebook Authentication
Server that you configured.
3. Authentication process
Fill in the username and password of your Facebook account and click Login:
Authentication finished:
1. Developer Platform
3. Authentication process
After the completion of authentication, it will direct you to the webpage that
you want to browse previously.
1. Developer Platform
Select providers, click Create New Provider, follow the instructions to complete
the provider creation.
Go to the created provider, click create channel, select LINE Login, follow the
instructions to complete the channel creation.
Click to enter the newly created channel, get Channel ID, Channel secret, fill in
appid, appsecret under channel setting, and check LINE Login (NATIVE_APP),
LINE Login (WEB) under App type.
Set the Callback URL under App Setting to copy in the IAG’s web console.
3. Authentication process
After the completion of authentication, it will direct you to the page you want
to access previously.
1. Developer Platform
3. Authentication process
Timeout (sec): Timeout duration for the IAG to request data from the
database server. The default value is 60 seconds. The timeout duration
can be adjusted based on the server load and user quantity.
Click Test Validity to test the connectivity between the IAG and the
database server and the effectiveness of the initial configuration.
Before performing H3C CAMS SSO, add an H3C CAMS server on the Auth
Server page and set related parameters.
Timeout (s): timeout duration for the IAG to connect to the H3C CAMS
system. The timeout duration can be adjusted based on the server
load. We recommend you use the default value of 60 seconds.
Click Test Validity to test the connectivity between the IAG and the server.
The LAN user can select the third-party authentication system servers,
including CAS and OAuth, in the password authentication method.
SSO, proxy SSO, POP3 SSO, Web SSO, database SSO, and SSO on
SANGFOR devices and other third-party devices, such as Ruijie SAM
system, H3C CAMS system, and HTTP/HTTPS authentication system
of CITY HOT. In addition to the basic configuration, you need to
configure the users, authentication server, and Auth Method.
3.5.2.2.3.1 MS AD Domain
You can implement Domain SSO if a Microsoft AD server is deployed for user
management on the customer's network and intranet users log in using
domain accounts. User can access the Internet by logging in to the domain
without the need to get authenticated on the IAG. Domain SSO can be
implemented by:
Step 2. Select Obtain login profile by executing logon script through the
domain.
Step 3. In Shared Key, set the shared key used by the login script to send
information. For details about other configuration operations, see section
4.4.1.1.
Embed an SSO client program ADSSO on the IAG. The program will
periodically obtain login information from the AD server and report
the received information to the IAG for implementing SSO.
Domain DNS Server: Domain name of the domain DNS server. The
domain DNS server must resolve the domain name. Click Resolve
Domain to parse the IP addresses of all domain controllers.
Log eventID: Fill in AD domain event IDs that are separated using commas
Click Test Validity to test the domain controller. Click Commit to save the
settings.
Configure SSO on the IAG as follows: Select Enable Domain SSO. Select Enable
Integrated Windows Authentication.
Domain Name: Name of the domain to which the IAG was added.
Click Test Validity to test whether the parameters are valid. Then click
Commit.
The IWA single sign-on function will be affected by the server signing
requirement enabled in the AD domain. Therefore, if the server
signing requirement is enabled on the AD domain, you need to enable
the encrypt connection with AD domain server at the IWA single
sign-on location.
In this mode, the IAG intercepts data of the PC that logs in to the domain
server and obtains login information from the data, thereby implementing
SSO. No component needs to be installed on the domain server, but the data
of intranet PCs that log in to the domain server needs to be mirrored to the
device.
3.5.2.2.3.2 Radius
You can enable Radius SSO if a Radius server exists and the Radius
authentication and charging packets pass the IAG. An authenticated
user gets online on the IAG by using a Radius username.
Step 2. In RADIUS Server Addresses, enter the IP address of the Radius server.
Step 3. Suppose Radius authentication and charging packets do not pass the
IAG. In that case, a mirrored port needs to be set on the IAG, the authentication
and charging data need to be mirrored to the IAG through the mirrored port.
For details about the mirrored port setting, see section 3.4.2.3.9.
Step 4. Select Read RADIUS attributes and assign value to custom user
attribute. A Radius user has some attribute values, and you can set them on
the IAG. When a Radius user is authenticated, this option needs to be selected
if the user attributes need to be synchronized to the IAG.
Step 6. In Custom User Attribute, set a custom user attribute to which the
read Radius attribute value is assigned.
3.5.2.2.3.3 Proxy
You can use the Proxy SSO if a proxy server is deployed and intranet
users access the Internet using accounts and passwords through the
proxy server. An intranet user is automatically authenticated on the
IAG after being authenticated on the proxy server. A user can access
the Internet after connecting to the proxy server without getting
authenticated on the IAG. Proxy SSO can be implemented through
listening or by executing the specified login control. The configuration
page is shown in the following figure.
3.5.2.2.3.4 POP3
You can use POP3 SSO if a POP3 mail server is deployed and intranet
users log in to the mail server with accounts and passwords. A user
can access the Internet after being authenticated by the POP3 server.
See the following figure.
3.5.2.2.3.5 Web
Suppose the WEB server has been deployed in the user network environment
and the client LAN users have respective accounts and passwords for logging
in to the WEB server. In that case, the LAN users can access the Internet using
a WEB single sign-on (SSO) method after they pass the WEB server's
authentication. The configuration interface is as below:
Enable Web SSO: Enable and disable the Web SSO switch.
Type: Select Cookie value, form submitted using POST and parameter in URL
request, which applies to different Web authentication servers.
Cookie value: After the user's authentication succeeds, the Web server returns
one Cookie value for determining whether the login succeeds or not.
Cookie Name: Fill in the Cookie name returned by the server after the
authentication succeeds.
Form submitted using POST: During Web authentication, this type is needed
when the username is submitted using the POST method.
User Form Name: Fill in the user form name submitted to the server during
Web authentication, supporting a regular expression.
Specified Form Encoding Type: If messy codes appear, try to specify the
encoding type; otherwise, the device will automatically identify the selected
encoding code, no setting is required.
The IAG can work with another IAG to implement authentication. Two
SANGFOR devices are deployed, one for authentication and the other
for audit and control. After a user is authenticated on the
authentication IAG the audit and control, IAG can synchronize the
user information from the authentication IAG for audit and control.
See the following figure.
Forwarding Policy: a policy for setting the appliance to receiving the user
credentials.
Shared Key: a key for encrypting when the user credentials are sent. The
receiving appliance shall be consistent with the sending appliance.
3.5.2.2.3.8 Database
Database Server: Select the database server that you set on the External
Auth Server page.
SQL Statement: Set a select statement that can query online users. The IAG
runs this select statement to query online users in the user information table
of the database.
Sync Interval (sec): maximum duration from the time when a user is
authenticated on the server, to the time when the user is
authenticated on the IAG. The default interval is 30 seconds.
3.5.2.2.3.9 Others
If the login data does not pass the IAG, a mirrored listening port needs
to be set for intercepting login data. Select any idle interface. The
listening port can be set in domain SSO (listening mode), Radius SSO,
POP3 SSO, and web SSO.
For a user that adopts Password-based, the user will be redirected to the
authentication page if the user attempts to access the Internet before
authentication. The authentication page can be customized. The disclaimer
page can also be customized. See the following figure.
Click View to preview the display effects on a computer and a mobile phone.
Click Clone to create a template based on an existing template and edit this
template.
1. Click the name of any page template. The page shown in the following
figure is displayed.
3. Click Background Color, select a color in the upper left corner, and click
OK to save the setting.
4. Click Edit next to Page Content and edit the contents, as shown in the
following figure.
6. Click Edit next to Terms of Use. Edit the disclaimer and set whether
the option The "I have read and agreed Terms of Use" option is
selected by default.
7. Click OK.
The contents on embedded authentication page templates are different from those on
custom templates. The preceding procedure is an example of editing a page with
advertisements and disclaimers and is for reference only.
The page for editing a disclaimer page is shown in the following figure.
3.5.2.3.1 Controllers
Pre-Shared key: The key used for branch IAG access must be consistent with
the connection key of the branch Sangfor device.
Interface: The port used for communication between the IAG authentication
center and the branch Sangfor equipment. The default is 390, which can be
modified. It needs to be consistent with the branch Sangfor equipment
authentication center port.
After the IAG authentication center has completed the configuration, it needs to go to the
branch IAG equipment to configure the managed authentication. Please refer to the
managed authentication chapter. For BBC environment configuration, please refer to the
chapter on multi-branch networking scenarios.
Controller information:
Request URL: After relevant protocols are selected, a URL address will be
automatically generated. When WeChat is enabled to connect WiFi by QR code,
the controller is required to support carrying AUTHURL and EXTEND
parameters in the configuration of the request URL.
Use external RADIUS server: The authentication system combines the third-
party controller for authentication; when the user information is maintained
on the third-party RADIUS server, check this option; when the authentication
system serves as the RADIUS server, do not check this option. Enable the
configuration in Access Mgt > Authentication > Correlation Connection >
RADIUS Auth Server, set the port as 1812, and the key as RADIUS, consistent
with the third-party controller.
IP Address Field: The way to obtain the IP address of the client. The field can
be obtained from the data packet or the URL parameter.
VLAN 1 Field: Field information contained in the data packet of the third-party
controller.
VLAN 2 Field: Field information contained in the data packet of the third-party
controller.
The device can be regarded as the RADIUS server, and the accounting port and
the authentication port use mutually exclusive keys.
Enable: Check Enable to configure the IAG device as the RADIUS server, and
only PAP is supported by default.
There are two ways to acquire MAC across L3. The setting method is as follows:
If intranet users are bound with MAC addresses or the MAC address range is
limited, and the intranet covers L3, the function of obtaining MAC addresses
across L3 needs to be enabled for obtaining MAC addresses of intranet users.
To use this function, ensure that the intranet switch supports SNMP so that the
IAG can obtain real MAC addresses of intranet users from the switch through
SNMP. Working principle: The IAG periodically sends an SNMP request to the
L3 switch to obtain the MAC address table and saves the table in the memory.
Suppose a PC on another network segment accesses the Internet through the
IAG, for example. In that case, a PC with the IP address 192.168.1.2 (on a
different network segment as the LAN interface of the IAG) accesses the
Internet through the IAG will verify whether the MAC address of the packets is
the L3 switch. If yes, the IAG will query and verify the real MAC address based
on the IP address 192.168.1.2.
3. In SNMP Servers, enter the information about the L3 switch from which
the IAG obtains MAC addresses.
Timeout (second): Timeout duration for the IAG to obtain SNMP information.
Interval (sec): Interval for the IAG to send an SNMP request for obtaining
information.
4. Enter the MAC address of the intranet switch to avoid being bound with a
user, as shown in the following figure.
3.5.2.4 Advanced
You can configure authentication options on the page shown in the following
figure.
Select Log out users who causes no fow in specified period to set a timeout
duration for the IAG to log out a user if the user has no traffic within the
specified time.
Select Log out all users every day to set a time for the IAG to log out all online
users.
Select Lock users if authentication attempts reach the threshold for the
IAG to lock a user if the user fails authentication for the specified number of
times.
Log out user who causes no flow in specified period: For users
whose devices are automatically added to the organizational
structure, the login time is detected. If they have not logged in after
the set time, IAG will automatically log out these users.
After Delete accounts inactive for too long a time is selected, the
IAG will detect the login time of users that are automatically added to
the local organization structure. If any user does not log in for a long
time, the IAG will delete this user. Manually created users will not be
deleted.
username must not be the same, New and the current password
must not be the same, Password Strength, or Password must
contain. After all the four options are selected, a user can change the
login password only if all the requirements are met.
Domain Name indicates the domain name of a page to which users are
redirected. Click Device Certificate to import or create an SSL certificate.
Allow user to edit endpoint information: If the endpoint user can change
the information of bound endpoints by oneself, check this function.
When users adopt Password-based open an HTTP web page, they will
be redirected to an authentication page. However, they will not be
redirected if they access an HTTPS webpage. To redirect users when
they access an HTTPS webpage, select the option Redirect HTTPS
request to captive portal if user is not authenticated.
Suppose the proxy server is deployed in one-arm mode and the IAG
is deployed in bridge mode between the intranet and the proxy
server. In that case, public network IP addresses will be added to the
online users list. In this case, Open auth for data flow from WAN to
LAN interface needs to be selected to avoid authenticating public
network IP addresses. For the configuration example, see section 4.4.
a. Authentication policy
b. User binding
c. IP/MAC binding
e. Single sign-on
f. Authentication controller
g. RADIUS Server
4. Under the managed authentication status, the user going online on the
controller does not support synchronously going online on the
authentication system, but the user logged off on the controller can be
synchronously logged off on the authentication system.
6. The managed authentication also supports the scenario taking the control
device as the proxy server, HTTPS proxy, HTTP proxy, and SOCK5 proxy
scenarios.
Access Token: It keeps in line with the secret key for the unified authentication
system settings.
LDAP Service Port: The unified authentication system can be used as an LDAP
server, and takes a TPC389 port as the default port.
Alternate Group (post outage): Use the configuration policy of the outage
policy to authenticate and go online on the user group.
Cancel Enabled and click Commit to prompt the following message. Please
operate carefully.
Configuration process
The idea that the administrator needs to configure the endpoint checking policy:
2. Configure the check policy, including the name of the policy (required),
description information (optional), select the ingress client based on the
checking policy, set applicable objects, and advanced configuration.
The role of the check policy is to check and control the compliance and illegal
outreach of all endpoints. The configuration of the policy is first customized
according to the settings of the check rules. The following are the steps to check
the configuration of the policy.
Step 1. After configuring the check rule settings, create a new policy in Access
Management/Endpoint Check/Check Policy in the navigation menu, click to
enable the policy, and enter the policy name and description information.
Step 3. On the Objects page, select the users for which the policy takes effect.
You can select the objects to be checked according to the user, location,
endpoint type, and destination.
Step 4. On the Advanced page, you can set the expiration time of the policy,
the viewing and editing permission settings of the same level administrator,
and whether to allow lower-level administrators to view it.
The administrator can delete, edit in batches, enable and disable, import/export,
move up/down, etc., all check policies can be filtered and selected.
Check rules are divided into ingress client-based checking. When implementing
the ingress client-based rules, the endpoint needs to install the ingress plug-in.
Step 2. Fill in the rule name and rule description, select the rule type in the
menu, or you can directly enter the custom rule type name in the dialog box to
select the configuration and item to be checked according to the configured
check rule.
Based Rule
Windows2008。
File status: file exists, and the file does not exist.
File Based
Rule Advanced conditions: Set the MD5 value, file size, and update
date of the matching file by the number of days lagging
behind the current date.
execute program
Execution permission
Result check
Fine control
Anti- It is to check the user to change their MAC address and the
Defacement PC IP address.
Rule
Step 3. Configure the violation action and select the corresponding violation
Prohibit surfing the Internet and prompt the user, stop the
Process
process, prompt the user, only record the result, customize
Based Rule
the prompt content.
Patch Based Prompt the user and only record the result.
Rule
1. When configuring the check policy, the added rule type is the name entered in the
check rule type. Therefore, it is recommended that the rule type needs to be filled
in to match the rule for subsequent calls.
2. Operating system check: The patch package requires SP2 or above for Windows XP, and
no other requirements.
3. File inspection: The rules are only used for files with conditions configured at the same
time.
4. Patch package detection: This rule does not support Windows XP, Windows Server 2003
and the operating system versions below it; when checking at the specified level and
detect for the specified patch simultaneously, any violation detected by either method
is a violation.
5. Access check rules: Among them, illegal WIFI and illegal gateways have whitelist
settings.
6. External device control rules: Windows XP system and all family version systems have
no group policy and do not support group policy management and control; refined
control only supports Windows 7 and above, regardless of whether it is home version;
refined control is only for USB interface Storage device: U disk mobile hard disk
portable device.
Step 2. Fill in the rule name and rule description. The rule type can be selected
in the menu, or you can directly enter the name of the custom rule type in the
dialog box. This rule type is to call when adding a rule policy later. The
establishment of the combination rule can choose: establish all the rules and
establish any one of the rules.
Step 3. In combination rule setting, select the rule to be set, and click Add to
add it to the selected rules. If there is no rule to choose from, create an
operating system rule, process rules, file rules, registry rules, scheduled task
rules, patch package detection rules, windows account rules in the endpoint
ingress client-based check rule.
Step 4. Operation after violation: Reject request and alert, give an alert or log
event only. You can also click Prompt Text to customize the prompt content.
The combination rule function only supports operating system rules, process rules, file
rules, registry rules, scheduled task rules, patch package detection rules, and Windows
account rules. Other rules currently do not support the combined ingress rule.
In Endpoint Check/Check Rules, the administrator can delete, batch edit, and
import/export ingress client-based check rules. Combined ingress rules only
support the delete and edit operations.
1. When a rule that a check policy has referenced, you cannot delete it directly; if you need
to delete it, you need to delete the rule referenced in the check policy first.
3. The imported rule file must be in zip format, and the imported file must include the
IngressRuleExport.conf file, and the IngressRuleExport.conf file must be at the outermost
level.
Step 2. Fill in the rule name and rule description. The rule type can be selected
from the menu, or you can directly enter a custom rule type name in the dialog
box.
You can choose to check the anti-software: 360 security guards and anti-virus,
Kingsoft Internet Security, Tinder security software, Tencent Computer
Manager, Xiaohong Umbrella, Kaspersky, Symantec.
The anti-virus that can be selected for detection are: EDR, 360 Tianqing,
Kaspersky, Symantec, and custom enterprise anti-virus.
Step 4. Deal with violations. You can choose: only record the results or
periodically redirect to the specified URL for repair. If you choose to redirect to
the specified URL for repair periodically, you need to configure the redirection
configuration: redirect URL and redirection interval.
When an enterprise only allows employees to use the XP operating system, the
operating system of the access endpoint is checked for compliance, and the
compliant operating system can normally access the Internet. There are three
ways to deal with non-compliant endpoints: reject Internet access and alert,
give alert, and log event only.
Configuration steps:
Step 2. Fill in the rule name, rule type, rule description on the operating
system rules page, and check the corresponding operating system. The
operating system selected here is not in violation, and the operating system
that is not selected is in violation. Take the XP system as an example, only the
XP system is allowed, and the other unchecked systems are all violating
systems.
Step 3. Some methods for illegal operations include: reject the request and
alert, give alert, and log event only. At the same time, click Prompt Text to
customize the prompt content.
Step 4. After completing the check rule settings, create a new policy in Access
Management/Endpoint Check/Check Policy in the navigation menu, enter
the policy name and description information, check the ingress client-based,
and click Add. Select the previously created operating system rule, select the
effective time as needed, and then click OK.
Step 5. On the Objects page, select the users for whom the policy takes effect.
You can choose according to the user, location, endpoint type, and destination.
Step 6. On the Advanced page, you can set the expiration time of the policy,
the viewing and editing permission settings of the same level administrators,
and whether to allow lower-level administrators to view it.
Step 8. When the user is not using the specified operating system, access to
Step 9. The device will pop up a reminder of violation of disobey rules: OS.
⚫ There are two ways to authenticate via ingress client: enable the 802.1X
function of the ingress client and enable the portal authentication function
of the ingress client authentication (automatic online function enabling is
optional).
⚫ Set ingress client uninstall password: Check this option to enable the ingress
client anti-uninstallation function. Uninstalling the ingress requires a
password to complete the uninstallation. The anti-uninstallation takes effect
only after the endpoint successfully obtains the check policy.
⚫ Set ingress client to find gateway address: automatically obtain gateway and
specify gateway address.
When the device is in bypass mode, the device will find the IP automatically. We recommend
you to check the "Set Ingress Client Gateway Address" and fill in the gateway address
manually.
⚫ As the check failed, Internet access is prohibited: After checking, the Internet
access of the endpoint that does not install the ingress client is prohibited.
⚫ Allow Internet access: After checking, the endpoint that does not install the
ingress client is allowed to access the Internet.
1. The ingress client installed by MSI cannot prevent uninstallation and is usually used in
conjunction with domain control push.
2. The EXE package is used for the anti-uninstallation of the ingress client, and it needs to be
used in conjunction with the set ingress client uninstallation password.
Ignore the patches detected by the patch check rules at the specified
level without prompting and network control.
Application includes: Application, Service, Proxy, Search Keyword, File Type, and SaaS
Options
Application: The IAG has an application rule library set for all types of common
network applications and a URL Database set for websites (for details, see sections
3.5.1–3.5.4). The Application module references these rules to implement
permission control on network applications and websites.
Permission control for websites falls into four types: Website Browse, File Upload,
Other Upload, and HTTPS.
In permission control for website browse, the IAG detects the URLs of visited
websites and controls website access behaviors. The URLs are referenced from
the URL groups defined on the page displayed after choosing System > Objects >
URL Database.
The IAG has embedded URL groups. Dedicated personnel collect and classify a
large number of URLs. Embedded URL groups can be referenced. In addition,
custom URL groups can be defined. For details, see section 3.5.4.
In control of file uploading and another uploading, the IAG filters behaviors of
uploading files through HTTP POST or other contents based on URL groups.
HTTPS permission control is about filtering websites visited through HTTPS. Like
permission control for website browse, HTTPS permission control is also
performed based on URL groups defined on the page displayed after choosing
System > Objects > URL Database. They differ in the URL detection mode. When
a user visits a secure website through HTTPS, data is encrypted, and the IAG
cannot detect the URL. Generally, the URL of a secure website is the same as the
address specified in Issued To of an SSL certificate. Therefore, the IAG can detect
this value in the SSL certificate to obtain the URL of the visited security website. To
define the URL of an HTTPS website, set the URL based on the value of Issued To
in the certificate issued by the website.
Service involves detecting the IP address, protocol ID, and port number of packets
to control Internet access data. You can choose System > Objects > URL
Database and define target IP groups, and choose System > Objects > Service
and define target protocols or ports (for details, see section 3.5.6 and 3.5.7). These
defined objects are referenced in port control to control Internet access data.
Proxy includes whether to allow an external HTTP proxy and an external SOCK4/5
proxy, and whether to detect sharing Internet access. To prevent applications
from transmitting data using a standard HTTP port (TCP 80) or SSL port (TCP 443)
to escape restrictions of the IAG, you can select the Not allow other protocols
on standard HTTP or SSL port.
Search Keyword falls into two types: search keyword filtering and HTTP uploading.
In search keyword filtering, the IAG performs filtering or generates alarms based
on search keywords. In HTTP uploading, the IAG performs filtering or generates
alarms based on keywords in HTTP uploading. The referenced keywords are
defined on the page displayed after choosing System > Objects > Keyword Group
(for details, see section 3.5.10). The two types of filtering are aimed at all HTTP
websites and cannot implement keyword-based filtering or alarming for specified
URLs.
In File Type, the IAG can filter files upload or download through HTTP or FTP. The
referenced file types are defined on the page displayed after choosing System >
Objects > File Type Group (for details, see section 3.5.11).
SaaS Options: The configuration documents are provided on this device and are not
repeated in this manual. The corresponding function post in the Sangfor community is as
follows: http://bbs.sangfor.com.cn/forum.php?mod=viewthread&tid=65956
Email involves filtering emails sent and received by clients on the intranet through SMTP or
POP3. The IAG can filter mails by the sending address, recipient address, mail subject, or
text keyword.
If a QQ Whitelist is defined, only QQ numbers in the whitelist can be used, and therefore no
QQ blocking policy needs to be configured. The whitelist function is compatible with both PC
QQ client and mobile QQ client.
The Internet access objects to which Internet access policies can be associated
are listed on the
There are four types of objects: User, Location, Endpoint Device, and
Destination.
1. The four types of objects have the AND relationship. For example, you can select user IT
Department in Users, All in Location, PC in Endpoint Device, and All in Destination. This
policy applies to user tests with the endpoint device PC on the IP address segment at the
R&D headquarters. The object set is displayed on the Selected pane.
2. If any of the four object types are not specified, this type is not used as a filtering
condition. For example, if no location is specified, the location is not a filtering condition.
3. If none of the four object types is specified, this policy is blank. It is not associated with
any user and is not effective to any user.
There are six user types: Local Users, Domain User, Security Group,
Domain Attributes, User Attributes, and Source IP.
Domain User, Security Group, and Domain Attributes are displayed only if
an LDAP server is configured.
In Domain Attributes, you can select users meeting specified attributes on the
LDAP server. On the Domain Attributes page, click Add. In the Add Domain
Attribute dialog box, set attribute conditions. A maximum of five conditions
can be set. The conditions have the AND relationship.
In User Attributes, you can select users meeting specified attributes. On the
User Attributes page, click Add. In the Add User Attributes dialog box, set
attribute conditions. A maximum of five conditions can be set. The conditions
have the AND relationship.
In Source IP, you can select a source IP address range of intranet users.
1.The Users type includes Local Users, Domain User, Security Groups, Domain Attributes,
User Attributes, and source IP addresses. The user types have the OR relationship instead of
the AND relationship. For example, if you select local user A and domain user B, the policy
applies to both users.
2.Domain Users, Security Groups, and Domain Attribute are displayed only if an LDAP
server is configured.
The procedure for adding an Internet Access Policy for a specific object is as
follows: When creating this Internet Access Policy, you can directly add objects
for this policy.
2. Click Object, select an object type and then select a user group or
user.The selected user/user group is displayed on the Selected pane.
3. Click Commit.
The procedure for adding an Internet Access Policy (only local users)
on the User Management page is as follows:
Choose Users > Local Users. Select a user group named Marketing
Click Add. In the Add dialog box, select Access Control for Marketing
Department, and the option Recursive pass down to its subgroups to apply
the Internet Access Policy to child groups. If this option is not selected, this
policy does not apply to child groups. However, it will still apply to member
users of this user group and child groups added later. Click OK.
On the Policies tab page, view the list of policies associated with the user
group. The Pass Down column indicates whether a policy applies to all
member users and child groups.
You can change the Internet Access Policy of a single user on the Online users
page. The procedure is as follows:
Choose Status > Users. On the Members pane, select user test for which an
Internet Access Policy is added or edited.
On the Policies tab page, click Add and select an Internet Access Policy
associated with the selected user.
On the Online Users page, you can edit or modify the Internet Access Policy of a non-
temporary user. If you click the username of a temporary user in the online users list, you
can only view the policy result set of this user. You cannot edit the Internet Access Policy of
the user.
Choose Access Mgt > User Management > Local Users, and you
can view the Internet access policies associated with local users and
domain users. See the following figure.
Click Policies next to a user group. The names of all Internet access
policies associated with the user group are displayed.
Click View Resultant Set to display the policy combination results, as shown in
the following figure.
Choose Status > Users, and you can view the Internet access policies of online
users.
Click the username of a user whose Internet Access Policy is to be viewed. The
page shown in the following figure is displayed.
If the online user is temporary, you can only view the Internet Access
Policy of this user and cannot edit the policy.
1. On the page displayed after you choose Access Mgt > User Management > Local
Users, the location and endpoint attributes are not displayed in the displayed
Internet access policies.
2. On the page displayed after you choose Status > Users, the Internet
Access Policy of the current user matching the current location and
endpoint device is shown.
If the sequence of policies in the Policies is adjusted, the policy sequence on the page
displayed after you choose Users > Policies is changed accordingly.
1. On the Access control page, click Add and choose Access Control.
2. On the Access control page, select Enabled. If this option is not selected,
the added policy will not take effect.
3. Enter the policy name and description. The policy name uniquely identifies
a policy. It is mandatory and must be unique. The description is a summary
of the policy and is optional.
4. On the Option tab page, set the Internet access permission policy as
required. On the Access Control pane, select a control type and set details
on the right pane. Access Control consists of three control modules:
Application, Email, and QQ Whitelist. For more information, see the
following sections.
5. On the Object tab page, set the applicable user, location, endpoint device,
and destination for this policy.
6. On the Advanced tab page, set the expiry date, whether to allow other
administrators of the same level to view and edit the policy, and whether
to allow lower-level administrators to view the policy.
7. Click Commit.
3.6.1.5.1.1.1 Application
A. Application
The IAG has an application rule library set for all types of common network
applications and a URL Database set for websites (for details, see sections
3.5.1–3.5.4). The Application module references these rules to implement
permission control on network applications and websites.
The Application module can detect packet contents to control applications. You
need to set control policies for identified and unidentified applications, such as
P2P applications, QQ, and mail applications.
The Application module can also filter website access behaviors, including
HTTP URL filtering, HTTPS URL filtering, and HTTP uploading filtering.
The following introduces the procedures for configuring Access Control based
on application types and configuring HTTP URL filtering.
3. Return to the Application tab page, set Action to Reject, Schedule to All
Day, and click OK. The policy for rejecting P2P applications is set
successfully. For details about setting the effective time, see section 3.3.6.
4. To modify the Access Control policy, select P2P and click Delete to delete
the policy. You can also select Allow in Action, or select Reject. Click Up or
Down to change the priority of the policy. A policy with a smaller priority
value will be preferentially matched.
By default, the IAG allows access to applications for which no control policy is set.
2. In the Select Application window, find the Visit Web Site type, and select
Internet Banking and Bank Website under Finance.
Office Hours, and click OK. For details about how to set the schedule, see
section 3.5.8. The policy is set successfully.
In control of file uploading and another uploading, the IAG filters behaviors of uploading
files through HTTP POST or other contents based on URL groups.
HTTPS URL filtering involves filtering websites that are visited over
HTTPS. For example, you can configure a policy to prevent intranet
users from accessing the encrypted website https://mail.google.com/.
The procedure for setting a policy to reject access to Gmail all day is as follows:
1. In the URL Database, no URL group is specific for Gmail. Therefore, set
a URL group and add the URL of Gmail before setting the policy.
2. Choose System > Objects > URL Database and click Add. On the Add
URL Category page, enter the URL group name, description, and URL.
In URL, enter the value of Issued To in the SSL certificate issued by the
website. HTTPS URLs support wildcards. Therefore, enter
*.google.com.
3. Select Access Control. Click Add and choose Application. Click below
Application.
4. In the Select Application window, find the Website Access type and
select HTTPS under Gmail.
5. Return to the configuration page, set Action to Reject and Schedule to All
Day and click OK. For details about how to set the effective time, see
section 3.3.8. The policy of preventing access to Gmail all day is set
successfully.
When a user visits a secure website through HTTPS, data is encrypted, and the IAG cannot
detect the URL. Generally, the URL of a secure website is the same as the address specified
in Issued To of an SSL certificate. Therefore, the IAG can detect this value in the SSL
certificate to obtain the URL of the visited security website. To define the URL of an HTTPS
website, set the URL based on the value of Issued To in the certificate issued by the website.
