NIPS WebUI User Manual-6-1
NIPS WebUI User Manual-6-1
TechDocs | docs.hillstonenet.com
Copyright 2021Hillstone Networks. All rights reserved.
Information in this document is subject to change without notice. The software
described in this document is furnished under a license agreement or nondisclosure agree-
ment. The software may be used or copied only in accordance with the terms of those
agreements. No part of this publication may be reproduced, stored in a retrieval system,
or transmitted in any form or any means electronic or mechanical, including photocopying
and recording for any purpose other than the purchaser's personal use without the written
permission of Hillstone Networks.
Contact Information:
US Headquarters:
Hillstone Networks
5201 Great America Pkwy, #420
Santa Clara, CA 95054
Phone: 1-408-508-6750
https://www.hillstonenet.com/about-us/contact/
Contents 1
Conventions 23
Explorer Compatibility 31
Transparent Mode 33
Tap Mode 37
Routing Mode 39
Installing Licenses 56
Chapter 2 Dashboard 61
System Status 61
Threat Type/Detected by 61
Hot Events 63
TOC - 1
Threat Geographical Distribution 65
Refresh Interval 65
Statistical Period 66
Chapter 3 iCenter 66
Critical Assets 67
Risk Computers 70
Threat 73
Mitigation 78
Chapter 4 Monitor 80
User Monitor 81
Summary 81
User Details 82
Statistical Period 84
Application Monitor 85
Summary 85
Application Details 86
Group Details 87
TOC - 2
Select Application Group 88
Statistical Period 89
Computer Monitor 90
Computer Details 90
Summary 91
User/IP 92
URL 94
URL Category 95
Statistical Period 97
Service/Network Monitor 97
Summary 103
Summary 106
Application 106
User/IP 107
Alarm 109
TOC - 3
Alarm as a Monitor 109
Reporting 116
Logging 133
TOC - 4
Destination of Exported Logs 134
TOC - 5
Policy 163
NAT 186
TOC - 6
Configuring DNAT 199
iQoS 213
Pipes 214
Pipes 219
TOC - 7
Configuring a Session Limit Rule 234
TOC - 8
IPS Global Configuration 301
Preparing 307
Antispam 313
Preparing 314
TOC - 9
Configuring Botnet C&C Prevention 322
Preparing 323
Configuration 338
TOC - 10
Viewing URL Hit Statistics 348
Sandbox 362
TOC - 11
Configuring Sandbox 364
Preparation 364
ACL 381
Attack-Defense 384
TOC - 12
Viewing the Abnormal Behavior Detection Information 401
Mitigation 410
TOC - 13
Configuration a Management Interface 426
Interface 427
LLDP 456
DNS 464
TOC - 14
Configuring a DNS Cache 465
DHCP 469
RIP 504
TOC - 15
Creating RIP 504
Address 520
TOC - 16
Application Book 532
Schedule 557
Timeframe 557
TOC - 17
Creating a Schedule 557
User 573
Role 582
TOC - 18
Creating a Role 582
Administrators 597
TOC - 19
NTP Key 611
Option 612
SNMP 620
V3 User 627
License 636
TOC - 20
Applying for a License 639
HA Cluster 652
HA Group 652
HA Selection 652
TOC - 21
HA Synchronization 652
Configuring HA 654
Authentication 660
PKI 662
TOC - 22
Ping 683
Traceroute 684
Conventions
Know the operate method of WebUI common controls, can complete the configuration of most func-
tions.
The common controls and effect of operating as follows:
l Switching between the function category : Select the tab ( at the top of page).
l Switching between Chinese and English: click the drop-down button of the user name in the upper
right corner, and then click the "中-EN" button to switch.
TOC - 23
l Switching between the function : Click specific function node in level-2 navigation pane.
l Viewing the specified column: Click icon, click "Column" in the drop-down list, select the specified
list.The system support for the list status memory function, the system will display the last con-
TOC - 24
figuration of the list status when logging in to the device.
TOC - 25
l To lock the column: Click icon, click "Lock" in the drop-down list, the locked column will be
l To restore the initial state of the list: double-click the list header and click "OK" in the dialog box.
l To restore the initial state of all the list: Click button of the user name in the top right corner of the
TOC - 26
l To view the specified items by setting up filters: click button, select filter conditions from the
Filter drop-down list, and then select filter conditions as needed. To delete a filter condition, hover
your mouse on that condition and then click the icon. To delete all filter conditions, click the
icon on the right side of the row.
TOC - 27
l To delete the items, select the check box and click Delete.
TOC - 28
l To dispaly the hidden controls , click .
l To search according one condition , click Filter. In the pop-up line, click +Filter to add a new filter
condition. Then select a filter condition from the drop-down menu and enter a value. And then press
Enter to start searching.
l To search according multiple conditions, click to add another filter condition, Then select a
filter condition from the drop-down menu and enter a value. And then press Enter to start searching.
TOC - 29
l To close the dialog, click 'X' at the top right corner of dialog.
TOC - 30
l Click Apply, the modification will be took effect.
l Click next page buttons to jump to previous page , next page , dashboard or last page. Enter the page
number, jump to the corresponding page.
Explorer Compatibility
The following browsers have passed compatibility tests:
l IE11
l Chrome
TOC - 31
Chapter 1 Getting Started Guide
This guide helps you go through initial configuration and basic set-up of devices.
l Deploying Devices: for different scenarios, you can use different deployment modes.
l "Transparent Mode" on Page 33: Use this mode to analyze and transmit packets effi-
ciently, to record logs, reset the connection, or block the connection when detecting
attack behavior. To deploy in this mode conveniently, the device has pre-defined con-
figurations for security zones, interfaces, and policies.
l "Tap Mode" on Page 37: Use this mode to inspect the attack behavior and record logs.
l "Routing Mode" on Page 39: Use this mode when you want the routing and NAT
functions provided by the device.
l Installing License
When using this transparent mode, the pre-defined configurations of interfaces, security zones
where the interfaces locate, security policy between the security zones are described as below:
For S2060/S2160/S2200-C/S2560/S2660/S3060/S3100-C/S3260/S3300-
C/S3560/S3860/S3960/S5560, you can use other interface pairs.
S2060/S2160/S2200-C/S2560/S2660
S3060/S3100-C/S3260/S3300-C/S3560/S3860/S3960/S5560
Destination
eth0/5 address: Any
Service/Service
group: Any
Step1: Configure the switch to mirror the traffic to the interface that connects to S series device.
Step2: Bind the physical interface to the tap-a security zone. After the binding, this physical inter-
face becomes the tap interface.
1. In the WebUI, select Configuration Management > Network Configuration > Interface.
TAP tap-a
After the configurations, the device will inspect the received mirror traffic. When using this tap
mode, the configurations of interface, security zone where the interface locates, security policy
between the security zones are described as below:
Destination zone:
tap-a Intrusion Pre-
Source address: vention System:
TAP security zone:
eth0/3 Any Enable
tap-a
Destination Profile: tap-a-
address: Any default-ips
Service/Service
group: Any
1. Connect one interface (e.g. ethernet0/1) to the ISP network and connect the other interface
(e.g. ethernet0/0) to the intranet.
2. Log into the WebUI. For more information, see "Initial Visit to Web Interface" on Page 54.
Zone untrust
Type Static IP
Netmask 255.255.255.0
3. Click OK.
4. Double-click the ethernet0/0 interface to open the Ethernet Interface page. The eth-
ernet0/0 interface is connecting to the intranet.
Option Value
Zone trust
Type Static IP
IP Address 192.168.1.1
Netmask 255.255.255.0
Zone dmz
Type Static IP
IP Address 10.89.19.1
Netmask 255.255.0.0
6. Click OK.
2. Click New.
Option Value
Translated Egress IP
Sticky Enable
3. Click OK.
Option Value
3. Click OK.
Option Value
Source Any
Address
Destination untrust
Zone
Destination Any
Address
Service Any
Application -----
3. Click OK.
1. Select Configuration Management > Policy > Security Policy > Policy.
Option Value
Source Any
Address
Destination dmz
Zone
Destination Any
Address
Application -----
3. Click OK.
1. Select Configuration Management > Network Configuration > Routing > Destination
Route.
Option Value
3. Click OK.
2. Connect an RJ-45 Ethernet cable from your computer to the eth0/0 or MGT0 of the
device.
4. In the login interface, type the username, password and verification code. The default user-
name and password is hillstone and hillstone.
Notes: To ensure account security, one account can only be uesd for one user to log
in to the WebUI at the same time. If multiple users need to log in with the same
account, the user who logs in later will kick out the user who logs in before.
Installing Licenses
After you obtain the license string or file from the sales person, take the following steps to install
the license:
l Upload License file: Select the radio button, click Browse, and select the license file
(a .txt file).
l Manual Input: Select the radio button, and paste the license code into the text box.
3. Click OK.
4. To make the license take effect, reboot the system. Go to Configuration Management > Sys-
tem Configuration > Device Management > Option, and click System Option > Reboot.
1. Select Configuration Management > System Configuration > Device Management >
Administrators.
Option Value
Name Admin
Role Administrator
Password Hillstone@321
3. Click OK.
Notes: The system has a default administrator "hillstone", which cannot be deleted
or renamed.
2. Click New.
Option Value
IP 192.168.1.2/24
Login Type Select the login type allowed: Telnet, SSH, HTTP
and HTTPS
3. Click OK.
1. Select Configuration Management > System Configuration > Upgrade Management > Sig-
nature Database Update.
2. Find your intended database, and choose one of the following two ways to upgrade.
l Local Update: Select Browse to open file explorer, and select your local signature file
to import it into the system.
Notes: Resetting your device will erase all configurations, including the settings that
have been saved. Please be cautious!
To restore factory default settings via WebUI, take the following steps:
1. Select Configuration Management > System Configuration > Configuration File Man-
agement > Configuration File List..
4. In the Restore to Factory Defaults page, click OK to confirm. To delete the history content
in the database, including threat logs, reports, and captured packets, select the Clear History
check box.
5. The device will automatically reboot and be back to factory settings. All configurations,
including the backed-up system configuration file and the history content in the database
will be deleted.
System Status
Display the current system CPU utilization, memory utilization, hard disk utilization, session util-
ization, and chassis temperature.
Threat Type/Detected by
Display the threat distribution and the threat trend through Threat Type and Detected by.
Threat Type: Select the Threat Type tab, and then system will display the number of threat
events of various types, and display the changing trend of the threat events in different periods in
the Threat Event Trends line chart.
Chapter 2 Dashboard 61
l Click the number under the name of a certain threat type to open the iCenter > Threat page,
and then system will filter threat events by the corresponding threat type to display all intranet
threat events of the threat type in the list.
l Hover your mouse over the line chart to display the number of attacks of each threat type at
the specified time point.
Detected by: Select the Detected by tab, and then system will display the number of threat events
detected by each detection engine, and display the changing trend of the threat events in different
periods in the Threat Event Trends line chart.
62 Chapter 2 Dashboard
l Click the number under the name of a certain detection engine to open the iCenter > Threat
page, and then system will filter threat events by the corresponding detection engine to dis-
play all intranet threat events detected by the detection engine in the list.
l Hover your mouse over the line chart to display the number of attacks detected by each detec-
tion engine at the specified time point.
Hot Events
Display the names of the latest ten pieces of threat intelligence obtained. If system has been
attacked by a threat described in a piece of certain threat intelligence, the intelligence will be dis-
played in red, otherwise it will be in blue. Click the name of a piece of intelligence to open the
iCenter > Hot Threat Intelligence page, and system will display details of the selected intelligence
in the list.
Chapter 2 Dashboard 63
Top5 Threat Tags/Top5 Threats
Top5 Threat Tags: Select the Top5 Threat Tags tab to display the top 5 threat tags by the num-
ber.
l Click the the name of a certain threat tag to open the iCenter > Threat page, and then sys-
tem will filter threat events by the corresponding threat tag to display all intranet threat
events of the threat tag in the list.
l Click All to open the iCenter > Threat page, and then system will display details of all
threat events in the list.
Top5 Threats: Select the Top5 Threats tab to display the top 5 threats by the number of attacks.
l Click the name of a certain threat to open the iCenter > Threat page, and then system will
display details of the selected threat event in the list.
l Click All to open the iCenter > Threat page, and then system will display details of all
threat events in the list.
64 Chapter 2 Dashboard
Threat Geographical Distribution
Display the top 5 threat distribution areas by the number of attacks.
l Hover your mouse over the map and scroll the mouse wheel to zoom in and out the map to
view the specific location of an attack source, or click the "+" and "-" icons on the left side of
the map to zoom in and out.
l Hover your mouse over a certain area to display the number of threats in the area.
Refresh Interval
You can specify the refresh interval as needed, and system will refresh the statistics on the page
according to the time period you set. Otherwise, you can select Manual and click to refresh
the statistics on the page immediately
Chapter 2 Dashboard 65
Statistical Period
System supports the predefined time cycle and the custom time cycle. Click Last 30 Days on the
top right corner to set the time cycle.
l Last 60 Minutes: Displays the statistical information within the latest 1 hour.
l Last 24 Hours: Displays the statistical information within the latest 1 day.
l Last 7 Days: Displays the statistical information within the latest 1 week.
l Last 30 Days: Displays the statistical information within the latest 1 month.
l Custom: Customize the time cycle. Select Custom to open the Custom Date and Time
page, and then select the start time and the end time as needed. For the supported most dis-
tant time in the past, you can specify the start time as a time point in the 30th day before
the current time.
Chapter 3 iCenter
The multi-dimensional features show all the critical assets, risk computers, and threats threats of
the whole network.
66 Chapter 2 Dashboard
Critical Assets
The Critical Assets page displays the detailed information of critical assets and the related threat
information. Click iCenter > Critical Assets to enter the Critical Assets page.
Click the link of the critical asset name in the list to view the following information of this critical
asset:
l Detailed information: Displays the name of the critical asset, the ComputerName/IP (If the
computername cannot be identified, IP will be displayed), operating system, status, zone, risk
level (the white line points to the risk level of this critical assets), and certainty.
l In the Kill Chain tab, view the attacks and threats to this critical asset that exist in each
stage of the kill chain. A highlighted stage means there are attacks and threats in this
stage. Click this stage to display all threat information in this stage. Click the threat
name in the list to view the threat information.
Chapter 2 Dashboard 67
l In the Threats tab, view all attacks and threats from or to the critical asset.
68 Chapter 2 Dashboard
l In the Mitigation tab, view the mitigation actions and the mitigation rules.
l Statistical information: The statistics about the applications, traffic, and connections related to
the critical asset, including the statistic that the critical asset is the source IP of the sessions,
the statistic that the critical asset is the destination IP of the sessions, and the statistic that the
critical asset is source IP or destination IP.
l Internal connection: The Risk Computers tab displays the computer information that interacts
with the critical asset, the Address tab displays traffic and new sessions of IPs that interact
with the critical asset, the Application tab displays traffic and new sessions of applications that
Chapter 2 Dashboard 69
interact with the critical asset.
Risk Computers
Risk computer refers to the attacker computer and the victim computer. Based on the threat
level, the Risk Computers tab displays the statistics of all risk computers and threat information of
the whole network. Select iCenter > Risk Computers.
Click a computer name link on the list to view detailed information about the risks, kill chain, and
threat details.
l Detailed information: Displays the computer name/IP (if the computer name cannot be
identified, the IP will be displayed), operating system, status, zone, risk level (the white
70 Chapter 2 Dashboard
line points to the risk level of this critical assets), and certainty.
l Kill Chain: View the threat about the risk computer in each phase of the kill chain.
Chapter 2 Dashboard 71
l Threats: View all the threats about the risk computer.
l Mitigation: View all of the mitigation rules and the mitigation action results details of mit-
igation rules.
Click a threat name link in the list to view the detailed information, source/destination, know-
ledge base and history about threat. For a detailed description , see the next section Threat .
72 Chapter 2 Dashboard
Threat
Threats tab statistics and displays all threats information of the whole network within the spe-
cified period. Click iCenter, and click Threat tab.
Click a threat name link in the list to view the detailed information, source/destination, know-
ledge base and history about the threat.
l Threat Analysis: Depending on the threats of the different detection engine, the content of
Threat Analysis tab is also different.
l Anti Virus/IPS: Display the detailed threat information and view or download the
evidence packets.
Chapter 2 Dashboard 73
For the Anti Virus/ IPS function introduction, see "Anti Virus" on Page 306/"Intru-
sion Prevention System" on Page 255.
74 Chapter 2 Dashboard
l Sandbox Threat Detection: Display the detailed threat information of the suspicious
file.
Chapter 2 Dashboard 75
l Advanced Threat Detection: Display the advanced threat detection information, mal-
ware reliability information etc.
For the Advanced Threat Detection function introduction, see "Advanced Threat
Detection" on Page 403.
76 Chapter 2 Dashboard
l Anti-Spam:Display the spam filter information, such as sender and subject of spam.
l Knowledge Base: Display the specified threat description, solution, etc. of the threats detec-
ted by IPS, Abnormal Behavior Detection and Advanced Threat Detection.
l Threat History: Display the selected threat historical information of the whole network .
l Admin Action: Click to modify the threat state (Ignore, Confirmed, False Positive,
Fixed).
Chapter 2 Dashboard 77
In the Admin Action page, enter the configurations.
Option Description
Marking Select the marking scope of the threat entry. The system
Mitigation
System can identify the potential risks and network attacks dynamically, and take action on the
risk that hits the mitigation rules. For the Mitigation function introduction, see "Mitigation" on
Page 410.
78 Chapter 2 Dashboard
Threat Alarm Rule
The threat alarm rules, including threat conditions and action method. When a threat event that
meets the threat conditions (such as threat type, severity, behavior category, threat name, etc.)
occurs, system will notify the user in time according to the action method specified in the rule
(such as linked to the firewall, sound alarm or email), and the user can perform subsequent action
processing for the threat event. For the Threat Alarm Rule function introduction, see Threat
Alarm Rule.
Chapter 2 Dashboard 79
Chapter 4 Monitor
The Monitor module analyzes the traffic via the device and provides the statistics in various
aspects and styles.
System can monitor the following objects:
l User Monitor: Displays the users-based application statistics within the specified period (real-
time, latest 1 hour, latest 1 day, latest 1 month ). The statistics include the users that use
applications, application traffic and applications' concurrent sessions.
l Application Monitor: Displays the application statistics within the specified period (real-time,
latest 1 hour, latest 1 day, latest 1 month). The statistics include the users that used one applic-
ation, application traffic and applications' concurrent sessions.
l Computer Monitor:Displays the statistics of all risky computers of the whole network.
l URL Hit: Displays the accessed URL statistics within the specified period (real-time, latest 1
hour, latest 1 day, latest 1 month). The statistics include the users and IPs who are surfing,
and URLs accessed by users/IPs.
l Service/Network Monitor:Displays the statistics of packet loss rate and latency of ser-
vice/network nodes.
l Device Monitor: Displays the device statistics within the specified period (real-time, latest 1
hour, latest 1 day, latest 1 month), including the total traffic, interface traffic, zone, Online IP,
new/concurrent sessions, and hardware status.
l Application Block: If system is configured with Security Policy, the application block can
gather statistics on the applications and user/IPs.
Chapter 4 Monitor 80
User Monitor
This feature may vary slightly on different platforms . If there is a conflict between this guide and
the actual page, the latter shall prevail.
User monitor displays the application statistics within the specified period (Realtime, latest 1
hour, latest 1 day, latest 1 month). The statistics include the application traffic and applications'
concurrent sessions.
If IPv6 is enabled, system will support to monitor both IPv4 and IPv6 address.
Notes: Non-root VSYS also supports user monitor, but does not support address
book statistics.