B.Service
1. Select Service. On the Service pane, click Add and set related
parameters. It will refer to the IP groups, network services, and
schedule groups defined earlier. For details, see sections 3.3.6–3.5.9.
2. Select a target IP group from the drop-down list. If the required IP group
does not exist, select Add IP Group at the bottom of the drop-down list to
create it. Click OK.
3. Add IP Group: This item is linked to the page displayed after you choose
Objects > IP Group. In the Edit IP Group dialog box, enter the IP group
name, description, and IP address, and click Commit.
4. Select a service from the drop-down list. If the required service does
not exist, select Add Service at the bottom of the drop-down list to
create it. Click Commit.
5. Add Service: This item is linked to the page displayed after you choose
Objects > Service. In the Add Service dialog box, enter the service name
and port or protocol ID, and click Commit.
7. To modify the port control policy, select the corresponding network service
and click Delete to delete the policy. You can also select Allow in Action or
select Reject. Click Move Up or Move Down to change the priority of the
policy. A policy with a smaller priority value will be preferentially matched.
8. If only port control is required, click Commit. If other types of policies need
to be edited, continue with the procedure.
By default, the IAG allows access to network services for which no control policy is set.
C. Proxy
Proxy control involves controlling behaviors of using HTTP and SOCK proxies
and using other protocols on a standard HTTP or SSL port. See the following
figure.
If Not allow external HTTP proxy is selected, the IAG will reject the requests
sent by intranet users to access the Internet by using an external HTTP proxy
server.
If Not allow external SOCK4/5 proxy is selected, the IAG will reject the
requests sent by intranet users to access the Internet by using a SOCK proxy.
After Not allow other protocols on standard HTTP or SSL port is selected, if
identified/unidentified software conducts communication over a well-known
port (TCP 80 or TCP 443), and the communication contents are in private
protocol format, the IAG will reject the communication information.
D. Search Keyword
Example: Set a policy to reject search requests with the keyword "Job Hunting"
and allow search requests with the keyword "Game" all day. When detecting
search requests with the keyword "Game", the IAG sends an alarm mail to
[email protected]. The IAG prevents uploading data containing
politically sensitive keywords through HTTP.
1. Select Search Keyword. On the Search Keyword pane, click Add and
set related parameters. The Keyword Group and schedule groups
defined earlier are referenced here. For details about defining objects,
see sections 3.5.9 and 3.5.10.
3. Return to the configuration page, select all URL types, and click OK.
4. Set Action to Reject and Schedule to All Day, and click OK. The policy of
rejecting search requests for the keyword Job Hunting all day is set
successfully. Repeat steps 1 to 4 to set a policy to generate alarms for
search requests for the keyword Game.
5. On the HTTP Upload tab page, click Add. Click the drop-down button
below Keyword to display the keyword group list.
7. Return to the configuration page, select all URL types, and click OK.
8. Set Action to Reject and Schedule to All Day, and click OK. The policy of
rejecting uploading requests with political sensitive keywords all day is set
successfully.
10. To set the address of the mail server for sending alarm mails and the
recipient mailbox, choose System > General > Alarm Options > Email
Alarm > SMTP Server.
E. File Type
Web file type filtering comprises two parts: uploading and downloading. You
can set the IAG to filter files uploaded or downloaded over HTTP or FTP.
1. Select File Type. On the File Type pane, click Add and set related
parameters. The File Type Group and schedule groups defined earlier
are referenced here. For details about defining objects, see sections
3.2.9 and 3.2.11. Click the drop-down button below File Type and
choose a keyword group. Select Apply to FTP upload/download as
well.
3. In the File Type drop-down list, select Movie. If the required file type is not
included, select Add File Type Group to create it.
4. Return to the configuration page, set Action to Reject and Schedule to All
Day and click Commit. The policy of rejecting requests to upload film files
to websites or over FTP all day is set successfully.
6. In the Fill Type drop-down list, select Movie. If the required file type is not
included, select Add File Type Group to create it.
7. Return to the configuration page, set Action to Reject and Schedule to All
Day and click OK. The policy of rejecting requests to download film files
from websites or over FTP all day is set successfully.
9. Click OK.
F. SaaS Options
Along with the rise of the Internet, more and more software providers offer
SaaS services in the evolution process from Web2.0 to Html5.0 to support the
users' usage of the Internet, bringing convenience but causing the risks of
Shadow IT.
Shadow IT: All applications not involving IT organizations, and applications not
covered by IT service management are all in the scope of Shadow IT.
SaaS Options
The configuration documents are provided on this device and are not repeated
in this manual. The corresponding function post in the Sangfor community is
as follows:
https://community.sangfor.com/forum.php?mod=viewthread&tid=1488&highli
ght=
3.6.1.5.1.1.2 Email
10. Select Email and set a policy to filter emails sent to a Gmail mailbox or
mails with a .exe attachment.
Source Address: to filter sender addresses of mails. Select Block email sent
from the following addresses/domain only and enter the mail addresses to
be filtered. If the sender of any mail matches any of the listed mail addresses,
the IAG blocks the mail. Select Only allow email sent from the following
addresses/domain and enter the mail addresses to be allowed. If the sender
of any mail matches any of the listed mail addresses, the IAG allows the mail.
See the following figure.
Block outgoing email attached file with the following extension: If this
option is selected, the IAG detects whether a mail to be sent contains an
attachment of the specified type. If yes, the IAG blocks the mail. In this
example, emails containing a .exe attachment are to be filtered. Therefore,
enter .exe.
block mails whose size exceeds the specified value. If Block email if
attachments exceed is selected and the function of detecting the
number of attachments in emails is enabled, the IAG will block mails
whose number of attachments exceeds the specified value.
The configured rules have the OR relationship and are matched from the top down. If any
rule is matched, the IAG performs the specified action. For any conflicts, the first matched
rule prevails.
1. On the Email page, you can enter a complete mail address or a suffix, for
example, [email protected], @abc.com, or abc.com. If abc.com is entered, mails with
abc.com or abc.com.cn will be matched. Enter one mail address in each row.
On the Email page, you can enter a regular expression when setting keywords.
For example, if key.*d is entered, both key and keyword are matched.
If one keyword is entered in each row, keywords in different rows have the OR
relationship. A rule will be matched if any keyword is matched.
2. If multiple keywords separated with a comma (,) are entered in each row, the
keywords have the AND relationship. A rule will be matched if all keywords in a
row are matched.
3. Mail filtering involves filtering emails that are sent through SMTP. This function is
invalid for webmails. To use this function, ensure that mail data passes the IAG.
The standard SMTP port used for sending mails is TCP 25. The mail filtering
function is invalid for mails that are sent over a non-standard port.
5. Before enabling mail filtering, ensure that the IAG can connect to the mail server
correctly. Otherwise, mails cannot be sent.
3.6.1.5.1.1.3 QQ Whitelist
Click Commit.
If a mobile phone number or a mailbox is used as the QQ account, you need to fill in the
account automatically allocated by Tencent, which is a numeric string.
Configuration steps:
Step 1. In Online Activities > Access Control, click Add SSL Decryption, and
click to enable the policy.
Step 2. Fill in the policy name and description information. The policy name is
the only required item, and the description information is not required.
Step 6. Check Reject data transmitted over QUIC protocol, SSL decryption
will not affect QUIC protocol domain names.
Step 7. Click Decryption Exclusion, configure the IP, domain name, and
process that do not require SSL content identification. The three are related to
each other and can be used flexibly.
Step 8. When you need to identify the content of the 25, 465, 143, 993, 587
ports of the mail, you need to enable the mail content recognition.
Step 9. Click Download Root SSL Certificate to download and install the
downloaded root certificate on the computer and eliminate the browser
security alarm caused by enabling SSL content recognition. If you need to stop
the security alarm of the browser in the AD domain environment, click Root
SSL Certificate Distribution via AD Domain, and refer to the configuration
steps in the document for details.
Step 10. After the setting is completed, click the Commit button to complete
the editing of this policy. If you need to edit other types of policies, continue to
select other control types for editing.
SSL content recognition is invalid for financial-related sites such as online banking and
online payment to prevent sensitive financial information from being audited.
You can use an available policy or a built-in policy as a template to add a policy.
If a policy is added using a template, the settings for the template are applied
to the new policy. It facilitates the addition of multiple Internet access policies
that are identical to or similar to each other.
For example, if the Various Internet activities and traffic template is used to
add a policy, all the settings included with the template are copied to the new
policy. You can modify the settings of Policy Name, Description, Policy Setup,
Applicable Group and User, and Advanced Settings.
Suppose the Give view privilege to administrator in lower-level role option is not selected on
the Advanced Settings tab page. In that case, low-level administrators cannot use this
template to add a new policy after logging in to the console.
This function allows you to delete a policy permanently. After it is deleted, the
association between this policy and specified users or user groups is removed.
Step 3. Select the users or user groups to whom the policies are applicable.
Click OK.
1. After users and user groups are selected, the original associations between users
and user groups and the policies are replaced.
high-level administrator can edit the policies in batches. Suppose the organization
structure managed by an administrator covers the organization structure managed by
another administrator at the same level who creates policies. In that case, the former
administrator can edit the policies only when Editing Allowed is selected for
administrators at the same level.
The Enabled state indicates that a policy is available and all the rules
included in the policy are effective when the policy is invoked.
The Disabled state indicates that a policy is unavailable and all the
rules included in the policy are not effective when the policy is
invoked.
Select a policy and click Enable or Disable to set the status of the policy
In the status column, indicates the Disabled state while indicates the Enabled
state.
You can move policies in a list using two methods: 1. Select the
1. The change in this list is applied to the policy lists of users or user groups.
2. The order of policies created by administrators at different levels cannot be changed, and
the priorities of the policies depend on the administrators' priorities. The order of policies
created by administrators at the same level can be changed.
When a policy is imported or exported, the object associated with the policy is imported or
exported as well. If the name of an imported object exists in the IAG, the IAG asks you
whether to replace the object that exists in the IAG.
Choose Online Activities > Advanced > SSL Certificate to check Specified
root certificate. Click Settings button to configure the specified root certificate.
After you return back to the configuration page, Root certificate has been
specified. Click Commit to apply the changes is on the page for further
confirmation.
Click Commit and then confirm to prevent from bringing troubles caused by
misoperation into the endpoint.
After click Yes, Valid is on the SSL Certificate page to prompt the certificate
status.
Click Download Root SSL Certificate to distribute the root certificate to the
endpoint device.
After you return to the configuration page, Root certificate has been
specified. Click Commit to apply the changes is on the page for further
confirmation.
Click Commit and then confirm to prevent from bringing troubles caused by
misoperation into the endpoint.
After click Yes, Valid is on the SSL Certificate page to prompt the certificate
status.
Click Download Server SSL Certificate to distribute the root certificate to the
endpoint device.
After you return to the configuration page, Root certificate has been
specified. Click Commit to apply the changes is on the page for further
confirmation.
Click Commit and then confirm to prevent from bringing troubles caused by
misoperation into the endpoint.
After click Yes, Valid is on the SSL Certificate page to prompt the certificate
status.
Click Download Server SSL Certificate to distribute the root certificate to the
endpoint device.
1. For PC added into the domain, it can be directly used to push and install
the root certificate.
How does the device determine whether the PC client is equipped with the
root certificate?
2. If the root certificate needs inspection, but does not pass the inspection,
redirect to http://x.x.x.x/httpscert/https.htm?
vlanid=xxx&url=xxxxxx&signver=xxxx, to inspect the root certificate.
Whether the root certificate is installed can be determined by judging
whether checkcert.js is loaded.
5. A new root certificate MD5 will be distributed if the root certificate needs
to be switched. When there is traffic from the user, a global root certificate
MD5 will be compared with the user's original root certificate MD5. If both
are not identical, the endpoint passing the inspection will be marked, and
the SSL certificate will be redistributed.
and control.
4. The domain name in the exclusion list will not be used to decrypt SSL
contents.
5. The domain name exclusion list can be used to exclude correctly only if
DNS resolution can be normally performed.
3.7.1 Overview
Bandwidth management is to manage and identify the network
Virtual line: It is used in the bridge mode to divide one physical line
into multiple virtual lines for Bandwidth Management channel
configuration.
A piece of data can match only one traffic control policy. Traffic
channels are matched in descending order. Therefore, channels with
more detailed matching criteria must be placed high in the list. Traffic
sub-channels are also matched in descending order. When a piece of
data matches a parent channel, the policy for the parent channel will
not implement immediately. Instead, the matching continues until a
sub-channel is matched, and the sub-channel does not contain
lower-level matching channels.
Function Description
Advanced It is to set the line idleness threshold and specify whether to enable
busy line protection.
Bandwidth Channel It is to set and manage assurance channels, limitation channels, and
penalty channels.
Edit You can select a channel, click Edit, and edit the channel.
View It is to filter the channel policies of the listed effective lines when
there are multiple lines. You can select all lines or a specific line.
You can click the first icon to expand all channel policies and click the
second icon to collapse all channel policies so that only the level-1
channel policies are displayed. These icons are available when there
are sub-channels.
It is to ensure the proper operation of important applications. You can set the
minimum bandwidth so that data of specified types have bandwidth not lower
than the minimum value even when the line is busy.
Example: A company leases a 10 Mbps line and has 1000 intranet users. The
company ensures that the finance department has at least 2 to 5 Mbps
bandwidth to access online banking websites and send and receive emails
even when the line is busy.
The Line Bandwidth section displays the total bandwidth of all Internet lines.
Click Edit Line Bandwidth. The Edit Line Bandwidth page is displayed.
Click Advanced and set the line idleness threshold and specify whether to
enable busy line protection. See the following figure.
You can select Enable High Bandwidth Usage Threshold to enable the
function and set the upper limits on the upstream and downstream traffic. The
default values are recommended.
If you are not sure about the advanced settings, you can click Recommended Settings to
use the recommended settings.
Scenario
Configuration Steps
Step 1. Enter Bandwidth Mgt > Line Bandwidth edit Line. Set Outbound
and Inbound to 20mbps.
Step 3. Under Bandwidth Channel, click add > Parent Channel, select the
guaranteed channel. Enter channel name. “/” means it is a root channel, and
Under Edit Channel > Channel Type, select Guaranteed Channel. Fill in the
inbound and outbound bandwidth.
Channel: It is used to set the target line, bandwidth channel type, restricted or
guaranteed bandwidth, and the bandwidth that a single user can use.
Target line: It is to select the applicable line of the channel. The channel will be
matched when the data goes through the selected line. There is only one line in
this example, so select Line 1 for Target Line.
Channel Type: Used to select the channel type (guaranteed channel or limited
channel) and define the bandwidth value. In this example, it is necessary to
guarantee the bandwidth for the personnel of the Finance Department to visit
the Internet banking category website and send and receive email data to
ensure at least 2Mbps and not more than 5Mbps. Check Guaranteed Channel,
set Outbound Bandwidth, Inbound Bandwidth, Min, and Max of bandwidth
are 20% and 50% of the total bandwidth. If the total bandwidth is 20Mbps, the
guaranteed bandwidth is 2Mbps, and the maximum bandwidth is 5Mbps.
Priority: Divided into three categories: high, medium, and low, it refers to the
priority of this channel occupying idle bandwidth when other channels are idle.
Max Bandwidth Per User: Used to limit the bandwidth occupied by a single
user matching this channel. In this example, there is no need to limit the
maximum bandwidth of a single user, so do not check here.
Advanced: Take every WAN IP as a channel user so that it can share bandwidth
with LAN users equally and comply with Max Bandwidth Per User (this is often
selected for a server providing external service)
3. Object
Step 1. Select Object in Option, and set the application and target users for
the channel in the Objects column. In this example, bandwidth is guaranteed
for the personnel of the Finance Department to access online banking websites
and send and receive email data, so the applicable applications and applicable
objects need to be customized.
Step 2. Customize the application for the channel. Check Specified in the
Application column. (Checking All Applications means that the channel is
valid for all types of data).
Step 3. Click select to check specific application types. Select the application
type and website type in the pop-up box Select Applications.
In this case, you need to visit the website of the Internet banking category and
the data for sending and receiving emails for bandwidth guarantee, then select
the application here: email/all, online banking/all, visit website/finance/online
payment, visit website/finance/bank website.
Step 4. Customize the channel applicable objects. Check Specific on the right
side of the Object column. (Checking All users means that the channel is valid
for all users).
Step 5. Click the blue font User button and select the specified object in the
pop-up box Objects. In this example, the bandwidth guarantee is required for
all the Finance Department users.
Step 6. Configure the effective period of the channel in the Schedule column.
The administrator can customize the effective period according to the working
hours of the enterprise. Click Add Schedule in the Schedule column to start
customizing the effective period of the strategy and click Add to add the
execution channel time.
Step 7. If the effective channel date is preset, click the Setting button behind
the Date column to add a period or exclude a period. After setting, click the OK
button, and finally click Commit.
If you need to make more specific restrictions on IP, you can customize the IP
address segment. Click Add IP Group in the Destination column. Then
customize the effective IP address segment of the channel under the pop-up
Add IP Group menu.
Step 9. The set channel will appear in Bandwidth Channel. The channel
configuration is complete.
1. When the total percentage of guaranteed bandwidth channels may exceed 100%, when it
exceeds 100%, the minimum bandwidth value of each guaranteed channel will be reduced
proportionally. For example, if we set up two channels, the first guaranteed bandwidth is set
to 30%, the second is set to 90%, the first is actually allocated to 30/(90+30)%, which is 25%,
and the second is actually Allocated to 90/(90+30)%, which is 75%.
2. Priority: When our actual bandwidth is free, the higher the priority, the more free
bandwidth is occupied.
Scenario:
A company leases a 10 Mbps line and has 1000 intranet users. Many
personnel of the marketing department often download files using
tools such as XunLei and P2P download tools, which occupy much
bandwidth and affect the office jobs of other departments. Therefore,
the Bandwidth Management system limits the bandwidth allocated to
the marketing department to download files to 2 Mbps and limits the
bandwidth allocated to each user to download files to 30 Kbps.
Configuration steps:
The Line Bandwidth section displays the total bandwidth of all Internet lines.
Click Edit Line Bandwidth Attributes. The Edit Line Bandwidth page is
displayed.
Click Advanced Settings and set the line idleness threshold, and
specify whether to enable busy line protection. See the following
figure.
To save the
configuration,
click Commit. To
cancel the
configuration,
click Cancel.
If you are not sure about the advanced settings, you can click Recommended Settings to
use the recommended settings.
On the Bandwidth Channel tab page, click Add and choose Add Parent
Channel. The Parent Channel page is displayed.
Enter the name of the channel in the Channel Name text box. The
Home Channel field displays the level of the channel and / indicates
a level-1 channel.
Target Line: It is to select the line applicable to the channel. That is,
the channel is used only when data is transferred through the selected
line. In this example, there is only one line. Therefore, select Line 1.
After the parameters are set, the settings are displayed. See the following
figure.
Click OK.
Step 4. The Bandwidth Channel tab page displays the configured channel.
On the Bandwidth Channel tab page, click Add and choose Add Parent
Channel. The Add Parent Channel page is displayed.
Enter the name of the channel in the Name text box. The Channel
field displays the level of the channel and / indicates a level-1
channel.
In the Channel Editing Menu, choose Channel. The related attributes for
setting the channel are on the right.
Target Line: To select the line applicable to the channel. That is, the
channel is used only when data is transferred through the selected
line. In this example, there is only one line. Therefore, select Line 1.
Maximum
Bandwidth Per User: To limits the bandwidth available to each IP address
using the channel. This example does not involve this limitation. Therefore, do
not select this option.
All Users indicate all intranet users. Specified indicates specified users
and user groups. You can click the links in blue and select objects in the
User-Defined Applicable Object dialog box that appears. In this
example, bandwidth assurance must be implemented for all users in the
finance department. Therefore, select the Finance Department user
group and click Commit.
After the parameters are set, the settings are displayed. See the following
figure.
Step 6. When the settings are saved, a message is displayed. Click Close.
The Bandwidth Channel tab page displays the configured channel. Ensure
that the channel is configured completely.
2. Priority: If some bandwidth is available, the channel with a higher priority can use the
bandwidth first.
Scenario:
A company leases a 10 Mbps line and has 1000 intranet users. The
bandwidth for all the users to send and receive mails must not be
less than 3 Mbps or greater than 5 Mbps, even in peak traffic hours.
Because there are many marketing personnel and sending and
receiving mails is vital to them, the bandwidth for them to send and
receive mails must not be less than 1 Mbps or greater than 2 Mbps
even in peak traffic hours in addition to the preceding assurance. The
bandwidth for each user in the marketing department to send or
receive mails must not exceed 20 Kbps.
Configuration steps:
On the Bandwidth Channel tab page, click Add and choose Add Parent
Channel. The New Add Parent Channel page is displayed.
Enter the name of the channel in the Channel Name text box. The
Home Channel field displays the level of the channel and / indicates
a level-1 channel.
Target Line: To select the line applicable to the channel. That is, the
channel is used only when data is transferred through the selected
line. In this example, there is only one line. Therefore, select Line 1.
options, namely, High, Medium, and Low, which indicate the priority of
allocating bandwidth of other channels to this channel when the other
channels are idle.
Set Applicable Object to All Users, Scheduled to All day, and Destination to
All. After the parameters are set, the settings are displayed. See the following
figure.
Step 4. Close the notification dialog box. The Bandwidth Allocation tab page
displays the configured channel.
Then, set the sub-channel of the created assurance channel to limit the HTTP
application bandwidth for the marketing department. Select HTTP Application
Assurance, click Add, and choose Add Child Channel.
On the Add Child Channel window that appears, set the sub-channel.
Enter the name of the channel in the Channel Name text box. The Home
Channel field displays the level of the channel, and /HTTP /HTTP Application
Assurance indicates a sub-channel.
Target Line is the same as that of the parent channel. It is not set in this
example.
Max bandwidth Per User is used to limit the unbound and outbound speed
per user IP address.
After the parameters are set, the settings are displayed. See the following figure.
Step 6. The Bandwidth Channel tab page displays the configured parent
channel and child channel.
1. The percentages defined by the sub-channel depend on the bandwidth calculated for the
parent channel. The actual traffic for the sub-channel does not exceed the traffic limit of the
parent channel.
3. The applications and objects defined for a sub-channel must be among the applications
and objects defined for its parent channel. Otherwise, the configuration fails.
Because the data is not transferred over the Internet, it does not
require Internet bandwidth control. In this case, an exclusion policy is
implemented for the applications and IP addresses of the servers.
Scenario:
Configuration steps:
You can set the maximum bandwidth of the channel so that traffic
control is implemented on the data transferred through the channel.
The bandwidth used to transfer the data will not be greater than the
maximum bandwidth specified. A penalty channel is similar to a
limitation channel. It works with the user quota policies configured at
Access Mgt > Policies > Add > Quota Control to impose a penalty
on a user who exceeds a quota, by connecting the user through the
penalty channel configured at Quota Control > Online Duration
Quota > Action If Threshold is Reached.
Scenario:
A company leases an 800 Mbps line and has 1000 intranet users.
Many personnel of the marketing department often download files
using tools such as XunLei and P2P download tools, which occupy
much bandwidth and affect the office jobs of other departments.
Therefore, the Bandwidth Management system is to limit the daily
download traffic to 1 GB and the monthly download traffic to 30 GB
for each user in the marketing department. If a user exceeds a quota,
Configuration steps:
The Line Bandwidth section displays the total bandwidth of all Internet lines.
Click Edit Line Bandwidth. The Edit Line Bandwidth page is displayed.
Click Advanced and set the line idleness threshold and specify whether
to enable busy line protection. See the following figure.
If you are not sure about the advanced settings, you can click Recommended Settings to
use the recommended settings.
On the Bandwidth Management tab page, click Add and choose Add Limited
BM Channel. The Add Limited BM Channel page is displayed.
Enter the name of the channel in the Channel Name text box. The
Home Channel field displays the level of the channel and / indicates
a level-1 channel.
Bandwidth Channel Settings: Set the channel type, limited bandwidth, and
per-user bandwidth.
After the parameters are set, the settings are displayed. See the following
figure.
Step 4. The Bandwidth Allocation tab page displays the configured channel.
Step 5. Access the Access Mgt tab page, click Add, and choose Quota
Control.
In this example, the daily download traffic of each user in the marketing
department cannot exceed 1 GB, and the monthly download traffic cannot
exceed 30 GB.
Enter the name of the policy in the Policy Name text box and the description
of the policy in the
Quota Policy: Select the user limitation type and set related parameters. In
this example, the traffic quota for P2P download tools such as XunLei must be
limited for the marketing department. Select Flow Quota and set the
parameters.
You can select the start day of each month within the range of 1 to 28. For
example, if you choose 8, May 8 to June 8 is regarded as one month. Each
month consists of 30 days.
Select Penalty, Add to Traffic Control Channel, and then the Download
Traffic Penalty Channel for Marketing Department policy.
Click Commit.
Quota Policy provides five limitation means, including traffic quota, duration quota, traffic
rate control, concurrent connections control, and online terminal limit. For a detailed
description, see policy management in section 3.4. This section describes the method to
configure a penalty channel and only one type of user quota policy.
Scenario
An enterprise requires that the daily Thunder downloads and P2P downloads
of the marketing department cannot exceed 1G, and the total number of
downloads per month cannot exceed 30G, so configure the traffic quota
strategy as required.
Configuration steps:
Step 1. Click Add of Bandwidth Management > Quota Control and click
Quota Control. In the pop-up Quota Control menu bar, check Enabled, and
fill in the policy name and description information.
Step 2. Check Flow Quota in the Quota Control column and configure the
traffic quota parameters in the Flow Quota column.
In this example, the quota is configured for the Thunder downloads and P2P
downloads of marketing personnel. The quota is up to 1G per day and 30G per
month. Therefore, check the Period column in the Flow Quota Per User
column as all day. You can set the period consistent with the custom time
period configuration method in the traffic channel above. Click Application
and check all P2P applications in the pop-up Select Application. Fill in 1GB for
daily quota and 30GB for monthly quota.
Step 3. In the Action If Threshold is Reached column, you can configure the
following three penalties for users who exceed the duration quota.
⚫ Select to send an alert message by email to notify the administrator that the
user has oversubscribed information (this function requires the IAG to
complete the docking with the company's mailbox system to send the alarm
email normally).
⚫ Select to remind users who are about to exceed or exceed their quota and
inform the user that his time quota is about to be exceeded.
⚫ Choose to add excess users to the penalty channel or prohibit excess users
from surfing the Internet. Suppose you need to penalize oversubscribed
users through a penalty channel. In that case, you need to configure the
penalty channel in Bandwidth Control in advance, and then select Apply
limited BM Channel on the Other action page, and then select the
corresponding penalty. The channel imposes penalties on excess users.
Step 4. In the Quota Control column, click Objects to select the target of the
quota policy to take effect. This example aims to limit the P2P downloads of
marketing personnel, so select marketing personnel in the applicable objects.
Step 5. Click the Advanced menu bar in the Quota Control column.
Advanced configuration includes Expiry Date, Privilege of Admin in Same
Role, Give view privilege to administrator in lower-level role.
Step 6. After completing the configuration, the quota policy just configured
will be displayed in the quota control list.
Duration quota is to limit the online time of a single user during the effective
period of the policy. When a user’s application time or online time exceeds the
limit during the policy's effective period, the user will be prohibited from going
online or calling the penalty channel for corresponding punishment. There are
two types of duration: application duration quota and online duration quota.
Users can select the corresponding quota type according to their needs.
Application Quota
Step 1. Check Application in the Daily Duration Quota Per User column on
the Online Duration Quota interface. In the Duration column, you can
customize the quota period according to the needs of the enterprise.
Step 2. In the Application column, you can select the applications that require
quotas according to the needs of the enterprise, or you can select all
applications and then set the whitelist application in the Excluded
Application.
Step 4. On the pop-up Excluded Application page, click Select under the
Specified column, and select the application to be excluded in the pop-up
interface or fill in the port of the corresponding application in Excluded Port.
Step 5. In the Online Duration Quota column, you can configure a single
user's online duration configuration, the unit is minute, and the maximum
setting is 1440 minutes (24 hours).
Online Duration
The following three punishment measures can be configured for users who
exceed the time limit in the Action If Threshold is Reached column.
⚫ Select to send an alert message by email to notify the administrator that the
user has oversubscribed information.
⚫ Select to remind users who are about to exceed or exceed their quota and
inform the user that his time quota is about to be exceeded.
3.7.4.3 Bandwidth
The bandwidth limit is to detect the flow rate of a single user during
the effective period of the policy. When the total bandwidth (upstream
or downstream flow) of all applications (specific applications) of the
user during the effective period of the policy, continues to exceed the
set flow threshold for how many minutes, this user will be prohibited
from surfing the Internet or calling the punishment channel for
corresponding punishment.
Configuration steps:
Step 1. In the Period column in the Bandwidth Per User column of the
Bandwidth interface, customize the limitation period according to the needs
of the enterprise.
Step 3. In the Type column, you can select the type of traffic detected by the
strategy. You can choose the flow rate of inbound traffic, outbound traffic or
bidirectional.
Step 4. Fill in the flow rate threshold for policy detection in the Max
Bandwidth column and fill in the time required in the Above Threshold For
column. For example, if an enterprise wants to limit users whose total traffic
exceeds 2Mbps for 30 minutes, fill in 2Mbps in the Max Bandwidth column
and 30 minutes in the Above Threshold For.
As shown in the following figure, there is only one default virtual line: line 1. If
no other line is configured, line 1 must be the total bandwidth of all the
physical lines if multiple Internet lines connected to the front-end device or the
local device are configured with various egresses in multi-bridge mode.
However, the IAG cannot control the traffic of multiple Internet lines separately
in this case.
Scenario
The IAG is deployed in bridge mode, as shown in the following figure. The
firewall has two egresses, including one 10 Mbps line from China Telecom and
one 10 Mbps line from China Unicom. The P2P traffic of the lines must be
controlled separately so that the P2P traffic of each line does not exceed 20%
of the bandwidth.
Configuration Steps
Choose Bandwidth Management > Line Bandwidth, click Line 1, and set the
bandwidth value of the line
Assume that line 1 in this example corresponds to the line from China
Telecom. The following figure shows the configuration for line 1.
Choose Bandwidth Management > Line Bandwidth, click Add, and set the
bandwidth value of line 2. Assume that line 2 in this example corresponds to
the line from China Unicom. The following figure shows the configuration for
line 2.
The rules help distribute data between the virtual lines and
correspond the virtual lines with the physical lines. Generally, the
front-end device has route selection rules. You can copy the route
settings of the front-end device to the virtual line rules. Refer to the
firewall route selection settings shown in the following figure and set
the virtual line rules.
Choose Bandwidth Management > Line Bandwidth > Virtual Line List and
click Add. On the Edit Virtual Line Rule page that appears, select virtual line 1
for the data transferred to the IP addresses 202.96.0.0/24 through the line
from China Telecom.
Specify Line: To specify the virtual line destination of the data that
meets the preceding criteria.
Step 3. Set rules for the other virtual lines until the virtual line rules are the
same as the line rules of the firewall.
Step 4. Control the P2P traffic of the two virtual lines separately.
Choose Bandwidth Management > Line Bandwidth and set the limitation
channel policy of line 1.
On the Bandwidth Channel tab page, click Add and choose Add Parent
Channel. The Add Parent Channel page is displayed.
Set the effective line, channel type, limited or assured bandwidth, and per-user
bandwidth. Set traffic control for line 1 (line from China Telecom). Set Target
Line to Line 1.
Step 5. Control the P2P traffic of the two virtual lines separately.
Use the method for setting the limitation channel policy of line 1 to
set the limitation channel policy of line 2.
Step 6. The Bandwidth Channel tab page displays the configured channels.
The limitation channel configuration is complete.
Example: The device serves as a bridge, and the firewall is equipped with two
ports, covering the international and local lines. The policy-based routing
enables international line traffic to go through the international line with the
bandwidth of 3 Mb/s and local line traffic to go through the local line with 7
Mb/s. It is required that P2P data going through the two lines are subject to
traffic control, so that respective bandwidths of P2P data occupied on the two
lines do not exceed 10%, and the region is China.
Choose Bandwidth Management -> Virtual Lines -> Create a virtual line
named as International, with the outbound and inbound width of 3M, and a
virtual line named as Local, with the outbound and inbound width of 7M.
Choose Bandwidth Management -> Virtual Line Rule -> Create two virtual
line rules, one of the WAN IP’s rule selects Overseas to specify the
international line, and the other one selects Local to specify the local line.
Choose Bandwidth Management -> Channel -> Enable the traffic control
switch to create a new channel. Select International as the target line, and set
the limited bandwidth.
Bandwidth Usage Range: To set what types of data will be matched to this
channel, i.e., the usage range of channel. Click Select custom application, and
select application type in a pop-up box Custom Applicable Services and
Applications. In this example, P2P-related data needs to be subject to traffic
control, and applications including P2P/All, and P2P Steam Media/All should
be selected. Click OK to complete the settings of applicable applications.
Objects: To set users, user group, and IP addresses to which this channel is
effective; checking All indicates that the channel is effective to all LAN users;
after selecting the Objects, click OK to complete the settings.
Step 5. Perform traffic control on application data of P2P on two virtual lines.
Set the limited channel policy of line 2 (local line) using a method similar to that
in the international line, which is not repeated here.
Step 6. After the settings are completed, set channels will be displayed in the
Bandwidth Channel, indicating that the configuration of the limited channel is
complete.
2. Virtual line rules can be configured in batches to select lines based on destination IP
addresses and bridges. On the Virtual Line Rules page, click Batch Import and set rules.
When multiple Internet links are deployed in the network, most users will be
assigned to the same link because all LAN users write the DNS server of a
particular ISP. As a result, the link always remains in a busy state, which results
in a situation where the access speed of users on this link slows down while
the other link stays in an idle state. The uneven utilization of links leads to a
waste of Internet resources and cannot guarantee the access speed of users.
With the DNS server transparent proxy of Sangfor's Internet access control,
regardless of the ISP to which users' DNS server addresses, the DNS server
requests can be forwarded by Sangfor's Internet access control device and
returned to LAN PCs via a proper DNS server. In this respect, based on the
preset load algorithm, traffic can be assigned to various links according to the
configured link utilization policy. It makes the traffic on both links in the users'
network always meet the administrator's expectation and ensures the
utilization of all links.
1. The specified line displays the networking interface in the routing mode and the virtual
line in the bridge mode.
2. In the redirect to specified line policy, lines that are not configured with DNS server are
not available, and a message displays that only lines configured with DNS server can be
selected.
Specific configuration
Select "Redirect to DNS Server" for Proxy Action and enter the DNS address
to be resolved
Configure an ineffective DNS server for the destination DNS server; configure
an ineffective DNS server for the tested PC.
2. Redirect the access to specified domain names to the specified IP, which is
mandatory.
Specific configuration
For all users, define the access domain name as "www.qq.com" and the
destination DNS server of the tested user PC's DNS as "All".
Select Resolve to IP address for Proxy Action and enter the IP address to be
resolved.
Specific configuration
For all users, define the access domain name as "www.sangfor.com.cn" and the
destination DNS server of the tested user PC's DNS as "All".
4. Redirect the access to specified domain names to the specified line, which
is mandatory.
Specific configuration
1. Configure DNS Server to enable DNS server for the line (virtual line).
For all users, define the access domain name as "www.sina.com.cn" and the
destination DNS server of the tested user PC's DNS as "All".
Select Redirect to specified line for Proxy Action and enter the networking
interface of the specified line.
Only lines configured with DNS server and DSCP/TOS value can be selected,
and this function does not take effect when link load is not enabled.
The two scenarios of Redirect to DNS Server and Forward to Specified Line
of the DNS proxy provide escape mechanisms. When a particular line is broken,
the DNS proxy policy becomes invalid.
⚫ The link load is not enabled and directly uses the default route.
⚫ The link load is enabled, and the load strategy is adopted; if the load is also
abnormal, the default route is adopted.
⚫ The new default route page supports adjusting the default route order.
⚫ The default route failover mechanism based on line failure detection (DNS
and ping).
3.7.6.6 Precautions
1. The scenario of redirecting to LAN DNS server: The DNS proxy action
redirects to the DNS server in the LAN (DNS server is in the DMZ zone).
Outcomes
Redirection to DNS server in the LAN fails (if the user's PC is configured with an
effective DNS server, use the own DNS server; an ineffective DNS server will
result in network disconnection).
Solution
Configure DNS server to Drop packet. After adding the domain name to global
exclusion, the Drop packet of DNS server proxy stop being effective.
3. In the bridge mode, DNS detection detects by sending a package from the
DMZ interface. The deployment scenario should ensure that the package
sent from the DMZ interface can reach the port.
IAG traffic routing supports improving users' bandwidth usage via traffic
optimization functions, such as IP address, protocol, user routing, application
routing, bridge scenario routing, and DNS proxy.
It also supports setting the diversion range in accordance with factors including
endpoint user group, Internet access application, access domain name, source
IP address range, destination IP address range, transmission protocol, and IP
layer DSCP/TOS marking, and supports multiple load methods including
dynamic load (high-priority lines preferred), specified lines, load based on
carrier, load based on line bandwidth, load based on residual bandwidth and
lease line backup based on VPN, to improve the diversion effect.
The Sangfor Internet access control adopts the application routing technology
to implement an allocation mechanism to allocate the links based on factors
including load situations of links, time range, user group, and access objects,
and accessed application types to improve the optimized usage links further.
The Sangfor Internet access control adopts the dynamic diversion technology.
When the high-quality line is idle, other users and traffic also can go through it.
When the line is busy, the traffic of non-important applications and non-
important users will be diverted. The high-quality line guarantees the Internet
access experience of the core users and core applications.
The routing mode and bridge mode support link load balancing, DSCP, and
TOS marking.
Default load policy priority: Disable the default load policy, and prefer to use
the line with the highest usage priority, the load based on carrier,
AD devices are deployed on multiple lines of the unit port, and the IAG bridge
model is serially deployed to realize linkage with port devices to implement
routing. The "important applications" go through line 1, and non-working
applications such as games go through line 2.
Implementation Method
The IAG device is configured with link load balancing to specify that the line AD
and IAG device use the TOS tags to mark the lines simultaneously.
Test Topology
Deployment of the bridge mode of the IAG device: There are two WAN lines, in
which line 1 is the ISP1 (with the bandwidth of 800M), and line 2 is the ISP2
(with the bandwidth of 500M).
Prerequisites
Configuration Method
Under Bandwidth Mgt > Link Load Balancing > Add > Add Preferred Link
Load Balancing Policy. The TOS value in the virtual lines should be defined
and keep in line with AD.
Configuration Results.
Scenario
The client's branch uses IAG on the prefectural-municipal port, and employees
in the branch need to access the LAN applications in the provincial branch’s
intranet. The IAG in the branch and the port device in the provincial branch
(the headquarters) are connected to VPN; meanwhile, the branch and the
provincial branch also are connected to the lease line. When the lease line is
normal, the branch should access the applications in the provincial branch
using this line. When the lease line is disconnected, it is automatically switched
to a VPN line.
Implementation Method
The IAG is equipped with link load balancing, it will go through a lease line by
default and switch to VPN when the lease line is abnormal.
Test Topology
Configuration of device route mode: There are two WAN lines, one connects
the VPN and the other one connects to the headquarters as the lease line.
Prerequisites
1. The IAG is equipped with two WAN lines at least, one is connects the VPN,
and the other is used to connect the lease line.
3. Confirm whether the VPN device in the headquarters is our VPN device or a
third-party VPN device. If the VPN device is the former, the headquarters
should create a VPN account in advance for the connection of branch VPN;
if it is the latter, we should know parameters related to connection from
stage 1 to stage 2 of the third-party VPN.
Expected Result
When the lease line and VPN are connected normally, the branch preferentially
goes through the lease line to access the applications in the headquarters and
switches to the VPN line when the lease line is disconnected.
Configuration Method
three-layer switch of LAN. The static route is not required because the LAN
is a two-tier environment in this environment.
After the configuration is complete, the VPN connection is successful. Then you
can see the VPN connection is successful. The route of the network segment of
the headquarters LAN directs to the VPNTUN port.
VPN device of a third party, rather than Sangfor, used by the headquarters is also
supported. However, the third-party connection shall be configured for VPN configuration.
Moreover, if the headquarters' VPN device or network is to support the lease line for branch
LAN's access to headquarters applications, the backhaul from the headquarters to the
branch LAN should use the lease line. If the branch LAN access headquarters' applications
via the VPN, the backhaul should use the VPN.
1. Configure the IP groups in the LAN and of the headquarters for branch
IAG.
3. In Link Load, perform link failure detection for the two WAN lines.
In terms of link failure detection, two link state detection options are available: DNS
resolution and ping command, which you can choose at your disposal.
Disconnection detected by either the ping command or DNS server means that the line is
not connected.
You can enter multiple addresses for the ping or DNS server, and if anyone from these
addresses successfully connected, it means that the line can be connected.
Auto Detect indicates whether automatic detection is enabled. If not, the network is
deemed connected as long as the networking interface has power.
1. Static route: The IAG LAN is a two-tier environment without static routes.
2. VPN configuration: Configure the addresses and ports for monitoring the
server-side with the headquarters VPN and create an account.
⚫ Define IP groups
1. The headquarters device can be a VPN device of Sangfor or a third party. The private
branch line can connect to the headquarters via either the headquarters' VPN device or
other devices in the headquarters LAN. However, the headquarters should ensure that the
backhaul from the headquarters uses the lease line if the branch LAN data access
headquarters applications via the lease line, and the same goes to VPN. The headquarters
should have relevant Link Load Balancing or routing rules configured.
2. Headquarter accessing to branch LAN can use the lease line preferentially and, if it is
disconnected, use the VPN line, after the routing policy is configured at the headquarters.
Testing
1. Normally, the IAG LAN tests applications in the headquarters LAN via the
lease line, and there should not be traffic on the IAG VPN.
2. Unplug the lease line for the WAN line on the eth1 port, and the data
should switch to VPN. Data can be found on the VPN.
Distinct applications for the unplugging-and-switch testing are recommended. For example,
test http://172.18.1.10 when the lease line is in a normal state and test other servers'
applications when the lease line is disconnected. Disconnect the application before
beginning a new test, if the same application is used for the unplugging-and-switch testing.
The client's IAG has two WAN lines, one belonging to Line 1 and the other
belongs to Line 2. The LAN data shall access the Line 1 network via Line 2 or
access the Line 1 network via the Line 2.
Solution: Link Load policy, specifies the LAN Src IPs' lines based on the
destination IPs.
Prefer the line with the highest priority: When there are multiple lines, the
device presents the status of each line. According to line status, the
administrator defines their priority and uses the line with higher priority
preferentially; when the traffic is heavy, configuration to ensure services for
preferred users is supported, and non-core applications shall be taken away.
Based on dst ISP: load the traffic to the corresponding ISP's line according to
the ISP to which a destination IP belongs. It requires the administrator to
define the DNS server of each line. Traffic requested by DNS servers supports
an independent definition of the loading method.
Even load assignment: All links have equal chances of load assignment and
are selected sequentially.
Weighted Round Robin: select all links based on weight proportion, which
means that those with more significant weight proportion have greater
chances of being selected and vice versa. The weight proportion is based on
the line bandwidth.
Prefer the link at top: Support link backup. Suppose there are links 1, 2, and
3, and select the first remaining link as the port. Only the preferred load policy
supports this routing method.
Load exclusion policy: The default load policy is unique and supports the
exclusion of lines with the load.
In Bandwidth Mgt, you can click View to enter the line visualization state to
view the current usage.
3.7.7.6 Precautions
1. Routing mode, link load routing, DNS server proxy, default routing
function, and visible loaded link state.
2. Bridge mode, link load routing, DNS server proxy, and visible loaded link
state.
3. DNS server proxy is not supported for IAG in proxy mode. When IAG is in
the proxy mode, DNS server requests are initiated by the local ADC proxy,
and the DNS server proxy cannot serve as the proxy of the packages of the
local ADC.
4. When IAG is in proxy mode, routing for ISP load based on DNS server load
is not supported. In essence, routing for ISP load based on DNS server load
requires a proxy for DNS server; when IAG is in the proxy mode, DNS
requests are initiated by the local ADC rather than the drive.
5. When IAG is in the proxy mode, application routing is not supported (TCP
proxy is not supported, and the effect cannot be reached.).
7. When global exclusion and pass-through are enabled, the link load
function will not have package loss, and the function still takes effect.
9. When IAG is in proxy mode or SSL decoding is enabled, link load is not
supported.
11. Priority in the routing mode: pass-through route > static route >
dynamic route > DNS serve proxy (Redirect to specified line) >
preferred load policy > default load policy > default route. (when the
VPN is not configured and neither the lease line backup)
12. Pass-through route > static route > dynamic route > DNS serve proxy
(Redirect to the specified line) > preferred load policy > default load
policy > default route > system default route.
13. VPN route > pass-through route > static route > dynamic route > DNS
serve proxy (Redirect to the specified line) > preferred load policy >
default load policy > default route > system default route.
14. Priority in the bridge mode: DNS serve proxy (Redirect to the specified
15. DNS server proxy action only conflicts with link load policy when
configuring redirection to the specified line. When the tow policies conflict
configuration, DNS server proxy action has higher priority, and the
redirected line to which it redirects prevails.
16. In LAN - IAG (bridge) - proxy server - F5 scenario, the link load function is
not supported
17. When there are several WAN lines for link load configuration, it is required
to configure the link failure detection function. Otherwise, the link load
policy cannot take effect after configuration.
can allow the function SN of content audit to record all the content
during auditing.
Step 1. Click Add and choose Audit Policy. The page for editing the Audit
Policy is displayed.
If you do not select this checkbox, the configured policy does not take effect.
Step 3. Specify Name and Description. The policy name is the unique
identifier of the policy. It cannot be the same as an existing one and is
Step 4. On the Audit Policy page, set the Audit Policy as required. On the
Audit Policy page, choose the desired audit type, and set the policy details on
the right. Internet access behavior audit policies include Application,
Flow/Online Duration, and Webpage Content. (For more information about
these three types of audit modules, see the subsequent chapters.)
Step 5. Set Object. The configured policy applies to the selected user groups
and users.
Step 6. Specify Advanced. You can set Expiry Date, View, and Edit in Privilege
of Admin in Same Role, and Give view privilege to administrator in lower-level
role.
HTTP Data Outgoing: You can select Web-based BBS posting to record
intranet users’ behavior of visiting and posting on web BBSs. The log records
the posting information except for the post subjects and content. You can
select Web Mail contents to record intranet users’ behavior of sending mails
through webpages. The log records the mail information except for the mail
subjects and content. You can select Web-based attachment upload
(including WebMail) to audit file names of attachments uploaded over
webpages. To audit attachments of webmails, select this checkbox. You can
select Web-based text upload to record behaviors of uploading text over
HTTP. If this checkbox is selected, there will be a large number of logs.
Therefore, you are recommended to select Web-based BBS posting and Web
Mail contents instead. You can select Microblogging contents to record
intranet users’ behavior of posting microblogs through the Microblog desktop
client and web browser. The microblog subjects and content are not recorded.
To audit the file names of image and video attachments posted on microblogs,
select Include microblog attachment (such as image, video and music).
You can also set the level of URL record details at Access Mgt > Advanced >
Logging. For more information, see Section 3.7.2.1.
Email: It is used to audit intranet users' attempts to send and receive mails using
the mail client. You can select Outgoing email (SMTP) to audit intranet users'
attempts to send mails. In this case, mail information excluding subjects and
bodies is logged. You can select Incoming email (POP3/IMAP) to record
intranet users' attempts to receive emails. In this case, email information
excluding subjects and bodies is logged.
The email receiving protocol and email sending protocol must be POP3/IMAP and SMTP.
Application: To audit intranet users' Internet access behaviors. You can select
Access to other applications (exclusive of contents) to audit the identifiable
Internet access behaviors. You can also select Access to unidentified
applications (on which address and port. It incurs massive logs) to audit
the Internet access behaviors that the IAG cannot identify. If this option is
selected, the IAG records destination IP addresses and port numbers using a
large number of logs. By default, this option is not selected, and you are
recommended to use the default setting.
To audit users' content, enable content audit SNs. Then, the outgoing
HTTP packets, website visits or downloads, emails, IM content, FTP
content, TELNET content, and Internet access behaviors are audited.
Example: Configure a policy for auditing web BBS post content, text,
and images sent using microblogs, webmails and attachments, users'
webpage access attempts, names of files downloaded from websites,
and various types of identified Internet access behaviors.
Step 1. Select Access Audit, and the Access Audit page is on the right. Click
Add and then the button below Item. In the Select Item window that appears,
select the objects to be audited.
Step 2. The Select Item window includes the HTTP Data Outgoing, Website
Browsing/Downloads, Email, IM, FTP, Telnet, and Application menu items.
You can click the menu items to go to the corresponding configuration
modules.
Step 3. Outgoing HTTP Packets: You can select Web-based BBS posting to
audit the content of posts created by intranet users in BBSs. The logs record all
post information, including subjects and bodies of posts.
You can select Web Mail contents to audit the bodies (excluding attachments)
of emails sent by intranet users through webpages. You can also select Web-
based attachment upload (including WebMail) to audit the attachments
uploaded through webpages. This option is required for auditing webmail
attachments. You can select Web-based text upload to record all the text
uploaded over HTTP.
If this checkbox is selected, there will be a large number of logs. Therefore, you
are recommended to select Web-based BBS posting and Web Mail contents.
You can select Microblogging contents to audit intranet users’ behavior of
posting microblogs through the Microblog desktop client and web browser. To
audit the images and videos posted on microblogs, select Include microblog
attachment (such as image, video and Music). Configure the policy for
auditing web BBS post content, text, and images posted using microblogs and
webmails, and attachments. See the following figure.
When you click Specified, the Select page is displayed. On the page, you can
select the URL group to be audited. (For details of setting URL groups, see
Section 3.3.4.) If you select File name of downloaded file, the names of files
downloaded from websites using the HTTP protocol are audited, and file
content is not recorded.
You can also set the level of URL record details at Access Mgt > Advanced >
Logging.
Telnet: To audit the commands run by intranet users using Telnet. The
port number must be 23.
Application: To audit intranet users' Internet access behaviors. You can select
Access to other applications (exclusive of contents) to audit the identifiable
Internet access behaviors. You can also select Access to unidentified
applications (on which address and port. It incurs massive logs) to audit
the Internet access behaviors that the IAG cannot identify. If this option is
selected, the IAG records destination IP addresses and port numbers using a
large number of logs. By default, this option is not selected, and you are
recommended to use the default setting.
Configure the policy for auditing various types of identified Internet access
behaviors. See the following figure.
Step 4. Step 3 After selecting audit options, click OK. The Application page is
displayed. Set Schedule to All Day and Action to Audit.
Step 5. Click OK. The policy for auditing Web-based BBS posting,
Microblogging contents, WebMail contents, and Web-based attachment
upload, users’ visited URL, the file name of download file, and various types of
identified Internet access behaviors is configured.
The behaviors and content of web MSN users can only be audited if the web MSN users log
in using HTTP. If the users log in via HTTPS, the behaviors and content cannot be audited.
If you select Log application traffic based on user group, statistics on the
traffic for each application to access the Internet through the IAG are collected
and sorted by group. If you select Log application traffic for each user as
well, the statistics can be collected by the user. This option provides a basis for
Internet access traffic statistics collection and sorting in the data center. The
options must be selected to query the data center for Internet access traffic
information and rankings.
If you select Log online duration for each user based on application,
statistics on the Internet access duration of each application that accesses the
Internet through the IAG are collected. If this option is not selected, statistics
on Internet access duration (including the total duration) of applications are
not collected. You cannot query the data center for Internet access duration
information and rankings.
If you select Ignore the traffic caused by the system rather than by user,
such as system update, statistics on the Internet access duration of only the
applications that are not in the Excluded Applications List and access the
Internet through the IAG are collected.
The Applications (exempted from online duration quota policy) defines some
application traffic, such as the traffic for background software updates. You
can enable or disable the list. In the Specified, you can select the applications
to be excluded. You can enter the port numbers in the Excluded Port list to be
excluded from the Internet access duration statistics collection.
If you select URL access traffic, statistics on the traffic for accessing the
Internet through the IAG are collected by the domain name.
name.
Select Webpage Content. The Webpage Content page appears on the right. It
consists of the Webpage Content Audit and Keyword (independent from
the settings above) sections.
If you select Not to Audit, the IAG does not audit the titles and content of the
webpages accessed.
If you select Audit webpage caption and contents, the IAG audits both the
titles and content of the webpages accessed by intranet users.
If you select All URL categories, the IAG audits both the titles and
content of all the webpages accessed by intranet users.
If you select Specified URL categories, the IAG audits the titles and
content of only the specified webpages accessed by intranet users.
You can click Select and then specify the web pages. When you click
Select, the page shown in the following figure is displayed.
Keyword (independent from the settings above) is to audit only the web
pages containing specified keywords.
Click Add. The page for adding Keyword Group is displayed. Click the
Keyword drop-down list box and select the keyword group to be
used. For more information on setting Keyword Group, see Section
3.5.10. Next, click the Schedule drop-down list box and select the
effective time of the keywords. For more information on setting
effective time groups, see Section 3.5.9. Click the Action drop-down
list box and select the handling method to be used by the IAG when it
detects a specified keyword. The list includes the Log contents,
If a specified keyword is detected and Action is set to Log contents, the titles and content
of the webpages involved are audited. If a specified keyword is detected and Action is set to
Reject, the webpages' content is rejected.
1. You can use different function SNs to separate behavior audit from content audit for
Internet access audit policies. If the IAG is upgraded from an earlier version, the content
audit is enabled by default.
2. If behavior audit is enabled, the Content Audit module will not be available in the
Internet access audit policy on the console.
⚫ Removable storage device: Audit the read and write logs of U disk and
mobile hard disk through the Ingress Client.
Offline audit requires that the terminal has been connected to the IAG and obtained the
corresponding policy to take effect.
Client application audit includes five types of objects: IM audit, mail client
attachment audit, remote, operation and maintenance, and file transfer. The
above applications can be updated according to the rule base.
⚫ Remote control: Audit the files transmitted by the terminal through remote
software through access to the client. Currently, there are four remote
software options, including TeamViewer, Sunflower, AnyDesk, and RDP.
⚫ Operations Audit the files sent by the terminal through operation and
maintenance tools through access to the client. Currently, it includes four
operation and maintenance tools: XShell, PShell, MobaXterm, and
SecureCRT.
⚫ File transfer: Audit the files transferred by the terminal through file
transfer tools through access to the client. Currently, it includes four file
transfer tools: WinSCP, XFtp, FileZilla, and SecrusFX.
⚫ Effective time: You can choose from work time, off-work time, and all day.
⚫ File type: The file type can be filtered, and the file type can be defined in
System/Object/File Type Group.
⚫ Offline audit: Support for enabling offline auditing (that is, auditing when
the access client is disconnected from the IAG).
Scenario
Configuration Step
Step 1. Ingress Client Audit > Application in the navigation menu, click Add,
and select Ingress Client Audit.
Step 2. Fill in the policy name and description information, select the
application, then click Add, select IM audit, and select offline audit to enable.
Step 3. Select Objects. The selected user groups and users here will all match
this audit policy. Click OK to complete the policy configuration.
Step 4. The user uses the WeChat client to chat and send files.
USB device audit can check removable storage devices and offline endpoint
audit.
⚫ Removable storage device: Audit the read and write logs of U disk and
mobile hard disk through access to the client.
⚫ Offline endpoint audit supports audit when the access client is disconnected
from the IAG (the laptop is taken away from the company).
Offline audit requires that the terminal has been connected to the IAG and obtained the
corresponding policy to take effect.
internal employees may privately set up wireless AP (Access Point) and use the
wireless AP to export to the company network. These APs are weak due to
weak security measures. It is extremely easy to be cracked by outsiders,
leading to internal network leaks and threats to information security.
The security of terminal behavior can also prevent some employees from
surfing the Internet through proxy software, circumventing permission control,
and causing loopholes and risks to internal network management. The
terminal access management function can help users manage the access of
different terminals to the network, identify wireless smart terminals and other
devices through private AP access and terminal proxy Internet behavior, and
prevent wireless smart terminal device access causing wireless security
loopholes and leaks
Endpoints:
username is detected.
Click Commit.
Status List: It displays the IP addresses and usernames that are used
to share Internet connections. You can lock and unlock users on the
page or add users to the excluded users list.
Filter: It is to filter user types in the list. You can select all users,
locked users, unlocked users, or select users based on IP addresses.
Click Excluded Users (Groups) and select trusted users and user groups. See
the following figure.
Click Add and enter the trusted IP addresses or IP address ranges. See the
following figure.
Click Commit.
To view more information about users who use shared Internet connections,
click Report Center.
You can select Send alert by mail, click Alarm Options, and set alarm options.
You can select Lock Endpoint and define the lockout period.
Click Export List to export the mobile endpoints list to a CSV file. The
content and format of the file are the same as the mobile endpoints
list.
Click Excluded Users and select trusted users and user groups.
Click Add and enter the IP addresses of APs or the network segments
where the APs provide the DHCP function.
previous 7 or 30 days. You can click Report Center and query more
information on the mobile endpoint management page. See the
following figure.
3.9.2 Anti-Proxy
With anti-proxy, users’ Internet access through proxy tools can be
detected and blocked, as shown below:
To detect the use of proxy tools, enable proxy detection. But proxy tools will
not be blocked. To configure anti-proxy, click Settings and configure the
options on the following page:
To select proxy tools that you want to detect, restrict or block, click on Select
next to Proxy Tool, as shown in the following figure:
To block specified proxy tools, select the option Block proxy tools. The proxy
tools application containing Block with IAG in its name means the block is
based on the network flow. The proxy tools application containing Block with
Endpoint Secure in its name means it is required to correlate with Endpoint
Secure to block the application based on the process. If that option is not
selected, the use of proxy tools will be detected but not blocked.
The details for the correlation block with Endpoint secure can refer to the
configuration guide IAG_v13.0.19_Sangfor anti-proxy IAG and ES correlation
Configuration Guide.
To block official websites that offer proxy tool download, select Block
websites offering proxies. It can also add some of the specific URL or IP
addresses in Block specific addresses that offer the proxies services.
It also can add the Internal DNS server to whitelist inside DNS Server address,
To alert the user when access is denied, select the option Give alert to user.
By clicking Preview next to that option, you may view the webpage to which
the user is redirected when Internet access is denied. To modify that webpage,
go to System > General > Custom Webpage > Others, as shown below:
To lock the user when the proxy is detected, select the option Take action and
specify Lockout Period (minute). What is more, you can apply to limit BM
channel or reject Internet access.
There are three tabs on the Anti-Proxy page: Proxy Tools, Excluded Users,
Trends.
On the Excluded Users tab, you can add the user that you want to use
the proxy tool and specify IP address to allow the use of the proxy tool
on that address.
On the Trends tab, it displays the trend of the use of proxy tools over
the last 7 or 30 days, as shown below:
Users: Infected user is in red, and the user likely infected is in orange
Security Event: Display Botnet, Malicious URL, Inside Dos Attack, and Virus
Hot Events: Access to the Sangfor cloud nerve to get top 10 security events. If
the event occurs, the cloud diagram will turn red, and the user can click to
check details.
Information List: You can check the exact user and security event here.
Users: Click on the user name to enter the user tab. You can see the specific
occurrence time, description, data packets, risk information, and details.
Security Events:
Click the Journal to link to Security Event Details, and check the data packet,
threat information, and details.
Pluses Experience, real-time cloud detection, big data smart analysis and
detection, and real-time cloud correlation. Combined with devices, it provides
three-dimensional security services for you from terminal security, content
security, and network security.
In the figure, the enabled function is in the green selected state. Users can link
to the corresponding configuration page by clicking; The unenabled function is
displayed as gray unselected, and the user can also link to the corresponding
configuration page by clicking.
3.9.4.1.2 Overview
The Overview consists of three parts: Update Overview, Update and Top 10 Hot
Events.
Shortest minutes: The shortest period from the outbreak to the device
update detection defense capability of all new threats in the last month.
Scans in Cloud: Shows the average number of daily cloud scans in the last
month after the device is linked to Neural-X
Display the security capability update in the last month, showing Update 0.
When there is an update time, there is no update. When the user put the
mouse on the update entry, it will display the specific update content and
update amount, including URL rule base, malicious URL rule base, application
identification rule base, the Malware rule base, and the hotspot time update, it
will display the updates and its quantity of the day.
Three parts are included: Malware Detection, End Secure (EDR), and Patch
Check.
Action: You can choose to Give Alert (combination with the "System
Management - System Configuration - Alarm Option") and Block access to
malicious URL or Block source IP.
In the IAG endpoint's Endpoint Detection and Response (EDR) page, enter
the IP address of the Endpoint Secure platform to connect to the platform.