Summary
Summary displays the user traffic/concurrent sessions ranking during a specified period or of spe-
cified interfaces/zones. Click Monitor > User Monitor > Summary.
l Hover your mouse over a bar to view the user 's average upstream traffic, downstream traffic,
total traffic or concurrent sessions .
l When displaying the user traffic statistics, the Upstream and Downstream legends are used to
select the statistical objects in the bar chart.
81 Chapter 4 Monitor
User Details
Click Monitor > User Monitor> User Details.
l Click to select the condition in the drop-down list to search the desired users.
l To view the detailed information of a certain user, select the user entry in the list, and click
"+".
l Cloud Application (real-time): Select the Cloud Application tab to display the cloud
application information of selected user.
l URL (real-time): Select the URL tab to display the URL hit count of selected user.
l URL Category (real-time) : Select the URL Category tab to display the URL category hit
count of selected user.
l Traffic: Select the Traffic tab to display the traffic trends of selected user.
Chapter 4 Monitor 82
l Concurrent Sessions: Select the Concurrent Sessions tab to display the concurrent ses-
sions trends of selected user.
l Within the user entry list, hover your cursor over a user entry, and there is a button to its
l Click to select the condition in the drop-down list to search the desired address
entry.
l To view the detailed information of an address entry, select the address entry in the list, and
click "+".
l Application (real-time): Select the Application (real-time) tab to display the detailed
information of the upstream traffic, downstream traffic, and total traffic. Click Details in
the list to view the line chart.
l Cloud Application(real-time): Select the Cloud Application tab to display the cloud
application information of selected address book.
l User (real-time): Select the User tab to display the total traffic of selected address book.
l Traffic: Select the Traffic tab to display the traffic trends of selected address book.
l Concurrent Sessions: Select the Concurrent Sessions tab to display the concurrent ses-
sions trends of selected address book.
83 Chapter 4 Monitor
Monitor Address Book
The monitor address is a database that stores the user's address which is used for statistics.
Click Monitor > User Monitor > Select Address Book, and Click at the
top left corner.
l In the left list, click an address entry and click × to remove it from the list.
Statistical Period
System supports the predefined time cycle and the custom time cycle. Click the time button on
the top right corner of each tab to set the time cycle.
l Last Hour: Displays the statistical information within the latest 1 hour.
Chapter 4 Monitor 84
l Last Day: Displays the statistical information within the latest 1 day.
l Last Month: Displays the statistical information within the latest 1 month.
Application Monitor
This feature may vary slightly on different platforms. If there is a conflict between this guide and
the actual page, the latter shall prevail.
Application monitor displays the statistics of applications, application categories, application sub-
categories, application risk levels, application technologies, and application characteristics within
the specified period (Realtime, latest 1 hour, latest 1 day, latest 1 month) .The statistics include
theapplication traffic and applications' concurrent sessions.
If IPv6 is enabled, system will support to monitor both IPv4 and IPv6 address.
Notes: Non-root VSYS also supports application monitor, but does not support to
monitor application group.
Summary
The summary displays the following contents of specified interfaces/zones during a specified
period:
85 Chapter 4 Monitor
l Select different Statistical_Period to view the statistical information in different periods of
time.
l From the drop-down menu, specify the type of statistics: Traffic or Concurrent Sessions.
l Hover your mouse over a bar or a pie graph to view the concrete statistical values of total
traffic or concurrent sessions .
Application Details
Click Monitor > Application Monitor > Application Details.
l Click the Time drop-down menu to select different Statistical_Period to view the statistical
information in that periods of time.
Chapter 4 Monitor 86
l Click button and select Application in the drop-down menu. You can search the
desired application by entering the keyword of the application's name in the text field.
l To view the detailed information of a certain application, select the application group entry in
the list, and click "+".
l Users (real-time): Select the Users (real-time) tab to display the detailed information of
users who are using the selected application. Click in details column to see the
l Traffic: Select the Traffic tab to display the traffic trends of selected application.
l Concurrent Sessions: Select the Concurrent Sessions tab to display the concurrent ses-
sions trends of the selected application.
l Description: Select the Description tab to display the detailed information of the selec-
ted application.
Group Details
Click Monitor > Application Monitor > Group Details.
l Click Time drop-down menu to select a different Statistical_Period to view the statistical
information in that periods of time.
l Click button and select Application Group in the drop-down menu. You can search
the desired application group by entering the keyword of the application group name in the
text field.
87 Chapter 4 Monitor
l To view the detailed information of a certain application group, select the application group
entry in the list, and click "+".
l User (real-time): Select the Users (real-time) tab to display the detailed information of
users who are using the selected application group. Click in details column, you can
see the trends of the upstream traffic, downstream traffic, total traffic.
l Traffic: Select the Traffic tab to display the traffic trends of selected application group.
l Concurrent Sessions: Select the Concurrent Sessions tab to display the concurrent ses-
sions trends of the selected application group.
Chapter 4 Monitor 88
In this page, you can perform the following actions:
l Click the desired application group entry to add it to the left list.
l In the left list, click an application group entry and click × to remove it from the list.
Statistical Period
System supports the predefined time cycle and the custom time cycle. Click Real-time on the top
right corner of each tab to set the time cycle.
l Last 60 Minutes: Displays the statistical information within the latest 1 hour.
l Last 24 Hours: Displays the statistical information within the latest 1 day.
l Last 30 Days: Displays the statistical information within the latest 1 month.
89 Chapter 4 Monitor
Computer Monitor
This feature may vary slightly on different platforms. If there is a conflict between this guide and
the actual page, the latter shall prevail.
Computer monitor displays the statistics of all risky computers of the whole network.
Computer Details
Computer details displays the statistics of all risky computers of the whole network.
l Click to select the condition in the drop-down list to search for the risky computers.
Chapter 4 Monitor 90
URL Hit Monitor
After the system is configured with , URL hit monitor displays URL visit statistics of user/IPs,
statistics of accessed URLs and URL categories within the specified period (real-time, latest 1
hour, latest 1 day, latest 1 month).
Summary
Click Monitor > URL Hit > Summary.
l Select a different Statistical_Period to view the statistical information in that period of time.
l Hover your mouse over a bar, to view the hit count of User/IP, URL or URL Category .
91 Chapter 4 Monitor
l Click at top-right corner of every table and enter the corresponding details.
l Click and to switch between the bar chart and the pie chart.
User/IP
Click Monitor > URL Hit > User/IP.
Chapter 4 Monitor 92
93 Chapter 4 Monitor
l The User/IPs and detailed hit count are displayed in the list below.
l Click "+" before a User/IP entry in the list to display the corresponding URL hit statistics in
the curve chart below.
l URL Trend: Displays the hit statistics of the selected User/IP, including the real-time
statistics and statistics for the latest 1 hour, 24 hours, and 30 days.
l URL: Displays the URLs' real-time hit count of selected User/IP. Click the URL link,
you can view the corresponding URLs detailed statistics page. Click the Detail link, you
can view the URL hit trend of the selected User/IP in the URL Filter Details page.
l URL Category: Displays the URL categories' read-time hit count of selected User/IP.
Click the URL category link, you can view the corresponding URL categories' detailed
statistics page. Click the Detail link, and you can view the URL category hit trend of
the selected User/IP.
l Click the Filter button at the top-left corner. Select User/IP and you can search the User/IP
hit count information by entering the keyword of the username or IP.
URL
Click Monitor > URL Hit > URL.
l The URL, URL category and detailed hit count are displayed in the list below.
l Click "+" before a URL entry in the list to view its detailed statistics.
l Statistics: Displays the hit statistics of the selected URL, including the real-time stat-
istics and statistics for the latest 1 hour, 24 hours, and 30 days.
l User/IP: Displays the User/IP's real-time hit count of selected URL. Click the User/IP
link and you can view the corresponding user/IPs detailed statistics page. Click the
Chapter 4 Monitor 94
Detail link and you can view the URL hit trend of the selected user/IP in the URL Fil-
ter Details page.
l Click the Filter button at the top-left corner. Select URL and you can search the URL hit
count information by entering the keyword of the URL.
URL Category
Click Monitor > URL Hit > URL Category.
95 Chapter 4 Monitor
Chapter 4 Monitor 96
l The URL category, count, and traffic are displayed in the list.
l Click "+" before a URL category entry in the list to view its detailed statistics displayed in the
Statistics, URL and User/IP tabs.
l Statistics: Displays the trend of the URL category visits, including the real-time trend
and the trend in the last 60 minutes, 24 hours, and 30 days.
l URL: Displays the visit information of the URLs, contained in the URL category, that
are being visited.
l User/IP: Displays the visit information of the users or IPs that are visiting the URL cat-
egory.
Statistical Period
System supports the predefined time cycle and the custom time cycle. Click the time button on
the top right corner of each tab to set the time cycle.
l Last 60 Minutes: Displays the statistical information within the latest 1 hour.
l Last 24 Hours: Displays the statistical information within the latest 1 day.
l Last 30 Days: Displays the statistical information within the latest 1 month.
Service/Network Monitor
This feature may not be available on all platforms. Please check your system's actual page to see if
your device delivers this feature.
The Service/Network Monitor page displays the latency of the service node that connects to the
current Hillstone device and the latency and packet loss rate of the network node. Click Monitor
> Service/Network Monitor.
97 Chapter 4 Monitor
l Use the table to view the name, detection type, interface, latency, packet loss rate (of network
nodes), and health status of the nodes. Click New.
Chapter 4 Monitor 98
Option Description
from the following options:
l ICMP.
99 Chapter 4 Monitor
Option Description
Test Click Test to test whether the node is reachable or the
service is available.
l Click to select the condition in the drop-down list. The nodes that meet the search-
Health status
Description
color
Health status
Description
color
l Select a node to view the latency/packet loss rate history trend during the latest 1 hour at
the bottom of the page.
l Select a node and click at the top-right corner of the history trend chart to expand
this chart.
After expanding the chart, you can perform the following actions in the expanded chart:
l Click Trend Comparison. The Trend Comparison window appears. Choose comparison
items from the Choose Comparison Items drop-down menu. System will display today's his-
Summary
The summary displays the device statistics within last 24 hours. Click Monitor > Device > Sum-
mary.
l Total traffic: Displays the total traffic within the specified statistical period.
l Hover your mouse over the chart to view the total traffic statistics at a specific point in
time.
l Select a different Statistical Period to view the statistical information in that period of
time.
l If IPv6 is enabled, the device traffic will show the total traffic of IPv4 and IPv6.
l Click Storage for system to display the disk space utilization trend.
l Hover your mouse over the chart to view the disk space utilization statistics at a
specific point in time.
l Hover your mouse over the chart to view the CPU/chassis temperature statistics
at a specific point in time.
l Fan status: Displays the operation status of the fan. Green indicates normal, and red
indicates error.
l Power Status: Displays the status of power module. Green indicates normal, and red
indicates error or a power supply module is not used.
l Power Status: Displays the information of power module, including the state of power mod-
ule, voltage/current, temperature and fan speed .
l CPU/memory status: Displays the current CPU utilization, memory utilization and CPU
temperature statistics of device/vSSM/vSCM.
l Hover your mouse over the histogram to view the detailed information, and the link
Details is displayed.
l Hover your mouse over the chart to view CPU utilization, memory utilization or
CPU temperature statistics at a specific point in time.
l Hover your mouse over the chart to view the new sessions and concurrent sessions stat-
istics at a specific point in time.
l Select a different Statistical Period to view the statistical information in different period
of time.
l Key Process: Displays information about key processes on the device, including process
name, PID, state, priority, CPU, memory, and runtime.
Statistical Period
System supports the predefined time cycle. The statistical period may vary slightly on different
monitored objects. If there is conflict between this guide and the actual page, the latter shall pre-
vail. Select statistical period from the drop-down menu at the top right
corner of some statistics page to set the time cycle.
l Last 60 Minutes: Displays the statistical information within the latest 1 hour.
l Last 30 Days: Displays the statistical information within the latest 1 month.
Application Block
This feature may not be available on all platforms. Please check your system's actual page to see if
your device delivers this feature.
If system is configured with "Security Policy" on Page 164 the application block can gather stat-
istics on the applications and user/IPs.
If IPv6 is enabled, system will support to monitor both IPv4 and IPv6 address.
Summary
The summary displays the application block's statistics on the top 10 applications and top 10 user-
/IPs. Click Monitor > Application Block > Summary.
l Select a different Statistical_Period to view the statistical information in that period of time.
l Hover your mouse over a bar to view the block count on the applications and user/IPs.
l Click to switch between the bar chart and the pie chart.
l Click at the top-right corner of every table and enter the corresponding details page.
Application
Click Monitor > Application Block > Application.
l To view the corresponding information of application block on the applications and user/IPs,
select the application entry in the list, and click "+".
l Statistics: Displays the block count statistics of the selected application, including the
real-time statistics and statistics for the latest 1 hour, 24 hours and 30 days.
l User/IP: Displays the user/IPs that are blocked from the selected application. Click a
user/IP in the list to display the corresponding block count statistics in the curve chart
below. Click to jump to the corresponding user/IPs page.
l Click to select the condition in the drop-down list. You can search the application
User/IP
Click Monitor > Application Block > User/IP.
l Click a user/IP in the list to display the corresponding block count statistics in the curve
chart below. Click to jump to the corresponding user / IPs page.
l Click to select the condition in the drop-down list. You can search the users/IPs
information.
Statistical Period
System supports the predefined time cycle and the custom time cycle. Click (
) on the top right corner of each tab to set the time cycle.
l Last Hour: Displays the statistical information within the latest 1 hour.
l Last Day: Displays the statistical information within the latest 1 day.
l Last Month: Displays the statistical information within the latest 1 month.
Alarm as a Monitor
The alarms are show under the monitor module. When an occurrence defined in the alarm rule
happens, the alarm message is generated and shown in the alarm page. For more information on
alarm rules, refer to Alarm Rule.
In the alarm page, alarms are shown by three categories: alarms arranged by time, alarms arranged
by severity levels and alarms details.
Alarms by Time
In the Time tab, alarm messages are on a two-dimensional coordinate axis. To see the alarm by
time page, select Monitor > Alarm, and select the Time tab.
l Type: Select one or more types from the drop-down menu and click Add to add them to
the right.
l Severity: Select one or more severity levels. There are three severity hierarchy: crit-
ical, warning, and informational.
l Status: Select a message status from the drop-down menu: all, unread and read.
l Time: Select the time range when alarms are generated. You may select to view the
last one hour, one day, one week, one month or other user-defined time.
l Hover over a dot (red, yellow or green) and click the link, and then you will be redirected to
the detail page of that alarm.
Alarm by Severity
Alarms in the Severity tab shows the number bar of alarm messages of different severity levels.
Select Monitor > Alarm, and select the Severity tab.
l Type: Select one or more types from the drop-down menu, and click Add to add
them to the right.
l Status: Select a message status from the drop-down menu: all, unread and read.
l Time: Select the time range when alarms are generated. You may select to view the
last one hour, one day, one week, one month or other user-defined time.
Alarm Details
Select Monitor > Alarm, and click the All tab. You will be able to see all alarm messages and their
detailed information.
l Configuring filters.
l Last Alarm Time: Select the time range when alarms are generated. You may select to
view the last one hour, one day, one week, one month or other user-defined time.
l Severity: Select one or more severity levels. There are three severity hierarchy: critical,
warning, and informational.
l Status: Select a message status from the drop-down menu: all status, unread messages
or/and read messages.
l Reason: Type keywords you want to search in the reasons that trigger alarm.
l Batch reading: Select all the check boxes of alarm messages you want to read, and click
Read Alarm. In the prompt, enter your comment, and click OK.
l Single reading: Hover your cursor over the Status column and click Read. In the
prompt, enter your comment, and click OK.
l Batch adding/modifying: Select all the check boxes of alarm messages you want to com-
ment, and click Add/Modify Comment. In the prompt, enter your comment, and click
OK.
l Single adding/modifying: Select the check boxes of alarm message you want to com-
ment, and click Add/Modify Comment. In the prompt, enter your comment, and
click OK.
l Click and then specify the search conditions: select a AAA server , or enter the user
name.
l Click to search.
l Click Kick Out under the Operation column to kick the user out.
Monitor Configuration
This feature may not be available on all platforms. Please check your system's actual page to see if
your device delivers this feature.
You can enable or disable some monitor items as needed. The monitor items for Auth user are
enabled automatically.
To enable/disable a monitor item, take the following steps:
3. Select subnet monitor address book in the IPv4 Subnet Monitor Address Book or IPv6 Sub-
net Monitor Address Book drop-down list. System will match the traffic which is sent from
the Internet to Subnet according to the specified address. If matched, the traffic will be
counted to the Subnet side.
4. Click OK .
Notes: After a monitor item is enabled or disabled in the root VSYS, the item of all
VSYSs will be enabled or disabled(except that the non-root VSYS does not support
this monitor item). You can not enable or disable monitor item in non-root VSYSs.
Reporting
This feature may not be available on all platforms. Please check your system's actual page if your
device delivers this feature.
System provides rich and vivid reports that allow you to analyze network risk, network access and
device status comprehensively by all-around and multi-dimensional statistics and charts.
You can configure report task in "Report Template" on Page 118 and "Report Task" on Page 125,
and view generated report files in "Report File" on Page 117.
Related Topics:
l Sort report files by different conditions: Select Group by Time, Group by Task or Group
by Status from the drop-down list, and then select a time, task or status from the selective
table, and the related report files will be shown in the report file table.
l The bold black entry indicates that the report file status is "unread".
l Click Export, the browser launches the default download tool, and downloads the selected
report file.
l Click Mark as Read to modify the status of the selected report files.
l Click to select the condition in the drop-down list. In the text box, enter the
keyword to search for the report files.
l In the File Type column, click the icon of the report file to preview the report file. You can
preview report files in PDF, HTML format, and you can download report files in WORD
format.
Notes: If your browser has enabled "Blocking pop-up windows", you will not see
the generated file. Make sure to set your browser "Always allow pop-up windows",
or you can go to your blocked window history to find the report file.
l Predefined Template: Predefined templates are built in system. By default, different report
items have been selected for each predefined template category. The predefined template can-
not be edited or deleted. The predefined template categories are as follows:
Category Description
Global Net- Statistics of the global network and risk status, covering
work and the overview, network and application traffic, network
Risk Assess- threats and host details.
ment Report
Threats
Top 10 Hosts Statistics of the top 10 hosts by URL hits, covering the
by URL Hits host application traffic, network threats and URL hits.
l User-defined Template: The report template created as needed. You can select the report
items. Up to 32 user-defined templates can be created.
2. Click New.
Con- Select the check box of the report item as needed. By default, all
tent report items are selected. The report items are described as fol-
lows:
2. In the templates list, select the user-defined report template entry that needs to be edited.
3. Click Edit.
2. In the templates list, select the user-defined report template entry that needs to be deleted.
3. Click Delete.
System supports the rapid clone of a report template. You can clone and generate a new report
template by modifying some parameters of one current report template.
To clone a report template, take the following steps:
3. Click the Clone button above the list, and in the Report Template Configuration page, enter
the newly cloned report template name into the "Name" .
Report Task
The report task is the schedule related to report file. It defines the report template, data range,
generation period, generation time, and the output method of report files.
You can configure report tasks and generate report files on the device according to your needs.
Option Description
Expand Report Template, select the report template you want to use for the report task.
Option Description
Option Description
Option Description
File Format Specifies the output format of the report file, including
PDF, HTML, and WORD formats.
Recipient Sends report file via email. To add recipients, enter the
email addresses in to the recipient text box (use ";" to sep-
arate multiple email addresses. Up to 5 recipients can be
configured).
Send via FTP Click the Enable button to send the report file to a spe-
cified FTP server.
will be saved.
2. In the report task list, select the report task entry that needs to be edited.
3. Click the Edit button on the top to open the Report Task Configuration page to edit the
selected report task.
2. In the report task list, select the report task entry that needs to be deleted.
3. Click the Delete button on the top to delete the selected report task.
2. Select the task, and click the Enable or Disable button on the top.
By default, the user-defined task is enabled.
l Threat - logs related to behaviors threatening the protected system, e.g. attack defense logs,
AV logs, and IPS logs.
l Event - logs about the system, like ARP logs and login logs.
l Network - logs about network services, like DHCP logs and route logs.
l Session - Session logs, e.g. session protocols, source and destination IP addresses and ports.
l NAT - NAT logs, including NAT type, source and destination IP addresses and ports.
l URL - logs about network surfing, e.g. Internet visiting time, web pages visiting history, URL
filtering logs.
l Content filter logs – logs related with content filter function, e.g. Web content filter, Web
posting, Email filter and HTTP/FTP control.
l Network behavior record logs – Logs related with network behavior record function, e.g. IM
behavior ,etc.
System logs record running status of the device, thus provide information for analysis and evid-
ence.
Log Severity
Event logs are categorized into eight severity levels.
Logging 133
Severity Level Description
l Console - The default output destination. You can close this destination via CLI.
l File - By default, the logs are sent to the specified USB destination in form of a file.
134 Logging
Log Format
To facilitate the access and analysis of the system logs, system logs follow a fixed pattern of
information layout, i.e. date/time, severity level@module: descriptions.See the example below:
2000-02-05 01:51:21, WARNING@LOGIN: Admin user "admin" logged in through console
from localhost.
Logging 135
Threat Log
Threat logs can be generated under the conditions that:
l Threat logging in the Logging feature is enabled. Refer to "Managing Logs" on Page 146
l You have enabled one or more of the following features: "Anti Virus" on Page 306,"Intrusion
Prevention System" on Page 255, "Attack-Defense" on Page 384.
To view threat logs, select Report & Log > Log > Threat Log.
l In the Detection Period drop-down menu, Specify the detection period to view the logs dur-
ing the specified time range.
l Click Filter to configure more filter conditions. After configure the filter conditions, the sys-
tem will automatically display the matched logs. Click the drop-dow menu after the Filter and
select "Save Filter" to save the current filter conditions, so that the next time you can directly
select the save filter conditions, and view the corresponding log.
l Export: Export all threat logs that matches the filter conditions. The separator is used to facil-
ity the process of importing logs to other auditing system.
l Merge Log: Specifies the type of merging log. The system supports source IP, destination IP,
and threat name to merge logs. When specified, the logs in the list are displayed after merged.
You can enter the IPv4 or IPv6 address if the filter condition is selected as source or des-
tination IP.
l Select a threat log in the table and then you can view the detailed information in the Log
Details tab. In the Log Details tab, you can do the following:
136 Logging
l View the severity, application/protocol, source/destination port, threat start time,
end time, and other threat-related information (such as plain-text SQL command,
plain-text paths to URI, etc.).
l Click "ViewPcap" to see the message package of the threat, or click "Download" to
download the packet to local for viewing. IPv6 and IPv4 protocol type messages are
both supported for users to view.
l Click "Signature ID" "Add Whitelist" "Disable Rule" to quickly link to the relevant
page.
l If the threat log is detected by Intrusion Prevention system model or Antivirus, you
can click Add Blacklist to add the source IP address of attacker to the blacklist to block
its flow. In the page that pops up, configure the IP range, schedule, and status of the
blacklist.
Event Log
This feature may vary slightly on different platforms. Please see the actual page of the feature that
your device delivers.
To view event logs, select Report & Log > Log > Event Log.
In this page, you can perform the following actions:
l Filter: Click to add conditions to show logs that match your filter.
Network Log
This feature may vary slightly on different platforms. Please see the actual page of the feature that
your device delivers.
To view network logs, select Report & Log > Log > Network Log.
Logging 137
In this page, you can perform the following actions:
l Filter: Click to add conditions to show logs that match your filter.
Configuration Log
This feature may vary slightly on different platforms. Please see the actual page of the feature that
your device delivers.
To view configuration logs, select Report & Log > Log > Configuration Log.
In this page, you can perform the following actions:
l Filter: Click to add conditions to show logs that match your filter.
138 Logging
Session Log
Session logs can be generated under the conditions that:
l Session logging in the Logging feature is enabled. Refer to "Managing Logs" on Page 146.
l The logging function has been enabled for policy rules. Refer to "Security Policy" on Page
164.
To view session logs, select Report & Log > Log > Session Log.
Notes:
l For ICMP session logs, system will only record the ICMP type value and its
code value. As ICMP 3, 4, 5, 11 and 12 are generated by other com-
munications, not a complete ICMP session, system will not record such kind
of packets.
l For TCP and UDP session logs, system will check the packet length first. If
the packet length is 20 bytes (i.e., with IP header, but no loads), it will be
defined as a malformed packet and be dropped; if a packet is over 20 bytes,
Logging 139
but it has errors, system will drop it either. So, such abnormal TCP and UDP
packets will not be recorded.
140 Logging
PBR Log
PBR logs can be generated under the conditions that:
l PBR logging in the Logging feature is enabled. Refer to "Managing Logs" on Page 146.
l You have enabled logging function in PBR rules. Refer to "Policy-based Route" on Page
493.
To view PBR logs, select Report & Log > Log > PBR Log.
Logging 141
NAT Log
NAT logs are generated under the conditions that:
l NAT logging in the Logging feature is enabled. Refer to "Managing Logs" on Page 146.
l NAT logging of the NAT rule configuration is enabled. Refer to "Configuring SNAT" on
Page 188 and "Configuring DNAT" on Page 199.
To view NAT logs, select Report & Log > Log > NAT Log.
142 Logging
URL Log
URL logs can be generated under the conditions that:
l URL logging in the Logging feature is enabled. Refer to "Managing Logs" on Page 146.
l You have enabled logging function in URL rules. Refer to "URL Filtering" on Page 339.
To view URL logs, select Report & Log > Log > URL Log.
l Content Filter logging in the Logging feature is enabled. Refer to "Managing Logs" on Page
146.
l You have enabled one or more of the following features: "Web Content" on Page 372 func-
tion.
To view Content Filter logs, select Report & Log > Log > Content Filter.
l Filter: Click to add conditions to show logs that match your filter.
Logging 143
l Clear: Click to delete all the displayed logs.
l Network Behavior Record logging in the Logging feature is enabled. Refer to "Managing
Logs" on Page 146.
l You have enabled the function of"Network Behavior Record" on Page 377.
To view Network Behavior Record logs, select Report & Log > Log > Network Behavior
Record.
l Filter: Click to add conditions to show logs that match your filter.
CloudSandBox Log
This feature may vary slightly on different platforms. Please see the actual page of the feature that
your device delivers.
To view sandbox logs, select Report & Log > Log > Cloud SandBox Log.
In this page, you can perform the following actions:
l Filter: Click to add conditions to show logs that match your filter. You can enter the
IPv4 or IPv6 address if the filter condition is selected as source or destination IP.
144 Logging
l Clear: Click to delete all the displayed logs.
Logging 145
Managing Logs
In the Log Management page, you can configure log settings, log servers, Web emails, and UNIX
servers.
Threat Log
Option Description
146 Logging
Option Description
Email address Select the check box to export logs to the specified
email address.
Logging 147
Option Description
Event Log
Option Description
Enable Select the check box to enable the event logging function.
148 Logging
Option Description
Log server Select the check box to export event logs to the log
server.
Email address Select the check box to send event logs to the email.
Network Log
Option Description
Logging 149
Option Description
Log server Select the check box to export network logs to the log
server.
Configuration Log
Option Description
Enable Select the check box to enable configuration logging
function.
Cache Select the check box to export configuration logs to
cache.
Log Server Select the check box to export network logs to the
log server.
150 Logging
Option Description
sages per second).
Session Log
Option Description
Enable Select the check box to enable session logging func-
tion.
Log Server Select the check box to export session logs to the
syslog server.
Logging 151
Option Description
PBR Log
Option Description
Enable Select the check box to enable PBR logging func-
tion.
152 Logging
NAT Log
Option Description
Enable Select the check box to enable NAT logging func-
tion.
Log Server Select the check box to export NAT logs to log
servers.
URL Log
Option Description
Enable Select the check box to enable URL logs.
Logging 153
Option Description
Cache Select the check box to export URL logs to
cache.
Log Server Select the check box to export URL logs to log
server.
154 Logging
Option Description
Log Server Select the check box to export content filter logs
to log server.
Log Server Select the check box to export content filter logs to
log server.
Logging 155
Option Description
CloudSandBox Log
Option Description
Enable Select the check box to enable CloudSandBox logs.
Cache Select the check box to export CloudSandBox logs to
cache.
3. Click OK.
156 Logging
Creating a Log Server
3. Click New.
Option Description
Logging 157
Option Description
Log Type Specifies the log types the syslog server will receive.
5. Click the Log Encoding Config button in the upper right corner to open the Log Encod-
ing Config dialog box.
An email in log management setting is an email address for receiving log messages.
To add an email address:
158 Logging
3. Enter an email address and click Add.
5. Click OK.
3. Select a device you want, the logs will be exported to that Unix server.
4. Click OK.
Logging 159
l " Security Protection Configuration" on Page 253
System Information
160 Logging
System Information
Signature DB Information
Anti-Virus Sig- Show the current version of the antivirus signature database
nature and the date of the last update.
IPS Signature Show the current version of the IPS signature database and the
date of the last update.
Botnet C&C Show the current version of the Botnet C&C Prevention sig-
Prevention Sig- nature database and the date of the last update.
nature
URL Category Show the current version of the URL signature database and
Database the date of the last update.
Sandbox Show the current version of the Sandbox Whitelist DB and the
Whitelist Data- date of the last update.
Logging 161
System Information
base
IP Reputation Show the current version of the perimeter traffic filtering sig-
Database nature database and the date of the last update.
Mitigation Sig- Show the current version of the mitigation signature database
nature and the date of the last update.
Advanced Show the current version of the advanced threat detection sig-
Threat Detec- nature database and the date of the last update.
tion Signature
Notes: The signature is all license controlled, so you need to make sure that your
system has installed that license. Refer to "License" on Page 636.
162 Logging
Policy
The Policy module provides the following functions:
l Security policy: Security policy the basic function of devices that is designed to control the
traffic forwarding between security zones/segments. By default all traffic between security
zones/segments will be denied.
l NAT: When the IP packets pass through the devices or routers, the devices or routers will
translate the source IP address and/or the destination IP address in the IP packets.
l Session limit: The session limit function limit the number of sessions and control the session
rate to the source IP address, destination IP address, specified IP address, service or role/user-
/user group, thereby to protect from DoS attacks.
l ARP defense: ARP defense function protects your network against various ARP attacks
l URL filter: URL filter controls the access to some certain websites and records log messages
for the access actions.
l Global blacklist: After adding the IP addresses or services to the global blacklist, the system
will perform the block action to the IP address and service until the block duration ends.
Policy 163
Security Policy
Security policy is the basic function of devices that is designed to control the traffic forwarding
between security zones/segments. Without security policy rules, the devices will deny all traffic
between security zones/segments by default. After configuring the security policy rule, the
device can identify what traffic between security zones or segments will be permitted, and the oth-
ers will be denied.
The basic elements of policy rules:
l Actions that the devices will perform when processing the specific type of traffic, including
Permit and Deny.
Generally a security policy rule consists of two parts: filtering conditions and actions. You can set
the filtering conditions by specifying traffic's source zone/address, destination zone/address, ser-
vice type, and user. Each policy rule is labeled with a unique ID which is automatically generated
when the rule is created. You can also specify a policy rule ID at your own choice. All policy rules
in system are arranged in a specific order. When traffic flows into a device, the device will query
for policy rules by turn, and processes the traffic according to the first matched rule.
The max global security policy rule numbers may vary in different models.
Security policy supports IPv4 and IPv6 address. If IPv6 is enabled, you can configure IPv6
address entry for the policy rule.
This section contains the following contents:
l Manage the security policy rules: enable/disable a policy rule, clone a policy rule, export or
import policy rules, adjust security rule position,view and clear policy hit count, hit count
164 Policy
check, and rule redundancy check.
1. Select Configuration Management > Policy > Security Policy > Policy.
2. At the top-left corner, click New to open the Policy Configuration page.
Policy 165
Option Description
Source Information
166 Policy
Option Description
policy rule.
Destination
Policy 167
Option Description
Other Information
168 Policy
Option Description
Policy 169
Option Description
described as follows:
TCP/UDP:
l Destination port:
l Source port:
Notes:
l The minimum port num-
ber cannot exceed the
maximum port number.
170 Policy
Option Description
ICMP:
Policy 171
Option Description
Notes:
l The minimum code can-
not exceed the maximum
code.
ICMPv6:
172 Policy
Option Description
Policy 173
Option Description
Notes:
l The minimum code can-
not exceed the maximum
code.
4. Click Close .
174 Policy
Option Description
click icon.
Action
Policy 175
Option Description
through.
176 Policy
Option Description
Enable Web Enable the Web redirect function to redirect the HTTP
Redirect request from clients to a specified page automatically.
With this function enabled, system will redirect the page
you are requesting over HTTP to a prompt page.
Option Description
Policy 177
Option Description
tering policy rule and URL filter profile enables the devices to
implement fine-grained application layer policy control.
Option Description
178 Policy
Option Description
Option Description
Log You can log policy rule matching in the system logs
according to your needs.
Policy 179
Option Description
Policy Assist- Click the Enable button to enable policy assistant. After
ant enabling the policy assistant, you can specify the policy
ID as the traffic hit policy. System can analyze the traffic
data hit the specified policy ID, and aggregate the traffic
list according to the user-defined aggregation rules, and
finally the security policy rules that meet your expect-
ations can be generated. For how to use policy assistant,
see Configuring the Policy Assitant.
180 Policy
Option Description
ACL Click the Enable button to enable the access control func-
tion and select the ACL profile. With the combination of
security policy and ACL rules, system can achieve accur-
ate access controlling.
Managing security policy rules include the following matters: enable/disable a policy rule, clone a
policy rule, adjust security rule position, configure default action, view and clear policy hit count,
hit count check, and rule redundancy check.
Policy 181
Enabling/Disabling a Policy Rule
By default the configured policy rule will take effect immediately. You can terminate its control
over the traffic by disabling the rule.
To enable/disable a policy rule:
1. Select Configuration Management > Policy > Security Policy > Policy.
3. Click icon, and then select Enable or Disable to enable or disable the rule.
The disabled rule will not display in the list. Click icon , and then select Show Disabled
Policies to show them.
1. Select Configuration Management > Policy > Security Policy > Policy.
2. Select the security policy rule that you want to export and click Export.
3. In the Export page, select Selected Policy and click OK. The selected security policies will
be exported in the format of ".zip ". You can also select All policies to export all security
policies or select Page Range and specify the page number to export the security policies for
the specified page number.
The exported policies can be imported on another device. To import a policy rule, take the fol-
lowing steps:
1. Select Configuration Management > Policy > Security Policy > Policy.
182 Policy
3. In the Import page, click the Browse to select the security policy file to be imported.
When there are a large number of policy rules in system, to create a policy rule which is similar to
an configured policy rule easily, you can copy the policy rule and paste it to the specified location.
To clone a policy rule, take the following steps:
1. Select Configuration Management > Policy > Security Policy > Policy.
2. Select the security policy rule that you want to clone and click Copy.
3. Click Paste. In the drop-down list, select the desired position. Then the rule will be cloned
to the desired position.
1. Select Configuration Management > Policy > Security Policy > Policy.
2. Select the check box of the security policy whose position will be adjusted.
3. Click Move.
4. In the drop-down list, type the rule ID or name , and click Top, Bottom, Before ID , After
ID , Before Name ,or After Name. Then the rule will be moved to the top, to the bottom,
before or after the specified ID or name.
In order to make sure that the policies based on schedule are effective, system provides a method
to check the validity of policies. After checking the policy, the invalid policies based on schedule
will be highlighted by yellow.
To check schedule validity:
Policy 183
1. Select Configuration Management > Policy > Security Policy > Policy.
2. Click icon and select Schedule Validity Check. After check, system will highlight the
invalid policy based on schedule by yellow. Meanwhile, you can view the validity status in
the policy list.
1. Select Configuration Management > Policy > Security Policy > Policy.
2. Click icon and select Show Disabled Policies. The disabled policies will be highlighted
Notes:
l By default( the "Schedule Validity Check" and "Show Disabled Policies" are
not selected), the policy list only displays the enabled policies which are not
highlighted.
l When you select both "Schedule Validity Check" and "Show Disabled
Policies", the policy is managed as follows:
184 Policy
l The policy list will display the "Validity" column, which shows the
validity status of policies.
Policy 185
NAT
This feature may not be available on all platforms. Please check your system's actual page to see if
your device delivers this feature.
NAT, Network Address Translation, translates the IP address within an IP packet header to
another IP address. When the IP packets pass through the devices or routers, the devices or
routers will translate the source IP address and/or the destination IP address in the IP packets. In
practice, NAT is mostly used to allow the private network to access the public network, vice
versa.
When a device is implementing the NAT function, it lies between the public network and the
private network. The following diagram illustrates the basic translation process of NAT.
As shown above, the device lies between the private network and the public network. When the
internal PC at 10.1.1.2 sends an IP packet (IP packet 1) to the external server at 202.1.1.2
through the device, the device checks the packet header. Finding that the IP packet is destined to
the public network, the device translates the source IP address 10.1.1.2 of packet 1 to the public
IP address 202.1.1.1 which can get routed on the Internet, and then forwards the packet to the
external server. At the same time, the device also records the mapping between the two addresses
in its NAT table. When the response packet of IP packet 1 reaches the device, the device checks
the packet header again and finds the mapping records in its NAT table, and replaces the des-
tination address with the private address 10.1.1.2. In this process, the device is transparent to the
186 Policy
PC and the Server. To the external server, it considers that the IP address of the internal PC is
202.1.1.1 and knows nothing about the private address 10.1.1.2. Therefore, NAT hides the
private network of enterprises.
Implementing NAT
The devices translate the IP address and port number of the internal network host to the external
network address and port number, and vice versa. This is the translation between the "private IP
address + port number" and "public IP address + port number".
The devices achieve the NAT function through the creation and implementation of NAT rules.
There are two types of NAT rules, which are source NAT rules (SNAT Rule) and destination
NAT rules (DNAT Rule). SNAT translates source IP addresses, thereby hiding the internal IP
addresses or sharing the limited IP addresses; DNAT translates destination IP addresses, and usu-
ally the IP addresses of internal servers (such as the WWW server or SMTP server) protected by
the device is translated to public IP addresses.
Policy 187
Configuring SNAT
Requirements
Virtual Specifies a VRouter for the SNAT rule. The SNAT rule
Router will take effect when the traffic flows into this VRouter
188 Policy
Requirements
Policy 189
Requirements
drop-down list.
Ingress Specifies the ingress traffic, the default value is all traffic.
Traffic
l All traffic - Specifies all traffic as the ingress traffic.
Traffic from any ingress interfaces will continue to
match this SNAT rule.
Egress Specifies the egress traffic, the default value is all traffic.
190 Policy
Requirements
Service Specifies the service type of the traffic from the drop-
down list. To create a new service or service group, click
New Service or New Group.
Translated to
Policy 191
Requirements
192 Policy
Requirements
Policy 193
Requirements
194 Policy
Expand Advanced Configuration, configure the corresponding options.
Option Description
NAT Log Click the Enable button to enable the log function for
this SNAT rule. The system will generate log inform-
ation when there is traffic matching this NAT rule.