Redirection URL: for generating, copying, and adding Endpoint Secure devices
Interval(s): define the interval for pushing the web page to clients who do not
have the agent installed. It is 300 s, by default.
For endpoints within the applicable address scope that do not have the agent
installed, the timed redirection page is as follows:
The only redirection of accessing the HTTP web page is supported; accessing the HTTP web
page is not supported.
Click Disconnect from EDR to disconnect the correlation between the device
and Endpoint Secure.
The Windows patch detection function can detect patches and patch update
prompts that are not currently installed on the client computer on time,
enabling users with insufficient security awareness to actively improve the
security of the operating system and help administrators reduce the work
pressure from the LAN security.
3.9.5.2.1 Anti-DoS
The LAN DOS attack function of the IAG only focuses on the direction of the
LAN port.
SYN flooding: TCP SYN flooding occurs in the fourth layer of OSI, using the
characteristics of the TCP protocol, i.e., the three-way handshake. The attacker
sends a TCP SYN, which is the first packet in the TCP three-way handshake.
When the server returns an ACK, the attacker does not re-confirm it. Then the
TCP connection is in a suspended state called In the semi-connected state, if
the server does not receive the re-confirmation, it will repeatedly send an ACK
to the attacker. It will cause further resource waste to the server. The attacker
sends a large number of such TCP connections to the server. Since each one
cannot complete the three-way handshake, these TCP connections will
consume CPU and memory due to the suspended state on the server, and the
server may crash and cannot serve normal users.
UDP flooding: The attacker sends a large number of UDP packets to the
server, and the server sends a large number of replies.
ICMP flooding: The source IP address of the attacker sending the packet is the
IP address of the attacker, and the destination IP address is the broadcast
address of the network segment where the attacker is located, so that a large
number of ICMP echo replies are sent to the attacker.
Never block the internal IP below: Do not perform DOS defense on the IP
address filled in the list. For example, the intranet has a server that provides
services to the public network and provides more connections to the public
network. In this case, it is recommended to exclude the server's address to
avoid being considered illegal by the DOS defense.
Advanced
LAN subnets: The LAN subnets refer to the LAN segment that accesses the
Internet through the device. Users who are not in the list default to the
attacker. When it is enabled, user data that is not in the list will be blocked, and
users in the list will be blocked if there is an attack.
Block for (minutes): Sets the blocking time of the attacking host after the
device detects the attack in the unit of a minute.
Select Give Alert to enable mail alert. For details, see System Management →
System Configuration → Alarm Option.
ARP spoofing is a common LAN virus. A computer with this virus sends an ARP
spoofed broadcast packet to the LAN irregularly, which will bring interference
and damage to the regular communication of the LAN machines. In severe
cases, the entire network is disconnected.
The device realizes the ARP Protection by cooperating with the access client of
the LAN PC.
The device protects the ARP cache by refusing ARP requests or replies with
attack features to achieve its own immunity.
If the access control user of the device is bound to the IP/MAC, the bound
IP/MAC information will prevail in the device.
The LAN PC executes the ARP Protection through cooperation with the access
client. After the access client is installed, the access client communicates with
the device to obtain the correct IP/MAC relationship between the device and
the gateway and perform the static binding.
Enable ARP Protection: It is the master switch that enables ARP protection.
Enable static ARP: If the gateway of the LAN PC is not the interface address of
the device, it needs to be set here. For example, if the device uses the bridge
mode, the gateway address of the LAN PC should be the interface address of
the front router (or firewall). Then we can fill the interface IP/MAC of the front
router into the box below. Suppose the LAN PC is installed with the access
client. In that case, it can obtain the correct gateway IP/MAC for binding, which
will ensure the correct IP/MAC of the PC gateway and regular communication
between the PC and the gateway.
MAC Broadcast Interval (sec): Set the interval for the broadcast gateway (that
is, the LAN interface of the device) MAC. The recommended interval is 10
seconds.
Select Give Alert to enable mail alert. For details, see System
Excluded Websites: Websites that do not need to be detected and can be added
to the whitelist
Action: Select the Give alert (combination with the System Management -
System Configuration - Alarm Option) and Block access to malicious URL.
SAVE antivirus is mainly for virus scanning and removal of the data passing
through the device to protect the security of the LAN computer. The device can
perform virus scanning and removal under four common protocols: HTTP, FTP,
POP3, and SMTP. The device has a built-in SAVE engine developed by Sangfor,
which has a high virus recognition rate and high scanning and removal
efficiency. Unlike the traditional rule base update, the SAVE engine is still in a
rule base to maintain the habit. The current update cycle is two months.
The SAVE antivirus settings interface includes the antivirus switch for four
protocols, websites with no need for antivirus or file whitelist.
Protect HTTP download against virus, Protect FTP download against virus,
Protect POP3/IMAP against virus and Protect SMTP against virus are used
to enable the antivirus switches for these four protocols.
Excluded Websites (URL): Set the access data to particular websites with no
need for antivirus. The input is in URL format, supporting the wildcard and one
entry per row.
Action: Check the "Give alert" and use it with the Alarm Option. For details, see
System Management, System Configuration, Alarm Option.
Update Service Expires On: It displays the automatic update expiration date
of SAVE antivirus. During the expiration date, during which the device will
automatically connect to the server of Sangfor Technologies Inc. to update the
Antivirus Database.
Antivirus Database Release On: It displays the current date of the Antivirus
Database.
Configuration Steps:
Step 2. Click to enable the policy and fill in the policy name and policy
information. The policy name is the unique identifier of the policy and cannot
be repeated and is required. The description information is a summary
description of the policy and is optional.
Step 3. Click Option to enter the policy setting page, check the announcement
page, and set the corresponding terminal reminder policy.
Remind: You can choose to push the announcement page at regular intervals or
regularly push.
Every day at (hh:mm: ss): Push the announcement page at the set time.
Bulletin Board (need to ensure that users can access the page normally)
⚫ Use external announcement page: Set the URL of a custom page in URL,
and you can directly link to the announcement page you need by way of URL.
Step 4. Click Object to configure applicable groups and users. The user
groups and users selected here will fully match this terminal reminder policy.
Step 5. Click Advanced, you can configure the policy expiration date, the
privilege of admin in the same role, and give view privilege to the administrator
in a low-level role.
Step 7. When the user visits the HTTP website at the interval of setting the
reminder frequency, the prompt page will appear.
Scenario
Some management devices use the method of installing controls and blocking
the process to disable the proxy, which is extremely inconvenient; the use of
the anti-proxy function of IAG can provide the function of disabling the
endpoint to use the intranet proxy without plug-ins.
Configuration Steps
Step 2. On the connection sharing options page, click setting, and select the
statistics method to count all endpoints. Set the number of endpoints reached
two or more, and lock the user for 30 minutes.
Endpoints Select All to identify the sharing between PC and PC, PC and mobile
terminal, and mobile terminal and mobile terminal.
What Would You Like to Lock: Select Lock IP address, only one user is
allowed to go online for one IP address?
⚫ Install 360 computer WIFI on the PC, start 360WIFI, and release the hotspot.
⚫ The mobile phone connects to the SSID sent by the PC, and the proxy can
go online.
⚫ Use the browser on the PC to access the webpage and use the WeChat and
other App applications on the mobile phone. After some time, the two
terminals are detected as shared Internet access.
Exceptions are allowed: the number of single IP computer terminals is 1, and mobile
terminals are 1. Refers to the sharing of Internet access between a computer and a mobile
terminal will be allowed. The shared surfing behavior of two PCs or two mobile terminals
will be blocked.
Step 4. Effect.
Mobile phone one and mobile phone two access the Internet through a proxy
within 5 minutes (the fastest test is about 1 minute). There will be a web page
that is blocked by the device's anti-sharing Internet access. And the shared
access management page recognizes the type of mobile phone and terminal.
The rendering of the mobile phone opening the web page is as follows.
Scenario:
Due to the popularity of smart terminals such as tablet computers and mobile
phones and their characteristics that they can only use wireless networks to
access the Internet, employees may use some wireless APs to access the
company’s wired network and wireless terminals (such as mobile phones).
They may access the company’s network through wireless APs. It may lead to
exposure of the intranet and threats to information security.
Configuration Steps
When the device discovers a mobile endpoint, you can set the settings to send
alarm alert emails, lock the mobile terminal’s Internet access, and enable the
Identify DHCP clients function.
Enable the Identify DHCP clients: To enhance the ability of mobile terminals
to identify this type of terminal after accessing the network, it also supports the
DHCP mobile terminal identification function based on the original application
identification terminal ability and mirrors the DHCP protocol data to the device.
Configure the mirror port on the interface to provide the device to capture the
data packets of the specified network port. Please prepare an empty network
1. DHCP mirror port configuration supports dual device and multi-device synchronization
and does not support BBC configuration delivery.
2. The modification of the DHCP mirror port configuration supports administrator operation
authority (non-administrator has no authority), and the administrator operation log will be
recorded.
Users: Infected user is in red, and the user likely infected is in orange.
Security Event: Display Botnet, Malicious URL, Inside Dos Attack, and Virus.
Hot Events: Access to the Sangfor cloud nerve to get top 10 security events. If
the event occurs, the cloud diagram will turn red, and the user can click to
check details.
Information List: You can check the exact user and security event here.
Users: Click on the user name to enter the user tab. You can see the specific
occurrence time, description, data packets, risk information, and details.
Security Events:
Click the Journal to link to Security Event Details, and check the data packet,
threat information, and details.
In the figure, the enabled function is in the green selected state. Users can link
to the corresponding configuration page by clicking on it; The disabled function
is in grey unselected state, and the user can also link to the corresponding
configuration page by clicking on it.
3.10.2.1.2 Overview
The Overview consists of three parts: Update Overview, Update and Top 10
Hot Events.
Shortest minutes: The shortest period from the outbreak to the device
update detection defense capability of all new threats in the last month.
Scans in Cloud: This shows the average number of daily cloud scans in the last
month after the device is linked to Neural-X.
When you click on display the security capability in last month, it will show
update 0, it is because during that time, the device was not connected and did
the update from the neutral-x. When the user puts the mouse on the update
entry, it will display the specific update content and update amount, including
the URL rule base, malicious URL rule base, application identification rule base,
the Malware rule base, and the hotspot time update. It will show the updates
Three parts are included: Malware Detection, End Secure (EDR), and Patch
Check.
Action: You can choose to Give Alert (combination with the System
Management - System Configuration - Alarm Option and Block access to
malicious URL or Block source IP.
In the IAG endpoint's Endpoint Detection and Response (EDR) page, enter
the IP address of the Endpoint Secure platform to connect to the platform.
Interval(s): define the interval for pushing the web page to clients who do not
have the agent installed. It is 300 s, by default.
For endpoints within the applicable address scope that do not have the agent
installed, the timed redirection page is as follows:
Accessing to HTTP web page is not supported, only redirection of accessing to HTTP web
page is supported.
Click Disconnect from EDR to disconnect the correlation between the device
and Endpoint Secure.
The Windows patch detection function can detect patches and patch update
prompts that are not currently installed on the client computer on time,
3.10.2.2.2.1 Anti-DoS
The LAN DOS attack function of the IAG only focuses on the direction of the
LAN port.
Enabled: Click to enable Anti-DoS. There are three detection methods, namely
SYN flooding, UDP flooding, ICMP flooding.
SYN flooding: TCP SYN flooding occurs in the fourth layer of OSI, using the
characteristics of the TCP protocol, i.e., the three-way handshake. The attacker
sends a TCP SYN, which is the first packet in the TCP three-way handshake.
When the server returns an ACK, the attacker does not re-confirm it. Then the
TCP connection is in a suspended state called In the semi-connected state, if
the server does not receive the re-confirmation, it will repeatedly send an ACK
to the attacker. It will cause further resource waste to the server. The attacker
sends a very large number of such TCP connections to the server. Since each
one cannot complete the three-way handshake, these TCP connections will
consume CPU and memory due to the suspended state on the server, and the
server may crash and cannot serve normal users.
UDP flooding: The attacker sends a large number of UDP packets to the
server, and the server sends a large number of replies.
ICMP flooding: The source IP address of the attacker sending the packet is the
IP address of the attacker, and the destination IP address is the broadcast
address of the network segment where the attacker is located so that a large
number of ICMP echo replies are sent to the attacker.
Never block the internal IP below: Do not perform DOS defense on the IP
address filled in the list. For example, the intranet has a server that provides
services to the public network and provides more connections to the public
network. In this case, it is recommended to exclude the server's address to
avoid being considered illegal by the DOS defense.
Advanced
LAN subnets: The LAN subnets refer to the LAN segment that accesses the
Internet through the device. It is enabled, user data that is not in the list will be
blocked, and users in the list will be blocked if there is an attack.
Block for (minutes): Sets the blocking time of the attacking host after the
device detects the attack in the unit of a minute.
Select Give Alert to enable mail alert. For details, see System Management →
System Configuration → Alarm Option.
ARP spoofing is a common LAN virus. A computer with this virus sends an ARP
spoofed broadcast packet to the LAN irregularly, which will bring interference
The device realizes the ARP Protection by cooperating with the access client of
the LAN PC.
The device protects the ARP cache by refusing ARP requests or replies with
attack features to achieve its immunity.
If the access control user of the device is bound to the IP/MAC, the bound
IP/MAC information will prevail in the device.
The LAN PC executes the ARP Protection through cooperation with the access
client. After the access client is installed, the access client communicates with
the device to obtain the correct IP/MAC relationship between the device and
the gateway and perform the static binding.
Enable ARP Protection: It is the master switch that enables ARP protection.
Enable static ARP: If the gateway of the LAN PC is not the interface address of
the device, it needs to be set here. For example, if the device uses the bridge
mode, the gateway address of the LAN PC should be the interface address of
the front router (or firewall). Then we can fill the interface IP/MAC of the front
router into the box below. If the LAN PC is installed with the access client, it can
obtain the correct gateway IP/MAC for binding, which will ensure the correct
IP/MAC of the PC gateway and normal communication between the PC and the
gateway.
MAC Broadcast Interval (sec): Set the interval for the broadcast gateway (that
is, the LAN interface of the device) MAC. The recommended interval is 10
seconds.
Select Give Alert to enable mail alert. For details, see System
Excluded Websites: Websites that do not need to be detected and can be added
to the whitelist.
Action: Select the Give alert combination with the System Management >
System Configuration > Alarm Option and Block access to malicious URL.
SAVE antivirus is for virus scanning and removal of the data passing through
the device to protect the security of the LAN computer. The device can perform
virus scanning and removal under four common protocols: HTTP, FTP, POP3,
and SMTP. The device has a built-in SAVE engine developed by Sangfor, which
has a high virus recognition rate and high scanning and removal efficiency.
Unlike the traditional rule base update, the SAVE engine is still in a rule base to
maintain the habit. The current update cycle is two months.
The SAVE antivirus settings interface includes the antivirus switch for four
protocols, websites with no need for antivirus or file whitelist.
Protect HTTP download against virus, Protect FTP download against virus,
Protect POP3/IMAP against virus and Protect SMTP against virus are used
to enable the antivirus switches for these four protocols.
Excluded Websites (URL): Set the access data to particular websites with no
need for antivirus. The input is in URL format, supporting the wildcard and one
entry per row.
Action: Check the Give alert and use it with the Alarm Option. For details, see
System Management, System Configuration, and Alarm Option.
Update Service Expires On: It displays the automatic update expiration date
of SAVE antivirus. During the expiration date, the device will automatically
connect to the server of Sangfor Technologies Inc. to update the Antivirus
Database.
Antivirus Database Release On: It displays the current date of the Antivirus
Database.
3.11 System
3.11.1 Object
The objects defined on the Objects page are the basis for the device
to perform online behavior filtering, online behavior audit, and
Bandwidth Management.
You can set Ingress rules on the Ingress Rule Database page,
including detecting the client OS, processes, files, and registries.
Encrypted IM chat contents can be audited through Ingress control.
The Ingress rules set on the Ingress Rule Database page can be referenced on
the page displayed after you choose Access Mgt > Policies > Ingress Policy,
thereby implementing detection and control of client PCs.
on the page displayed after you choose Access Mgt > Policies > Add >
Access Control. Network access data is controlled by detecting the
port and protocol of packets. This type of object can also be referenced
on the page displayed after choosing System > Firewall > Firewall
Rules.
The keywords set in Keyword Group can be referenced on the page displayed
after you choose Access Mgt > Policies > Add > Access Control > Search
Keyword.
The file types set in File Type Group can be referenced on the page displayed
after you choose Access Mgt > Policies > Add > Access Control > File Type, or
Bandwidth Mgt > Bandwidth Channel.
Location Object Group: The set location object group is to select location
objects when associating applicable objects in Web Access -> Web Access
Permission, and Traffic Mgt.
Trusted Certificate Authority: When the LAN user accesses the WAN using
SSL protocol, the device can verify the legality of the certificate. Suppose the
certificate used by the SSL protocol falls in the scope of Trusted Certificate
Authority. In that case, it indicates that the certificate is legal, and the client
can delete or add a trusted SSL certificate. When SSL Certificate Link Control
is enabled in Web Access -> Web Access Permission -> SSL Mgt -> SSL
Security Protection, SSL certificate detection is enabled.
The first type of application identification rule aims to detect the application
type of packets based on multiple conditions, including the characteristic value
or protocol, port, direction, packet length, and packet content. This type of rule
can effectively detect application types that cannot be identified by port or
protocol, such as Facebook and P2P applications.
The first type of rules can be further divided into embedded rules and custom
rules. Embedded rules cannot be modified and are updated by the device
periodically. A license is required to authorize the update of embedded rules,
and Internet access must be available. Custom rules can be added, deleted,
and modified. For details about custom rules, see section 3.3.3. SSL
management, Internet access audit, terminal reminders, and Bandwidth
Management are controlled and audited based on application identification
results. Therefore, the application library is very important. An embedded
application identification library cannot be edited or deleted. Some
applications can be disabled but those involving basic protocol identification
cannot be disabled.
The second type of application refers to URL groups defined on the page
displayed after choosing Objects > Application Signature. URL groups are a
sub-class of the Visited Websites type. This type is used to recognize websites
visited by intranet users based on HTTP data. URL groups are classified into
embedded URL groups and custom URL groups. URL groups cannot be edited
or added to the Application Signature. Instead, they are reused here. To edit a
URL group, choose Objects > Application Signature. For details, see section
3.5.4.
Click All, and all application types will be displayed on the Application
Signature pane on the right. The device has six embedded labels: Security
risks, Send Email, High Bandwidth Consumption, Reduce the Efficiency of
Work, Forum and Microblog Posts, and Disclosure Risk. These embedded
labels will be updated accordingly as the application identification library is
updated. Applications with embedded labels cannot be deleted or added. To
define labels, click Tags. All labels can be referenced on the page displayed
after choosing Access Mgt > Policies > Add > Access Control.
In Filter, select a rule type. Select All to filter all rules meeting the
search condition, enabled to filter enabled rules meeting the search
condition, and Disabled to filter disabled rules meeting the search
condition. Input a keyword in Search, for example, Facebook, and
press Enter, as shown in the following figure.
Click Database Manual Update to manually import application identification rule files to
the device.
In the position for associating applications, click Select and select applications
as required.
1. The application identification rules of some basic protocols cannot be disabled, such as
HTTP. If a basic protocol is disabled, the data identification based on this protocol will be
affected. Therefore, it is not allowed to disable such rules on the device.
2. In the Application Signature, the Mobile Applications maps application software running
on mobile endpoints such as smartphones and tablets.
3. Some URL groups are not included in the application type Visited websites. Instead, they
belong to the corresponding application type as web applications. For example, microblog
URLs are included in the application type Microblog. Suppose control of microblog
applications is enabled in Internet access policies. In that case, the device can control the
behaviors of accessing microblog applications by using a web browser and behaviors of
accessing microblog clients.
The Advanced App Signature is used to recognize application types of all kinds
of Internet access data. It differs from the Application Signature in the
identification mode. The Advanced App Signature can recognize encrypted
data, such as ciphertext or plaintext P2P applications, Skype, SSL, SANGFOR
VPN data, web proxy, and PiPi. See the following figure.
In the navigation area, choose Objects > Advanced App Signature. The
Advanced App Signature panel is on the right.
In Sensitivity, you can set the sensitivity of the rule to high, medium,
low, and very low. Errors may exist in the intelligent identification of
P2P applications. Therefore, you can set the sensitivity to improve the
identification accuracy. You can adjust the sensitivity level based on
the data identification conditions. For example, suppose there is a
large amount of unrecognized data. In that case, the connected ports
are all random high-end ports, and the destination IP addresses are
unknown. The data may be unrecognized P2P data. In this case, you
can set the sensitivity to a high level. On the other hand, if some
application data is mistakenly recognized as P2P data, it may be
because the sensitivity level is too high. To solve this problem, adjust
the sensitivity to a lower level.
In Excluded Port, set one or more ports that are to be excluded from
scanning. If the destination port of data is an exclusion port, the
device will not perform P2P identification for the data.
Web online proxy identification rules can be edited. Click Web Online Proxy to
display the rule editing dialog box.
In the second notes point in the above figure, Settings will automatically link to
the page displayed after you choose System > General > Update > Database
Update.
In the third notes point in the above figure, Settings will automatically link to
the page displayed after choosing System > General > Global Exclusion. You
can add the destination addresses of misjudged network applications to the
global exclusion address list to reduce the misjudgment rate.
In the navigation area, choose Objects > Custom Application. The Custom
Application pane is on the right.
On the Custom Application page, click Add. In the Add Custom Application
window, you can add custom application rules.
1. Select Enabled and set basic application information, including the rule
name, description, application type, and application name. You can select
an existing type or define one.
Protocol: Specifies the protocol type of data. In this example, emails are sent
over TCP.
You are recommended to set the destination port, IP address, and domain name when a
custom rule is defined. If the identification conditions are too general, the customs rule may
conflict with the embedded application identification rules. As a result, identification errors
may occur, thereby causing some control and audit functions to fail.
On the Custom Application page, select a custom rule and click Enable,
Disable, or Delete.
Click Import to add a custom application rule. Click Export to export a custom
application rule.
In the navigation area, choose Objects > URL Database. Next, double-
click on the URL Database page, and then the update time and
upgrade validity period of the embedded URL Database are displayed
in the upper part of the page.
In the navigation area, choose Objects > URL URL Database. Click URL
Lookup. In the URL Lookup window, enter a domain name and click Go. The
URL type is displayed in the query result.
You can add a URL group to define URLs. On the URL Database page, click
Add. The Add URL Category window is displayed, as shown in the following
figure.
1. The asterisk (*) can be used as a wildcard. For example, to set a URL to indicate a sub-
page of Sina, including news.sina.com.cn, sports.sina.com.cn, and ent.sina.com.cn, enter
*.sina.com.cn in URL. The asterisk (*) can be used to match a first-class domain name and
can be placed only at the headmost of the URL instead of in the middle of the URL.
Otherwise, the URL is invalid.
2. After a custom URL group is added, an intelligent identification URL group with the same
name will be added to the intelligent URL identification system.
You can delete a custom URL group. An embedded URL group cannot be
deleted. To delete a URL group, select a custom URL group on the URL
Database, and click Delete.
Specifically, you can modify the description, URLs, and domain name keyword
of a custom URL group. However, you cannot modify the name, description, or
existing URLs of an embedded URL group. You can only add URLs and domain
name keywords.
Click the name of a URL group and modify related information in the Edit URL
Category window. For details, see section 3.5.4.1.2.
On the URL Database List page, click Database Manual Update. Then, select
an embedded library file and click Open.
On the URL Database page, click Import & Export, choose Export, select the
save path, and click OK to export all custom URL Database contents.
If the name of a URL group to be imported is duplicate with an existing URL group, the
existing URL group will be overwritten. If the name of a URL group to be imported is unique,
it is imported as a new URL group.
In the navigation area, choose Objects > Ingress Rule Database > Ingress
Rules. On the Ingress Rules page, you can add or delete Ingress rules.
On the Ingress Rules page, click Add and choose a rule type, which may be
Operating System Based Rule, Process Based Rule, File Based Rule,
Registry Based Rule, Task Based Rule, Patch Based Rule or Other. See the
following figure.
You can set rules for detecting the OS of clients. Access the Ingress Rules
page, click Add, and select Operating System Based Rule. The Operating
System Based Rule page is displayed.
Name: specifies the name of the rule to be added. The length of the rule name
must be equal to or shorter than 95 characters.
Category: specifies the type of the rule. You can select a rule type from the
drop-down list or enter a rule type. The length of the entered rule type must be
equal to or shorter than 95 characters.
Required Operating System lists the OS versions allowed on intranet PCs that
need to access the Internet through the device. For example, SANGFOR
requires that all PCs on the intranet run Windows XP and that SP4 must be
installed on the PCs to protect against viruses. PCs that do not meet the
requirements cannot access the Internet through the device. The settings are
shown in the following figure.
taken on client data, and logs will be recorded in the console and the data
center).
Access the Ingress Rules page, click Add and select Process-Based Rule. The
Process Based Rule page is displayed.
Category: specifies the type of the rule. You can select an embedded rule type
or define one.
If Not running is selected, you can select Reject request and give alert, Start
process, Give alert or Report only from Action.
Status can be set to Running or Not Running. If Running is selected, you can
set advanced conditions, including the process's MD5 value and program size.
See the following figure.
If Running is selected in Status, you can select Disable Web access, Stop the
process or Not operating (only submitting report) in Rule Operation.
If Not Running is selected in Status, you can select Disable Web access, Start
the process or Not operating (only submitting report) in Rule Operation.
Access the Ingress Rules page, click Add, and select File Based Rule. The File
Based Rule page is displayed.
Category: specifies the type of the rule. You can select an embedded rule type
or define one.
Status: specifies the status of files to which the rule is applied. If File Exists is
selected, you can select Reject request and give alert, Delete file, Give alert
or Log Event only from Action.
If File does not exist is selected, you can select Reject request and give alert,
Give alert or Log Event only from Action.
If Exist is selected, you can set advanced conditions. See the following figure.
You can set the MD5 value, file size, and the number of days after which files
are updated. Click OK.
If File exists is selected in Status, you can select Disable Web access, Delete
file or Not operating (only submitting report) in Rule Operation.
If File does not exist is selected in Status, you can select Disable Web access
or Not operating (only submitting report) in Rule Operation.
Access the Ingress Rules page, click Add and select Registry Based Rule. The
Registry Based Rule page is displayed.
Category: Specifies the type of the rule. You can select an embedded rule type
or define one.
If Specified item does not exist in registry is selected, you can select Reject
request and give alert, Give alert or Log Event only from Action.
Registry Item: Specifies an entry, the path displayed on the left pane of the
Required Registry Item window.
You can set the status to specify items in the registry or specify items not in the
registry.
You can set scheduled tasks. The Ingress client invokes custom executable
programs, JavaScript, and VBScript. You can set return values in these
executable files. The Ingress client takes actions based on the return values.
Access the Ingress Rules page, click Add and select Task Based Rule. The
Task Based Rule page is displayed.
Name and Description: Set the name and description information of the rule.
Execute program:
Program Path: Used to enter the detailed path of the program script stored
on the server. The path must be a network address where all users applying to
this rule can execute permissions.
Scheduled Execution includes Start running periodically and run only once
when the ingress program starts on the computer.
Execution Result Check includes Check returned results and Disabled, and
is used to set whether the execution results of the task script need to be
checked. Operation timeout is to set the timeout duration. If 1 is returned
and If 2 is returned, process the different return results obtained after the
task script check. Actions can be selected as Log event only, give alert, and
Reject request and give alert.
When the program path is configured, if the server is configured with the account and
password for login again, and the client does not save the account and password, the
program execution will fail. You have to access the server via the client and save the account
and password. If the server does not set the account and password, the planned task can be
successfully executed.
Patch Based Rule checks whether the terminal updates the vulnerability patch
in time as required by the organization.
On the Ingress Rule edit page, click Add to pop up the new ingress type, and
select Patch-based rule to pop up the page to add Patch-based rule.
Name and Description: Set the name and description information of the rule.
For Severity, you can check Critical Windows Updates. Severity customizes
the patches in patch checking. For patch names and details, please refer to the
patch contents.
Action: Select the actions of the device on users who do not conform to the
rules, such as Give Alert or Log event only (Log event only means that no
action is taken on client data, and logs will be recorded in the console and the
data center at this time).
Access the Ingress Rules page, click Add, and select Others. The Others page is
displayed.
On the Ingress Rules page, select a custom Ingress rule and click Delete. The
displayed message asking for your confirmation, click Yes.
On the Ingress Rules page, select a custom Ingress rule and click its name.
Then, in the dialog box for editing the Ingress rule, modify the settings as
required except the rule name.
On the Ingress Rules page, select multiple custom Ingress rules and click Edit.
You can edit only the rule type in batches.
On the Ingress Rules page, select custom Ingress rules and click Export.
Embedded Ingress rules cannot be exported. Click Import and select an
Ingress rule file to import and Ingress rule.
The imported rule file must be in ZIP format and must contain IngressRuleExport.conf, and
the IngressRuleExport.conf file must be at the outermost layer.
In the navigation area, choose Objects > Ingress Rule Database > Combined
Ingress Rule. On the Combined Ingress Rule page, click Add. The page shown
in the following figure is displayed.
Action: Specifies the action to be performed if the rule is not met. It can be set
to Reject or Report only.
Logic: Specifies the condition for the Combined Ingress Rule to take
effect. A Combined Ingress Rule can be set to take effect when any
member rule is effective or when all member rules are effective. When
the specified member rule is met, the specified action will be
performed.
Ingress Rules: Select a custom rule and click Add to move it to the right pane.
1. Set two Ingress rules for detecting Kaspersky and Rising. The device
detects the processes of the antivirus software.
The actual antivirus software processes prevail. The process names provided in this
example are for reference only.
3. Associate the composite Ingress rule with an Internet Access Policy and
associate the policy to users/user groups. For details, see section 3.5.1.1.6.
On the Combined Ingress Rule List page, select a Combined Ingress Rule and
click Delete. Alternatively, click the name of a Combined Ingress Rule and
modify the settings as required except the rule name. See the following figure.
3.11.1.5 Service
Service is referenced on the page displayed after you choose System >
Firewall > Firewall Rules or Access Mgt > Policies > Add > Access Control >
Service.
On the Service page, define all types of services, including the ports and
protocols used by the services. Then choose Firewall > Firewall Rules and
determine the filtering rule based on the defined services or choose Access
Mgt > Policies > Add > Access Control > Service and determine the Internet
access permission based on the defined services.
In the navigation area, choose Objects > Service. The Service pane is
displayed on the right.
Services: specifies the service protocol type and port number. Click TCP, UDP,
ICMP, and Others in turn and enter the corresponding port in the text box in
the lower part.
After clicking Others, you can enter a protocol ID. The protocol ID 0 indicates all protocols.
3.11.1.6.1 IP Group
⚫ Referenced on the page displayed after you choose Bandwidth Mgt >
Bandwidth Channel. In the navigation area, choose Objects > IP Group.
The IP Group page is on the right.
3.11.1.6.2 ISP
On the ISP page, you can set the IP address segment of the network carrier.
This IP address segment is invoked during multiline routing in policy-based
routing.
Click Delete to delete the selected Internet service provider (ISP) address
library.
Click Add to add an ISP address library. The configuration page is as follows.
WHOIS Server: Specifies the server for updating the ISP address library.
By default, the device contains four ISP address libraries: China Unicom, China Telecom,
China Mobile, and the education network.
3.11.1.6.3 Country/Region
1. From the Navigation bar, select IP Address Database and click on the
Country/Region tab. Create a new customs area as below.
When there is some abnormal traffic, the admin can use location lookup to
search for the IP location and take action accordingly.
When admin/technical support has confirmed that the IP address has been
miscategorized, but the actual location of the IP is from another place.
Admin/technical support can manually change the IP location.
Under the circumstance that the device can access the Internet, the IP address
database will be updated in real-time. It can also be manually updated to
obtain the latest IP address database. If the IP address database is already the
latest one, there will be a prompt for not updating during the manual update.
3.11.1.7 Schedule
On the Schedule page, you can define common time segment combinations,
which can be referenced when you set the validation and expiration time of
rules on the page displayed after choosing Firewall > Firewall Rules, Access
Mgt > Policies, or Bandwidth Mgt > Bandwidth Channel.
Date: Specifies the validation date and expiry date. A maximum of 10 dates
can be set.
Included: A date within the specified included date segment can match the
schedule group.
You can add multiple discontinuous time segments. To delete a time segment,
select it and click Delete.
You can set and group keywords, which can restrict search and upload on the
page displayed after choosing Access Mgt > Policies > Add > Access Control >
Search Keyword. In the navigation area, select Objects > Keyword Group.
The Keyword Group pane is on the right.
On the File Type Group page, you can define file types as required, which can
be used to restrict the upload and download of HTTP and FTP files on the page
after choosing Access Mgt > Policies > Add > Access Control > File Type. You
can set traffic control based on file types on the page after choosing
Bandwidth Mgt > Bandwidth Channel.
In the navigation area, choose Objects > File Type Group. The File Type
Group pane is on the right.
Click Add. The Add File Type Group window is displayed, as shown in the
following figure.
File Extensions: Specifies the file types. Enter the file name extensions, such
as *.mp3 or mp3.
3.11.1.10 Location
In the navigation area, choose Objects > Location. The Location pane is on
the right.
Click Add. The Location window is displayed, as shown in the following figure.
Type: Specifies the type of the location group, which can be set to IP Segment,
or VLAN.
Location objects can be imported and exported. You can export location objects
in .inf format. Location objects can also be searched by IP address. Location
objects cannot be searched by VLAN ID or wireless network. When you search
location objects by IP address, the IP address segment needs to be displayed.
For example, location object A is 2.2.2.2–5.5.5.5. If you search for 3.3.3.3, the
location object needs to be displayed.
Location objects can be referenced by Internet access policies and traffic control policies,
but cannot be referenced by authentication policies.
A user belongs to only one location. User locations will be recorded when logs
are kept.
Location objects cannot be duplicated. There are three types of location objects:
SSID, IP segment, and VLAN. You can set location objects of the same type to be
unique but cannot set location objects of different types to be unique. For
example, the IP address of an SSID may be contained in the location defined by
an IP segment. If there are duplicate location objects of different types, the
device can identify location objects by SSID, IP address, and VLAN in turn. A
maximum of 1000 location objects is supported.
3.11.2 Network
3.11.2.1 Deployment
You can set the device's operating mode to route, single-arm, bridge, or bypass
on the Deployment Mode panel.
Route mode: In this mode, the device functions as a router, the network
structure is modified to a large extent, and all functions of the device can be
implemented.
Single-arm mode: The device functions as a proxy server and proxies internal
users’ access to the Internet. Most device features can be implemented in this
mode, and no changes will be made to the network topology.
Bridge mode: The device is considered a network line with the filtering
function. This mode is usually enabled when the original network structure
cannot be modified. In bridge mode, the device is smoothly deployed on the
Bypass mode: The device is connected to the mirrored port of the intranet
switch or a hub. The device monitors and controls Internet access data on the
intranet based on mirrored data without modifying the network environment
and causing network interruption. In bypass mode, some functions of the
device cannot be implemented due to poor controllability.
Authentication mode: You can switch between the authentication mode and
the common mode. When there are multiple branches across the nation on
the Internet, it is required for the headquarters to deploy a user authentication
center and sent a unified authentication interface to all branches. Since the
traffic for authentication is not significant, switching to the authentication
mode is feasible despite a relatively significant number of users.
Before deploying the device on the network, you are advised to configure
information, including the deployment mode, interfaces, routes, and device
users. The default IP addresses of interfaces of the device are listed in the table
below.
Interface IAG
1. Configure the device and log in to the device by using the default IP
address. For example, to log in by using the LAN interface, whose default
IP address is 10.251.251.251/24, configure an IP address on this network
segment on the PC and log in to the device by accessing
https://10.251.251.251. The default login username and password are both
admins.
LAN interface list: A network interface added to the LAN interface list
WAN interface list: A network interface added to the WAN interface list
serves as a WAN interface and needs to be connected to the external
network. If multiple WAN interfaces are required, apply for multi-line
authorization.
DMZ interface list: A network interface added to the DMZ interface list
serves as an internal network interface. Important servers can be
connected to the DMZ, and the firewall settings on the device can restrict
the access of intranet users, thereby ensuring the security of the servers.
For details about firewall settings, see section 3.2.2.
The default LAN interface is eth0, the default DMZ interface is eth1, and
the default WAN interface is eth2. It is recommended that the positions of
these network interfaces not be modified and conform to the device panel
The current IAG version is compatible with IPv6. Therefore, IPv6 addresses can be
configured for the network interfaces, gateway, and DNS. The following is an example of
configuring IPv4 addresses.
If virtual local area networks (VLANs) are divided on the switch, and the LAN
interface of the device is a trunk interface, VLAN needs to be enabled. In this
example, an L3 switch is used, and therefore VLAN does not require to be
enabled.
The WAN interface supports three modes: Auto assigned, Specified, and
PPPoE. In this example, the public network line is an optical fiber and
assigned a fixed public network IP address. Therefore, select Specified.
If PPPoE is employed, connect the WAN interface to a modem. If Enable is selected in Auto
Dial-up, automatic dialup will be performed after the connection line is disconnected
abnormally or the device is restarted. Enter the dialup account and password.
7. Configure DMZ interface eth1. Set the IP address and subnet mask.
8. Configure IPv4 SNAT rules. When the device functions as a gateway and
directly connect to the public network line, proxy settings need to be
completed on the device to implement Internet access for intranet users.
Set the proxy network segment and select a WAN interface, which can be
set to a single network interface or all network interfaces in the WAN
interface list.
Restart the device for the configurations to take effect. Click Yes in the
dialog box that asks for your confirmation.
10. In this example, the LAN interface and the intranet are not on the same
network segment. Therefore, a system route from the device to the
intranet needs to be added. In the navigation area, choose Network >
Static Routes. On the Static Routes pane on the right, click Add to add
routes. For details, see section 3.2.3.3. If the intranet covers multiple
network segments, add multiple system routes.
11. Add a user or user group or add a user authentication policy on the
Authentication Policy to avoid Internet access failures caused by the lack of
identity authentication.
12. Connect the device to the network. Specifically, connect the WAN interface
to the public network line and the LAN interface to the intranet switch.
Configure the route of the intranet switch to direct to the LAN interface of
the device.
1.When the device operates in route mode, the gateway addresses of all PCs on the LAN
point to the IP address of the device’s LAN interface or the L3 switch, and the gateway
address point to the device. The device performs NAT for Internet access data or forwards
the data.
2.The IP addresses of the WAN, LAN, and DMZ interfaces must be on different network
segments.
3.After an 802.1q-VLAN address is configured for the LAN interface. The LAN interface can
connect to the trunk interface of an L2 switch that supports VLAN. The device (one-armed
router) can then forward data among VLANs and implement firewall rules between LANs.
The device can implement
5.If the route mode is set to asymmetric digital subscriber line (ADSL) dialup, select PPPoE
when setting the IP address of the WAN interface in step 5 and fill in the dialup account and
password. Other operations are the same.
6.If a front-end device is configured, set the IP address of the WAN interface to be on the
same network segment as the IP address of the LAN interface of the front-end device. Other
operations are the same.
7.If DHCP is enabled on the front-end device, configure the WAN interface to automatically
obtain an IP address and ensure normal communication between the WAN interface and
DHCP server.
In Single Arm mode, this unit is connected to a switch without changing the
network topology and thus has no impact on the network. This unit functions
as a proxy server, controls and audits Internet access since data go through it.
Take the following scenario as an example. The unit is deployed in Single Arm
mode and for proxy, accelerate, and control Internet access. The network
topology is as shown below:
2. Navigate to System > Network > Deployment page. Click Settings, select
Single Arm Mode, and click Next.
3. Select the eth0 interface and configure IPv4 address, gateway, and DNS
server for the interface. IPv6 address is also supported in this mode. Then,
click Next. (In this example, the eth0 interface of the unit should be
connected to the switch)
5. Make sure the network settings are correct. Then, click Commit.
Clicks Commit, and the following dialog pops up to notify you that applying the
settings requires restarting the device. To apply the changes, click Yes.
In bridge mode, the device is considered a network line with the filtering
function. This mode is usually enabled when the original network structure
cannot be modified. Deploy the device between the original gateway and the
intranet users. You only need to configure the device without modifying the
configurations of the original network or intranet users. The device is invisible
to the original network and intranet users, which are the characteristic of the
bridge mode.
Example: VRRP is enabled between the two firewalls and the switch. The
virtual IP address of the firewalls is 192.168.1.1. The device is deployed
between the switch and firewall as a bridge with two inputs and two outputs.
1. Configure the device and log in to the device by using the default IP
address. For example, to log in by using the LAN interface, whose default
3. Add a LAN interface and a WAN interface to form a bridge and configure
two bridges. See the following figure.
4. Set the bridge IP addresses.Set two bridge IP addresses for the device. In
this example, the two bridges are on different network segments. Assign
two idle IP addresses as bridge IP addresses.
VLAN data passes through the device. Therefore, VLAN information needs
to be configured, including the VLAN ID, VLAN IP address (an idle IP
address is assigned to each VLAN), and VLAN mask.
Network access data on the intranet will not be affected if no idle IP address is available.
However, in this case, the device has no IP address for communication with the intranet and
external network and some functions will be affected, such as embedded library update,
web authentication, and Ingress. To solve this problem, connect the management interface
to the intranet switch so that the device can communicate with the intranet and external
network. The following will describe the configuration in detail.
When the device operates in bridge mode, the bridge IP address can be empty.
The bridge IP addresses must be on different network segments, and the VLAN
IDs must be unique.
6. Configure the gateway address and DNS address. Configure the default
gateway and DNS address. In this example, two idle IP addresses are
assigned as the bridge IP addresses. The default gateway points to the
virtual IP address of the front-end firewall.
Restart the device for the configurations to take effect. In the displayed
dialog box asking for your confirmation, click Yes.
9. onnect the device to the network. Specifically, connect WAN1 and WAN2 to
FW1 and FW2, and LAN1 and LAN2 to the intranet switch.
1.When the device operates in bridge mode, the gateway addresses of all PCs on the LAN
do not need to be modified. Retain the internal interface IP address that points to the front-
end device.
2.During data penetration, ensure that the WAN connects to the front-end router and the
LAN connects to the intranet switch. In this way, online behaviors can be monitored and
controlled when data is transmitted from the LAN to the WAN.
4.The bridge mode is implemented at the data link layer (the second layer of the OSI
model). Several network interfaces of the device are bridged. The data at the data link layer
and above layers can be penetrated. The IP/MAC address binding function and DHCP
function enabled on the original gateway can be implemented to support the data
penetration function at the data link layer.
5.The device does not provide the NAT function in bridge mode.
7.To enable functions such as antivirus and mail filtering, or to enable the device to
automatically upgrade the URL Database and enable applications to identify the rule library
and antivirus library, you need to configure the bridge IP address, default gateway, and DNS
and ensure that the device can access the external network. To check whether the device
can access the external network, upgrade the console and perform a ping test.
8.If functions that need to be redirected to the device are required, such as web
authentication and Ingress. The intranet covers multiple network segments, enabling
indirect routes to the network segments of the intranet to direct to the routing device of the
network intranet.
9.In bridge mode, the device supports VLAN trunk penetration, and 802.1q-VLAN
addresses can be configured as bridge IP addresses. In other words, the device can be
connected to the VLAN trunk in transparent mode.
The device monitors and controls function in bypass mode without modifying
the original network structure or causing network interruption. The device is
connected to the mirrored port of the switch or to a hub to ensure that
Internet access data of intranet users passes through this switch or hub. Both
outbound and inbound data are mirrored, thereby implementing monitoring
and control on Internet access data. In bypass mode, the network will not be
interrupted even if the device breaks down. Typical application scenarios are
shown in the figures below.
Example: The network topology is shown in the following figure. The device is
to be deployed in bypass mode. The customer requires that Internet access
data of all network segments on the intranet is under monitoring, that the
device automatically updates the embedded rule library, that web
authentication is performed for intranet users, and the device console can be
Based on the customer requirements and network topology, deploy the device
in bypass mode to communicate with both the external network and the
intranet. However, the device cannot access networks over a mirrored port. To
solve this problem, connect the device's management interface (DMZ interface)
to the intranet switch and assign an idle IP address for the device to
communicate with the public network and intranet. Then, connect the DMZ to
the intranet switch.
1. Configure the device and log in to the device by using the default IP
address. For example, to log in by using the LAN interface, whose default
IP address is 10.251.251.251/24, configure an IP address on this network
segment on the PC and log in to the device by accessing
https://10.251.251.251. The default login username and password are both
admins.
Restart the device for the configurations to take effect. In the displayed
dialog box asking for your confirmation, click Yes.
1.The bypass mode applies when a hub or the switch acts as a mirrored port. If the switch
does not have a mirrored port, a hub can be deployed before the switch.
2.In bypass mode, the traffic rankings, and active connection rankings are displayed as
invalid.
3.In bypass mode, TCP control is achieved by sending reset packets through the DMZ
interface. Therefore, ensure that PCs and public network servers can receive the reset
packets sent through the DMZ interface.
4.Many functions cannot be implemented in bypass mode, such as VPN and DHCP
functions.
5.In bypass mode, the device mainly implements the monitoring function, and the control
function is not as comprehensive as in route mode and bridge mode. Only TCP connections
can be restricted, such as URL filtering, keyword filtering, and mail filtering. User Datagram
Protocol (UDP) connections are not restricted, such as P2P connections.
6.In bypass mode, the traffic diagrams are displayed only when the mirrored interface is a
WAN interface. When a WAN interface is connected, there is only received traffic and no
transmitted traffic.
Refer to Chapter 3.3, Chapter 3.13, and Chapter 3.6 for the configuration of
modules Real-time Status, System Management, and User Authentication
and Management.
In the navigation area, choose System Management > Network > Interfaces.
The Interfaces pane is on the right, as shown in the following figure.
Zone: indicates the logical interface area of a network interface. A LAN interface
functions as an intranet interface and therefore needs to add to the LAN. A WAN
interface acts as a WAN interface and needs to add to the WAN. If multiple WAN
interfaces are required, apply for multi-line authorization. A DMZ interface
functions as an intranet interface. Important servers can be connected to the
DMZ, and the firewall settings on the device can restrict the access of intranet
users, thereby ensuring the security of the servers. For details about firewall
settings, see section 3.2.2.
MTU: Indicates the MTU of a network interface, which ranges from 700 to
1800. The MTU must be set to at least 1280 if IPv6 is enabled. Otherwise, It will
clear the IPv6 addresses.
Dialup Log: Indicates the dialup log information about a network interface.
The procedure for configuring a network interface is as follows:
On the Interfaces page, click the name of the physical interface. For example,
to configure eth0 on the LAN, click eth0. The LAN Interface page is displayed,
as shown in the following figure.
To configure eth2 on the WAN, click eth2, and the WAN Interface
Configuration page is displayed.
In the navigation area, choose System > Network > Network Interface
Configuration. The Interface
MTU: Indicates the MTU of a network interface, which ranges from 700 to
1800. The MTU must be set to at least 1280 if IPv6 is enabled. Otherwise, it will
clear the IPv6 addresses.
To configure a bridge, click its name. The Bridge Configuration page shown in
the following figure is displayed. To change the IP address of the default
gateway, change it to another IP address on the same segment. Otherwise, you
need to change it on the Deployment page.
An IPv4 or IPv6 address can be configured for the bridge. In IP Address, enter
the ID and IP address of each VLAN. The IP address assigned to a VLAN must
be idle. If VLAN 2 exists and resides on network segment
10.10.0.0/255.255.0.0, and IP address 10.10.0.1 is not used on the intranet,
2/10.10.0.1/255.255.0.0 can be entered in the IP address list. Add information
about other VLANs (802.1q) one by one on different rows.
There are two high availability (HA) modes: Active-Standby and Active-Active. In
Active-Standby mode, two devices interwork with each other over a
communications interface for mutual backup. This mode applies when there are
two lines in Active-Standby mode. The two devices connect to the active and
standby lines. When the active line fails, the standby line and standby device
become active. The configurations on the standby device are the same as those
on the active device.
2. Select Active-Standby and click Settings. The dialog box shown in the
following figure is displayed.
Device Name: Enter a name for distinguishing the current device from the
other.
Priority: Set the priority of two devices. The recommended host priority is
high, and the standby priority is low.
Primary Link: in the active/standby mode, you can set two sets of HA
ports, the Primary Link and the Secondary Link. The Primary Link is a
required option. The Secondary Link is a fillable option. In addition, the
network configuration of Primary Link and Secondary Link are not
synchronized. In active/standby mode, you can use the network port of the
DMZ port or other unconfigured area.
Shared Secret: Configure a key used by the active device to connect to the
standby device. This key must be the same as that configured for the
standby device.
Alarm Options: Click alarm options, you can jump to the email alarm
events settings page and select the high availability event, as shown below:
4. Detection method.
5. Action.
After low has been selected on the priority of the standby device, the
configuration method is the same as the active device. Please note that the
standby device's priority cannot be the same as the active device. The
primary link of the standby device needs to write the address of the active
device. Detection method and Action refer to the active device
configuration.
8. Connect the active and standby devices according to the physical topology,
and connect the primary link interface of the two devices.
9. Power on the active device first, followed by the standby device. After the
normal operation, the configuration of the active device is synchronized to
the standby device through the primary link. After the active and standby
devices are successfully established, the status is as follows:
due to a link fault. In addition, ensure that the device configuration and user
status are consistent with those on the other device. The following figure
shows a typical application scenario.
1. In the navigation area, choose System > Network > High Availability. The
High Availability page is displayed.
Device Name: Enter a name for distinguishing the current device from the
other.
Alarm Options: Click alarm options, you can jump to the email alarm
events settings page and select the high availability event, as shown below:
After configuration, the page showing the information about the online
device is displayed.
The Controller can synchronize the configuration, click Sync Now, and the
device will send a synchronization signal. Perform device configuration
synchronization and information synchronization. All node states are
displayed, named Online Node, showing all online nodes.
The configurations on the node device cannot be modified and can only be
synchronized from the control device.
1. In Active-Standby mode, the two devices need to be connected using a heartbeat cable
instead of a serial cable. Therefore, the deployment mode needs to be adjusted. A direct
upgrade is not supported by default.
3. In Active-Standby mode, a DMZ interface or a network interface that does not belong to
any zone can be used. The network configuration of the HA interface will not be
synchronized. If a DMZ interface is configured as the HA interface, the network
configuration of the DMZ interface will not be synchronized either.
5. The Active-Active mode is exclusive with an Ingress policy or the security desktop. If an
Ingress policy or security desktop policy is configured, the Active-Active mode cannot be
enabled.
6. In Active-Active mode, no physical interface is required if a node device can route to the
control device.
8. A device supports only Active-Active in bridge mode and Active-Active and Active-Standby
in route mode. If Active-Standby is used in bridge mode, an upgrade cannot be performed,
and a message will be displayed, prompting the customer to change the HA mode to Active-
Active.
SPs can be synchronized by default, but those with a special mark cannot. For
KBs and custom devices, synchronization is supported if the installed patch
packages are the same (insensitive to the sequence). New configurations of
custom devices also support synchronization.
Active-Standby Active-Active
On the Static Routes pane, you can set static routing policies. When the device
needs to communicate with IP addresses on different network segments, static
routes must be configured. IPv4 and IPv6 static routes can be added.
In the navigation area, choose System > Network > Static Route. The Static
Route pane is displayed on the right, as shown in the following figure.
To solve this problem, a static route needs to be set for forwarding the data
destined for network segments on the intranet to the L3 switch, and the L3
switch will forward the data to corresponding PCs on the intranet.
Click Routing Table to display all system routes, including IPv4 and IPv6
routes.
The device does not support dynamic routing protocols. You need to configure routes on
the Static Route page.
OSPF opens and sets up OSPF dynamic routing protocols for IAG devices,
including network configuration, interface configuration, parameter
configuration, information display, debugging options, etc. In addition, these
devices support IPv4 OSPF. It is shown in the figure below:
Check Enable OSPF to enable it, and show the prompts below:
Configure Virtual Link: When the area where IAG devices are located is not
adjacent to the OSPF backbone area, the virtual link needs to be enabled and
configured. Click Set Virtual Link to pop up the following page:
Router ID: Enter the router ID on the opposite terminal establishing the virtual
link, to indicate which router the virtual link is established.
Hello Time: The retransmit interval of Hello messages, with a default value of
10s.
Dead Time: If the Hello message has not been received after the dead time,
the OSPF neighbor is considered unreachable, and it is generally set to 4 times
the Hello interval, with a default value of 40s.
Click Advanced Settings to set up the route redistribution and NBMA neighbor
configuration, as shown in the following figure:
3.11.2.6 HOSTS
The HOSTS file is a built-in host file on the unit, containing the mapping
information of IP addresses and domain names/host names.
To add a new Host entry, click Add and specify the fields on the following page.
GRE Tunnel: Used to configure GRE Tunnel and support GRE OVER IP, GRE
OVER OSPF, and GRE OVER IPSECVPN. The settings interface is shown below:
Tunnel Alias: Add an alias for the number of the tunnel port and customize
the alias.
IP Address: Used as the IP address of the new tunnel, the network segment
where the IP address is located in the OSPF running network segment.
Zone: The zone where the outbound interface is located; you can select LAN
area or WAN area.
Src Address: The source addresses the actual public network routing of the
outbound interface at the source port.
Dst Address: The actual public network routing destination address of the
inbound interface at the destination port.
Advanced: Set MTU value, message check, and link-state check, shown as
follows:
By default, four commonly used ports are provided and closed. When required
to open the ports, click the Disable button to switch to the Enable button in
green. Finally, click Commit to save the changes.
To customize requirements, click Add button, and enter the port number and
description.
3.11.2.9 DHCP
For example, the device in route mode acts as a gateway for implementing
Internet access for intranet users. Intranet users are connected to the LAN
interface, whose IP address is 192.168.1.1. Totally 100 PCs on the intranet need
to be assigned IP addresses. The IP address pool is 192.168.1.100–
192.168.1.199. The PC of the manager needs to be assigned a fixed IP address
192.168.1.100.
In Options, set the gateway address, DNS addresses, and WINS addresses.
Click Add and enter the name, fixed IP address, MAC address, and
hostname in the dialog box.
To view the DHCP operating status and IP address assignment status, choose Status >
DHCP Status > Status in the navigation area.
The SANGFOR IAG peels off the special protocol headers, analyzes these
packets' characteristics and matches the packets with embedded special
protocol rules. Then the device can authenticate, audit, and control the raw
data.
Currently, the SANGFOR IAG can peel off packet headers of the following
protocols: VLAN, MPLS, PPPoE, L2TP, LWAPP, CAPWAP, WLTP, and user-defined
protocols.
In the navigation area, choose System > Network > Protocol Extension. The
Network Protocol Extension pane is on the right, as shown in the following
figure.
If the special protocol is in the protocol de-encapsulation list but does not use
the default port for communication, for example, L2TP does not use the
default port 1701 for communication, double-click the protocol rule and edit
port information. The information about ports can be separated by a comma
(,).
5. Some data may have two IP headers after being encapsulated by a special protocol such
as L2TP. After protocol de-encapsulation, the outer IP header (lower layer) is peeled off.
Therefore, authentication, audit, and control are performed based on the inner IP header
(upper layer). The Internet access policies of the device should not block the communication
that is performed based on the outer IP header.
6. By default, the device supports the de-encapsulation of single-layer 802.1q VLAN headers
regardless of whether protocol de-encapsulation is enabled. If 802.1q is used together with
other protocols, such as PPPoE, VLAN (Q-in-Q) de-encapsulation, and PPPoE de-
encapsulation need to be selected.
Select Enable External Optical Bypass module to enable the optical bypass
module. Next, an optical bypass switch needs to be connected.
Before enabling the optical bypass module for the first time, connect an optical bypass
switch.
At this time, a message will prompt and ask you to restart the device.
In Type, select optical bypass. Currently, only domestic bypass switches are
supported. See the following figure.
Click Add Optical Bypass Module to add an optical bypass mode. In the Add
Optical Bypass Module dialog box, Optical Module ID and Bridge. Enter the
module ID on the bypass switch in Optical Module ID. See the following figure.
You can view the information about the current VPN connections and network
traffic on this page. See the following figure.
You can click Tunnel NAT State and query the tunnel NAT status.
You can click Refresh to refresh the current page after VPN status changes.
You can click Display Options and select options from the list. All the options
are selected by default.
You can click Start Service to start the VPN service. You can click Stop Service
to stop the VPN service.
If multiple WAN port lines are used, they must be set through Multi-line
Options. You can add, delete, and modify the line information and modify the
SDWAN path selection policy.
When the device has a multi-WAN port and enables multiple lines, check
Enabled and add multiple lines.
Click the Add to add a line. The dialog box appears as follows:
The Use static Internet IP address option should be filled in according to the
actual situation. The setting is not necessary if it is a dynamic IP address.
1. When the line type is Ethernet, you must fill in Test DNS, and the filled DNS address
must be a normal public network DNS address. If it is an ADSL dial-up line, it can be left
blank.
2. The Bandwidth Preset item should be filled with the bandwidth parameters according
to the actual situation of the line.
Click the Advanced on the Multi-line Options interface, and the Multiline Advanced
Settings will appear as follows:
Check Enable DNS detection to enable the status detection for multi-lines.
Interval (1-120) set the interval frequency of the DNS detection through the multi-line
status detection function. This setting is activated only when DNS detection is enabled.
It supports three routing modes. If the peer device has no routing, the path is
wan1-wan1 by default. Otherwise, the optimal path is preferred (If the line label
is not configured, it should be processed as per the wan1-wan1 by the same ISP).
a) Specified path: Select a path according to the LAN service. It is often used
in video conferencing services or some services that have some
requirement for lines.
c) Prioritize the top-quality line: Select the top-quality line based on the real-
time quality of the line. It is often used for services that have high
2. In case of a line fault, the line will switches within 1s, without disconnecting
the service.
4. Fully-loaded line switching function. If the loaded path is used, one fully-
loaded line will automatically switch to another line.
The default Global line selection policy cannot be deleted. Add a new
SDWAN Path Selection policy:
LAN Service: Select the LAN service that activates the line.
Prioritize the use of the preferred. If the preferred path is busy or fails, it
attempts to match the next one after it.
For example, the headquarters and branches have the specified link and VPN
link. The video conference will select the specified path while other services will
use VPN paths.
If Line 1 is the static Internet IP and the Line 2 is the specified path, the devices
wan1 and wan2 correspond to Line 1 and Line 2.
3. Add the OTHERS use VPN under the Advanced> Edit LAN Service, and
select all services.
4. Select the Specified for path selection mode. Select the Line 1 for VPN
Path. Next, select the OTHERS use VPN.
5. Create a SDWAN policy Video. Select the Selected Video for LAN Service.
Select Specified for the Mode. Select the specified path.
6. Make sure that the Video SDWAN path selection policy on the interface.
In this way, the branch can use the specified path to have a video
conference with the headquarters through the VPN. Others in the VPN
tunnel go through the Internet line so that the video conference traffic is
guaranteed.
2. If all the specified paths are busy or fail, it will choose the optimal one from the remaining
lines
The headquarters and the branch have two VPN links. The branch accesses the
headquarters' service according to the dynamic loads based on the residual
bandwidth.
1. Create a SDWAN policy; select all services for the service, Multiline
Options for the mode, two lines of the branch for the load path, and
Based on bandwidth ratio for the LB mode.
1. Through the check, the flow rate displayed by the VPN detailed connection information is
lower than the configured bandwidth because the VPN will be encrypted, and the data
packet will be added with the VPN header field.
2. The current version does not display the status of each connection line in the foreground.
The tool cannot control the flow rate of each TCP connection, so it only can be seen that two
lines are fully loaded with bandwidth in the foreground.
The headquarters and the branch have two VPN links. The branch accesses the
services of headquarters according to the path selection based on the link
quality.
1. Create a SDWAN policy; select all services for the service, Multiline
Options for the mode, two lines of the branch for the load path, and
Prefer the optimal path for the LB mode.
1. The delay statistics of the detailed connection information line will have an error of less
than 5ms; the out-of-order packets will be counted into the packet loss rate, so sometimes
the packet loss rate value will be displayed without the packet loss, which may be due to the
out-of-order packet.
2. When the link quality changes, the current connection information will not perform the
path selection, and only the newly-built connection will perform the path selection.
Under the SDWAN Path Selection, the service priority is classified into five
levels: Highest; High; Medium; Low; Lowest. SDWAN performs traffic control
(QoS priority) on data through service priority.
For the usage scenario, the headquarters and the branch have two VPN links:
ISP1 and ISP2. Generally, the branch accesses the headquarters' service
according to the dynamic load based on the residual bandwidth. Thus, when
the video conference needs traffic, the traffic of the video conference is
guaranteed preferentially.