Policy 195
Option Description
specified.
ID Specifies the method you get the rule ID. Each rule
has its unique ID. It can be automatically assigned by
system or manually assigned by yourself. If you select
Manually assign , type an ID number into the box
behind.
By default the configured SNAT rule will take effect immediately. You can terminate its control
over the traffic by disabling the rule.
To enable/disable a policy rule:
Adjusting Priority
Each SNAT rule has a unique ID. When the traffic flows into the device, the device will search
the SNAT rules in order and then implement NAT on the source IP of the traffic according to the
first matched rule. The sequence of the ID shown in the SNAT rule list is the order of the rule
matching.
To adjust priority, take the following steps:
2. Select the rule you want to adjust its priority and click Priority.
196 Policy
3. In the Priority page, move the selected rule to:
l Top: The rule is moved to the top of all the rules in the SNAT rule list.
l Bottom: The rule is moved to the bottom of all the rules in the SNAT rule list. By
default, system will put the newly-created SNAT rule at the bottom of all the SNAT
rules.
l Before ID: Specifies an ID number. The rule will be moved before the ID you spe-
cified.
l After ID: Specifies an ID number. The rule will be moved after the ID you specified.
When there are a large number of NAT rules in system, to create a NAT rule which is similar to
an configured NAT rule easily, you can copy the NAT rule and paste it to the specified location.
To copy/paste a SNAT rule, take the following steps:
2. Select the SNAT rule that you want to clone and click Copy.
3. Click Paste. In the pop-up, select the desired position. Then the rule will be cloned to the
desired position.
l Top: The rule is pasted to the top of all the rules in the SNAT rule list.
l Bottom: The rule is pasted to the bottom of all the rules in the SNAT rule list.
l Before the Rule Selected: The rule will be pasted before the Rule being selected.
l After the Rule Selected: The rule will be pasted after the Rule being selected.
Policy 197
Hit Count
The system supports statistics on SNAT rule hit counts, i.e., statistics on the matching between
traffic and SNAT rules. Each time the inbound traffic is matched to a certain SNAT rule, the hit
count will increment by 1 automatically.
To view a SNAT rule hit count, click Configuration Management > Policy > NAT > SNAT. In
the SNAT rule list, view the statistics on SNAT rule hit count under the Hit Count column.
1. Select Configuration Management > Policy > NAT > SNAT Hit Analysis.
l All NAT: Clears the hit counts for all NAT rules.
l NAT ID: Clears the hit counts for a specified NAT rule ID.
3. Click OK.
1. Select Configuration Management > Policy > NAT > SNAT Hit Analysis.
2. Click Analyze.
198 Policy
Configuring DNAT
DNAT translates destination IP addresses, usually the IP addresses of internal servers (such as the
WWW server or SMTP server) protected by the device is translated to the public IP addresses.
Policy 199
Requirements
Virtual Specifies a VRouter for the DNAT rule. The DNAT rule
Router will take effect when the traffic flows into this VRouter
and matches the DNAT rule conditions.
200 Policy
Requirements
Mapping
Others
HA Group Specifies the HA group that the DNAT rule belongs to.
The default setting is 0.
Policy 201
2. Click New and select Port Mapping.
Requirements
Virtual Specifies a VRouter for the DNAT rule. The DNAT rule
Router will take effect when the traffic flows into this VRouter
and matches the DNAT rule conditions.
202 Policy
Requirements
Service Specifies the service type of the traffic from the drop-
down list.
To create a new service or service group, click New Ser-
vice or New Group.
Policy 203
Requirements
Mapping
Port Mapping Types the translated port number of the Intranet server.
The available range is 1 to 65535.
Others
HA Group Specifies the HA group that the DNAT rule belongs to.
The default setting is 0.
You can create a DNAT rule and configure the advanced settings, or you can edit the advanced
settings of an exiting DNAT rule.
To create a DNAT rule and configure the advanced settings, take the following steps:
2. Click New and select Advanced Configuration. To edit the advanced settings of an existing
DNAT rule, select it and click Edit. The DNAT configuration page will appear.
204 Policy
In this page, configure the following options.
Requirements
Virtual Specifies a VRouter for the DNAT rule. The DNAT rule
Router will take effect when the traffic flows into this VRouter
and matches the DNAT rule conditions.
Policy 205
Requirements
206 Policy
Requirements
Service Specifies the service type of the traffic from the drop-
down list.
To create a new service or service group, click Add.
Translated to
Action Specifies the action for the traffic you specified, includ-
ing:
Policy 207
Requirements
Translate to When selecting the NAT option, you need to specify the
translated IP address. The options include Address Entry,
IP Address, IP/Netmask (or IPv6/Prefix), and SLB
Server Pool. The SLB Server Pool configure option is
available if the type of the DNAT rule is IPv4 or NAT64.
For more information about the SLB Server Pool, view
Configuring SLB Server Pool.
Load Balance Click Enable to enable the function. Traffic will be bal-
anced to different Intranet servers.
208 Policy
Track Server
Track Ping After enabling this function, system will send Ping pack-
Packets ets to check whether the Intranet servers are reachable.
Track TCP After enabling this function, System will send TCP pack-
Packets ets to check whether the TCP ports of Intranet servers
are reachable.
TCP Port Specifies the TCP port number of the monitored Intranet
server.
NAT Log Enable the log function for this DNAT rule to generate
the log information when traffic matches this NAT rule.
Position Specifies the position of the rule. Each DNAT rule has a
unique ID. When the traffic is flowing into the device,
the device will search the DNAT rules by sequence, and
then implement DNAT on the source IP of the traffic
according to the first matched rule. The sequence of the
ID shown in the DNAT rule list is the order of the rule
matching. Select one of the following items from the
drop-down list:
Policy 209
Track Server
By default the configured DNAT rule will take effect immediately. You can terminate its control
over the traffic by disabling the rule.
To enable/disable a policy rule, take the following steps:
When there are a large number of NAT rules in system, to create a NAT rule which is similar to
an configured NAT rule easily, you can copy the NAT rule and paste it to the specified location.
To copy/paste a DNAT rule, take the following steps:
210 Policy
1. Select Configuration Management > Policy > NAT > DNAT.
2. Select the DNAT rule that you want to clone and click Copy.
3. Click Paste. In the pop-up, select the desired position. Then the rule will be cloned to the
desired position.
l Top: The rule is pasted to the top of all of the rules in the DNAT rule list.
l Bottom: The rule is pasted to the bottom of all of the rules in the DNAT rule list.
l Before the Rule Selected: The rule will be pasted before the Rule selected.
l After the Rule Selected: The rule will be pasted after the Rule selected.
Adjusting Priority
Each DNAT rule has a unique ID. When the traffic is flowing into the device, the device will
search the DNAT rules in order, and then implement NAT of the source IP of the traffic accord-
ing to the first matched rule. The sequence of the ID shown in the DNAT rule list is the order of
the rule matching.
To adjust priority, take the following steps:
2. Select the rule you want to adjust its priority and click Priority.
l Top: The rule is moved to the top of all of the rules in the DNAT rule list.
l Bottom: The rule is moved to the bottom of all of the rules in the DNAT rule list. By
default, system will put the newly-created DNAT rule at the bottom of all of the
DNAT rules.
l Before ID: Specifies an ID number. The rule will be moved before the ID you spe-
Policy 211
cified.
l After ID: Specifies an ID number. The rule will be moved after the ID you specified.
Hit Count
The system supports statistics on DNAT rule hit counts, i.e., statistics on the matching between
traffic and DNAT rules. Each time the inbound traffic is matched to a certain DNAT rule, the hit
count will increment by 1 automatically.
To view a DNAT rule hit count, click Configuration Management > Policy > NAT > DNAT. In
the DNAT rule list, view the statistics on DNAT rule hit count under the Hit Count column.
1. Select Configuration Management > Policy > NAT > DNAT Hit Analysis.
l All NAT: Clears the hit counts for all NAT rules.
l NAT ID: Clears the hit counts for a specified NAT rule ID.
3. Click OK.
1. Select Configuration Management > Policy > NAT > DNAT Hit Analysis.
2. Click Analyze.
212 Policy
iQoS
System provides iQoS (intelligent quality of service) which guarantees the customer's network per-
formance, manages and optimizes the key bandwidth for critical business traffic, and helps the cus-
tomer greatly in fully utilizing their bandwidth resources.
iQoS is used to provide different priorities to different traffic, in order to control the delay and
flapping, and decrease the packet loss rate. iQoS can assure the normal transmission of critical
business traffic when the network is overloaded or congested. iQoS is controlled by license. To
use iQoS, apply and install the iQoS license.
Implement Mechanism
The packets are classified and marked after entering system from the ingress interface. For the clas-
sified and marked traffic, system will smoothly forward the traffic through the shaping mech-
anism, or drop the traffic through the policing mechanism. If the shaping mechanism is selected
to forward the traffic, the congestion management and congestion avoidance mechanisms will give
different priorities to different types of packets so that the packets of higher priority can pass
though the gateway earlier to avoid network congestion.
In general, implementing QoS includes:
l Classification and marking mechanism: Classification and marking is the process of identi-
fying the priority of each packet. This is the first step of iQoS.
l Policing and shaping mechanisms: Policing and shaping mechanisms are used to identify
traffic violation and make responses. The policing mechanism checks the traffic in real time
and takes immediate actions according to the settings when it discovers a violation. The
shaping mechanism works together with queuing mechanism. It makes sure that the traffic
will never exceed the defined flow rate so that the traffic can go through that interface
smoothly.
Policy 213
begin to work.
System supports two-level traffic control: level-1 control and level-2 control. In each level, the
traffic control is implemented by pipes.
Pipes
By configuring pipes, the devices implement iQoS. Pipe, which is a virtual concept, represents
the bandwidth of transmission path. System classifies the traffic by using the pipe as the unit, and
controls the traffic crossing the pipes according to the actions defined for the pipes. For all traffic
crossing the device, they will flow into virtual pipes according to the traffic matching conditions
they match. If the traffic does not match any condition, they will flow into the default pipe pre-
defined by the system.
Pipes, except the default pipe, include two parts of configurations: traffic matching conditions and
traffic management actions:
l Traffic matching conditions: Defines the traffic matching conditions to classify the traffic
crossing the device into matched pipes. System will limit the bandwidth to the traffic that
matches the traffic matching conditions. You can define multiple traffic matching con-
ditions to a pipe. The logical relation between each condition is OR. When the traffic
matches a traffic matching condition of a pipe, it will enter this pipe. If the same conditions
are configured in different root pipes, the traffic will first match the root pipe listed at the
top of the Level-1 Control list in the Configuration Management > Policy > iQoS page.
l Traffic management actions: Defines the actions adopted to the traffic that has been classified
to a pipe. The data stream control includes the forward control and the backward control. For-
ward control controls the traffic that flows from the source to the destination; backward con-
trol controls the traffic flows from the destination to the source.
214 Policy
To provide flexible configurations, system supports the multiple-level pipes. Configuring mul-
tiple-level pipes can limit the bandwidth of different applications of different users. This can
ensure the bandwidth for the key services and users. Pipes can be nested to at most four levels.
Sub pipes cannot be nested to the default pipe. The logical relation between pipes is shown as
below:
l You can create multiple root pipes that are independent. At most three levels of sub pipes can
be nested to the root pipe.
l For the sub pipes at the same level, the total of their minimum bandwidth cannot exceed the
minimum bandwidth of their upper-level parent pipe, and the total of their maximum band-
width cannot exceed the maximum bandwidth of their upper-level parent pipe.
l If you have configured the forward or backward traffic management actions for the root pipe,
all sub pipes that belong to this root pipe will inherit the configurations of the traffic direction
set on the root pipe.
l The root pipe that is only configured the backward traffic management actions cannot work.
The following chart illustrates the application of multiple-level pipes in a company. The admin-
istrator can create the following pipes to limit the traffic:
Policy 215
1. Create a root pipe to limit the traffic of the office located in Beijing.
3. Create a sub pipe to limit the traffic of the specified applications so that each application has
its own bandwidth.
4. Create a sub pipe to limit the traffic of the specified users so that each user owns the
defined bandwidth when using the specified application.
System supports two-level traffic control: level-1 control and level-2 control. In each level, the
traffic control is implemented by pipes. Traffic that is dealt with by level-1 control flows into the
level-2 control, and then system performs the further management and control according to the
pipe configurations of level-2 control. After the traffic flowing into the device, the process of
iQoS is shown as below:
According to the chart above, the process of traffic control is described below:
216 Policy
1. The traffic first flows into the level-1 control, and then system classifies the traffic into dif-
ferent pipes according to the traffic matching conditions of the pipe of level-1 control. The
traffic that cannot match any pipe will be classified into the default pipe. If the same con-
ditions are configured in different root pipes, the traffic will first match the root pipe listed
at the top of the Level-1 Control list in the Configuration Management > Policy > iQoS
page. After the traffic flows into the root pipe, system classifies the traffic into different sub
pipes according to the traffic matching conditions of each sub pipe.
2. According to the traffic management actions configured for the pipes, system manages and
controls the traffic that matches the traffic matching conditions.
3. The traffic dealt with by level-1 control flows into the level-2 control. System manages and
controls the traffic in level-2 control. The principles of traffic matching, management and
control are the same as the one of the level-1 control.
Enabling iQoS
Policy 217
1. Select Policy > iQoS > Configuration.
3. If you click the Enable NAT IP matching button in Level-1 Control or Level-2 Control, sys-
tem will use the IP addresses between the source NAT and the destination NAT as the
matching items. If the matching is successful, system will limit the speed of these IP
addresses.
Notes: Before enabling NAT IP matching, you must config the NAT rules.
Otherwise, the configuration will not take effect.
218 Policy
Pipes
By using pipes, devices implement iQoS. Pipes in different traffic control levels will take effect in
different stages.
Configuring pipes includes the following sections:
1. Create the traffic matching conditions, which are used to capture the traffic that matches
these conditions. If configuring multiple traffic matching conditions for a pipe, the logical
relation between each condition is OR.
2. Create a white list according to your requirements. System will not control the traffic in the
white list. Only root pipe and the default pipe support the white list.
3. Specify the traffic management actions, which are used to deal with the traffic that is clas-
sified into a pipe.
4. Specify the schedule. The pipe will take effect during the specified time period.
Basic Operations
Select Configuration Management > Policy > iQoS > Policy to open the Policy page.
l Disable the level-2 traffic control: Click Disable second level control. The pipes in the level-2
traffic control will not take effect. The Level-2 Control tab will not appears in this page.
l View pipe information: The pipe list displays the name, mode, action, schedule, and the
description of the pipes.
l Click the icon to expand the root pipe and display its sub pipes.
l Click the icon of the root pipe or the sub pipe to view the condition settings.
Policy 219
l Click the icon of the root pipe to view the white list settings.
l represents the root pipe is usable, represents the root pipe is unusable, rep-
resents the sub pipe is usable, represents the sub pipe is unusable,
l Create a root pipe: Select the Level-1 Control or Level-2 Control tab, then click New in the
menu bar to create a new root pipe.
l Create a sub pipe: Click the icon of the root pipe or the sub pipe to create the cor-
l Click Enable in the menu bar to enable the selected pipe. By default, the newly-created
pipe will be enabled.
l Click Disable in the menu bar to disable the selected pipe. The disabled pipe will not take
effect.
l Click Delete to delete the selected pipe. The default pipe cannot be deleted.
Configuring a Pipe
1. According to the methods above, create a root pipe or sub pipe. The Pipe Configuration
page appears.
Option Description
Parent Pipe/Con- Displays the control level or the parent pipe of the newly created pipe.
trol Level
220 Policy
Option Description
l The Shape mode can limit the data transmission rate and smoothly
forward the traffic. This mode supports the bandwidth borrowing
and priority adjusting for the traffic within the root pipe.
l The Policy mode will drop the traffic that exceeds the bandwidth
limit. This mode does not support the bandwidth borrowing and
priority adjusting, and cannot guarantee the minimum bandwidth.
l The Monitor mode will monitor the matched traffic, generate the
statistics, and will not control the traffic.
l Bandwidth borrowing: All of the sub pipes in a root pipe can lend
their idle bandwidth to the pipes that are lacking bandwidth. The
prerequisite is that their bandwidth must be enough to forward
the traffic in their pipes.
Policy 221
3. In Condition, click New.
Option Description
Type Select the IP type, including IPv4 or IPv6. Only the IPv6
firmware supports to configure IPv6 type IP. If IPv6 is
selected, all the IP/netmask, IP range, address entry con-
figured should be in the IPv6 format.
222 Policy
Option Description
Source Information
Zone Specify the source zone of the traffic. Select the zone
name from the drop-down menu.
Interface Specify the source interface of the traffic. Select the inter-
face name from the drop-down menu.
Destination Information
Zone Specify the destination zone of the traffic. Select the zone
name from the drop-down menu.
Policy 223
Option Description
User Inform- Specify a user or user group that the traffic belongs to.
ation
1. From the User drop-down menu, select the AAA
server where the users and user groups reside.
224 Policy
Option Description
click .
Policy 225
Option Description
URL Cat- Specifies the URL category that the traffic belongs to.
egory After the user specifies the URL category, the system
matches the traffic according to the specified category.
226 Policy
Option Description
To add a new URL category, click , the page will pop
Advanced
4. If you are configuring root pipes, you can specify the white list settings based on the descrip-
tion of configuring conditions.
The following configurations control the traffic that flows from the
source to the destination. For the traffic that matches the conditions,
Policy 227
system will perform the corresponding actions.
Pipe Band- When configuring the root pipe, specify the pipe band-
width width.
When configuring the sub pipe, specify the maximum
bandwidth and the minimum bandwidth of the pipe:
228 Policy
Limit by section, specify the min-
imum/maximum bandwidth of the users.
Limit by When the Limit type is Limit Per IP or Limit Per User,
you need to specify the minimum bandwidth or the max-
imum bandwidth:
Advanced
Policy 229
the appeared TOS Configuration page.
Limit Oppos- Click the Enable button to configure the value of limit-
ite Band- strength.The smaller the value, the smaller the limit.
width
The following configurations control the traffic that flows from the des-
tination to the source. For the traffic that matches the conditions, sys-
tem will perform the corresponding actions.
Pipe Band- When configuring the root pipe, specify the pipe band-
width width. When configuring the sub pipe, specify the max-
imum bandwidth and the minimum bandwidth of the
pipe:
230 Policy
Limit type Specify the maximum bandwidth and minimum band-
width of the pipe for each user/IP:
Limit by When the Limit type is Limit Per IP or Limit Per User,
you need to specify the minimum bandwidth or the max-
imum bandwidth:
Policy 231
l Max Bandwidth: Specify the maximum bandwidth.
Advanced
Limit Oppos- Click the Enable button to configure the value of limit-
ite Band- strength.The smaller the value, the smaller the limit.
232 Policy
width
Policy 233
Session Limit
The devices support zone-based session limit function. You can limit the number of sessions and
control the session rate to the source IP address, destination IP address, specified IP address,
applications or role/user/user group, thereby protecting from DoS attacks and controlling the
bandwidth of applications, such as IM or P2P.
IP
234 Policy
IP
address entry.
Protocol
Application
Role/User/User Group
Policy 235
IP
Role Select the Role radio button and a role from the Role
drop-down list to limit the number of sessions of the
selected role.
User Select the User radio button and a user from the User
drop-down list to limit the number of sessions of the
selected user.
User Group Select the User Group radio button and a user group
from the User Group drop-down list to limit the num-
ber of sessions of the selected user group.
Schedule
Schedule Select the Schedule check box and choose a schedule you
need from the drop-down list to make the session limit
rule take effect within the time period specified by the
schedule.
Session Type
236 Policy
Session Type
6. Select the Enable after Session Limit Log to record the session limit log.
8. Click Switch Mode to select a matching mode. If you select Use the Minimum Value and an
IP address matches multiple session limit rules, the maximum number of sessions of this IP
address is limited to the minimum number of sessions of all matched session limit rules; if
you select Use the Maximum Value and an IP address matches multiple session limit rules,
the maximum number of sessions of this IP address is the maximum number of sessions of
all matched session limit rules.
After configuring a session limit rule, the sessions which exceed the maximum number of sessions
will be dropped. You can clear the statistical information of the dropped sessions of specified ses-
sion limit rule according to your need.
To clear statistic information, take the following steps:
2. Select the rule whose session's statistical information you want to clear.
3. Click Clear.
Policy 237
ARP Defense
System provides a series of ARP defense functions to protect your network against various ARP
attacks, including:
l ARP Learning: Devices can obtain IP-MAC bindings in an Intranet from ARP learning, and
add them to the ARP list. By default this function is enabled. The devices will always keep
ARP learning on, and add the learned IP-MAC bindings to the ARP list. If any IP or MAC
address changes during the learning process, the devices will add the updated IP-MAC bind-
ing to the ARP list. If this function is disabled, only IP addresses in the ARP list can access
the Internet.
l MAC Learning: Devices can obtain MAC-Port bindings in an Intranet from MAC learning,
and add them to the MAC list. By default this function is enabled. The devices will always
keep MAC learning on, and add the learned MAC-Port bindings to the MAC list. If any
MAC address or port changes during the learning process, the devices will add the updated
MAC-Port binding to the MAC list.
l ARP Inspection: Devices support ARP Inspection for interfaces. With this function
enabled, StoneOS will inspect all ARP packets passing through the specified interfaces, and
compare the IP addresses of the ARP packets with the static IP-MAC bindings in the ARP
238 Policy
list and IP-MAC bindings in the DHCP Snooping list.
l DHCP Snooping: With this function enabled, system can create a binding relationship
between the MAC address of the DHCP client and the allocated IP address by analyzing
the packets between the DHCP client and server.
l Host Defense: With this function enabled, system can send gratuitous ARP packets for dif-
ferent hosts to protect them against ARP attacks.
Policy 239
Configuring ARP Defense
Devices support IP-MAC binding, MAC-Port binding and IP-MAC-Port binding to reinforce net-
work security control. The bindings obtained from ARP/MAC learning and ARP scan are known
as dynamic bindings, and those manually configured are known as static bindings.
1. Select Configuration Management > Policy > ARP Defense > IP-MAC Binding.
2. Click New.
240 Policy
In the IP-MAC Binding Configuration, configure the corresponding settings.
Option Description
Port Select the Enable check box to enable the port bind-
ing, and then select a port from the drop-down list
behind.
l ARP/MAC learning
l IP-MAC scan
1. Select Configuration Management > Policy > ARP Defense > IP-MAC Binding.
Policy 241
2. Click and click ARP/MAC Learning from the pop-up menu.
3. In the ARP/MAC Learning Configuration page, select the interface that you want to enable
the ARP/MAC learning function.
4. Click Enable and then select ARP Learning or MAC Learning in the pop-up menu. The sys-
tem will enable the selected function on the interface you select.
242 Policy
5. Close the page and return to the IP-MAC Binding page.
1. Select Configuration Management > Policy > ARP Defense > IP-MAC Binding.
2. Select Binding Configuration and then click IP-MAC Scan from the pop-up menu.
3. In the IP-MAC Scan page, enter the start IP and the end IP.
4. Click OK to start scanning the specified IP addresses. The result will display in the table in
the IP-MAC binding page.
1. Select Configuration Management > Policy > ARP Defense > IP-MAC Binding.
2. Select Binding Configuration and then click Bind All from the pop-up menu.
1. Select Configuration Management > Policy > ARP Defense > IP-MAC Binding.
2. Select Binding Configuration and then click Unbind All from the pop-up menu.
Policy 243
3. In the Unbind All page select the unbinding type.
1. Select Configuration Management > Policy > ARP Defense > IP-MAC Binding.
3. In the Import page, click Browse to select the file that contains the binding information.
Only the UTF-8 encoding file is supported.
1. Select Configuration Management > Policy > ARP Defense > IP-MAC Binding.
This feature may not be available on all platforms. Please check your system's actual page to see if
your device delivers this feature.
The devices provide Authenticated ARP to protect the clients against ARP spoofing attacks.
Authenticated ARP is implemented on the ARP client Hillstone Secure Defender. When a PC
with Hillstone Secure Defender installed accesses the Internet via the interface that enables
Authenticated ARP, it will perform an ARP authentication with the device to assure the MAC
address of the device being connected to the PC is trusted. Besides, the ARP client is also
designed with powerful anti-spoofing and anti-replay mechanisms to defend against various ARP
attacks.
244 Policy
Notes: The Loopback interface and PPPoE sub-interface are not designed with
ARP learning, so these two interfaces do not support Authenticated ARP.
To use the Authenticated ARP function, you need to enable the Authenticated ARP function in
the device and install the Hillstone Secure Defender in the PCs.
To enable the Authenticated ARP in the device, take the following steps:
1. Select Configuration Management > Policy > ARP Defense > Authenticated ARP.
2. Select the interfaces on which you want to enable the Authenticated ARP function.
3. Click Enable and select Force Authenticated ARP to enable the authenticated ARP func-
tion.
4. Enable or disable Force Install as needed. If the Force Install option is selected, PCs cannot
access the Internet via the corresponding interface unless the ARP client has been installed;
if the Force Install option is not selected, only PCs with the ARP client installed are con-
trolled by Authenticated ARP.
To install Hillstone Secure Defender in the PCs, take the following steps:
1. Enable Authenticated ARP for an interface, and also select the Force Install option for the
interface.
2. When a PC accesses the Internet via this interface, the Hillstone Secure Defneder's down-
load page will pop up. Download HillstoneSecureDefender.exe as prompted.
Policy 245
3. After downloading, double-click HillstoneSecureDefender.exe and install the client as
prompted by the installation wizard.
Devices support ARP Inspection for interfaces. With this function enabled, system will inspect
all the ARP packets passing through the specified interfaces, and compare the IP addresses of the
ARP packets with the static IP-MAC bindings in the ARP list and IP-MAC bindings in the
DHCP Snooping list:
l If the IP address is in the ARP list and the MAC address matches, the ARP packet will be
forwarded;
l If the IP address is in the ARP list but the MAC address does not match, the ARP packet will
be dropped;
l If the IP address is not in the ARP list, continue to check if the IP address is in the DHCP
Snooping list;
l If the IP address is in the DHCP Snooping list and the MAC address also matches, the
ARP packet will be forwarded;
l If the IP address is in the DHCP Snooping list but the MAC address does not match, the
ARP packet will be dropped;
l If the IP address is not in the DHCP Snooping, the ARP packet will be dropped or for-
warded according to the specific configuration.
The VSwitch interface of the system supports ARP Inspection. This function is disabled by
default.
To configure ARP Inspection of the VSwitch interface, take the following steps:
1. Select Configuration Management > Policy > ARP Defense > ARP Inspection.
246 Policy
3. Double-click the item of a VSwitch interface.
5. To drop the traffic whose sender's IP address is not in the ARP table, select Drop. To for-
ward the traffic whose sender's IP address is not in the ARP table, select Forward.
7. For the interfaces belonging to the VSwitch interface, you can set the following options:
l If you do not need the ARP inspection in the interface, in the Advanced Options sec-
tion, double-click the interface and select Do Not Inspect option in the pop-up page.
l Configure the number of ARP packets received per second. When the ARP packet
rate exceeds the specified value, the excessive ARP packets will be dropped. The
value range is 0 to 10000. The default value is 0, i.e., no rate limit.
Policy 247
enabled, the system will check if an ARP packet passing through can be matched to any binding
on the list. If not, the ARP packet will be dropped. In the network that allocates addresses via
DHCP, you can prevent against ARP spoofing attacks by enabling ARP inspection and DHCP
Snooping.
DHCP clients look for the server by broadcasting, and only accept the network configuration para-
meters provided by the first reachable server. Therefore, an unauthorized DHCP server in the net-
work might lead to DHCP server spoofing attacks. The devices can prevent DHCP server
spoofing attacks by dropping DHCP response packets on related ports.
Besides, some malicious attackers send DHCP requests to a DHCP server in succession by for-
ging different MAC addresses, and eventually lead to IP address unavailability to legal users by
exhausting all the IP address resources. This kind of attacks is commonly known as DHCP Star-
vation. The devices can prevent against such attacks by dropping request packets on related ports,
setting rate limit or enabling validity check.
The VSwitch interface of the system supports DHCP snooping. This function is disabled by
default.
To configure DHCP snooping, take the following steps:
1. Select Configuration Management > Policy > ARP Defense > DHCP Snooping.
248 Policy
2. Click DHCP Snooping Configuration.
3. In the Interface tab, select the interfaces that need the DHCP snooping function.
Policy 249
5. In the Port tab, configure the DHCP snooping settings:
l Validity check: Check if the client's MAC address of the DHCP packet is the same as
the source MAC address of the Ethernet packet. If not, the packet will be dropped.
Select the interfaces that need the validity check and then click Enable to enable this
function.
l Rate limit: Specify the number of DHCP packets received per second on the inter-
face. If the number exceeds the specified value, system will drop the excessive
DHCP packets. The value range is 0 to 10000. The default value is 0, i.e., no rate
limit. To configure the rate limit, double-click the interface and then specify the value
in the Rate text box in the pop-up Port Configuration page.
l Drop: In the Port Configuration page, if the DHCP Request check box is selected,
the system will drop all of the request packets sent by the client to the server; if the
DHCP Response check box is selected, system will drop all the response packets
returned by the server to the client.
With DHCP Snooping enabled, system will inspect all of the DHCP packets passing through the
interface, and create and maintain a DHCP Snooping list that contains IP-MAC binding inform-
ation during the process of inspection. Besides, if the VSwitch interface or any other Layer 3 phys-
ical interface is configured as a DHCP server, the system will create IP-MAC binding information
automatically and add it to the DHCP Snooping list even if DHCP Snooping is not enabled. The
bindings in the list contain information like legal users' MAC addresses, IPs, interfaces, ports,
lease time, etc.
To view the DHCP snooping list, take the following steps:
250 Policy
1. Select Configuration Management > Policy > ARP Defense > DHCP Snooping.
2. In the current page, you can view the DHCP snooping list.
Host Defense is designed to send gratuitous ARP packets for different hosts to protect them
against ARP attacks.
To configure host defense:
2. Click New.
Sending Settings
Excluded Specify an excluded port, i.e., the port that does not send
Policy 251
Sending Settings
Host
MAC Specify the MAC address of the host that uses the device
as a proxy.
Sending Rate Specify a gratuitous ARP packet that sends rate. The
value range is 1 to 10/sec. The default value is 1.
3. Click OK to save your settings and return to the Host Defense page.
4. Repeat Step 2 and Step 3 to configure gratuitous ARP packets for more hosts. You can con-
figure the device to send gratuitous ARP packets for up to 16 hosts.
252 Policy
Security Protection Configuration
You can configure the Security protection functions to detect and block network threats. After
configuring , Hillstone devices can defend network attacks and reduce losses of the internal net-
work.
Security protections include:
l "Intrusion Prevention System" on Page 255 Prevention: It can detect and protect mainstream
application layer protocols (DNS, FTP, POP3, SMTP, TELNET, MYSQL, MSSQL,
ORACLE, NETBIOS), against web-based attacks and common Trojan attacks.
l "Anti Virus" on Page 306: It can detect the common file types and protocol types which are
most likely to carry the virus and protect the network from them.. Hillstone devices can
detect protocol types of POP3, HTTP, SMTP, IMAP4 and FTP, and the file types of archives
(including GZIP, BZIP2, TAR, ZIP and RAR-compressed archives), PE , HTML, MAIL,
RIFF and JPEG.
l "Attack-Defense" on Page 384: It can detect various types of network attacks, and take appro-
priate actions to protect the Intranet against malicious attacks, thus assuring the normal oper-
ation of the Intranet and systems.
l "Antispam" on Page 313: It can filter the mails transmitted by SMTP and POP3 protocol
through the cloud server, and discover the mail threats.
l "Botnet C&C Prevention" on Page 320: It can detect botnet host in the internal network
timely, as well as locate and take other actions according to the configuration, so as to avoid
further threat attacks.
l "Perimeter Traffic Filtering" on Page 325 : It can filter the perimeter traffic based on known
IP of black/white list, and take block action on the malicious traffic that hits the blacklist.
l "Sandbox" on Page 362: It can execute a suspicious file in a virtual environment, collect the
actions of this file, analyzes the collected data, and verify the legality of the file.
l "Data Security" on Page 370:The data security function allows you to flexibly configure con-
trol rules to comprehensively control and audit (by behavior logs and content logs) on user
network behavior.
l "ACL " on Page 381:You can create access control profile based on MAC addresses and bind
the profile to security policies to achieve access control of the specific MAC addresses.
l "Abnormal Behavior Detection" on Page 399: Traffic of sessions is detected based on the
abnormal behavior detection signature database. When one detected object has multiple abnor-
mal parameters, system will analyze the relationship among the abnormal parameters to see
whether an abnormal behavior was formed.
l "Advanced Threat Detection" on Page 403: It can intelligent analysis the suspicious traffic of
Host, to detect malicious behavior and to identify APT (Advanced Persistent Threat) attack.
l If a security zone is configured with the threat protection function, the system will perform
detection on the traffic that is destined to the binding zone specified in the rule, and then do
according to what you specified.
l If a policy rule is configured with the threat protection function, the system will perform
detection on the traffic that is destined to the policy rule you specified, and then response.
l The threat protection configurations in a policy rule is superior to that in a zone rule if spe-
cified at the same time, and the threat protection configurations in a destination zone is super-
ior to that in a source zone if specified at the same time.
l Scanning
l Network attacks
l Deny of service
l Spam
l Malware
The detection performed by IPS consists of two methods: signature matching and protocol parse.
l Signature matching: IPS abstracts the interested protocol elements of the traffic for signature
matching. If the elements are matched to the items in the signature database, the system will
process the traffic according to the action configuration. This part of detection is configured
in the Select Signature section.
l Protocol parse: IPS analyzes the protocol part of the traffic. If the analyze results shows the
protocol part contains abnormal contents, the system will process the traffic according to the
action configuration. This part of detection is configured in the Protocol Configuration sec-
tion.
l Signature List
Configure an IPS profile and bind it to a certain security policy. The system will perform the IPS
function on the traffic that matches this security profile.
The system defines multiple IPS profiles and binds them to various pre-defined security policy.
You can check the detailed settings of these profiles and adjust them according to your real net-
work environment.
You can also customize IPS profiles. The configuration includes two parts:
l Protocol configurations
1. Select Configuration Management > Security Protection Configuration > Intrusion Pre-
vention System > Profile.
4. According to your requirements, click the Enable button of Global Packet Capture to cap-
ture packets.
6. In the Signature Set area, the existing signature sets and their settings will be displayed in
the table. You can manage the signature sets, including New, Edit, and Delete. When cre-
ating a new signature set rule, you can select Filtering Signature or Selection Signature as
needed to filter and retrieve the signature database to select the desired signature sets.
l Filtering Signature: Filter signature sets by certain filter conditions. Click the Filter
Signature button to search for the signatures you want. In this way, you can quickly
select the signatures that have been classified by system.
l Selection Signature: Select a particular signature set from the signature database. In
this way, you can quickly select a particular signature.
O-
pti- Description
on
Ac- Specify the action performed on the abnormal traffic that matches
Ca- Capture the abnormal packets that match the configured signature
pt- set. You can view them in the threat log.
ur-
e
Pa-
ck-
et
at- You can view the detailed information of the signature by clicking
ur- the signature ID, and you can select one or more signatures. Click
the Disable or Enable button to disable or re-enable the sig-
e
nature. Note: The enabled/disabled state here is only for the cur-
rent profile, but the global state is not affected.
lec- into the Keyword text box, and system will perform fuzzy search
in the following fields: signature ID, signature name, and descrip-
tio-
tion.
n
Si-
gn-
at-
ur-
e
Note: You create several signature sets and some of them contain a par-
ticular signature. If the actions of these signature sets are different and
the attack matches this particular signature , system will adopt the fol-
lowing rules:
l Always perform the stricter action on the attack. The signature set
with stricter action will be matched. The strict level is: Block IP
> Block Service > Rest > Log Only > Deault. If one signature
set is Block IP with 15s and the other is Block Service with 30s,
the final action will be Block IP with 30s.
10. In the Protocol Configuration area, click . The protocol configurations specify the require-
ments that the protocol part of the traffic must meet. If the protocol part contains abnormal
contents, system will process the traffic according to the action configuration. System sup-
ports the configurations of HTTP, DNS, FTP, MSRPC, POP3, SMTP, SUNRPC, and Tel-
net.
Option Description
To protect the Web server, configure Web Server in the HTTP tab.
Protecting the Web server means system can detect the following attacks: SQL injection,
XSS injection, external link check, ACL, and HTTP request flood and take actions when
detecting them. A pre-defined Web server protection rule named default is built in. By
Option Description
High Frequency Click the Enable button to enable the High Frequency
Access Control Access Control feature. When this function is enabled,
system will block the traffic of this IP address,whose
access frequency exceeds the threshold.
o URL Path: Click the link and the URL Page Con-
figuration page appears. Click New and enter the
URL path in the Path text box. After the con-
figuration, all paths that contain the name of the
path are also counted. System accesses the fre-
quency statistics for HTTP requests that access
these paths. If the access frequency of the
HTTP request exceeds the threshold, the source
IP of the request is blocked, and the IP will not
be able to access the Web server. For example:
configure'/home/ab', system will perform a fre-
quency check on the 'access/home/ab/login'
and '/home/BC/login' HTTP requests. URL
path does not support the path format which
contains the host name or domain name, for
example: you can not configure www.baidu.-
com/home/login.html, you should configure '/
home / login.html', and 'www.baidu.com' should
be configured in the corresponding Web server
domain name settings. You can configure up to
XSS Injection Click the Enable button to enable XSS injection check
Protection for the HTTP protocol.
External Link Click the Enable button to enable external link check
Check for the Web server. This function controls the resource
reference from the external sites.
Iframe check Click the Enable button to enable iframe checking. Sys-
tem will identify if there are hidden iframe HTML
pages by this function, then log it or reset its link.
After iframe checking is enabled, system checks the
iframe in the HTML page based on the specified iframe
HTTP Request Click the Enable button to enable the HTTP request
Flood Pro- flood protection. Both IPv4 and IPv6 address are sup-
tection ported.
Option Description
Option Description
ation.
Action for Brute-force: If the login attempts per 5
minutes fail for the times specified by the threshold, sys-
tem will identify the attempts as an intrusion and take an
action according to the configuration. Click the Enable
button to enable brute-force.
Option Description
ner information.
Max Command Line Length: Specifies a max length
(including carriage return) for the POP3 command line. If
the length exceeds the limits, you can:
one single POP3 session) for the POP3 server. If the fail-
ure time exceeds the limits, you can:
Option Description
Option Description
Signature List
Select Configuration Management > Security Protection Configuration > Intrusion Prevention
System > Signature List. You can see the signature list.
The upper section is for searching signatures. The lower section is for managing signatures.
Searching Signatures
In the upper section, click Filter to set the search conditions to search the signatures that match
the condition.
To clear all search conditions, click Remove All. To save the search conditions, click and then
click Save Filters to name this set of search conditions and save it.
You can view signatures, create a new signature, load the database, delete a signature, edit a sig-
nature, enable a signature, and disable a signature.
l View signatures: In the signature list, click the "+" button before the ID of a signature to
view the details.