2. Add the OTHERS use VPN under the Advanced > Edit LAN Service, and
select All Services for LAN Service.
3. Create a SDWAN policy OTHERS use VPN, select the current branch, and
select All Services for LAN Service, Multiline Options for the mode, two
lines of the branch for the load path, Based on bandwidth ratio for the
LB mode, and Low for Service Priority.
Create a SDWAN policy OTHERS use VPN, select the current branch, and
select All Services for LAN Service, Multiline Options for the mode, two
lines of the branch for the load path, Based on bandwidth ratio for the
LB mode, and Low for Service Priority.
4. Create a SDWAN policy Video, select the current branch, and select the
Video for LAN Service, Specified for the mode, Telecom for the line, and
Highest for Service Priority.
Set the Web agent information, MTU value of VPN data, minimum compression
value, VPN monitoring port, VPN connection mode, broadcast packets, and
performance information required for configuring VPN connections.
Web agent indicates the addresses of the dynamic IP addressing file in the web
servers, including the active Web agent address and standby Web agent
address. See the following figure.
If WebAgent Password is set, it cannot be recovered once it is lost, and you have to contact
the customer service center of Sangfor to regenerate a file excluding the WebAgent
password and replace the original file. If Shared Key is set, all VPN sites cannot be
interconnected with each other until they must set the same Shared Key. In the case of
multiple lines and fixed IPs, WebAgent can be filled in the format of IP1 # IP2: Port.
MTU Value (224-2000) sets the maximum MTU value for VPN data. The default
value is 500.
Min Compression Value (99-5000) sets the minimum packet size for VPN data
compression. The default value is 100.
VPN Listening Port (Default: 4009) sets the monitoring port for the VPN
service. The default value is 4009. You can change it as required.
Modify MSS is used to set the maximum splice of VPN data for the UDP mode.
Generally, the default values of the MTU Value, Minimum Compression Value, and Modify
MMS parameters are recommended. However, if you need to change the values, contact
SANGFOR technical engineering for help.
Threads: Sets the maximum number of VPNs connected to a VPN device. The
default value is 20, and a maximum of 1280 VPNs are allowed. If you need to
change the value, contact SANGFOR's technical engineers for help.
When you click Detect USB-Key, the system checks whether the computer used
to log in to the gateway console is connected with a USB key. If no USB key driver
is installed, it asks you whether to download the driver. You can click Download
USB Key Driver to download the driver and then install it.
Before generating a USB key, you must install the USB key driver. Otherwise, the computer
cannot identify the USB key hardware. To prevent USB key installation failures caused by
program conflict, exit the third-party antivirus and firewall software during driver
installation.
You can enter a username or user group and click Search to find the user or
user group, and then edit the found user or user group. A found user is
highlighted. See the following figure.
You can click Advanced Search and set filters for searching for users. You can
select the username fuzzy match option. (If it is not selected, an exact keyword
match is implemented. Separate keyword using a comma.) The search result
includes the following information: user group, group attribute (unlimited,
enabled, or disabled), status (unlimited, enabled, or disabled), type (unlimited,
mobile, or branch), DKEY status (unlimited, enabled, or disabled), and user
idleness duration (unlimited, one year, one month, one week, or user-defined).
See the following figure.
You can click Search to search for information. You can click Cancel to cancel
information.
You can click New User to set account information, including the
username, password, description, algorithm, and type. See the
following figure.
Before using Radius authentication or LDAP authentication, set the authentication server in
Algorithm: You can select from the DES, 3DES, AES, SANGFOR_DES, AES192
and AES256. Two peers must use the same algorithm.
Inherit Group Attributes: To group users. If you select this option, the User
Group settings are activated. You can add a user to a user group so that the user
uses the common attributes of the group.
Add a user group before using the Inherit Group Attributes option. After a user is added
to a group, the Algorithm, Enable My Network Places, Permission Settings, and
Advanced parameters cannot be set separately.
Enable DKEY: Specifies whether to enable DKEY authentication for mobile users.
If it is selected, connect the DKEY to a USB port of the computer and click DKEY
Generate DKEY.
Effective Time and Enable Expiry Time: Sets an account's effective time and
expiration time.
This parameter sets SANGFOR's proprietary VPN technology. It ensures high bandwidth use
efficiency when the bandwidth is low and speeds up data transmission. However, it does not
apply to all network environments. You can set it based on the actual situation.
Disable Internet Service for the User After Connecting to HQ: This option is
valid only for mobile users. If selected, a mobile user connected to a VPN can
access the VPN but cannot access the Internet.
Before assigning permissions, add the required services at Select LAN Service. For details,
see the Intranet Service Settings section.
For details of route selection policy settings, see Section 3.2.3.4 "Multi-Line
Route Selection Policy." For more information on multicast service settings, see
Section 3.10.12.3.
Channel parameter settings cover the VPN channel timeout interval, dynamic
rate detection, and channel traffic control.
Timeout: When the network has a significant delay and high packet loss rate,
you can set a timeout interval on a SANGFOR VPN for the network. The timeout
interval of each channel depends on the server configuration. The default
timeout interval is 20s. For a poor network environment, you can increase the
timeout interval.
Enable tunnel dynamic probe: When the local or peer end has many lines, this
option is applicable. After it is selected, the SANGFOR VPN regularly detects each
line's delay and packet loss rate and selects an optimal line based on the
detection result for data transmission.
Enable tunnel traffic control: When there are multiple VPN branches or mobile
users, this option prevents one branch or user from occupying all the
bandwidth, which slows down data transmission for the other branches or
users. You can assign upstream bandwidth and downstream bandwidth to each
connected user to ensure each user's appropriate data transmission rate.
The setting of Enable tunnel traffic control is a value range other than a specific value. For
example, if you set it to 100 kbps, the bandwidth varies within the range of 80 to 120 kbps.
Click Add to enter the matched source subnet segment, proxy subnet segment,
and subnet mask required by this rule in the dialog box and to allow the device
to assign an IP segment from the virtual IP pool automatically. The page is as
follows:
The subnet mask must be matched in configuration. NAT in the tunnel only performs NAT
on the masked network segment, and the host number remains the same.
Before using Tunnel NAT in Advanced, add the site's required virtual IP network segment in
the Virtual IP Pool.
Click Add Group to set the user group name, description, and common
attributes of group members. The page is as follows:
LAN Permissions and Advanced are the same as those buttons in New User.
Refer to the corresponding description in New User.
Click Import Domain User to import a user account from the LDAP server (set
up an LDAP server on the LDAP Settings page before importing). The imported
user uses the LDAP authentication method by default and does not contain a
password. The page as follows:
Check the users to be imported, select the user type, including mobile user or
branch user, a user group, encryption algorithm, compression, and network
neighborhood, and then click Import to import users from LDAP server into
VPN device.
Click Import Text User to import user information from TXT or CSV files. You
can choose to import users into a user group and use group properties. You
can also set whether the imported user type is mobile or site. TXT file is
formatted as "user name, password" and other user information cannot be
imported. CSV file is formatted as the same as TXT files. Replace the English
comma with an empty column. The page is as follows:
Click Export User to export the user from the device to local for saving. You can
choose whether the exported user password is encrypted or unencrypted. The
page is as follows:
Default User: This will be matched if the user cannot be found in the user list
and the authentication method is consistent with the default user. In addition,
when there are multiple sites of certificate authentication in LAN, the default
user is enabled and selected as certificate authentication, and the
corresponding rules are configured. Therefore, it is unnecessary to add
certificate authentication users to the user list one by one. The default user
with the authentication enabled is configured as follows:
This function must be enabled only when this device is used as a branch and needs to
connect to HQ devices. If this device is an HQ device, you do not need to enable this
function.
You can click Add to add a link to the HQ. See the following figure.
HQ Name and Description are used to indicate a link. You can set them as
required.
Test requests are sent from the local computer instead of the device. If the Web agents are
set to domain names, a test success indicates that the corresponding page exists.
Otherwise, the page does not exist. If the Web agents are set to fixed IP addresses, a test
success indicates that the information entered in the IP address format: Port number is
correct. However, the test success does not mean that the VPN connection is successful.
Protocol: It can be set to TCP or UDP to indicate VPN packet type. The default
option is UDP.
Data Encryption Key, Username, and Password must be set according to the
account information provided by the HQ.
Peer Root Certificate: Check it when the same CA does not issue the
certificate used by the headquarters as the local one.
The inter-carrier function must be activated when necessary. Otherwise, it is not effective.
For IAG interconnection, both IAGs must enable this function. For interconnection between
a module user and the IAG, only the IAG must enable the function.
You can click Edit LAN Service Access Right and assign permissions to the
peer end connected to a VPN. It enables you to specify the local services
available to the peer end. After setting the preceding parameters, select Allow
to activate the connection. Then, click Save.
Virtual IP Pool supports the creation of a virtual IP address pool for branch
users. The interface is shown as follows:
In the IP pool of the branch user, the virtual IP segment for the branch's access
to the headquarters replaces the original segment at the branch to a segment
in the virtual IP pool, solving the LAN IP conflicts when two branches for the
same segment accessing the headquarters. Click New, select Branch user for
type, set the Start IP and End IP for virtual IP addresses (Click Get to calculate
the applicable End IP automatically), netmask, and a number of segments of
the branch. See the picture below:
Subnet mask: The subnet mask of the virtual IP segment. It shall be consistent
with the subnet mask at the branch.
After setting the branch virtual IP segment, create a new user in VPN
Information Settings/User Management, select Branch for user type, and
then configure the branch segments to be switched in Advance/NAT Settings
in Tunnels.
List the intranet subnets of a hardware device so that VPN users can access the
intranet subnets of the HQ. For example, if the HQ has to subnets
(192.200.100.x and 192.200.200.x), you can set the local subnet list to enable
interconnection among mobile users, branch users, and HQ intranet users. The
configuration procedure is as follows:
Subnet Segment and Subnet Mask must be set to the network ID and subnet
mask of a network
segment other than the directly connected network segment of the LAN/DMZ
port of the IAG at the local end.
2. Set reachable routes for the subnets in the Static Routes window. (For
details, choose System > Network > Static Routes.
The local subnet list acts as a statement. The network segments defined in the list are
regarded by SANGFOR's VPN device and software client as VPN network segments. This is
because all the packets intended for the network segments are encapsulated in the VPN
channels for transmission when the packets reach the VPN device or software client.
Therefore, if subnet segments are added to the list, static routes are required to access the
subnets.
The IAG provides a powerful inter-channel routing function for VPNs. It enables
interconnection among VPNs (software/hardware) to create a real mesh VPN
network.
Source IP: Indicates the network ID of the source IP address. In this example,
set it to 172.16.1.0. Subnet Mask (Source): Indicates the subnet mask of the
source IP address. In this example, set it to 255.255.255.0.
Destination Route User: Indicates the VPN user to whom the route points.
Source IP and Destination IP are used to match the source IP address and destination IP
addresses of data. When data in a VPN channel matches the settings, the route is used to
send the data to the specified VPN device. Destination User indicates the destination VPN
device of data to be routed. In this example, the username shanghai is specified in the
Connection Management window for the Shanghai branch to connect to the HQ through a
VPN. Therefore, data with the username shanghai is sent to the HQ.
Source IP: Indicates the network ID of the source IP address. In this example,
set it to 10.1.1.0. Subnet Mask (Source): Indicates the subnet mask of the
source IP address. In this example, set it to 255.255.255.0.
Destination User: Indicates the VPN user to whom the route points. In this
example, set it to Guangzhou.
If a branch accesses the Internet through the HQ, you must choose System Management >
Firewall > NAT Proxy and add proxy rules for VPN network segments. For details, see the
firewall setup description.
The IAG provides a function for interconnecting with third-party VPN devices. It
can set up standard IPSec VPN connections with third-party VPN devices.
3.11.3.10.1Phase I
Set the information about the VPN devices that must set up standard IPSec
connections with the IAG. See the following figure.
Outgoing Line: indicates the line used to set up standard IPSec VPN
connections with the peer end. Select a line egress and click Add. The Edit
Peer Device dialog box is displayed. See the following figure.
Address Type: The types include fixed IP address, dynamic IP address, and
dynamic domain name. If you select static IP Address at Peer End, you must
enter the fixed IP address and the pre-shared key. See the following figure.
If you select Dynamic Domain Name at Peer End, you must set the dynamic
domain name and the pre-shared key. See the following figure.
If you select Dynamic IP Address at Peer End, you must set the pre-shared
key. In this case, connections can be set up only in the aggressive mode. See
the following figure.
When you click Advanced, the Advanced Settings dialog box is displayed. See
the following figure.
ISAKMP Lifetime: Set the survival period of the phase I policy. The unit can
only be second.
D-H Group: Set the Differ-Hellman group for the two parties performing
negotiation. The options include MODP768 Group (1), MODP1024 Group (2),
and MODP1536 Group (5).
Select Enable DPD to enable the DPD function, which helps a VPN device to
detect device faults that occur at the peer end of a channel.
Detection Interval: Set the interval for detecting the peer end status. It ranges
from 5s to 60s.
Max Timeout Count: Set the number of times that detecting the peer end
status times out. It ranges from 1 to 6. It is regarded that the peer end device is
faulty when the number reaches its max.
1. Standard IPSec supports only the routing mode but does not support the bridge and one-
armed mode. Standard IPSec does not allow both ends to set their peers to the dynamic IP
address mode at the same time.
2. If you set ISAKMP Encryption Algorithm to SANGFOR_DES, both ends must be SANGFOR
devices.
3.11.3.10.2 Phase II
Configure the inbound policy and outbound policy of VPNs. See the following
figure.
Inbound Policy Settings send rules for the packets sent from the peer end to
the local end. Click Add. The Policy Setup dialog box is displayed. See the
following figure.
Inbound Service: Select the services that can access the local device. The
services must be predefined at VPN Configuration > Advanced Settings >
LAN Service.
Expiry Time: Set the effective time of a policy. The time must be predefined at
VPN VPN Configuration > Settings > Time and Schedule Settings.
You can select Enable Expiry Time and set the expiration time of the policy.
Select Enable This Policy and click Save.
Outbound Policy Ssend rules for the packets sent from the local end to the
peer end. Click Add. The Policy Setup dialog box is displayed. See the
following figure.
SA Lifetime: Set the survival period of the phase II policy. The unit can only be
second. Outbound Service: Select the services that can access the peer device.
The services must be predefined at VPN Configuration > Advanced Settings
> LAN service.
Security Options: Select the security policy for negotiation. Configure the
policy on the Security Options tab page.
Expiry Time: Set the effective time of a policy. The time must be predefined at
VPN VPN Configuration > Settings > Time and Schedule Settings.
You can select Enable Expiry Time and set the expiration time of the policy.
Select Enable This Policy. If the peer end adopts PFS, select Enable Perfect
Forward Secrecy. Click Save.
1. If PFS is enabled, the DH groups set in phase I and phase II for the peer VPN device must
be the same. Otherwise, IPSec VPN connections cannot be set up.
2. The outbound service, inbound server, and time settings for outbound and inbound
policies are extended rules of SANGFOR. The rules are effective only to the local device and
are not negotiated when VPN connections are set up with third-party devices. The source IP
addresses in the outbound policies and inbound policies correspond to Source and Peer
Service.
Set the security parameters used when standard IPSec connections are set up
with the peer end. See the following figure.
Click Save.
SANGFOR's VPN gateway uses the configured connection policy to set up IPSec
connections with the peer end.
The encryption algorithm specified in the security options encrypts the data used in phase II
of a standard IPSec connection. If multiple devices using different connection policies are
interconnected, add the policies to the security options.
The source IP addresses in the outbound policies and inbound policies correspond to
Source and Peer Service.
The outbound service, inbound server, and time settings for outbound and inbound policies
are extended rules of SANGFOR. The rules are effective only to the local device and are not
negotiated when VPN connections are set up with third-party devices.
3.11.3.12 Object
3.11.3.12.1 Schedule
Define the common period combinations, which can be used in the User
Management and Intranet Permissions windows. The current time of the IAG
prevails. See the following figure.
When you click Add, the Schedule dialog box is displayed. See the following
figure.
View and add data encryption algorithms supported by the IAG. The algorithms
encrypt the data transferred in the VPN network set up by the hardware device
to ensure data security. See the following figure.
The IAG provides the DES, 3DES, MD5, AES, SHA-1, SINFOR_DES, SCB2, SM2,
SM3, and SM4 encryption and authentication algorithms. You can add other
algorithms as required. Before adding them, contact SANGFOR.
In the certificate list, the certificates to be used are imported, including local
certificate and root certificate, shown as follows:
Certificate Type: Select the local certificate or root certificate type, as shown in
the following figure.
⚫ If the root issued by the certificate of the opposite terminal is not the same
as the local terminal’s local certificate, the root of the opposite terminal also
needs to be imported.
Select Key: Come from the application information list. Namely, select the
application information corresponding to the certificate to be imported.
It consists of LAN Services, VPN Interface, LDAP Server, and Radius Server
Settings.
The IAG can assign access permissions to VPN users, allow a specific IP address
or mobile user in the intranet of a branch to access only the specified intranet
services provided by specified computers, and set service parameters of
inbound and outbound policies third-party device interconnection. By
assigning service access permissions, the device can manage VPN channel
security.
The branch user branch1 with the intranet IP address 172.16.1.200 is allowed
to access only the HQ's FTP server, whose IP address is 192.168.1.20. Access
requests from other IP addresses and requests for accessing other services are
rejected. The configuration procedure is as follows:
In the LAN Service window, click Add. The Edit LAN Service dialog box is
displayed. You can set Service Name to a value that can be easily identified.
Select a protocol type. (In this example, the FTP service uses the TCP protocol.)
See the following figure.
1. Click Add. The IP Address Range Settings dialog box is displayed. Set the
The intranet service settings configured here are definitions. You then must assign intranet
permissions to user accounts in the User Management window. The settings can also be
used as the parameters for Local Service in Outbound Policy and Peer Service in Inbound
Policy for interconnection with third parties. For details, see the "Interconnection with Third
Parties" section.
3. In the Permission Settings dialog box, move the service configured for
Branch1 to the list on the right and select Allow. in this example, only the
service is allowed. Therefore, set Default Action to Reject.
After the preceding steps, the branch user branch1 with the intranet IP
address 172.16.1.200 can access the HQ's FTP server at 192.168.1.20. FTP
server access requests from other IP addresses in the same intranet as
Branch1 are rejected.
After the settings are configured, computers at the HQ cannot access Branch1, because the
destination IP addresses contained in Branch1's responses to the access requests from the
computers are not 192.168.1.20. The responses are blocked according to the intranet
permission settings.
Set the intranet interface mask of the IPSec VPN service and the IP address and
mask of the VPN virtual network adapter for the device. See the following
figure.
VPN Intranet Settings: Notify the peer VPN device of the mask of the local
VPN network segment. If you select an interface mask, the network segment
corresponding to the mask is notified to the peer VPN device. If the network
segment connected to the DMZ port needs to access the VPN, select the DMZ
port and set a subnet mask.
Click Add, add an idle intranet interface and set the intranet mask of the local
VPN device. The value 0.0.0.0 indicates that the mask of the network port is used.
You can select an intranet interface and click Delete to delete it.
You can click Edit and modify the masks of selected intranet interfaces.
Local VPN Interface Settings: Set the IP address and mask of the VPN virtual
network adapter of the device. Generally, the default IP address is
recommended. However, if an IP address conflict occurs, you can click Specify
and enter an IP address that not in use.
The VPN interface is a virtual interface of the device but not a physical interface.
The Saving settings fails message is displayed in the upper-left corner. You
can click View Error Information to view the details.
After you click View Error Information, a page is displayed detailing the cause
of the error.
When you click Add, the multicast service editing page is displayed. You can set
the IP address and port number of the service. See the following figure.
Click Add and add IP addresses and port numbers. See the following figure.
When creating a user in the User Management window, select the multicast
service in Multicast Service. See the following figure.
The VPN service of the IAG supports third-party LDAP authentication. If you
need to enable this-party LDAP authentication, set LDAP information on the
LDAP Server Settings tab page (including the LDAP server's IP address, port
number, and administrator password). See the following figure.
Set the LDAP server information and click Advanced. The LDAP Advanced
Settings dialog box is displayed. Set the parameters as required. See the
following figure.
The VPN service of the IAG supports third-party Radius authentication. If you
need to enable third-party Radius authentication, set Radius information on
the Radius Server Settings tab page (including the IP address, port number,
shared key, and Radius protocol of the Radius server). See the following figure.
3.11.4 Firewall
The Firewall page contains four panels: Firewall Rules, IPv4 SNAT, IPv4
DNAT, and IPv6 NAT. On the Firewall Rules, you can set specific rules to filter
the data forwarded between different device interfaces. Filtering conditions
include the destination protocol and port, source IP address, destination IP
address, and time. On the IPv4 SNAT panel, you can set source network
address translation (SNAT) rules for Internet access of intranet users or other
Source NAT purposes. On the IPv4 DNAT panel, you can publish intranet
servers to the public network, and destination network address translation
(DNAT) rules need to be set for Destination NAT. The NAT settings apply only
when the device is deployed in route mode.
You can set specific rules to filter the data forwarded between different
interfaces of the device. Filtering conditions include the destination protocol
and port, source IP address, destination IP address, and time. The Firewall
Rules panel is shown in the following figure. In Direction, set the direction to
which a filtering rule applies, which can be LAN<->DMZ, DMZ<->WAN,
WAN<->LAN, LAN<->LAN, DMZ<->DMZ, VPN<->WAN, or VPN<->LAN. After
selecting a filtering direction, you can manage Firewall Rules on the right pane,
including deleting or adding Firewall Rules.
For example, internal web servers are connected to the device's demilitarized
zone (DMZ), and common internal users are connected to the local area
network (LAN) zone. For server security purposes, users in the LAN zone can
access only Transmission Control Protocol (TCP) port 80 (web service) of the
servers in the DMZ, and other data is not allowed to be forwarded to the DMZ.
In this case, Firewall Rules between the LAN zone and DMZ need to be set. The
procedure is as follows:
1. Select LAN > DMZ in Firewall Rules. In the LAN > DMZ pane, click Add.
The following objects are referenced: network services, IP groups, and
schedule groups. For details about these objects, see sections 3.3.6
through 3.3.9.
2. Enter the rule name in Name and priority value in Priority No. The priority
value specifies the priority of the rule. A smaller priority value indicates a
higher priority. Enter the description of this rule in Description.
3. Set a rule to allow HTTP packets from the LAN zone to the DMZ.
Specifically, select Allow from Action, HTTP from Service, and All from
Source and Destination or enter an IP group. Select All Day from
Schedule and specify a period. Select LAN->DMZ from Data Flow. See the
following figure.
After you set the filtering rule, HTTP packets are allowed, and other data is
rejected by default.
4. Modify the filtering rule if required. Select the filtering rule and click Delete
to delete the rule. Click Enable to enable the filtering rule. Click Disable to
disable the filtering rule. Click Move Up or Move Down to change the
priority of the filtering rule. A filtering rule with a smaller priority value will
be preferentially matched.
To edit a rule, click the rule's name and then edit the rule in the displayed
dialog box.
By default, the firewall module will reject the traffic. However, the LAN > WAN dual and the
LAN > DMZ are allowed by configuring the filtering rule of the firewall by factory settings.
On the IPv4 SNAT panel, you can set SNAT rules for translating source IP
addresses of data that meets the specified conditions and is forwarded by the
device. For example, when the device operates in route mode, it serves as a
proxy to implement Internet access of intranet users, and SNAT rules need to
be set for translating source IP addresses. You can manage SNAT rules,
including adding and deleting SNAT rules. See the following figure.
1. On IPv4 SNAT, click Add. In the dialog box shown in the following figure,
select Enabled and enter a rule name in Name.
2. In WAN Interface, set a WAN interface used for data forwarding. This rule
will be matched only when data is forwarded to the specified network
interface. In this example, the device needs to forward the data from two
WAN interfaces. Therefore, select All WAN interfaces. See the following
figure.
5. Modify the IPv4 SNAT rule if required. Select the rule and click Delete to
delete the rule. Click Enable to enable the rule. Click Disable to disable the
rule. Click Move Up or Move Down to change the priority of the rule. A
rule with a smaller priority value will be preferentially matched. To edit a
rule, click the rule's name and then edit the rule in the displayed dialog
box.
6. Add a filtering rule to allow data from the LAN to the wide-area network
(WAN). For details, see section 3.2.2.1.
Example 2: The device operates in route mode. There are two external
network lines: a telecom line and an education network line. According to the
customer's requirements, when a computer on internal network segment
192.168.1.0/255.255.255.0 accesses service port 80 on network segment
202.3.3.0/255.255.255.0 education network, the source IP address of the
computer will be translated to the IP address of the WAN1 interface, which is
202.96.1.1.
2. Set the Link Load Balancing. The device routes data from the internal
network segment to the education network segment over WAN1
(Education Network Line) based on the specified Link Load Balancing. For
details, see section 3.2.3.4.
3. On IPv4 SNAT, click Add. In the dialog box shown in the following figure,
select Enabled and enter a rule name in Name.
4. In the WAN interface, set a WAN interface used for data forwarding. In
this example, address translation is performed for data forwarded over
WAN1. Therefore, select WAN1 from Interface.
8. Modify the IPv4 SNAT rule if required. Select the rule and click Delete to
delete the rule. Click Enable to enable the rule. Click Disable to disable the
rule. Click Move Up or Move Down to change the priority of the rule. A
rule with a smaller priority value will be preferentially matched. To edit a
rule, click the rule's name and then edit the rule in the displayed dialog
box.
9. Add a filtering rule to allow data from the LAN to the wide-area network
(WAN). For details, see section 3.2.2.1.
The NAT settings apply only when the device is deployed in route mode.
On the IPv4 DNAT panel, you can configure the device to perform DNAT for
data. For example, publish an intranet server and map the services of this
server to the public network so that Internet users can access these services.
See the following figure.
1. On the IPv4 DNAT panel, click Add and select Basic Rule or Advanced
Rule, as shown in the following figure.
The Basic Rule option sets a simple IPv4 DNAT rule for which only
necessary conditions need to be set, whereas the Advanced Rule option
applies to complex IPv4 DNAT requirements. In this example, select Basic
Rule. In the displayed dialog box, select Enabled and set the rule name.
2. In Protocol, set the data conditions of this DNAT rule and the destination
IP address and port.
In Protocol: select the type of protocol data for which IPv4 DNAT needs to
be performed. In Dst Port, seta destination ports. In this example, NAT
needs to be performed for HTTP service access data. Therefore, select TCP
from Protocol and set Dst Port to 80. Set the IP address to which the
destination IP address will be translated in Mapped IP Address, and the
port to which the destination port will be converted in Mapped to Port. In
this example, the destination IP addresses of access data to service port 80
will be translated to 192.168.1.2. See the following figure.
Select Allow, and TCP port 80 access data in six directions will be allowed:
LAN<->WAN, DMZ<->WAN, and LAN<->DMZ.
3. Modify the IPv4 DNAT rule if required. Select the rule and click Delete to
delete the rule. Click Enable to enable the rule. Click Disable to disable the
rule. Click Move Up or Move Down to change the priority of the rule. A
rule with a smaller priority value will be preferentially matched.
To edit a rule, click the rule's name and then edit the rule in the displayed
dialog box.
1. On the IPv4 DNAT panel, click Add and select Advanced Rule. On the
displayed IPv4 DNAT page, select Enabled and set the rule name.
2. In the WAN interface, set a WAN interface, and DNAT will be performed
for the data forwarded over this WAN interface to the device. In this
example, the public network IP address corresponding to the domain
name www.sangfor.com is the IP address of WAN1. Therefore, select
WAN1.
3. In Source Address, set the source IP address in the DNAT rule. In this
example, the intranet server is mapped to the public network, and the
public network IP address is not fixed. Therefore, select All.
5. In Protocol, set the protocol and port for DNAT. In this example, DNAT is
performed for access requests to service port 80. Therefore, select All in
Src Port as the source port is usually random.
7. In Mapped Port, set the port to which the ports of access requests
meeting the conditions are converted. In this example, the port of the
destination server 192.168.1.80 is 80. Therefore, select Specified and enter
80.
8. Select Allow firewall automatically allows data, and TCP port 80 access
data in six directions will be allowed: LAN<->WAN, DMZ<->WAN, and
LAN<->DMZ.
9. Modify the IPv4 DNAT rule if required. Select the rule and click Delete to
delete the rule. Click Enable to enable the rule. Click Disable to disable the
rule. Click Move Up or Move Down to change the priority of the rule. A
rule with a smaller priority value will be preferentially matched.
To edit a rule, click the rule's name and then edit the rule in the displayed
dialog box.
The IPv4 DNAT settings only apply when the device is deployed in route mode.
On the IPv6 NAT panel, you can set source and destination IPv6 NAT. Source
NAT involves translating the source IP addresses of data that meets the
conditions and is forwarded by the device. Destination NAT involves translating
the destination IP addresses of data meeting the conditions.
You can manage source IPv6 NAT rules, including adding and deleting rules.
See the following figure.
1. Click Add and select Source NAT. See the following figure.
Source: Select an internal network interface of the source zone from Interface
and enter the prefix of an internal IPv6 address in IP Addr/Prefix, for example,
2000::/64.
Source NAT: Set the range of IPv6 addresses to which source IP addresses of
data meeting the conditions are translated. In this example, source IP
addresses will be translated to 3000::/64.
2. Click Add and select Destination NAT. See the following figure.
Source: Select a WAN interface of the source zone from Interface and enter
the prefix of an internal IPv6 address in IP Addr/Prefix, for example, 3000::/64.
3.11.5 General
General involves the configuration of licenses, administrator accounts, system
time, automatic upgrade, alarm options, global exclusion addresses, backup
and recovery, terminal page, report center, and advanced settings.
3.11.5.1 Authorization
Device License: The device license activates the device and authorizes the
number of lines, number of branches, and mobile users.
Software Update License: This license upgrades the software of the device.
Third-Party URL Database License: This license activates the update validity
period of the URL Database from third parties.
Sangfor URL Database: This license activates the update validity period of URL
Database from Sangfor.
Click Edit and enter the license to activate the authorization of the
corresponding function.
3.11.5.2 Administrator
On the Administrator page, you can set a user account for managing the
device on the console. In the navigation area, choose System > General >
Administrator. The Administrator pane is displayed on the right, as shown in
the following figure.
Username: Enter the username of the account for logging in to the console.
Login Security: Enter the account's password for logging in to the console in
New Password and Retype Password. You can also set the IP address used
by the administrator account to log in to the console. You can set a single IP
address or an IP address segment. Set one IP address in each row and can set
a maximum of 32 rows.