Option Description
Attack Type Select the attack type from the drop-down list.
Operating Sys- Select the affected operating system from the drop-down
tem list. "----" means all the operating systems.
Option Description
l Load the database: After you create a new signature, click Load Database to make the newly
created signature take effect.
l Edit a signature: Select a signature and then click Edit. You can only edit the user-defined sig-
nature. After editing the signature, click Load Database to make the modifications take effect.
Signatures are categorized by protocols, and identified by a unique signature ID. The signature ID
consists of two parts: protocol ID (1st bit or 1st and 2nd bit) and attacking signature ID (the last
5 bits). For example, in ID 605001, "6" identifies a Telnet protocol, and "00120" is the attacking
signature ID. 1st bit in signature ID identify protocol anomaly signatures, the others identify
attacking signatures. The mappings between IDs and protocols are shown in the table below:
In the above table, Other-TCP identifies all the TCP protocols other than the standard TCP pro-
tocols listed in the table, and Other-UDP identifies all the UDP protocols other than the standard
UDP protocols listed in the table.
Click Policy > Intrusion Prevention System > Configuration to configure the IPS global set-
tings.
Option Description
Merge System can merge IPS logs which have the same protocol ID,
Log the same VSYS ID, the same Signature ID, the same log ID, and
the same merging type. Thus it can help reduce logs and avoid to
receive redundant logs. The function is disabled by default.
Select the merging types in the drop-down list:
Aggregate Specifies the time granularity for IPS threat log of the same mer-
Time ging type ( specified above) to be stored in the database. At the
same time granularity, the same type of log is only stored once. It
ranges from 10 to 600 seconds.
Record Click Enable check box to enable the device to record HTTP
HTTP proxy IP. When enabled, system will only record the IP address
of the HTTP proxy and not the real IP address of the threat
Proxy IP
source in threat log. After disabled, system will parse the HTTP
header to obtain the real IP address of the threat source, and dis-
play the real IP address of the threat source in threat log. The
function is enabled by default.
Note:
The device detects the traffic in the network in real time. When a threat is detected, the device
generates alarms or blocks threats. With the complexity of the network environment, the threat of
the device will generate more and more warning, too much threat to the user can not start making
the alarm, and many of them are false positives. By providing IPS whitelist, the system no longer
reports alarms or blocks to the whitelist, thus reducing the false alarm rate of threats. The IPS
1. Select Configuration Management > Security Protection Configuration > Intrusion Pre-
vention System > White list
2. Click New.
Option Description
Next-hop Vir- Select the Next-hop VRouter from the drop-down list.
tual Router
3. Click OK.
l Detect file types of GZIP, PE, RAR, TAR, MS OFFICE, HTML, MAIL, RIFF, ELF, Raw
data, JPEG, BZIP2, ZIP, PDF and others.
The virus signature database includes over 10,000 signatures, and supports both daily auto update
and real-time local update. For more information, see "Upgrading System" on Page 630.
Notes:
l Anti Virus is controlled by license. To use Anti Virus, apply and install the
Anti Virus(AV)license.
l Preparing
Preparing
l Install the Anti-Virus license and reboot. The Anti-Virus will be enabled after the reboot-
ing.
l Update the Anti-Virus signature database when you use this function the first time. To assure
a proper connection to the default update server, you need to configure a DNS server for sys-
tem before updating.
The Anti-Virus function is running based on security policies. After configuring the Anti-Virus
function for a security policy, the system will perform detection on the traffic that matches the
security policy and perform the corresponding actions according to the detect result.
So, there are two steps:
2. Bind the rule to a security policy. For details, see "Security Policy" on Page 164.
1. Select Configuration Management > Security Protection Configuration > Anti-Virus > Pro-
file.
In the Anti-Virus Rules Configuration page, enter the Anti-Virus rule configurations.
Option Description
File Types Specifies the file types you want to scan. It can be GZIP,
JPEG, MAIL, RAR, HTML .etc. Other means scans the
other file, including GIF, BMP, PNG, JPEG, FWS, CWS,
RTF, MPEG, Ogg, MP3, wma, WMV, ASF, RM, etc.
Capture Pack- Click the Enable button before Capture Packet to enable
ets the capture function.
Action Specifies the action the system will take after the mali-
cious website is found.
3. Click OK.
Notes: By default, system comes with multiple default Anti-Virus rules. You can
check these rules and use them according to their configurations and your read net-
work environment.
1. Select Configuration Management > Security Protection Configuration > Anti-Virus > Con-
figuration.
3. Click OK.
After configuring the decompression control function, system can decompress the transmitted
compressed files, and can handle the files that exceed the max decompression layer as well as the
encrypted compressed files in accordance with the specified actions. This function supports to
decompress the files in type of RAR, ZIP, TAR, GZIP, and BZIP2. To configure the decom-
pression control function, take the following steps:
1. Select Configuration Management > Security Protection Configuration > Anti-Virus > Con-
figuration.
3. Click Configuration.
Option Description
Notes: For compressed files containing docx, pptx, xlsx, jar, and apk formats, when
Exceed Action is specified as Reset Connection, the maximum compression layers
should be added one more layer to prevent download failure.
Antispam
This feature may not be available on all platforms. Please check your system's actual page to see if
your device delivers this feature.
The system is designed with an Antispam function, which enables user to identify and filter mails
transmitted by SMTP and POP3 protocol through the cloud server, timely discover the mail
threats, such as spam, phishing and worm mail, and then process the found spam according to the
configuration, so as to protect the user's mail client or mail server.
Notes: The Antispam function will not work unless an Antispam license has been
installed on the devic that supports Antispam.
Related Topics:
Configuring Antispam
2. Import an Antispam license and reboot. The Antispam will be enabled after the rebooting.
Notes: To assure a proper connection to the cloud server, you need to configure a
DNS server before configuring the Antispam.
l If a security zone is configured with the Antispam function, system will perform detection on
the traffic that is matched to the binding zone specified in the rule, and then do according to
what you specified.
l If a policy rule is configured with the threat protection function, system will perform detec-
tion on the traffic that is matched to the policy rule you specified, and then respond.
l The threat protection configurations in a policy rule is superior to that in a zone rule if spe-
cified at the same time, and the threat protection configurations in a destination zone is super-
ior to that in a source zone if specified at the same time.
1. Create a zone. For more information, refer to "Security Zone" on Page 423.
3. Enable the threat protection you need and select an Antispam rule from the profile drop-
down list below; or you can click from the profile drop-down list. To create an Antis-
1. Create a security policy rule. For more information, refer to "Security Policy" on Page 164.
3. Click the Enable button of Antispam. Then select an Antispam rule from the Profile drop-
down list, or you can click from the Profile drop-down list to create an Antispam rule.
1. Select Configuration Management > Security Protection Configuration > Antispam > Pro-
file.
Option Description
Mail Protocol Specifies the mail protocol (SMTP, POP3), spam cat-
Type egory and action.spam category:
3. Click OK.
Notes: By default, system comes with one default spams filtering rules: predef_
default. The default rule is not allowed to edit or delete.
You can add the sender's domain name or email address to the User-defined Blacklist. When Antis-
pam User-defined Blacklist function is enabled, system will directly identify the email from the
User-defined Blacklist as spam, and reset the link or record to the threat log.
To configure an Antispam User-defined Blacklist, take the following steps:
1. Select Configuration Management > Security Protection Configuration > Antispam >
User-defined Blacklist and click New.
3. Click OK.
1. Select Configuration Management > Security Protection Configuration > Antispam >
User-defined Blacklist.
2. Click Export and all the item of the User-defined Blacklist will be exported as an file in the
format of ".txt ".
The exported User-defined Blacklists can be imported on another device. To import the sender
User-defined Blacklist, take the following steps:
1. Select Configuration Management > Security Protection Configuration > Antispam >
User-defined Blacklist and click Import.
2. In the Import User-defined Blacklist page, click the Browse to select the User-defined
Blacklist file to be imported.
1. Click Configuration Management > Security Protection Configuration > Antispam > Con-
figuration.
2. Type in the mail scan maximum limit in the Mail Scan Upper Limit text box. The range is
512 Kb to 2048 Kb, the default value is 1024 Kb.
Notes: The botnet C&C prevention function is controlled by license. To use the
botnet C&C prevention function, install the Botnet C&C Prevention license.
Related Topics:
Address Library
Select Configuration Management > Security Protection Configuration > Botnet C&C Pre-
vention > Address Library. You can see the IP address and domain name list.
To disable the signature of the specified IP/domain, take the following steps:
2. Select the IP or domain entry that you want to enable/disable, and then click Enable or Dis-
able.
To create a signature of the specified IP/domain name, take the following steps:
2. Click New to open the Botnet Custom IP Configuration or Botnet Custom Domain Con-
figuration page.
4. Click OK.
5. Select the IP or domain name entry that you want to delete/enable/disable, and then click
Delete, Enable or Disable.
To configure the Botnet C&C Prevention global settings, take the following steps:
1. Click Configuration Management > Security Protection Configuration Policy > Botnet
C&C Prevention > Configuration.
2. Click/clear the Enable button to enable/disable the Botnet C&C Prevention function.
3. Specify the Sinkhole IP address that replaces the IP address in the DNS response message.
You can select the system's predefined Sinkhole IP address or specify a user-defined Sink-
hole IP address. After selecting User-defined Sinkhole, specify a custom IPv4 address and
an IPv6 address. If only the IPv4 address is configured, the system will automatically map
the configured IPv4 address to the corresponding IPv6 address when the DNS server com-
municates by using the IPv6 protocol.
Preparing
2. Import a botnet C&C prevention license and reboot. The botnet C&C prevention will be
enabled after the rebooting.
Notes:
l You need to update the botnet C&C prevention signature database before
enabling the function for the first time. To assure a proper connection to the
default update server, you need to configure a DNS server for system before
updating.
The Botnet C&C Prevention configurations are based on security zones or policies.
To realize the zone-based Botnet C&C Prevention, take the following steps:
1. Create a zone. For more information, refer to "Security Zone" on Page 423.
3. Enable the threat protection you need and select a Botnet C&C Prevention rule from the
profile drop-down list below; or you can click from the profile drop-down list. To cre-
ate a Botnet C&C Prevention rule, see Configuring a Botnet C&C Prevention Rule.
To realize the zone-based Botnet C&C Prevention, take the following steps:
3. Click the Enable button of Botnet C&C Prevention. Then select an Anti-Spam rule from
the Profile drop-down list, or you can click from the Profile drop-down list to create a
Botnet C&C Prevention rule. For more information, see Configuring a Botnet C&C Pre-
vention Rule.
1. Click Configuration Management > Security Protection Configuration > Botnet C&C Pre-
vention> Profile.
2. Click New.
In the Botnet C&C Prevention Rule Configuration page, enter the Botnet C&C Prevention
rule configurations.
3. Click OK.
l IP Blacklist: The system supports Static IP Blacklist, Blacklist Library, Dynamic IP Blacklist
and Hit Statistics.
l Service Blacklist: After adding the services to the service blacklist, system will perform the
block action to the service until the block duration ends.
l IP Reputation list: Retrieve the risk IP (such as Botnet, Spam, Tor nodes, Compromised,
Brute-forcer, and so on.) list from the Perimeter Traffic Filtering signature database.
l White List: After adding the services to the service blacklist, the system will not block the IP
address.
l Global Search: Show the static IP blacklist, blacklist library, dynamic IP blacklist, exception
whitelist, service blacklist and IP reputation list entriesof specified IP address .
l Configuration: Blacklist global configuration, including Blacklist Log and Session Rematch.
Notes:
l You need to update the IP reputation database before enabling the IP Repu-
tation function for the first time. By default, system will update the database
at the certain time everyday, and you can modify the updating settings accord-
ing to your own requirements, see "Upgrading System" on Page 630.
To realize the zone-based Perimeter Traffic Filtering, take the following steps:
1. Create a zone. For more information, refer to "Security Zone" on Page 423;
l Log Only: Only generates logs if the malicious traffic hits the blacklist. This is the
default option.
l Block IP: Block the IP address and specify a block duration if the malicious traffic
hits the IP Reputation list.
Configuring IP Blacklist
Static IP Blacklist
The static IP blacklist will block specified IP address or prevent hosts from accessing the net-
work during the specified period.
To configure the static IP blacklist, take the following steps:
1. Select Configuration Management > Security Protection Configuration > Perimeter Traffic
Filtering > IP Blacklist.
Entry Type Select the address entry type and then type the address.
Redundancy Check
The system supports to check the conflicts among blacklists. You can check whether the black-
lists overshadow each other.
To configure the redundancy check, take the following steps:
1. Select Configuration Management > Security Protection Configuration > Perimeter Traffic
Filtering > IP Blacklist.
2. Click Redundancy Check in the Static IP Blacklist page. Click OK in the following prompt
dialog.
4. To delete an blacklist, select the blacklist you want to delete from the list and click Delete.
Blacklist Library
The system support to import/exporti the blacklist library file or update the blacklist from the spe-
cified server, and specify the rule of the blacklist library.
To configure the blacklist library rule, take the following steps:
1. Select Configuration Management > Security Protection Configuration > Perimeter Traffic
Filtering > IP Blacklist.
Click Blacklist Library Details to open the Blacklist Library Details page.
l Import Blacklist: Click Import Blacklist and select Import Mode in the Import page, includ-
ing Incremental Import and Overwrite Import. Click the Browse and select the local file
needed to import into the system.
l Delete Blacklist Library: Click Delete Blacklist Library to delete the blacklist file.
l Update Configuration: Click Update Configuration to enable the auto update function.
Dynamic IP Blacklist
After adding the IP addresses to the global blacklist, system will perform the block action to the
IP address and service until the block duration ends.
To configure the dynamic IP blacklist, take the following steps:
1. Select Configuration Management > Security Protection Configuration > Perimeter Traffic
Filtering > IP Blacklist.
Option Description
Virtual Select the virtual router that the IP address belongs to.
Router
Block Type Select the block type, including Permanent Block and
Blocked Time. When Select Blocked Time, type the dur-
ation that the IP address will be blocked. The unit is
second. The value ranges from 60 to 1296000.
Hit Statics
System supports statistics on blacklist hit counts, you can view all hit entries and TOP100 black-
list entries on the hit statistics page when there is a large number of blacklist entries.
To view a blacklist hit count take the following steps:
3. Click TOP 100 to view the TOP 100 hit entries in the Hit Statistics Ranking page.
Service Blacklist
2. Click New.
Option Description
Virtual Select the virtual router that the IP address belongs to.
Router
Port
MAC Blacklist
1. Select Configuration Management > Security Protection Configuration > Perimeter Traffic
Filtering > MAC Blacklist.
2. Click New.
Option Description
MAC address Type the MAC address of the host that will be added to
the blacklist.
IP Reputation Filtering
1. Select Configuration Management > Security Protection Configuration > Perimeter Traffic
Filtering > IP Reputation Filtering.
Option Description
Category Select the types of risky IPs and block the corresponding
IP.
White List
1. Select Configuration Management > Security Protection Configuration > Perimeter Traffic
Filtering > White List.
2. Click New.
Option Description
Global Search
To view black/white list entry of specified IP address, take the following steps:
2. Type the IP address, click Search to jump to the corresponding blacklist tab to view the cor-
responding entry.
Configuration
1. Select Configuration Management > Security Protection Configuration > Perimeter Traffic
Filtering > Configuration.
3. Click Enable button of Session Rematch. When you add, modify or delete the blacklist, the
session will match the optimal blacklist again.
l Access control to certain category of websites, such as gambling and pornographic websites.
l Access control to certain category of websites during the specified period. For example, for-
bid to access IM websites during the office hours.
l Access control to the website whose URL contains the specified keywords. For example, for-
bid to access the URL that contains the keyword of game.
2. Click New.
Option Description
Name Specifies the name of the rule. You can configure the
same URL filtering rule name in different VSYSs.
Single URL Click New to add information for a single URL, and select
Configuration the Block or Log check box to specify the action that sys-
tem will perform when accessing the URL.
3. In the URL Category part to configure the URL category control type for URL filtering rules
to control the access to some certain category of website.
Option Description
Edit Selects a URL category from the list, and click Edit to
edit the selected URL category. URL Keyword Category
controls the access to the website whose URL contains
the specific keywords. Click the URL Keyword
Categoryoption to configure. The options are:
URL category Shows the name of pre-defined and user-defined URL cat-
egories in the VSYS.
Other URLs Specifies the actions to the URLs that are not in the list,
including Block Access and Record Log.
SSL inspec- Select the Enable button to enable SSL negotiation pack-
tion ets inspection. For HTTPS traffic, system can acquire the
domain name of the site which you want to access from
the SSL negotiation packets after this feature is con-
figured. Then, system will perform URL filtering in
accordance with the domain name. If SSL proxy is con-
figured at the same time, SSL negotiation packets inspec-
4. In the URL Keyword Category part to configure the URL keyword category control type for
URL filtering rules to control the access to the website whose URL contains the specific
keywords.
Option Description
Edit Select a URL keyword category from the list, and click
Edit to edit the selected URL keyword categories.
Log Selects the check box to log the access to the website
whose URL contains the specified keywords.
Other URLs Specifies the actions to the URLs that do not contain the
keywords in the list, including Block Access and Record
Log.
Part 2: Binding a URL filtering rule to a security zone or security policy rule
The URL filtering configurations are based on security zones or policies.
l If a security zone is configured with the URL filtering function, system will perform detection
on the traffic that is destined to the binding zone specified in the rule, and then do according
to what you specified.
l If a policy rule is configured with the URL filtering function, system will perform detection
on the traffic that is destined to the policy rule you specified, and then respond.
l The threat protection configurations in a policy rule are superior to that in a zone rule if they
are specified at the same time, and the URL filtering configurations in a destination zone are
superior to that in a source zone if they are specified at the same time.
l To perform the URL filtering function on the HTTPS traffic, see the policy-based URL fil-
tering.
1. Create a zone. For more information about how to create this, refer to "Security Zone" on
Page 423.
3. Enable the threat protection that you need, and select the URL filtering rules from the pro-
file drop-down list below; you can click Add Profile from the profile drop-down list below
to create a URL filtering rule. For more information, see "Part 1: Creating a URL filtering
rule" on Page 339.
2. In the Protection tab, click the Enable button after URL Filtering.
3. From the Profile drop-down list, select a URL filtering rule. You can also click Add Profile
to create a new URL filtering rule.
4. To perform the URL filtering function on the HTTPS traffic, you need to enable the SSL
proxy function for this security policy rule. System will decrypt the HTTPS traffic according
to the SSL proxy profile and then perform the URL filtering function on the decrypted
traffic.
According to the various configurations of the security policy rule, system will perform the
following actions:
Policy Rule
Actions
Configurations
SSL proxy System decrypts the HTTPS traffic according to the
enabled URL SSL proxy profile but it does not perform the URL fil-
filtering dis- tering function on the decrypted traffic.
abled
SSL proxy System decrypts the HTTPS traffic according to the
enabled URL SSL proxy profile and performs the URL filtering func-
filtering tion on the decrypted traffic.
enabled
SSL proxy dis- System performs the URL filtering function on the
abled URL fil- HTTP traffic according to the URL filtering profile.
tering enabled The HTTPS traffic will not be decrypted and system
will transfer it.
If the SSL proxy and URL filtering functions are enabled on a security policy rule but
the control type of the selected URL filtering rule is the Web surfing record, the
If necessary, you can go on to configure the functions of "Predefined URL DB" on Page 349,
"URL Lookup" on Page 353, and "Warning Page" on Page 357.
Object Description
URL Lookup Use the URL lookup function to inquire URL information
from the URL database, including the URL category and the
category type.