Mail Verification: By enabling it, entering users who need mail verification on
the gateway console will automatically pop up the verification code acquisition
and input box.
3. On the Realm page, set the permission for the added administrator
account to manage a user group. Click Select and select a group in the
displayed organization structure.
3. On the Realm page, click Select, select Director Group in the displayed
organization structure, and click Commit.
4. On the Permission page, grant permission for viewing and editing the
Users and Object pages and click Commit. The administrator account
emily is created and associated with the role Manager successfully.
5. Log in to the console with the account emily. You can view online users in
the Network department group and mail approval information, manage
the Director Group group and Internet access policies, Objects, and set
user authentication.
2. Create two administrator accounts test1 and test2. Associate test1 to the
Campus administrator role, which can manage all students. Associate
test2 to the School administrator role, which can manage the computer
school students.
3. Log in to the console with the administrator account test1 and define a
policy named No Game During Class Time, which applies to the All-
students user group. For details about defining a policy, choose Access
Mgt > Policies. See the following figure.
4. Log in to the console with the administrator account test2 and define a No
Facebook policy during Class Time, which applies to the IT school in All
students user groups. For details about defining a policy, choose Access
Mgt > Policies. See the following figure.
The priority of a policy depends on the permission level of the role that creates
this policy. The policy created by the campus administrator takes precedence
over that created by the school administrator. If the campus administrator
test1 selects Give view privilege to administrator in lower-level role, the
school administrator test2 cannot modify the policy defined by test1. Only the
school administrator has permission to view the policy. See the following
figure.
1. The role determines the level of an administrator. In the Administrative Roles list, roles
are displayed in descending order of priority.
3. By default, a lower-level administrator cannot modify the Internet Access Policy defined
by a higher-level administrator.
6. The priority of an Internet Access Policy depends on the level of the administrator that
creates it. A policy created by a higher-level administrator has a higher priority. The
priorities of policies created by the same level of administrators can be adjusted. For details
about the matching sequence of Internet access policies, see section 3.5.1.4.
7. After an administrator is deleted, the user groups and users created by this administrator
are unaffected. Therefore, the priority of the Internet Access Policy created by this
administrator remains unchanged, and the created administrator becomes admin.
8. By default, the Administrator role exists with the highest permission and cannot be
deleted. Therefore, only an administrator of the Administrator role can create roles and
administrator accounts.
9. To delete an administrator role, delete the administrator of this role and the Internet
Access Policy created by this role, and then delete this administrator role.
Normally log into the console if the account does not have Email Notification
configured.
The verification code box appears if the account has Email Notification
configured:
After configuration, add a new admin account, add username, select External
authentication and submit.
Switch to the Disable status if local accounts and external accounts are not
used.
3.11.5.3 Date/Time
On the Date/Time page, you can set the system time of the SANGFOR IAG. You
can directly change the system time or by synchronizing the system time with
the time server.
In Date/Time, you can view the current system time or manually set the
system time. Click Sync with Local PC to synchronize the system time with the
time on the PC from which you log in to the console or click System Time to
refresh the system time in real-time.
You can also set the system time to be synchronized with the time server.
Specifically, select a time zone where the device resides in Time Zone, select
Sync Time with NTP Server, and set an Internet time server. Then the device
will automatically synchronize its time with the time server.
3.11.5.4 Update
You can configure and manage system update, proxy server, and database
update on the Update page.
On the System Update page, you can upload an upgrade package to upgrade
the device's software, as shown in the following figure.
The device needs to access the Internet to upgrade embedded libraries. If the
device cannot access the Internet and an HTTP proxy server exists, you can set
the proxy server on the Proxy Options page so that the device can access the
Internet through the proxy server to upgrade embedded libraries. Select
Enable Proxy Server, enter the proxy server's IP address and port number,
select Authentication required, and enter the username and password. See
the following figure.
On the Database Update page, you can manage the upgrade of the virus
database, URL database, system patch, application signature database, and
audit rule database.
Click to manually upgrade a rule library within the validity period of the
upgrade service.
Click to roll back the rule library to the version before the upgrade. The
application identification rule library and Ingress Rule Database support
rollback.
On the Alarm Options page, you can configure the device to alert the
administrator by mail in any of the following cases:
⚫ Botnet is detected
⚫ Virus is detected
⚫ Disk error
⚫ Network issue
Select Enable Email Alarm to enable the event alarm function for the device.
In Event, select alarm events based on the actual situation.
Click CPU usage exceeds threshold to set the CPU usage exceeds threshold
alarm. You can set the duration and alarm threshold. When you set Period
(minute) to 5 and Threshold (%) to 90, an alarm will be reported if the CPU
usage exceeds 90% for 5 minutes. When both parameters are set to 0 or CPU
usage exceeds threshold is not selected, no alarm will be reported. Click
Commit for the settings to take effect. See the following figure.
Click Memory usage exceeds threshold to set the memory usage exceeds the
threshold. You can set the duration and alarm threshold. When you set Period
(minute) to 5 and Threshold (%) to 90, an alarm will be reported if the
memory usage exceeds 90% for 5 minutes. When both parameters are set to 0
or Memory usage exceeds threshold is not selected, no alarm will be
reported. Click Commit for the settings to take effect. See the following figure.
Click Key Service Inspection Alarm to set key service inspection alarm. Use
regular ping packet to detect whether service is normal. In addition, inspection
frequency, number of inspection packet and target hosts to be inspected can
be set.
Probe Interval (mins): Each inspection interval for the destination IP address
to be inspected.
Packets per Probe: the packet number in each round of inspection for a
destination IP address. If the ping packets are lost by 100% in a round of
Attack Alarm: set the recipient address and delivery interval of the attack
alarm email. Details of other alarms will not be stated here. See the picture
below:
Select Use global settings to use the global settings in the SMTP server.
Custom delivery options: Can customize the recipient, subject, and interval of
the delivery.
Subject: Customize the subject of the alarm email. Enter any text that is easy
to be recognized but be sure not to enter special characters.
SMTP server: Set the mail server for sending alarm emails and the recipient
addresses, etc.
In Email Delivery, specify the recipient address, alarm mail subject, and
interval for sending alarm notification mails.
Subject: Specifies the title of an alarm notification mail. You can enter any text.
Interval: Specifies the interval for sending alarm notification mails. Click Send
Testing Email to send a test mail.
For Notification Options, please refer to the section 3.11.3.10.14 for the
configuration.
Click SNMP Trap Settings to go to System Config > Advanced > Enable
See Section 3.12.3.10.9 SNMP Options for configuration plan of SNMP trap
connection
On the Global Exclusion page, you can add the IP address of an intranet user
or a destination server to the list. Then the data will be monitored or controlled
when the intranet user accesses the Internet, or the destination server is
accessed. You can set an IPv4 address, IPv6 address, or domain name in the
list.
3.11.5.7 Backup/Restore
On the Backup/Restore page, you can download and save the device
configurations or import a backed-up device configuration file.
not including logs in the data center. Cautions should be taken to use this
function.
On the Custom Webpage page, you can define the custom page to which the
device redirects. Two types of pages can be defined: bulletin board and other
pages, which include the following:
⚫ Access Denied
⚫ Virus Detected
⚫ Ingress Client
⚫ User Locked
On the Bulletin Board pane, click the name of a Bulletin Board. The Edit
Predefined Bulletin Board dialog box is displayed, as shown in the following
figure.
In
the Edit Predefined Bulletin Board dialog box, you can change the source
code to change the page to be displayed. We recommend you change the text
and pictures only. If you make other changes, some links will be missing.
Click to display the code view to present text in the format of code. Click
Click Commit to save the customized page. Click View to preview the
customized page. Click Clone to copy the customized page.
For the customization of other pages, see the procedure for customizing a
Bulletin Board.
On the Report Center page, you can configure information about the external
and internal report centers. The external report center contains server
information, and the internal report center contains automatic log deletion
options. See the following figure.
On the Sync Policy page, you can set the IP address of the external report
center, name of the synchronization policy, Pre-Shared key, and Web-Access
port of the report center.
Click to test the connectivity between the device and the data center
server.
Click External Report Center to access the web UI of the external report
center. The default username and password for logging in to the external
report center are both admin. See the following figure.
Click New, and the Edit Sync Policy interface appears. Add new report center
server.
Listening Port: By default, the communication port for BA is TCP810, and that
for DLA is TCP1081.Enter the synchronization account information for external
report center options in Policy Name and Connection Secret Key (connection
to DLA needs no secret key).
Web-Access Port is used to set the port that the external report center uses to
provide web service. Click Commit after configuration.
On the Internal Report Center page, set disk alarm parameters and
automatic log deletion parameters.
Days Access Control Logs are Preserved: specifies the retention period of
logs in days.
Disk Usage Alarm Threshold: When the disk usage exceeds the specified
threshold and the log retention period is not reached, a warning will be
reported by mail.
You can set mail warning information on the Alarm Options page.
Set disk usage threshold. Delete access control logs on the earliest day if
threshold is reached: When the specified disk usage in percentage is
exceeded, the system will automatically delete the access control logs
generated on the earliest day.
When there are many logs, you can select Disable Internal Report Center (to
save resources and enhance logging performance) to ensure that the device
can record complete logs and improve the audit performance. However, after
this option is selected, the internal report center is not accessible. In this case,
it is recommended that an external report center be installed.
On the Advanced page, you can complete other system settings of the device,
including Web UI, Proxy, Remote Tech Support, Syslog Server, Central
Management, Device Name, Server Certificate, SNMP, and other Options.
3.11.5.10.1 Web UI
On the Web UI page, you can set the Default Encoding, Speed Unit, Radix,
HTTPS Port, Inactivity Timeout, and Issue SSL Certificate To, and click
Certificate to download a certificate. See the following figure.
Default Encoding: specifies the default code for processing monitored data
when the code of the data cannot be recognized. The default code can be GBK
or BIG5.
Speed Unit: specifies the unit of monitored network traffic. Click to select a
unit.
Radix: specifies the conversion scale of the traffic unit. It can be 1000 or 1024.
HTTPS Port: specifies the port used for logging in to the console. The default
port is TCP 443. Inactivity Timeout: specifies the timeout duration of the
console. If the administrator does not perform any operation on the console
within the specified period, the system will be automatically disconnected.
Max Attempts: The default allowed login number is 5, which is consistent with
the default value of the old version, and can be modified in the new version
within 1 - 90.
Issue SSL Certificate To: specifies the IP address or domain name to which
the SSL certificate for logging in to the console is issued.
3.11.5.10.2 Proxy
When a proxy server is required for Internet access, all user data is forwarded
to the proxy server. Modules including the firewall determine whether to reject
a connection based on the destination address and port. Therefore, many
functions are unavailable. To ensure that modules including the firewall to be
functional, the modules must correctly identify the actual destination address
and port of data forwarded to the proxy server.
Ensure that the data bound to the proxy server is forwarded to the device first.
The proxy server must connect to the WAN interface of the device.
By default, the device will detect all proxy data. You can configure the device to
detect the data of a fixed proxy server on the Proxy page. See the following
figure.
The device will detect whether the data destined for an IP address listed on the
Proxy page is proxy data and control the Internet access permission
accordingly. If the list is blank, the device will detect all data, which reduces the
working efficiency of the device. Therefore, it is recommended that the IP
address of a proxy server is listed.
On the Remote Tech Support page, you can set whether to allow remote login
to the device from a WAN interface, Report unidentified URL, Report system
error, and Report unidentified application, and whether to Enable Access
Backstage.
Enabled: Specifies whether to allow remote login to the device from a WAN
interface. If this option is selected, the ping function is automatically enabled
for the WAN interface of the device.
To download the black box in the last 1- 30days, click the Download Black Box
button.
On the Syslog Server pane, you can synchronize the System Logs, Email Alarm
Logs, and Admin Logs on the device to the configured Syslog server.
System Logs: includes debugging logs, information logs, alarm logs, and error
logs. Select Debug Logs to synchronize the debugging logs on the device to the
Syslog server. Select Info Logs to synchronize the information logs on the
device to the Syslog server. Select Warning Logs to synchronize the alarm logs
Select Error Logs to synchronize the error logs on the device to the Syslog
server.
Select Email Alarm Logs to synchronize the email alarm logs on the device to
the Syslog server. Select Admin Logs to synchronize the administrator
operation logs to the Syslog server.
On the Central Management page, you can set whether to incorporate the
IAG into centralized management. After the IAG is incorporated into centralized
management, the administrator of the central end can deliver policies to the
IAG. In addition, the permission of a controlled end can be assigned by the
central end.
central terminal owns the password. Here, the option is grey, which means
that the device has not connected to the central terminal. You can click after
connect to the central terminal.
Device Name is for entering the username of the central terminal of central
management.
Selecting Sync credentials if any change is made means that the device
name of the local controlled terminal will synchronize with that set in this
terminal.
Password: Enter the password for connecting to the central terminal of central
management.
Device Name is for entering the username of the central terminal of central
management.
Selecting Sync credentials if any change is made means that the device name
of the local controlled terminal will synchronize with that set in this terminal.
Password: Enter the password for connecting to the central terminal of central
management.
After the IAG is connected to the center end for centralized management, the configurations
delivered by the central end cannot be edited or deleted on the controlled end.
You can set device names to distinguish controlled devices when multiple
devices are connected to the central end, or to distinguish devices that
synchronize data to the external data center when multiple devices perform
data synchronization by using the same account. See the following figure.
If no device name is set, the centralized management account is used as the device name by
default after the device is connected to the central end for centralized management.
3.11.5.10.8 SNMP
On the SNMP page, you can set and enable the SNMP function for the IAG. See
the following figure.
Enable SNMP v1/v2: To enable SNMPv1 and SNMPv2. You need to set a
community name. You can view the running status of the device based on the
specified community name on an SNMP client.
Enable SNMP TRAP: Used to send the device alarm log to SNMP server
actively. It is disabled by default, and default port is 162.
Download MIB: Click this button to download the MIB of the device and
import it to the SNMP management software to monitor the parameters of the
device.
If you need to use IAG as a DNS server, you need to check this option.
The systems that support restful interface all support data reading and management of IAG
devices through the "open interface" function.
Shared Secret Key is for setting the shared password for the third-party
management platform.
LAN Zone: Default value, indicating that the VPNTUN interface belongs to the
LAN by default.
WAN Zone: If WAN is selected, all data passing the VPNTUN interface will be
regarded as data sent from the LAN to the WAN and be authenticated, audited,
and controlled.
NAT ALG: It is enabled by default. With this function enabled, the network
address translation on the application level gateway (NAT ALG) is configured
for SIP and H323 video protocols by the device. When the video client enables
NAT traversal, this function needs to be disabled.
Privacy options: Provide the option to join the User Experience Improvement
Program.
3.11.5.10.12 Redirection/Proxy
When the IAG is deployed in bridge mode, if the bridge IP address cannot
communicate with endpoints, functions involving redirection such as web
authentication, Ingress, and proxy detection, require the communication with
PCs on the intranet, which can be implemented by the IAG using virtual IP
addresses by default.
In Virtual IP, set virtual IPv4 and IPv6 addresses. The client will be redirected
to a virtual IP address.
After the device starts the SNAT proxy function, when LAN users access the
public network, the source IP addresses, and source ports of LAN users are
transformed to device IP addresses at the WAN interface and a random port
that has not been occupied.
This function is by default not enabled and only used for network security connection.
The default selection is Deliver by predefined SMS module, which is for the
following two scenarios:
Message delivery by GSM modem is not directly connected to the device but to
another PC.
In this case, the PC should be installed with a message delivery program. Click
Download to get the program. After installation, enter the IP address and the
SMS central port of the PC.
GSM modem: for GSM SIM cards, which are typically those of China Mobile
and China Unicom.
CDMA modem: for SDMA SIM cards, which are typically those of China
Telecom. China Mobile V2, China Mobile V3, China Unicom, and China Telecom
V3 are the SMS gateway types of various ISPs.
Country Code: The country code corresponding to the phone number. For
example, 86 is for China.
SMS Center: The SMS Center number of the corresponding ISP to which the
SIM card in the GSM modem belongs.
COM Port is the serial port that the GSM modem uses. Available options are
COM0, COM1, and COM2.
COM Baud Rate: The default selection is 115200, which applies to the
corresponding GSM modem of IAG. Other COM Baud rates cannot be chosen
for the GSM modem of IAG; otherwise, it may not normally send the message.
When China Mobile V2, China Mobile V3, China Unicom, or China Telecom V3 is
selected, configure as follows:
Server Port: Enter the port which is actually monitored by the SMS gateway.
The HTTP is selected when the client has a Webservice SMS gateway server.
The device sends some parameters to the server's URL, and the interface of
the SMS gateway sends messages accordingly when receiving the parameters.
Country Code: the country code corresponding to the SMS platform. For
example, 86 is for China.
URL: Enter the interface URL address for receiving the SMS parameters in the
SMS gateway.
Encoding, SOAP Version, and Request Type: Select according to the server
type.
SMS Message Template: The command template sent to the SMS server when
IAG needs to send messages. It is provided by the SMS server maintenance
personnel and imported into this configuration page.
Click Test Validity, and the configuration page for testing SMS appears:
Test Validity is for testing if the GSM modem or the SMS gateway can send
messages normally. Enter the phone number for receiving messages and click
Commit to send the testing message.
Sangfor's modems are as shown in the picture below, having two types including GSM and
CDMA.
Configure SMS Notification. Select the SMS server, and define SMS content. It
supports SMS passwords, self-registration approval, and new endpoint
approval.
After configuration, in Asset Center - Endpoint, click User List to view the
user list:
Note that clicking Synchronize Now can immediately synchronize the IAG device's user
information and update it to the CCOM platform. However, this does not clear up the
original user data on the CCOM.
If the IAG device is deployed in routing mode, the CCOM device needs to open
the TCP9998 port on the WAN interface.
Device Correlation
⚫ If there are relatively few IAG devices in the environment, choose the
correlation method randomly.
⚫ If there are relatively more IAG devices in the environment, choose auto-
negotiation to reduce configuration.
Method 1: Auto-negotiation
IAG configuration
In System Management > System Config > Device Correlation > Enable
correlation for Sangfor devices.
CCOM configuration
In the CCOM, go to System Config > Device Management > New to add a
new Internet access control device by configuring the IAG IP and shared secret
key for the correlated device. There is no need to configure advanced options.
The device automatically negotiates the authentication account and the secret
key:
Likewise, the status of the correlated IAG device can be seen on the CCOM.
IAG configuration
In System Management > System Config > Device Correlation > Enable
correlation for Sangfor devices.
CCOM configuration
Likewise, the status of the correlated IAG device can be seen on the CCOM.
On the CCOM device, click More > Response Tool Kit > Correlated Response
> Correlated IAG.
On the risky endpoint page, click a single IP address to correlate or click More -
> Correlated Response -> correlated IAG interface to add a new device. The
prompt message of Internet access prompting can either use the system
recommendation or be customized. The interface is shown as below:
The user can go to More -> Correlated Response -> correlated IAG interface
to start automatic Internet access prompting. The interface is as follows:
Internet access prompting effect: use the pop-up recommended by the system,
which is as shown in the picture.
Account freezing
1. Correlate IAG in the page of compromised hosts and the secondary page
of risky endpoints, as shown below:
2. Add a new correlated device by going to More > Correlated Response >
correlated IAG page:
3.11.6 Diagnostics
On the System Logs page, you can view each module's run logs and therefore
determine whether the modules run properly.
Click Filter. The Filter page that is displayed selects a log type, as shown in the
following figure.
Click Commit. Then the logs of the selected types are displayed.
In Date, select the date to view system logs generated during the specified
period.
The capture packets tool captures the packets passing through the device to
quickly locate problems. It can be used to detect errors. Click Options to
display the Options dialog box, as shown in the following figure.
Port: Specifies the port in the packets to be captured. Click Capture to start
capturing packets.
Click Stop to stop capturing packets. A .pcap file is generated, as shown in the
following figure.
Click Delete to delete the specified file, download to download the file to the
specified path, or Refresh to view real-time information about the packet
On the command console, you can view simple information about the device.
Supported commands include arp for viewing the arp table, mii-tool for listing
the connections of a network interface, ifconfig for viewing network interface
information, ping for testing the connectivity of the host address, telnet for
testing the connectivity of the port, ethtool for viewing information about the
network adapter, route for displaying the routing table, and traceroute for
tracing the packet forwarding path. Input any command on the command
console and press Enter, as shown in the following figure.
3.11.6.4 Troubleshooting
On the Troubleshooting page, you can query which module of the device
rejects a packet and the rejection reasons to quickly locate a configuration
error or test whether some rules take effect. Click Settings. On the Filter page,
set all kinds of filtering conditions, as shown in the following figure.
Specified IP: Specifies an IP address for which the rejection list is enabled. By
default, the rejection list applies to all network segments. Click Protocol
Conditions and set the protocol type and port range for filtering interception
logs, as shown in the following figure.
Click Advanced and set whether to enable straight-through transmission for the
traffic control module, as shown in the following figure.
After the interception logging and straight-through transmission functions are enabled, if
the administrator does not manually click Close, these functions are still enabled even if the
device is restarted.
3.11.6.5 Shutdown
The Restart Device and Restart Service buttons are available on the
Shutdown page, as shown in the following figure.
4 Use Cases
4.1 SSO Configuration
Domain server login script (logon.exe) and logout script (logoff.exe) are
configured. When a user logs in to or logs out of the domain, the login or
logout script is executed according to a delivered domain policy to log in or out
the user at the device.
3. The PC executes the logon.exe script and reports the domain login
success information to the device.
Click Commit.
Step 3. Enable SSO, select the SSO mode, and set the shared key. Choose User
Authentication > SSO Options > Microsoft AD Domain.
Select Auto Deliver Scripts, Execute Specified Login Script, and Obtain Login
Information, which indicates the SSO is implemented by delivering the login
script. Enter the shared key in Shared Key. See the following figure.
The shared key is used to encrypt the communication between the device and
the AD domain server and must be specified exactly the same in the login
script. Click Download Domain SSO Program to download the login and logout
scripts.
1. Log in to the domain server and choose Server Manager on the menu, as
shown in the following figure.
4. In the displayed window, click Group Policy. Double-click the group policy
Default Domain Policy.
7. In the Logon Properties window, click Add. In the Add a Script window,
click Browse, choose the login script file logon.exe, and enter the IP
address of the device, port number (fixed to 1773 and 1775 for IPv4, or to
1775 for IPv6), and shared key (exactly the same as that configured on the
device). The parameter values must be separated by space. Click Apply
and then OK. Then close the windows one by one.
Step 5. Configure the logout script on the LDAP. The logout script helps users
who are logged out of the domain server log out of the device.
1. Perform the steps for configuring the login script. In step 6, double-click
Log off instead.
2. In the displayed Logoff Properties window, click Show Files in the lower-
left corner. A directory is opened. Save the logout script file logff.exe in
the directory and close it.
3. In the Logoff Properties window, click Add. Add a Script window, click
Browse, choose the AD logout script file logoff.exe, and enter the IAG IP
address specified during logout script parameter configuration. Close the
pages one by one.
4. Choose Start > Run. Enter gpupdate and click OK. The group policy takes
effect.
Step 6. Log in to the domain on a computer. If the login is successful, you can
access the Internet.
1. The primary DNS of the PC must be set to the IP address of the domain server. Otherwise,
the domain IP address cannot be resolved, resulting in domain server login failure.
2. If the DNS or IP address is changed after the first successful login, the user can log in to
the computer with the correct password because Windows remembers the previous valid
password. However, the user cannot log in to the domain in this case. The SSO fails, and an
authentication dialog box requesting the username and password is displayed when the
user tries to access the Internet.
3. The domain server, device, and PC must communicate with each other properly.
The IAG has an ADSSO program, which can regularly connect to the Ad domain
and detect the
2. The SSO client program obtains the information about the user who
successfully logs in to the LDAP server domain.
Step 1. Choose Users > External Authentication Server and set the
authentication AD domain server. (For details, see Section 3.6.2.2.)
Step 2. Set the authentication policy. Choose Users > Authentication Policy >
Add Authentication Policy. Set the authentication policy according to the IP
or MAC addresses of the users who require SSO.
Step 4. Enable SSO on the device and set the IP address of the domain server.
Choose Users > Single Sign On SSO > MS AD Domain and perform
configuration.
1. Make sure that the RPC service works properly on the AD domain server.
If it is disabled, the SSO client may not be able to log in to the domain server
(not due to other factors such as the network and username).
Modify the group policy of the AD domain. If SSO is enabled for only
specified groups, modify the related group policies.
You can enable IWA on the IAG to add the IAG and intranet computers to the
AD domain. When an intranet user logs in to the domain and accesses a
webpage, the user is authenticated on the IAG. The configuration procedure is
as follows:
Step 1. Choose Users > External Authentication Server and set the
authentication AD domain server. (For details, see Section 3.6.2.2.)
Step 2. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 3. Enable SSO on the device and set the IP address of the domain server.
Choose Users > Single Sign On SSO > MS AD Domain and perform
configuration.
Click OK. After about 1 minute, the loudspeaker icon in the lower-
right corner will indicate whether you have joined the domain
successfully.
Step 4. Log in to the domain and access a webpage. View the online user list
of the IAG, which displays the users who have been authenticated.
In this mode, the IAG intercepts data of the PC that logs in to the domain
server and obtains login
3. If the user logs in to the domain successfully, the device authenticates the
user automatically. The procedure is as follows:
Step 1. Choose Users > External Authentication Server and set the
authentication AD domain server. (For details, see Section 3.6.2.2.)
Step 2. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 3. Enable SSO on the device and set the IP address of the domain server.
Choose Users > Single Sign On SSO > MS AD Domain and perform
configuration.
Select Obtain login profile by monitoring the data of computer logging into
domain. Enter the IP address and the listening port of the domain server in
Domain Controllers. If there are multiple domain servers, enter the IP address
and the listening port of each domain server in one line. See the following
figure.
Step 4. The domain login data of the intranet does not pass through the
device. You must set a mirroring port and connect it to the mirroring port on
the switch forwarding login data. Click Others and set the mirroring port of the
device. The mirroring port must be an available one not in use.
Step 5. Log in to the domain on a computer. If the login is successful, you can
access the Internet.
1. The packets of a PC logging into the domain pass through the device.
Step 1. Choose Users > External Authentication Server and set the
authentication AD domain server. (For details, see Section 3.6.2.2.)
Step 2. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
The LDAP server is not located on the intranet of the device. Before user
authentication, access to the domain server must be allowed. Choose
Authentication Policy > Action > Advanced > Before authentication, added
to group, set the group to be used before authentication, and configure the
Internet access policy to allow this group to access the domain server.
Step 3. Enable SSO on the device and set the IP address of the domain server.
Choose Users > Single Sign On SSO > MS AD Domain and perform
configuration.
Step 4. Log in to the domain on a computer. If the login is successful, you can
access the Internet.
In monitoring mode, only the user login information is monitored. The logout data is not
captured. Therefore, the logout state is not obtained. In this case, the PC may have logged
out while the user is not removed from the online user list on the device.
Scenario 1: Proxy server deployed out of the intranet. See the following figure.
1. Users can access the Internet through a proxy server, and the device
monitors the interaction between PCs and the proxy server.
2. When the proxy server authenticates the PCs, they are also authenticated
by the device. The configuration procedure is as follows:
Step 1. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
The proxy server is not located on the intranet of the device. Before user
authentication, access to the domain server must be allowed. Choose
Authentication Policy > Action > Advanced > Before authentication, added
to group, set the group to be used before authentication, and configure the
Internet access policy to allow this group to access the proxy server.
Step 2. Step 2 Choose Users > Single Sign On SSO > Proxy and perform
configuration. Select Proxy Enable Proxy SSO.
Select Proxy, obtain login profile by monitoring the data of computing logging
into the proxy server.
In Proxy Server List, enter the IP address and listening port of the proxy
server. If there are multiple proxy servers, enter the one IP address and port
number in each row. Set the port numbers to those for proxy authentication.
See the following figure.
Step 3. Log in to the proxy server on a computer. If the login is successful, you
can access the Internet.
If the proxy server is an ISA server that adopts IWA, the Compatible with
Kerberos option needs to be selected for implementing SSO. This option is
applicable only when login packets pass through the IAG and inapplicable to
the mirroring mode and bypass mode.
Scenario 2: Proxy server deployed in the intranet. See the following figure.
1. Users can access the Internet through a proxy server, and the IAG does not
forward the authentication data.
2. A mirroring port is configured on the switch to mirror the data sent from
PCs to the proxy server to the IAG.
3. When the proxy server authenticates the PCs, they are also authenticated
by the device. The configuration procedure is as follows:
Step 1. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 2. Choose Users > Single Sign On SSO > Proxy and perform
configuration. Select Proxy > Enable Proxy SSO.
Select Proxy > Obtain login profile by monitoring the data of computer logging
into the proxy server.
In Proxy > Proxy Server Address List, enter the proxy server's IP address and
listening port. If there are multiple proxy servers, enter the one IP address and
port number in each row. Set the port numbers to those for proxy
authentication. See the following figure.
Step 3. If the login data does not pass through the device, set a mirroring port
connected to the mirroring port on the switch forwarding login data packets.
Click Others, and set the mirroring port. The mirroring port must be an
available one not in use.
Step 4. Log in to the proxy server on a computer. If the login is successful, you
can access the Internet.
It is applicable when the ISA server is located in the intranet and ISA login data
does not pass through the device. An extended plug-in can be registered with
the ISA server and used to send ISA login information of PCs to the device,
which makes users login to the device. See the figure below.
1. PCs undergo proxy authentication by the ISA through the HTTP proxy.
3. The IAG authenticates the PCs and allows the PCs to access the Internet.
The procedure is as follows:
Step 1. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 2. Step 2 Choose Users > Single Sign On SSO > Proxy and perform
configuration. Select Proxy > Enable Proxy SSO.
Select Proxy, obtain login profile by executing logon control through proxy.
Enter the shared key in Shared Key. See the following figure.
Step 3. Download the ISA SSO login plug-in and a sample configuration file
from the device, configure the ISA server, register the plug-in, and configure
SangforAC.ini.
Config
key=123 Packet encryption key for logging in to the ISA. It must be the same as
that configured on the device.
logpath= Debug log path. If it is blank, the debug log function is disabled. If it is
set, the debug log function is disabled. Enable it when necessary. In addition,
make sure that the NETWORK SERVICE user can read and write the directory.
maxlogsize=1 Maximum size of a debug log file (unit: MB). When the size
reaches the upper limit, its content is deleted.