Notes:
l Only after canceling the binding can you delete the URL filtering rule.
l To get the latest URL categories, you are recommended to update the URL
database first. For more information about URL database, see "Predefined
URL DB" on Page 349.
l You can export the log messages to specified destinations. For more inform-
ation about log messages, see "Managing Logs" on Page 146.
System supports the rapid clone of a URL filtering rule. You can clone and generate a new URL fil-
tering rule by modifying some parameters of the one current URL filtering rule.
To clone a URL filtering rule, take the following steps:
1. Select Configuration Management > Security Protection Configuration > URL Filtering.
3. Click the Clone button above the list, and the Name configuration box will appear below
l Summary: The statistical information of the top 10 user/IPs, the top 10 URLs, and the top 10
URL categories during the specified period of time are displayed.
l URL Category: The URL category and detailed hit count and traffic are displayed.
To view the Web surfing records, view "URL Log" on Page 143. Before you view the Web surf-
ing records, see "Managing Logs" on Page 146 to enable URL Log function.
When using URL filtering function, you need to configure the following objects:
Object Description
User-defined The user-defined URL database is defined by you and you can
URL DB use it to specify the URL category.
URL Lookup Use the URL lookup function to inquire URL information
from the URL database.
Keyword Cat- Use the keyword category function to customize the keyword
egory categories.
Predefined URL DB
Notes: The predefined URL database is controlled by a license . Only after a URL
license is installed, the predefined URL database can be used.
The predefined URL database provides URL categories for the configurations of a URL filtering.
It includes dozens of categories and tens of millions of URLs .
When identifying the URL category, the user-defined URL database has a higher priority than the
predefined URL database.
By default, system updates predefined URL database everyday. You can change the update para-
meters according to your own requirements. Currently, two default update servers are provided:
https://update1.hillstonenet.com and https://update2.hillstonenet.com. Besides, you can update
the predefined URL database from your local disk.
To change the update parameters, take the following steps:
2. In the URL category database update section, you can view the current version of the data-
base, perform the remote update, configure the remote update, and perform the local
update.
3. Click Enable button of Auto Update to enable the automatic update function and then con-
tinue to specify the frequency and time. Click OK to save your settings.
4. Double click an entry of Update Server to configure the update server URL. Specify the
URL or IP address of the update server, and select the virtual router that can connect to the
server. To restore the URL settings to the default ones, click Restore Default.
5. Double click an entry of Proxy Server, then enter the IP addresses and ports of the main
proxy server and the backup proxy server. When the device accesses the Internet through a
HTTP proxy server, you need to specify the IP address and the port number of the HTTP
proxy server. With the HTTP proxy server specified, various signature databases can update
normally.
1. Select Configuration Management > System Configuration > Upgrade Management > Sig-
nature Database Update.
2. In the URL category database update section, click Update to update the predefined URL
database.
To upgrade the predefined URL database from local, take the following steps:
1. Select Configuration Management > System Configuration > Upgrade Management > Sig-
nature Database Update
2. In the URL category database update section, click Browse to select the URL database file
from your local disk.
Notes: You can not upgrade the predefined URL database from local in non-root
VSYS.
User-defined URL DB
Besides categories in predefined URL database, you can also create user-defined URL categories,
which provides URL categories for the configurations of URL filtering. When identifying the URL
category, the user-defined URL database has a higher priority than the predefined URL database.
System provides three predefined URL categories: custom1, custom2, custom3. You can import
your own URL lists into one of the predefined URL categories.
2. At the top-right corner, select Configuration > User-defined URL DB. The User-defined
URL DB page will appear.
4. Type the category name in the Category box. URL category name cannot only be a hyphen
(-). And you can create at most 16 user-defined categories.
6. Click Add to add the URL and its category to the table.
7. To edit an existing one, select it and then click Edit. After editing it, click Add to save the
changes.
System supports to batch imported user-defined URL lists into the predefined URL category
named custom1/2/3. To import user-defined URL, take the following steps:
2. At the top-right corner, select Configuration > User-defined URL DB. The User-defined
URL DB page will appear.
3. Select one of the predefined URL category(custom1/2/3), and then click Import.
4. In the Batch Import URL page, click Browse button to select your local URL file. The file
should be less than 1 M, and have at most 1000 URLs. Wildcard is supported to use once in
the URL file, which should be located at the start of the address.
In the predefined URL category named custom1/2/3, clear a user-defined URL, take the fol-
lowing steps:
2. At the top-right corner, select Configuration > User-defined URL DB. The User-defined
URL DB page will appear.
3. Select one of the predefined URL categories(custom1/2/3), and then click Clear. The URL
in the custom 1/2/3 will be cleared from the system.
URL Lookup
You can inquire a URL to view the details by URL lookup, including the URL category and the
category type.
1. Select Configuration Management > Security Protection Configuration > URL Filtering.
2. At the top-right corner, select Configuration > URL Lookup. The URL Lookup page will
appear.
3. Type the URL into the Please enter the URL to inquire box.
4. Click Inquiry, and the results will be displayed at the bottom of the page.
URL lookup server can classify an uncategorized URL (URL is neither in predefined URL data-
base nor in user-defined URL database) you have accessed, and then add it to the URL database
during database updating. Two default URL lookup servers are provided: url1.hillstonenet.com
and url2.hillstonenet.com. By default, the URL lookup servers are enabled.
To configure a URL lookup server, take the following steps:
2. At the top-right corner, Select Configuration > Predefined URL DB. The Predefined URL
DB page will appear.
3. Click Inquiry Server Configuration to open the Predefined URL DB Inquiry Server Con-
figuration page will appear.
4. In the Inquiry server section, double-click the cell in the IP/Port/Virtual Router column of
Server1/2 and type a new value.
5. Select the check box in the Enable column to enable this URL lookup server.
Keyword Category
You can customize the keyword category and use it in the URL filtering function.
After configuring a URL filtering rule, system will scan traffic according to the configured
keywords and calculate the trust value for the hit keywords. The calculating method is: adding up
the results of times * trust value of each keyword that belongs to the category. Then system com-
pares the sum with the threshold 100 and performs the following actions according to the com-
parison result:
l If more than one category action can be triggered and there is block action configured, the
final action will be Block;
l If more than one category action can be triggered and all the configured actions are Permit, the
final action will be Permit.
For example, a URL filtering rule contains two keyword categories C1 with action block and C2
with action permit. Both of C1 and C2 contain the same keywords K1 and K2. Trust values of
K1 and K2 in C1 are 20 and 40. Trust values of K1 and K2 in C2 are 30 and 80.
If system detects 1 occurrence of K1 and K2 each on a URL, then C1 trust value is 20*1+40*1-
1=60<100, and C2 trust value is 30*1+80*1=110>100. As a result, the C2 action is triggered
and the URL access is permitted.
If system detects 3 occurrences of K1 and 1 occurrence of K2 on a URL, then C1 trust value is
20*3+40*1=100, and C2 trust value C2 is 30*3+80*1=170>100. Conditions for both C1 and
C2 are satisfied, but the block action for C1 is triggered, so the web page access is denied.
1. Select Configuration Management > Security Protection Configuration > URL Filtering.
2. At the top-right corner, select Configuration > Keyword Category. The Keyword Category
page will appear.
5. Click New. In the slide area, specify the keyword, character matching method (sim-
ple/regular expression), and trust value (100 by default).
8. To delete a keyword, select the keyword you want to delete from the list and click Delete.
Warning Page
The warning page shows the user block information and user audit information. You can enable or
disable the warning page as needed.
The warning page include predefined warning page and user-defined warning page.
l Predefined warning page: Displays the predefined warning information content, including
prompt information and warning reasons.
l User-defined warning page: You can customize the warning page by custom warning inform-
ation and pictures. For details, please refer to Warning Page Management..
The block warning is disabled by default. If the internet behavior is blocked by the URL filtering
function, the Internet access will be denied. The information of Access Denied will be shown in
your browser, and some web surfing rules will be shown to you on the warning page at the same
time. According to the different network behaviors, the predefined warning page includes the fol-
lowing two situations:
1. Click Configuration Management > Security Protection Configuration > URL Filtering.
2. At the top-right corner, select Configuration > Warning Page. The Warning Page page will
appear.
Option Description
Redirect page Redirect to the specified URL. Type the URL in the URL
http:// box. You can click Detection to verify whether
the URL is valid.
The audit warning function is disabled by default. After enabling the audit warning function, when
your network behavior matches the configured URL filtering rule, your HTTP request will be
To enable or disable the audit warning function, take the following steps:
1. Select Configuration Management > Security Protection Configuration > URL Filtering.
2. At the top-right corner, select Configuration > Warning Page. The Warning Page page will
appear.
3. In the Audit Warning section, click the Enable button. To disable this function, clear the
Enable button.
l If the user-defined warning page is not configured, the predefined warning page will
be used.
l If the user-defined warning page is configured and enabled, the user-defined warning
page will be used.
For details, please refer to Warning Page Management..
For the uncategorized URL that you visit for the first time, that is, the URL which is neither in
the system's predefined URL database nor in the user-defined URL database, system will continue
to query the category of the URL in the cloud. Because the query may takes a litter while, system
cannot process the uncategorized URL immediately until the query result is returned.
1. Select Configuration Management > Security Protection Configuration > URL Filtering.
2. At the top-right corner, select Configuration > First Access of Uncategorized URL. The
First Access of Uncategorized URL page will appear.
3. Type the waiting time value of query into the Waiting Time of Query text box. The range is
0 to 5000ms. The default value is 0, which means there is no wait time limit.
4. Select the Enable check box after Block after Waiting Timeout to enable the block action,
after the waiting time of query is exceeded, system will block the access of uncategorized
URL. After clearing the Enable check box, after the waiting time of query is exceeded, sys-
tem will continue to perform URL filtering according to the configuration of URL filtering
profile.
l Collect and upload the suspicious file: The Sandbox function parses the traffic, and extracts
the suspicious file from the traffic.
l If there are no analyze result about this file in the local database, system will upload this
file to the cloud intelligence server, and the cloud server intelligence will upload the
suspicious file to the cloud sandbox for analysis.
l If this file has been identified as an illegal file in the local database of the Sandbox func-
tion, system will generate corresponding threat logs and cloudsandbox logs.
Additionally, you can specify the criteria of the suspicious files by configuring a sandbox
profile.
l Check the analysis result returned from the cloud sandbox and take actions: The Sandbox func-
tion checks the analysis results of the suspicious file returned from the cloud sandbox, verifies
the legality of the file, saves the result to the local database. If this suspicious file is identified
as an illegal file, you need to deal with the file according to the actions (reset the connection
or report logs) set by system. If it's the first time to find malicious file in local sandbox, sys-
tem will record threat logs and cloud sandbox logs and cannot stop the malicious link. When
l Maintain the local database of the Sandbox function: Record the information of the uploaded
files, including uploaded time and analysis result. This part is completed by the Sandbox func-
tion automatically.
Notes: The Sandbox function is controlled by license. To use the Sandbox function,
install the Cloud sandbox license.
Preparation
3. Import the Cloud sandbox license and reboot. The Sandbox function will be enabled after
rebooting.
Notes: If the Sandbox function is enabled, the max amount of concurrent sessions
will decrease by half.
Configuring Sandbox
System supports the policy-based Sandbox. To create the policy-based Sandbox, take the fol-
lowing steps:
1. Click Configuration Management > Security Protection Configuration > Sandbox > Con-
figuration. Click the Enable button to enable the Sandbox function.
2. Click Configuration Management > Security Protection Configuration > Sandbox > Profile
to create a sandbox rule you need.
3. Bind the sandbox rule to a policy. Click Configuration Management > Policy > Security
Policy > Policy. Select the policy rule you want to bind or click New to create a new policy.
A sandbox rule contains the files types that device has detected, the protocols types that the
device has detected, the white list settings, and the file filter settings.
l File Type: Support to detect PE, APK, JAR, MS-Office, PDF, SWF, RAR and ZIP file.
l Protocol Type: Support to detect HTTP, FTP, POP3, SMTP and IMAP4 protocol.
l White list: A white list includes domain names that are safe. When a file extracted from the
traffic is from a domain name in the white list, this file will not be marked as a suspicious file
and it will not be upload to the cloud sandbox.
l File filter: Mark the file as a suspicious file if it satisfies the criteria configured in the file filter
settings. The analysis result from the cloud sandbox determines whether this suspicious file is
legal or not.
l Actions: When the suspicious file accesses the threat items in the local sandbox, system
will deal with the malicious file with the set actions.
There are three built-in sandbox rules with the files and protocols type configured, white list
enabled and file filter configured. The three default sandbox rules includes predef_low, predef_
middle and predef_high.
l predef_low: A loose sandbox detection rule, whose file type is PE and protocol types are
HTTP/FTP/POP3/SMTP/IMAP4, with white list and file filter enabled.
1. Select Configuration Management > Security Protection Configuration > Sandbox > Pro-
file.
2. Click New to create a new sandbox rule. To edit an existing one, select the check box of
this rule and then click Edit.
Option Description
Action When the suspicious file accesses the threat items in the
local sandbox, system will deal with the malicious file
with the set actions. Actions:
White List Click Enable to enable the white list function. A white
list includes domain names that are safe. When a file
extracted from the traffic is from a domain name in the
white list, this file will not be marked as a suspicious file
and it will not be upload to the cloud sandbox.
Trusted Cer- Click Enable to enable the verification for the trusted cer-
tificate Veri- tification. After enabling, system will not detect the PE
fication file whose certification is trusted.
File Upload By default, the file will be uploaded to the cloud sandbox
when it marks it is classified as suspicious. You can dis-
able the function of suspicious file uploading, which will
prevent the suspicious file from being uploaded to the
cloud sandbox. Click the Disable to disable the function
of suspicious file uploading.
File Filter: Mark the file as a suspicious file if it satisfies the criteria con-
figured in the file filter settings. The analysis result from the cloud sand-
box determines whether this suspicious file is legal or not. The logical
relation is AND.
File Type Mark the file of the specified file type as a suspicious file.
The system can mark the PE(.exe), APK, JAR, MS-
Office, PDF, SWF, RAR, ZIP and Script file as a sus-
picious file now. If no file type is specified, the Sandbox
function will mark no file as a suspicious one.
Threat List
The threat list means the list of threat items in the local sandbox. There are two sources of the
threat items:
l The local sandbox finds suspicious file and reports to cloud. The cloud then analyzes and
returns the result to the device. If the result is malicious, the threat item will be listed in
the threat list.
You can filter and check threat items through specifying MD5 or the name of virus on the threat
list page, as well as add the selected threat item to trust list. Take the following steps:
1. Click Configuration Management > Security Protection Configuration > Sandbox >
Threat List.
2. Select the threat item that needs to be added to the trust list and click Add to Trust List
button. When threat item is added, once it's matched, the corresponding traffic will be
released.
Trust List
You can view all the sandbox threat information which can be detected on the device and add
them to the trust list. Once the item in trust list is matched, the corresponding traffic will be
released and not controlled by the actions of sandbox rule.
To remove threat items in the trust list, take the following steps:
1. Click Configuration Management > Security Protection Configuration > Sandbox > Trust
List.
2. Select the threat item that needs to be removed in the trust list and click Remove from
Trust button. The threat item will be removed from the trust list.
2. Click the Enable button of Sandbox to enable the Sandbox function. Clear the Enable but-
ton to disable the Sandbox function.
3. Specify the file size for the files you need. The file that is smaller than the specified file size
will be marked as a suspicious file.
4. If you click the Report benign file log button, system will record cloudsandbox logs of the
file when it marks it as a benign file. By default, system will not record logs for the benign
files.
5. If you click the Report greyware file log button, system will record cloudsandbox logs of
the file when it marks it as a greyware file. A greyware file is the one system cannot judge it
is a benign file or a malicious file. By default, system will not record logs for the greyware
files.
Data Security
The data security function allows you to flexibly configure control rules to comprehensively con-
trol and audit (by behavior logs and content logs) on user network behavior.
Data security can audit and filter in the following network behaviors:
Function Description
filter webpages that contain certain keywords, and log the actions.
Network Audits the IM applications behaviors and record log messages for the
Behavior access actions.
Record
The web content function is designed to control the network behavior of visiting the websites
that contain certain keywords. For example, you can configure to block the access to website that
contains the keyword "gamble", and record the access action and website information in the log.
1. Select Configuration Management > Security Protection Configuration > Policy > Data
Security > Content Filter > Web Content.
2. Click New.
3. Click OK.
3. Click OK.
Part 2: Binding a Web Content rule to a security zone or security policy rule
The Web content configurations are based on security zones or policies.
l If a security zone is configured with the Web content function, the system will perform detec-
tion on the traffic that is destined to the binding zone specified in the rule, and then do
according to what you specified.
l If a policy rule is configured with the Web content function, the system will perform detec-
tion on the traffic that is destined to the policy rule you specified, and then response.
l The threat protection configurations in a policy rule is superior to that in a zone rule if spe-
cified at the same time, and the Web content configurations in a destination zone is superior
to that in a source zone if specified at the same time.
1. Create a zone. For more information about how to create, refer to "Security Zone" on
Page 423.
3. Enable the threat protection you need, and select a Web content rules from the profile drop-
down list below; or you can click Add Profile from the profile drop-down list below, to cre-
ate a Web content rule, see Creating a Web content rule.
2. In the Data Security page, click the Enable button after Web Content.
3. From the Profile drop-down list, select a Web Content rule. You can also click Add Profile
to create a new Web Content rule.
If necessary, you can configure some additional features by going to the right top corner and click
Configuration.
Option Description
URL DB and tens of millions of URLs and you can use it to specify
the URL category and URL range for the URL cat-
egory/Web posting functions.
URL DB you can use it to specify the URL category and URL range
for the URL category/Web posting functions.
URL Lookup Use the URL lookup function to inquire URL information
from the URL database.
Bypass Domains that are not controlled by the internet behavior con-
Domain trol rules.
User Excep- Users that are not controlled by the internet behavior con-
l By default, a rule will immediately take effect after you click OK to com-
plete configuration.
To see the system logs of keyword blocking in web content, please refer to the "Content Filter
Log" on Page 143.
Network behavior record function audits the IM applications behaviors and record log messages
for the access actions, includes:
1. Select Configuration Management > Security Protection Configuration > Data Security >
Network Behavior Record.
2. Click New.
IM
3. Click OK.
Part 2: Binding a network behavior record rule to a security zone or security policy rule
The network behavior record configurations are based on security zones or policies.
l If a security zone is configured with the network behavior record function, the system will
perform detection on the traffic that is destined to the binding zone specified in the rule, and
then do according to what you specified.
l The threat protection configurations in a policy rule is superior to that in a zone rule if spe-
cified at the same time, and the network behavior record configurations in a destination zone
is superior to that in a source zone if specified at the same time.
1. Create a zone. For more information about how to create, refer to "Security Zone" on
Page 423.
3. Enable the threat protection you need, and select a network behavior record rules from the
profile drop-down list below; or you can click Add Profile from the profile drop-down list
below, to create a network behavior record rule, see Creating a network behavior record
rule.
1. Configure a security policy rule. See "Configuring a Security Policy Rule" on Page 165.
2. In the Data Security page, click the Enable button after Network Behavior Record.
3. From the Profile drop-down list, select a network behavior record rule. You can also click
Add Profile to create a new network behavior record rule.
l By default, a rule will immediately take effect after you click OK to com-
plete configuration
To see the logs of network behavior recording, please refer to the "Network Behavior Record
Log" on Page 144.
ACL
System supports ACL (Access Control List) based on MAC addresses. You can create access con-
trol profile based on MAC addresses and bind the profile to security policies to achieve access
control of the specific MAC addresses. With the combination of security policy and ACL rules,
system can achieve accurate access controlling.