4. Check the ISA plug-in panel to make sure that the Sangfor ISA Auth Filter
plug-in is enabled.
Step 4. Log in to the proxy server on a computer. If the login is successful, you
can access the Internet.
2. The ISA plug-in cannot log out a domain user of the device when the user logs out of the
domain or shut down the computer. You can set a timeout interval on the device console to
log out the user of the device. See the following figure.
3. The IAG and ISA server must use the same key, which is different from other SSO keys.
4. The ISA server must not block data of its UDP 1773 port connected to the IAG.
5. If the proxy server is in the IAG WAN, users must be allowed to access the proxy server
before being authenticated.
1. A user uses a mail client to communicate with the POP3 server, and the
device monitors the communication.
2. When the mail client logs in to the POP3 server, the device authenticates
the user so that the user does not need to enter a password again for
accessing the Internet.
3. Because data is exchanged in the intranet, the data for logging in to the
POP3 server does not pass through the device. Therefore, a listening port
must be configured on the device.
Step 1. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 2. Choose Users > Single Sign On SSO > POP3 and perform
configuration. Select Enable POP3 SSO.
In POP3 Server Address List, enter the IP address and listening port
of the POP3 server. If there are multiple POP3 servers, enter the one
IP address and port number in each row. Set the port numbers to
those for POP3 authentication (default: TCP110). See the following
figure.
Step 3. In this example, the login data does not pass through the device, set a
mirroring port connected to the mirroring port on the switch forwarding login
data packets. Click Others, and set the mirroring port. The mirroring port must
be an available one not in use.
Step 4. The PC receives mail using the mail client. After successful POP3 server
login, it can access the Internet.
1. The packets of a PC logging into the POP3 server pass through the device.
Step 1. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 2. Choose Users > Single Sign On SSO > POP3 and perform
configuration. Select Enable POP3 SSO.
In POP3 Server Address List, enter the IP address and listening port
of the POP3 server. If there are multiple POP3 servers, enter the one
IP address and port number in each row. Set the port numbers to
those for POP3 authentication (default: TCP110). See the following
figure.
Step 3. The PC sends and receives mail using the mail client. After successful
POP3 server login, it can access the internet.
If the POP3 server is in the IAG WAN, users must access the POP3 server before being
authenticated.
1. A user logs in to the web server. The entire process uses plaintext data,
and the device monitors the communication.
2. The keywords contained in the feedback sent from the server after
authentication are checked to determine whether the user is
authenticated. If the user is authenticated. Web SSO is successful.
Step 1. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 2. Step 2 Choose Users > Single Sign On SSO > Web and perform
configuration. Select Enable Web SSO.
Set User Form Name to the name of the username form submitted to the
server during web authentication.
Step 3. In this example, the login data does not pass through the device, set a
mirroring port connected to the mirroring port on the switch forwarding login
data packets. Click Others and set the mirroring port. The mirroring port must
be an available one not in use.
Step 4. Log in to the specified website, such as the BBS website in the
example, on a computer. If the login is successful, you can access the Internet.
1. The packets of a PC logging into the web server pass through the device.
Step 1. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 2. Choose Users > Single Sign On SSO > Web and perform
configuration. Select Enable Web SSO.
Step 3. Log in to the specified website, such as the BBS website in the
example, on a computer. If the login is successful, you can access the Internet.
Note: Below configuration is use with Rujie SAM system, do the following screesnhots
will taken in Chinese word.
2. Ruijie SAM's database server notifies the IAG of user login or logout to
implement SSO. The procedure is as follows:
Step 1. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 2. Choose Users > Single Sign On SSO > Third-Party Server and
perform configuration. Select Ruijie SAM system and configure the shared
key. See the following figure.
Step 3. Download the Ruijie SAM SSO program from the device and configure
the database server of Ruijie SAM to enable the database server to send user
authentication information to the IAG after a user logs in to Ruijie SAM through
a PC.
2. Copy logon.exe that the triggers must call to the related directory of the
server.
3. The directory 2005 stores the trigger SQL statements customized for SQL
Server 2005. Take logon_trigger.sql as an example. Open the file, copy all
its content to the query manager of the SQL Server, and modify the
following configuration in the content as required (same for
logout_trigger.sql and update_trigger.sql):
4. The three triggers mentioned above call the xp_cmdshell command of the
master database, but SQL Server 2005 disallows calling the command by
default. Therefore, you must run xp_cmdshell.sql to allow calling the
command. See the following figure. In SQL Server 2005 Management
Studio, open the file and click Run.
6. Locate the ONLINE_USER table and click the trigger directory icon. No
entry is displayed on the Object Resource Manager Details tab page on
the right. No trigger has been created for the ONLINE_USER table. See the
following figure.
7. Open the 2005 directory and double-click the three files described in step
3. They are opened in SQL Server 2005 Management Studio. Click Run on
the toolbar. The trigger corresponding to the active tab page is installed.
Go to another two-tab pages and perform the same operations to install
the triggers.
8. Access the Object Resource Manager Details tab page and refresh the
page. The triggers installed are displayed.
Step 4. When Ruijie SAM authenticates a user, the device authenticates the
user as well.
1. SQL Server 2000 and SQL Server 2005 have similar trigger installation processes. For SQL
Server 2000, you need to select the triggers in the 2000 directory to install. If the stored
procedure xp_cmdshell is used, xp_cmdshell.sql does not need to be run.
2. If the Ruijie SAM database name is not SAMDB, change SAMDB in use SAMDB in the first
trigger SQL statement to the actual database name. If the table name and field names are
different from those in the example, change them accordingly.
3. In the trigger SQL statements, pay attention to the field shown in the following figure. If
multiple users may log in or log out at the same time, increase the value of @i according to
the number of Internet users in the organization. Generally, the value must not exceed 2000
(high-end devices support the maximum value of 3000). If you retain the default value, when
two users log in at the same time, the IAG authenticates only one of them, and therefore the
other user cannot access the Internet.
See the following figure. The value indicates that a maximum of 10 users can log in or log
out at the same time.
4.
In the trigger SQL statements, pay attention to the fields shown in the following figure.
When logon.exe sends authentication information to the IAG, logging is not performed by
default to ensure server performance. If logging is required, use the last line to replace the
first line in the following figure. That is, add the -1 parameter to enable the logging function.
Then, logs similar to that in the following figure are generated in users' main directories on
the database server.
5. The device and trigger scripts must use the same key, different from other SSO keys.
6. The device must be able to communicate with Ruijie SAM. Ruijie SAM connects to the UDP
port 1773 of the device to send authentication information to the device. Data about users
logging in to Ruijie SAM does not need to be sent to the device.
7. This method applies to all database systems using MS SQL Server 2000/2005 in addition
to Ruijie SAM. You need to modify the SQL scripts for the other database systems so that
the related database names, table names, and field names are correct.
The HTTP SSO interface provided by the device can provide the SSO
function based on the HTTP/HTTPS protocol and GET method for any
third-party devices.
2. The login/logout page of the server is configured to notify the IAG to log in
or log out the related user, which achieves SSO. After the IAG authenticates
the PC, it can access the Internet. The procedure is as follows:
Step 1. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 2. Choose User Authentication > Single Sign On SSO > Third-Party Server
and perform configuration.
Select Enable HTTP SSO Interface and set the IP addresses of the devices
accessible to the interface.
1. The HTTP SSO interface is suitable for implementing SSO with Dr. COM's charging
management systems. It can work with other web authentication systems, but secondary
web server development is required to implement SSO.
2. If this function is not required, do not select Enable HTTP SSO Interface.
Step 1. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
set the H3C CAMS server. (For details, see Section 3.4.2.2.)
Step 3. Choose Users > Single Sign On SSO > Third-Party Server and
perform configuration.
Select H3C CAMS and select the H3C CAMS server configured on the External
Authentication Server page.
Step 4. When H3C CAMS authenticates a user, the user can access the Internet
through the IAG.
1. H3C CAMS allows automatic user information synchronization, which is set at Users >
User Synchronization. (For details, see Section 3.4.3.2.2.)
2. In some cases, a user is authenticated by the IAG (depending on Interval for Obtaining
Authenticated User) after being authenticated by the authentication server. Therefore, it is
recommended that the authentication policy be configured not to require user
authentication after an SSO failure.
must be authenticated by Dr. COM. When the user logs in to or logs out of Dr.
COM, the user is also logged in or out on the IAG. See the following figure.
2. The Dr. COM authentication server notifies the IAG of user login or logout
to implement SSO. The procedure is as follows:
Step 1. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 2. Choose Users > Single Sign On SSO > Third-Party Server and
perform configuration. Select Dr. COM and set its IP address. See the following
figure.
2. The H3C IMC authentication server notifies the IAG of user login or logout
to implement SSO. The procedure is as follows:
Step 1. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 2. Choose Users > Single Sign On SSO > Third-Party Server and
perform configuration. Select H3C IMC and set its IP address. See the following
figure.
Step 1. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 2. Choose Users > Single Sign On SSO > SANGFOR Devices and perform
configuration.
Step 3. For IAG A deployed in bridge mode, select Send users credential to
other Sangfor appliancesand set the related device IP address and the shared
key. See the following figure.
Then, IAG A can forward all the authentication information to IAG B, so that IAG
B deployed in bypass mode can identify online users and be synchronized with
IAG A. If IAG B is a SANGFOR Internet access optimization device deployed in
bypass mode, users can access some data only through a proxy. The proxy
server is set on IAG B and authenticates users on IAG B. In this case, users
authenticated by IAG A are also authenticated by IAG B. Then, the users can
access the data using the proxy server because the information about online
users is shared between IAG A and IAG B.
2. 2. The IAG regularly queries the database server for online users and
updates its online user list.
Step 1. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 2. Choose Users > External Authentication Server and set the
database server. (For details, see Section 3.6.2.2.)
Step 3. Choose Users > Single Sign On SSO > Database and perform
configuration.
Select Enable SSO with Database Authentication, select the database server,
and set SQL statement kfor queries.
Set SQL Statement to the select statement that can query online users. The
IAG runs this select statement to query online users in the user information
table of the database. The result set returned by the SQL statement cannot
contain more than two columns. The first column specifies usernames, and the
second specifies IP addresses. The number of records found cannot exceed
200,000.
The default value of Sync Interval (sec) is 30s. Generally, it indicates the
maximum duration from the time when a user is authenticated on the
authentication server to the time when the user is authenticated on the IAG.
1. The online user list consists of only the username and IP address columns. It does not
support synchronization of other user attributes, such as the attributes indicating whether a
user account is disabled or expires. By default, all the user accounts synchronized are
enabled and never expire.
3. In some cases, a user is authenticated by the IAG (depending on the settings of Sync
Interval (sec) after being authenticated by the authentication server. Therefore, it is
recommended that the authentication policy be configured not to require user
authentication after an SSO failure.
Step 1. Choose Users > Authentication Policy > Add and enable user
authentication. Set IP/MAC address. In this example, set it to 10.10.10.0/24.
In Action:
The customer requires that authenticated users are not added to the
organization structure. Therefore, do not select Add Non-Local/Domain Users
to Group. To enable the users to access the Internet with the permissions of
Intranet Group, set Group Used by Non-local/Domain Users for Network
Access to /Intranet Group/.
Step 2. When a user accesses the Internet, the user's IP address is used as the
username and authenticated. Information about the user can be viewed in the
online user list.
Configuration Case 2: A customer requires that the intranet users within the
10.10.10.0/24 segment can access the Internet without authentication. After
user authentication, IP addresses are used as usernames and added to the
organization structure. The users are added to the Intranet Group. Because
intranet IP addresses are fixed, the customer wants the IAG to automatically
bind users with IP addresses and MAC addresses so that intranet users cannot
change their IP addresses when accessing the Internet. If they change their IP
addresses, they cannot be authenticated on the IAG and cannot access the
Internet. L3 switches are deployed between the intranet and the IAG.
Step 1. Choose Users > Authentication Policy > Add and enable user
authentication. Set Authentication Scope. In this example, set it to
10.10.10.0/24.
In Action:
The customer requires that authenticated users are added to the organization
structure and the Intranet Group.
Set Add Non-Local/Domain Users to Group Select Add user account to local
user database Select Automatic binding.
Click OK.
Step 2. Because L3 switches are deployed between the intranet and the IAG,
the SNMP function of the IAG must be enabled, which obtains users' real AMC
addresses from the switches based on the SNMP protocol. In this scenario, the
switches must support the SNMP function.
Choose Advanced > MAC Filtering Across L3 switch and configure the IP
addresses, MAC addresses, and SNMP information of the L3 switches. See
Section 3.6.3.4.
Step 3. When a user accesses the Internet, the user's IP address is used as the
username and authenticated. Information about the user can be viewed in the
online user list.
SANGFOR's SMS modem is a tool that can be connected to the IAG to send SMS
messages. To send SMS messages in this way, you must prepare a serial cable,
a SANGFOR SMS modem, and a SIM card.
The customer requires that all the visitors using this network segment must be
authenticated using SMS messages. Authenticated visitors are not added to the
organization structure of the IAG, and the Internet access permissions of the
Visitor group are assigned to the visitors. The employees using this network
segment have usernames in the organization structure, and therefore they can
be authenticated using passwords. After being authenticated, the employees
can access the Internet based on the permissions corresponding to their
usernames.
Step 2. Use the serial cable (male-to-female cable) delivered with the SMS
modem to connect the SMS modem to the CONSOLE port on the rear of the
IAG and fasten the connectors to make sure that the SMS modem, serial cable,
and IAG are connected properly.
Set Gateway Type to an SMS modem type, which can be a GSM modem or
CDMA modem.
Set SMS Center to the SMS service number of the local SMS service
provider. For example, the SMS service number of Shenzhen Mobile
is 8613800755500.
Set Serial Port to the serial port connected to the SMS modem. For
example, the first serial port is COM0.
Click Test Validity to send a test message and check if it is sent successfully.
Step 4. Choose Users > Authentication Policy > Add and enable SMS
authentication. Set IP address/MAC address. In this example, set it to
192.168.1.0/24.
Action: Users authenticated using SMS messages are not local users or
domain users. Select the /Visitor/ group. Then, visitors authenticated using
SMS messages can access the Internet based on the permissions assigned to
the group.
The visitors authenticated using SMS messages are not added to the
organization structure on the IAG. Therefore, do not select Add Non-
Local/Domain Users to Group.
Step 5. Create local accounts for the employees. Choose Users > Users >
Local User and create local groups and accounts for authentication.
Step 6 When endpoint devices access the Internet through the IAG,
they are redirected to the authentication page.
A visitor selects SMS Authentication, enters his/her mobile number, and clicks
Obtain Verification Code. The SMS module sends a verification code to the
mobile number. After receiving the code, the visitor enters the code and clicks
Login for authentication.
Note: Due to this wechat developer only has Chinese version, so the screenshot will
be taken in Chinese word.
1. Apply for a WeChat public account and enable the developer mode on the
WeChat public platform. (If OPENIDs are not used as usernames to access
the Internet through scanning, you do not need to enable the developer
mode.)
2. Choose Users > External Authentication Server and add the WeChat
authentication server and QR code authentication server.
Step 1. Apply for a public account on the WeChat public platform and enable
the developer mode.
We recommend that you apply for a service account on the platform and
get certified by the platform. Then, you can adopt both the tapping and
scanning means for a good user experience.
Step 3. Choose Users > External Authentication Server and add the QR
code authentication server.
Authenticator: In this example, select All Users, which are all the authenticated
users. This means that a mobile phone of an authenticated user can be used to
scan a QR code to implement authentication. To assign the approving
permission only to specified groups and users, click and select them in the
organization structure.
User validation: Show captive portal and user information is selected, the
approver scans the QR code for authentication. Then the mobile phone of the
approver displays a page prompting for information about Internet access
users.
Action: Users authenticated using WeChat or QR codes are not local users or
domain users. Select the /Visitor/ group. Then, visitors authenticated can
access the Internet based on the permissions assigned to the group.
The visitors authenticated using WeChat or QR code are not added to the
organization structure on the IAG. Therefore, do not select Add Non-
Local/Domain Users To Group.
2. The customer starts WeChat and follows the WeChat public account of the
store.
3. The customer can use the following methods to access the Internet:
Method 1: Tap Access Internet on the WeChat public account page. WeChat
displays the Internet access message, which can be customized at User
Authentication > Custom Authentication Page.
Method 2: Send the specified letter w (not case-sensitive). WeChat returns the
Internet access message.
2. The customer starts WeChat and scans the QR code. The page for
following the WeChat public account of the store is displayed.
3. The customer follows the account and taps Allow Access Internet. The
user is authenticated and can access the Internet. The username displayed
in the online user list of the IAG is an OPENID of the WeChat user.
Use a mobile phone that has been authenticated to scan the QR code with
WeChat. The PC displays the Authentication success message. Then, the
customer can access the Internet.
Set Action to Automatic Binding and select Bind user account to IP address and
MAC address.
The local users are added or imported manually by administrators and are not
automatically added to the organization structure on the IAG. Therefore, do not
select Add Non-Local/Domain Users to Group.
Step 2. You must bind MAC addresses. If the intranet and IAG are on layer 2,
no additional configuration is required. If L3 switches are deployed between
the intranet and IAG, MAC addresses must be transferred through layer 3. In
this case, configure the intranet switchers to support SNMP. Choose
Advanced > MAC Filtering Across L3 Switch and configure the IP addresses,
MAC addresses, and SNMP information of the L3 switches. See Section 3.6.3.4.
Step 3. Choose Users > Users > Local User, and add a local user group and
local users. For details, see Section 3.6.3.1.1.
Step 4. When a user within the network segment accesses the Internet and
opens a webpage. The authentication page of the IAG is displayed. Enter a
username and password and click Login.
After authentication, choose Users > Bind User and view the automatically
bound MAC addresses. Choose Users >Bind IP/MAC Address and view the
binding relationships between IP addresses and MAC addresses.
Step 1. Choose Users > External Authentication Server and set the
authentication domain server. (For details, see Section 3.6.2.2.)
Choose Users > Authentication Policy and set an authentication policy. Set
the authentication scope to 192.168.2.0/24.
Set Action to automatic binding and select Bind user account to IP address and
MAC address. Select Enable open authentication and set the validity period to
10 days.
Function: Within this network segment, only domain users and users in the
Internet Group can be authenticated.
Step 3. Choose Users > Users > Local User and add a local user group and
local users. For details, see Section 3.6.3.1.1.
Step 4. When a user within the network segment accesses the Internet and
opens a webpage. The authentication page of the IAG is displayed.
For a local user, enter the username and password of a local user account and
click Login. For a domain user, enter the username and password of a domain
account and click Login.
Step 3. Choose Users > Users > Local User and add a local user group and
local users. For details, see Section 3.6.3.1.1.
Step 4. For female users, configure the Internet access policy to disallow them
to access shopping and entertainment websites.
Apply this policy to the users whose attribute values are Female.
Step 5. For male users, configure the Internet access policy to disallow them
to use gaming applications.
Apply this policy to the users whose attribute values are Male.
Choose Define Object > URL Classification Library and click New to add a
URL group.
Choose Access Mgmt > Policies and click New to add an Internet access
policy. Associate the policy with the Temporary Group.
Step 3. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users to be authenticated using passwords.
Step 4. When a user accesses the Internet and opens a webpage. The
authentication page of the IAG is displayed. However, when the user accesses
www.sangfor.com.cn, no authentication page is displayed.
Step 1. Choose Users > External Authentication Server and set the AD
domain authentication server.
Step 2. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 3. Enable SSO, select the SSO mode, and set the shared key. Choose
Users > Single Sign On > MS AD Domain.
The shared key is used to encrypt the communication between the IAG
and the AD domain server and must be specified exactly the same in
the login script. Click Download Domain SSO Program to download
the login and logout scripts.
Step 4. Configure the login script on the AD domain server. For details, see
Section 4.4.1.1.
Step 5. After a user logs in through SSO, the user can access the Internet.
The IAG is deployed between the ISA server and a switch to implement
control and audit. Intranet users must be able to access the Internet
without being authenticated. On the IAG, IP addresses are used as
usernames.
Step 1. Deploy the IAG in bridge mode. Connect the IAG to the switch using an
intranet port and to the ISA server using the Internet port.
Step 2. Set the authentication policy. Choose Users > Authentication Policy >
Add. Set the authentication policy according to the IP or MAC addresses of the
users who require SSO.
Step 3. Because the IAG connects to the switch using the intranet port and to
the ISA server using the Internet port, data from the Internet is transferred
through the intranet port of the IAG, and data from the intranet is transferred
to the ISA server through the Internet port. Therefore, to prevent Internet IP
addresses from being added to the online user list of the IAG, Internet data
must be excluded as follows:
Choose Users > Advanced > Authentication Options and select Open auth
for data flow from WAN to LAN interface.
Step 4. Configure the proxy settings of PCs to exclude the IAG IP address.
Network Topology:
Configuration Steps:
Step 1. Ensure that the CAS server is deployed correctly in the network and
obtain the CAS server account and the URL used to connect to the CAS server
(URL example: https://ip:8443/cas/login).
Step 2. Deploy the IAG unit in Route mode in this case, and configure a
corresponding deployment
mode on the IAG Web Admin console. The static route needs to be
configured if the intranet is a layer 3 network.
Step 3. Add a third-party auth system in Users > Authentication > External
Auth Server and configure related parameters. Specify a name for the new
authentication system, set the URL to the one obtained in Step 1, keep the
default keyword value, and select cas2.0 in the Version field.
If the CAS server version is earlier than V4.0.0, the Version field should be cas2.0; if the
server version is later than V4.0.0, the Version field should be cas3.0. In this case, the CAS
server version is earlier than V4.0.0.
Step 5. When attempting to access the Internet, the internal user will be
redirected to the CAS authentication page, which requires the user to provide a
username and password.
If the user passes the authentication against the CAS server, the user
information can be viewed in System > Status > Online Users, which means
he/she has logged into the IAG unit successfully.
1. CAS server authentication is applicable to the following deployment modes: Route mode,
Bridge mode, and Bypass mode.
2. If CAS server is deployed between IAG unit and external network, CAS server address
should be added into custom excluded address list in System > General > Global
Exclusion. Otherwise, users cannot be redirected to the CAS authentication page.
Step 1. In the navigation area, choose Access Mgt > Policies and Access
Policy page is displayed on the right. Click Add and select Access Control. The
Access Control page is displayed. Enter the policy name and description.
Step 2. Choose Access Mgt > Access Control > Application. The Application
Control page is displayed on the right. Click Add.
Step 5. Click OK. The application control page is displayed. Set the effective
time to the office hours and action to Reject. Click OK.
Step 6. Select Object and associate the policy with users and user groups.
Step 1. Step 1 In the navigation area, choose Access Mgt > Policies and the
Access Control page is displayed on the right. Click Add and choose Audit
Policy. The Audit Policy page is displayed. Enter the policy name and
description.
Step 2. Choose Access Mgt > Audit Policy > Application. The Application
page is displayed on the right. Click Add.
Click Commit.
Step 4. In the navigation area, choose Access Mgt > Access Control and the
Access Control page is displayed on the right. Click Add and choose Ingress
Policy. The Ingress Policy page is displayed. The policy is used to monitor
encrypted QQ messages and the files transferred using QQ.
Enter the policy name and description. Click below Type and select the
option for monitoring IM messages. Set the effective time to Whole Day.
Click Add, click below Type and select the option for monitoring
outbound IM files. Set the effective time to Whole Day.
Click Commit.
The users can access the Internet only after the client is installed. A user must
log in to a computer as an administrator so that the client can be installed on
the computer.
Step 1. In the navigation area, choose Access Mgt > Audit Policy, and the
Audit Policy page is displayed on the right. Click Add and choose Internet
Access Audit Policy. The Internet Access Audit Policy page is displayed.
Enter the policy name and description.
Step 3. Click below Audit Object. The Select Item window is displayed.
Select Website Browsing or Downloads, select visit URL and set the accessed
URL to be audited. Set Schedule to Office Hours.
Step 4. Click Add. The page for adding audit objects is displayed. Select Access
to other appications (exclusive of contents) and Access to unidentified
applications (on which address and port. It incurs massive logs). Set the
Internet access behaviors that all devices can identify. Set Schedule to All Day.
Step 2. On the Connection Sharing page, select options. See the following
figure.
Set Endpoints to All. It indicates that connection sharing between PCs, mobile
endpoint devices, and PCs and mobile endpoint devices is detected.
Set Lockout Options to Lock IP Address, so that only one user can use one IP
address to access the Internet.
Step 3. Choose Endpoint Device > Connection Sharing and select Enable
Connection Sharing Detection. See the following figure.
You only need to enable the mobile endpoint device management function.
To configure anti-proxy, you can click on Anti-Proxy Settings, and then you will
be redirected to the Anti-Proxy page.
If you want to block the use of the proxy tool, you need to do the following:
By default, All is selected for Proxy Tool. You can select proxy tools as per your
need. To block specified proxy tools, select the option Block proxy tools.
Select the option Give alert to user to alert the user when the use of the
specified proxy tool is detected.
3. Select the option Take action, and the option Reject Internet access.
Then Internet access will be denied when the use of the specified proxy
tool is detected.
After configuring anti-proxy, if any user tries to access the Internet through a
proxy tool like FreeGate, he/she will be redirected to the following page:
The customer purchases SANGFOR's IAG and wants to implement the following
configuration:
4. Not to control Internet access behaviors of the director team but audit the
behaviors.
5. Ensure website access bandwidth at all times. Allocate at least 60% of the
bandwidth for this purpose. Limit the bandwidth for P2P applications,
download applications, and online streaming media applications to 20% or
less.
firewall in bridge mode. Set the bridge mode, bridge IP address, and
system routes.
Step 2. Set the bridge mode. Assign the 10.10.10.3/29 IP address as the bridge
IP address of the IAG.
The IP address belongs to the network segment for direct connection between
the firewall ad L3 switch. Choose System > Network > Deployment, click
Configure, and select the bridge mode.
Click Next and select the bridge port numbers. In this example, ETH0 and ETH2
are used as a pair of bridge port numbers. ETH0 is used for the LAN, and ETH2
is used for the WAN.
Click Next and set the IP address of the DMZ management port. You can retain
the default settings.
Click Next and set the gateway and DNS for accessing the Internet.
Step 3. Add a common employee group and a director group for local users at
Users > Local User > Add Group/User.
You can add multiple groups and separate the group names with a comma.
Then click Commit.
Step 4. In this example, the L3 switch forwards data between the IAG and
intranet users. Therefore, select MAC Filtering Across L3 Switch so that users'
IP Addresses and MAC addresses can be bound correctly on the IAG. Choose
Users > Advanced > MAC Filtering Across L3 Switch.
Tick Enable MAC Filtering across L3 switch. Select Add and add a server and
enter the MAC address of the L3 switch to the exclusion list.
Click Commit.
Step 5. Add an authentication policy for the common employee group and
another for the director group at Users > Authentication > Authentication
Policy.
Click Add and set an authentication policy for the common user group. See the
following figure.
Click Commit.
Click Add and set an authentication policy for the director group. See the
following figure.
Step 6. Set the Internet access permissions for the common user group at
Policies > Access Control.
Click Add and select the Internet access policy. Choose Access Control and set
access control over P2P applications and online streaming media applications
for office hours and block access to illegal and unhealthy websites.
Click Object, choose Local Users, and select Common User Group.
Click Commit.
Set the Audit policy for the common user group. Add the policy,
select Audit policy, and add audit objects.
Click OK.
Click Object, choose Local Users, and select Normal User Group.
Click Commit.
Set the admission policy for the common user group. Add the policy, select
Ingress Policy and enable IM message monitoring.
Click Object, choose Local Users, and select Normal User Group.
Click Commit.
Step 7. Set the Internet access audit policy for the director group. Select Audit
Policy and add audit objects.
Click Commit.
Step 8. Set the Bandwidth Management policy. Set the line bandwidth at
Bandwidth Management > Line bandwidth.
Click Commit.
Click Add, select Add Parent Channel, and set the assurance channel for
website access.
Click OK.
Click Add, select Add Parent Channel, and set the limitation channel
for P2P applications, download applications, and streaming media
applications.
Click OK.
Step 9. Install the IAG. Connect the ETH0 (LAN) port of the IAG to the L3 switch
and the ETH2 (WAN) port to the intranet port of the firewall.
B. Configure the required alarm events. For the convenience of the test, the
memory usage exceeds the threshold to the minimum value, as shown below:
D. Enable SNMP, enable SNMP TRAP, configure trap server IP and port.
D. The General page configuration item confirms that the port and community
name are consistent with IAG.
Demand:
In Indonesia, the bandwidth was offered at a different rate for local and
ISP has provided two types of packages. The first package is 1Mbps of
International Bandwidth + 5Mbps of Local bandwidth. The second package is
2Mbps of International Bandwidth + 5Mbps of Local Bandwidth. In this
situation, we can see the difference between the two packages is just 1Mbps.
But customer needs to pay more RP1,000,000 to select the second package.
We can know that the price of International Bandwidth is around five times of
Local Bandwidth.
When the International Bandwidth has reached the limit, it couldn’t occupy on
Local Bandwidth. Whereas if the Local Bandwidth has reached the limit, it
couldn’t occupy International Bandwidth. Even though ISP has provided two
lines for customers to access the internet, from the user’s view, there is only 1
line to access the internet.
2. After configured, the admin can view which user has utilized most of the
International Bandwidth from the internal data center.
Bandwidth.
When the SANGFOR device upgrade system connects to the IAG for
an upgrade, the computer must be able to synchronize with the
Internet time.
If the computer running the system can obtain Internet time during
such an upgrade, the system can directly load an upgrade package to
upgrade the IAG.
The SANGFOR device upgrade system consists of the device IP address, device
search, administrator password, and options modules. The following describes
the functions of the modules.
Device Search: Search for the IP addresses of LAN ports of all the SANGFOR
devices within the same intranet with 2 layers. See the following figure.
password of the IAG. Then, you do not need to enter the password
next time you log in to the IAG through the system.
Options: Set the options related to upgrades. See the following figure.
Click Connect to log in to the current IAG for an upgrade. See the following
figure.
You can choose to upgrade the IAG online or load an upgrade package to
upgrade the IAG. After selecting the correct upgrade package, click Next to
start the upgrade.
2. Start the gateway, upgrade the client and choose Manage Upgrade
Package > Load Upgrade Package to load the local package.
5. If you need to restore the default settings, log in to the IAG and choose
Upgrade > Restore Default Settings.
You can upgrade the hardware firmware only under the instruction of SANGFOR technical
engineers.