ACL Profile
The ACL profile consists of one or more access control rules. In the access rule, you can set the
source MAC address and destination MAC address to filter the packets flowing through the
device, and set access control action for the matched packets, pass or discard. The configured
access control profiles will take effect only when they are bound to security policies.
To configure an ACL profile, take the following steps:
Option Description
Action packets which match the access control rule in the list
below, it will be processed according to the action set
in the access control rule; for the packets which fail to
match the access control rule, it will be processed
according to the default action set here. Default con-
trol actions include:
4. Click OK.
To configure the Attack Defense based on security zones, take the following steps:
Option Description
Enable all: Click this button to enable all the Attack Defense
functions for the security zone.
Action: Specifies an action for all the Attack Defense functions,
i.e., the defense measure system will be taken if any attack has
been detected.
Enable All
l Drop - Drops packets. This is the default action.
Flood Attack Click the button to expand the information of all flood attack
Defense
defenses. Select the Flood Attack Defense check box to enable
all flood attack defenses.
ICMP Flood: Click this button to enable ICMP flood defense for
the security zone.
UDP Flood: Click this button to enable UDP flood defense for
the security zone.
DNS Query Flood: Click this button to enable DNS query flood
defense for the security zone.
ted, system will give an alarm but still permit the DNS
query packets to pass through.
SYN Flood: Select this check box to enable SYN flood defense
DNS Reply Flood: Click this button to enable DNS reply flood
defense for the security zone.
ARP Spoofing Click the button to expand the information of the ARP spoof-
ing. Select the ARP Spoofing check box to enable all ARP spoof-
ing defenses.
Max IP Number per MAC: Click this button to check the max
IP number per MAC.
Specifies whether system will check the IP number per MAC in
the ARP table. If the parameter is set to 0, system will not check
the IP number; if it is set to a value other than 0, system will
check the IP number, and if the IP number per MAC is larger
than the parameter value, system will take the specified action.
The value range is 0 to 1024.
ND Spoofing Max IP Number per MAC: Click this button to check the max IP
number per MAC. Specifies whether system will check the IP
number per MAC in the ND table. System will check the IP num-
ber, and if the IP number per MAC is larger than the parameter
value, system will take the specified action. The value range is 1
to 1024.
Defense
defense.
Select the MS-Windows Defense check box to enable MS-Win-
dows defense.
Defense
Defense. Select the Scan/Spoof Defense check box to enable all
scan/spoof defenses.
Port Scan: Click this button to enable port scan defense for the
security zone.
Denial of Ser- Click the button to expand the information of denial of ser-
vice Defense
vice defense. Select the Denial of Service Defense check box to
enable all denial of service defenses.
Land Attack: Click this button to enable Land attack defense for
the security zone.
SYN Proxy: Click this button to enable SYN proxy for the secur-
ity zone. SYN proxy is designed to defend against SYN flood
attacks in combination with SYN flood defense. When both SYN
flood defense and SYN proxy are enabled, SYN proxy will act on
the packets that have already passed detections for SYN flood
attacks.
Anomaly
aly report. Select the Protocol Anomaly Report check box to
Report
enable the function of all protocol anomaly reports.
6. Click OK.
l Detected object: The protected objects configured in the Host Defender in this chapter and
the protected objects configured in "Configuring Critical Asset Object" on Page 589.
l Parameter: The basic statistical factor of a session, like the received bytes of inbound ses-
sions per second. The statistical values of the parameters are used by the system to judge
whether the detected object is abnormal or not.
l Baseline: The baseline is the benchmark for the parameters. Value of the baseline is cal-
culated by the system according to the historical data. When the baseline value is higher
than the upper limit or lower than the lower limit, the baseline value is considered to be
abnormal. If several baseline values of the detected object are abnormal, system will analyze
the association of these abnormal baselines, and use discretion in deciding whether this
detected object has abnormal behavior. If it has abnormal behavior, system will generate
threat logs.
l Abnormal behavior mode database: The abnormal behavior mode database includes the abnor-
mal information of the traffic, which are detecting rules, description of the abnormalities, the
reason for the abnormalities, and the suggestions. The information in the database helps you
analyze and resolve the abnormal problems. By default, system will update the database at the
Host Defender
You can enable the Host Defender function for the specific zone. Enabling this function can
achieve the following targets:
l Establish a data model for each host whose host name can be identified
l Detect the abnormal behavior of the host based on the signature dimension and find the more
hidden threat attack.
The results are displayed in the iCenter page. For more information, see Viewing_the_Abnormal_
Behavior_Detection_Information.
To enable Host Defender, take the following steps:
1. Create a zone. For more information, refer to "Security Zone" on Page 423;
4. Click the Host Defender button. To enable the abnormal behavior detection of the HTTP
factor, click the Advanced Protection button. To enable the DDoS protection for the host,
DNS Defender
DNS, as the domain name resolution protocol, is designed to resolve fixed domain names to IP
addresses. Due to the use of convenient and widely used domain names, the attacker will take dif-
ferent means to use the domain name to generate an attack. For example, an IP address can cor-
respond to multiple domain name. The server, according to the Host field of the HTTP packet,
can find the Goal URL, which the malware will use by modifying the Host field to disguise the
domain name and generate the abnormal behavior. DGA, domain generation algorithm, will gen-
erate a large number of pseudo random domain names that will be used by the malware. ISP DNS
hijack adds some of the malicious domain names used by the malicious software to its blacklist.
To solve these problems, the DNS domain name analysis can be used as an important basis to
determine the malicious behavior. System will monitor the DNS response packets after the host
defender function is enabled and establish the DNS mapping list. The DNS mapping list is used
to store domain names and IP addresses, the pseudo random domain name generated by DGA
algorithm, and the black and white domain names updated from the cloud. The device can detect
malware and abnormal behavior attacks according to the DNS mapping, generate the threat logs,
and display the results in the iCenter page. For more information, see Viewing_the_Abnormal_
Behavior_Detection_Information.
To view the Abnormal Behavior Detection information, take the following steps:
1. Select iCenter.
2. In Threat tab, click , select Detected By and Abnormal Behavior Detection in the
drop-down list, and then click the threat entry name in the list.
3. Click the Threat Analysis tab and view the Abnormal Behavior Detection information and
the trend chart of the actual value and predictive value (baseline, thresholds) of the detected
4. Click the Knowledge Base tab to view the threat attack description information.
Notes:
l You need to update the Malware behavior model database before enabling the
function for the first time. By default, System will update the database at the
certain time everyday, and you can modify the updating settings according to
your own requirements. For more information, see "Upgrading System" on
Page 630.
To realize the zone-based Advanced Threat Detection, take the following steps:
1. Create a zone. For more information, refer to "Security Zone" on Page 423;
4. If you need to capture packets, click the Capture Packets button. System will save the evid-
ence messages and have support to download it.
To view the Advanced Threat Detection information, take the following steps:
1. Select iCenter.
2. In Threat tab, click , select Detected By and Advanced Threat Detection in the
drop-down list, and then click threat entry name in the list.
3. View the advanced threat detection information, malware reliability information and so on.
5. Click Evidential packets or Relational packets drop-down list and select Download to
download the data packets.
6. Click in Admin Action, and select the threat status from the Change to drop-down list
l False Positive: When the threat entry status is "False Positive", system will upload it
to the cloud and display it again next time.
l Ignore: When the threat entry status is "Ignore", it will not participate in the "Risk
Index" score.
l Confirmed: When the threat entry status is "Confirmed", system will display it again
next time.
l Fixed: When the threat entry status is "Fixed", it will not participate in the "Network
Risk Index" score.
l Select a time period from the Release Time drop-down list to filter the threat information of
the specified time period. Click to add conditions to filter threat information as
needed.
l Click the Enable button after Hot Threat Intelligence Push. If enabled, Hillstone Cloud
server will push the latest hot threat intelligence to system, and once system gets threat intel-
ligence from the Hillstone Cloud server, it will be notified in the form of pop-up window.
Otherwise, Hillstone cloud platform will no longer push the latest hot threat intelligence.
Meanwhile, the previously received threat intelligence can only be viewed, and relevant pro-
tective operations are not allowed.
l Click "+" before a threat intelligence item in the list and the corresponding threat summary
and protection logs will be displayed below the item.
l Threat Summary: You can view the detailed threat information, including the release
time, the name, signature ID, severity, details, solutions, affected systems and other
information (the items may vary slightly for different types of threat).
Affected Sys- Displays the name of operating system that the threat will
tems affect.
CVE ID Displays the CVE ID and link of the threat. Click the link
address, and a new page will be opened, where you can view
the CVE details.
CNNVD ID Displays the CNNVD ID and link of the threat. Click the link
address, and a new page will be opened, where you can view
the CNNVD details.
l Protection Log: If system has been attacked by the threat described in the threat intel-
ligence in the latest month, the protection logs will be displayed. If not, the protection
log is empty.
l Click the threat intelligence name in the list or the corresponded operation ("Protect Now"
l For some threats in the "unprotected" status, you can see the corresponding pro-
tection solutions in the Solution tab. Click the links in sequence according to the
steps in the solution, and configure the related functions. Only when you finish all
the steps in one solutions (multiple solutions, at least one solution), the threat intel-
ligence status will become "Protected".
o For some threats in the "unprotected" status, the Solutions tab will not be displayed
and you need to take the protective measures on other websites or servers, but sys-
tem provides some solutions in the Threat Details tab. After the threat is protected,
click Confirm As Protected button and the status of threat intelligence will be
changed to "Protected".
l For the threat in the "Protected" status, if it’s protected by system, you can click Pro-
tection List to view the protective measures, and click View Details to view details of
the protective measures.
Notes: Because the operation steps in the Solution tab are correlated, please follow
the steps of the solution in turn. For example, if the signature database has not been
upgraded, the signature ID will not be shown, and subsequent protections may be
unavailable. Or after the signature database is upgraded, the subsequent steps may
change or some of the subsequent steps may be omitted.
System will obtain and download the latest threat intelligence information from the Hillstone
cloud server at the set time every day or when you log in to system, and the information will be
upgraded in the hot threat intelligence list.
When you enable the "Hot Threat Intelligence Push" function, once system gets a new intel-
ligence, the notice of New Threat Intelligence will display in the upper right corner of the page.
Hover the mouse over the notification, click Details, and the page will jump to the hot threat
intelligence page. On the iCenter > Hot Threat Intelligence page, the new threat intelligence will
be displayed in the form of pop-up windows for users to view.
Mitigation
System can identify the potential risks and network attacks dynamically, and take action on the
risk that hits the mitigation rules.
Mitigation Rule
l Predefined rule: This rule is retrieved from the Mitigation rule database. The predefined rules
may vary by different mitigation signature databases. For more information about updating the
signature database, see "Upgrading System" on Page 630
l User-defined rule: According to the user's needs, specify the trigger condition and action. For
more information, see Configuring a User-defined_Mitigation Rules.
2. Click New.
Description
Trigger Condition
Log Type Specify the log type of first level and second level for the
trigger condition.
Action
Session Control
Session Type Specify the session type, which includes new session and
concurrent session.
Total Num- Specify the limit of the total number of sessions. System
ber will take action when the risk of attacker traffic is in a con-
Drop Per- Specify the proportion for dropping the session packets
centage .The range is 1 to 100%.
Duration Specify the timeout value for dropping the session pack-
ets. The value range is 10 to 600 seconds.
Bandwidth Control
Total Num- Specify the limit of the total number of bandwidth. Sys-
ber tem will take action when the risk of attacker traffic is in a
condition that triggers system and the number of band-
width exceeds the total number. The value range is 1 to
1000000000.
Drop Per- Specify the proportion for dropping the bandwidth pack-
centage ets .The range is 1 to 100%.
IP Block
Duration Specify the timeout value for block action. The value
range is 10 to 600 seconds.
3. Click OK.
Enabling Mitigation
After enabling mitigation, mitigation rules (user-defined rule and predefined rule) will take effect.
To enable the mitigation, take the following steps:
To view the mitigation action results details of mitigation rules, take the following steps:
2. As necessary, you can click Filter to view the mitigation action details of specified con-
ditions.
Notes: Support for fuzzy search, but does not support IP address search in accord-
ance with the IP address containing mask.
2. Click New.
In the Threat Alarm Rule Configuration page, configure the following options.
Option Description
Rule Name Enter the name of threat alarm rule. The range is 1 to
127 characters.
Threat Condition
down list.
Note:
Response Method
Alarm alarm.
Click the Enable button to enable the threat
sound alarm. After it's enabled, when there's a
newly generated threat alarm or the threat alarm
hasn't be viewed,, system will use the sound to
remind the user and display a reminder at the
"Notice" in the upper right corner of the system.
For viewing details of the threat sound alarm, refer
to Viewing the Details of Threat Sound Alarm
1. Click iCenter > Threat Warning Rule to open the threat alarm rules list.
2. Select the check box of the threat alarm rule to be edited and click the Edit button.
3. In the Threat Alarm Rule Configuration page, edit the selected threat alarm rule.
4. Click OK.
To enable/ disable the threat alarm rule, take the following steps:
1. Click iCenter > Threat Warning Rule to open the threat alarm rules list.
2. Select the check box of the threat alarm rule to be enabled/ disabled.
1. Click iCenter > Threat Warning Rule to open the threat alarm rules list.
3. Click Delete.
After the Threat Sound Alarm is enabled in the threat alarm rule, when system generates a threat
alarm that matches the rule, the notice of Threat Sound Alarm will display in the upper right
corner of the page.
To view the details of threat sound alarm, take the following steps:
1. Hover the mouse over the notification, click Details after Threat Sound Alarm.
3. Click Clear Threat Sound Alarm to clear all threat sound alarm.
l Security Zone: The security zone divides network into different sections, for example, trust
zone or untrust zone. The device can control the traffic from and to security zones once
the configured policy rules have been applied.
l Interface: The interface allows inbound and outbound traffic to security zones. An interface
must be bound to a security zone so that traffic can flow into and from the security zone.
l Application Layer Gate: ALG can assure the data trasmission for the applications that uss
multi-channels, and assure the proper operation of VoIP applications in the strictest NAT
mode.
l Global Network Parameters: These parameters mainly include IP packet's processing options,
like IP fragmention, TCP MSS value, etc.
l A Layer 2 zone or a Layer 3 zone decides the interfaces bound to the zone to work in Layer 2
mode or Layer 3 mode.
l Interfaces bound to a Layer 2 zone or a Layer 3 zone are working in Layer 2 mode and
Layer 3 mode respectively.
l The traffic between interfaces that are bound to Layer 2 zones are forwarded according to
Layer 2 forwarding rules. The predefined vswitch1 interface acts as the upstream switch
interface, allowing packets forwarding between Layer 2 and Layer 3.
l The traffic between interfaces that are bound to Layer 3 zones are forwarded according to
Layer 3 forwarding rules.
There are several predefined security zones in system, which cannot be deleted or renamed. You
can modify the configurations of these predefined ones. And you can also customize security
zones. Actually predefined security zones and user-defined security zones make no difference in
functions, and you can make your choice freely.
2. Click New.
3. In the Zone Configuration page, type the name for the zone into the Zone box.
4. Type the descriptions of the zone into the Description text box.
5. Specify a type for the security zone: Layer 2 zone, Layer 3 zone, or TAP zone. The TAP
zone is a functional zone for the TAP mode.
6. Bind interfaces to the zone. Select an interface from the Binding Interface drop-down
list.
7. If needed, expand Advanced and click the Enable button before Application Identification
to enable APP identification for the zone.
9. If needed, expand Advanced and click the Enable button before NetBIOS over TCP/IP
(NBT) Cache to enable NetBIOS host query for the zone.
10. If needed, expand Threat Protection and configure the parameters for Threat Protection
function. For detailed instructions, see" Security Protection Configuration" on Page 253
11. If needed, expand Data Security and configure the parameters for Data Security function.
For detailed instructions, see "Data Security" on Page 370.
Notes:
The interface bound to the Tap zone only monitor the traffic but does not for-
ward the traffic, but when the device enters the Bypass state (such as system
restart, abnormal operation, and device power off), the Bypass interface pair will
be physically connected, and then the traffic will be forwarded to each other. If
you want to avoid this situation, try to avoid setting the pair of Bypass interfaces
as the tap zone or close the Bypass function, for details refer to "Force to Close
the Bypass Function" on Page 687.
3. Specify the zone for the management interface in the Zone drop-down list. You can only
select a Lay 3 zone.
4. Specify the method of obtaining IP address in the IP Configuration section. "Static IP"
means specifying a static IP address and the netmask. Click Advanced to specify the sec-
ondary IP address into the text box. You can specify up to 6 secondary IP addresses. "Auto-
obtain" means obtaining the IP address through DHCP.
6. Specify the mode and rate of the management interface. If you select the Auto duplex
transmission mode, you can only select the Auto rate.
7. Select the Shut Down check box to shut down the management interface.
8. Click OK.
l Physical Interface: Each Ethernet interface on devices represents a physical interface. The
name of a physical interface, consisting of media type, slot number and location parameter,
is pre-defined, like ethernet2/1 or ethernet0/2.
Interfaces can also be divided into Layer 2 interface and Layer 3 interface based on their security
zones.
l Layer 3 Interface: Any interface in Layer 3 zone. Only Layer 3 interfaces can operate in
NAT/routing mode.
Different types of interfaces provide different functions, as described in the table below.
Type Description
The configuration options for different types of interfaces may vary. For more information, see
the following instructions.
Both IPv4 and IPv6 address can be configured for the interface.
Interfaces of different types share many common properties. The tables below show the common
properties and their description.
Option Description
and then the cable is plugged into the fiber port, after
reboot the fiber port will be used for data transmission.
You can specify how to use a copper port or fiber port.
For detailed options, see the following instructions:
ARP Learn- Select the Enable check box to enable ARP learning.
ing
MAC clone Select the MAC clone check box to enable the MAC
clone funtion. The system clones a MAC address to the
Ethernet sub-interface. If the user click "Restore Default
Option Description
2. Select an action:
Click the Enable button after IPv6 Configuration configure IPv6 for the interface.
Option Description
IPv6 Advanced
Hop Limit Specifies the hop limit. Hop limit refers to the maximum
number of hops for IPv6 or RA packets sent by the inter-
face.
IP Configuration
3. "Expand Interface Properties, configure properties for the interface." on Page 429
4. "Exapand Advanced Configuration, configure advanced options for the interface." on Page
431
5. "Click the Enable button after IPv6 Configuration configure IPv6 for the interface." on
Page 432
6. Click OK.
Option Description
Name
IP Configuration
3. "Expand Interface Properties, configure properties for the interface." on Page 429
4. "Exapand Advanced Configuration, configure advanced options for the interface." on Page
431
5. Expand Load Balance, configure a load balance mode for the interface. "Flow-based" means
enabling automatic load balance based on the flow. This is the default mode. "Tuple" means
enabling load based on the source/destination IP, source/destination MAC, source/des-
tination interface or protocol type of packet, or the combination of the selected items.
6. "Click the Enable button after IPv6 Configuration configure IPv6 for the interface." on
Page 432
7. Click OK.
Option Description
Name
IP Configuration
ger the number is, the higher the priority is. The
priority of static DNS servers is 20.
3. "Expand Interface Properties, configure properties for the interface." on Page 429
4. "Exapand Advanced Configuration, configure advanced options for the interface." on Page
431
5. "Click the Enable button after IPv6 Configuration configure IPv6 for the interface." on
Page 432
6. Click OK.
Option Description
Name
IP Configuration
4. "Exapand Advanced Configuration, configure advanced options for the interface." on Page
431
5. "Click the Enable button after IPv6 Configuration configure IPv6 for the interface." on
Page 432
6. Click OK.
Editing an Interface
2. Select the interface you want to edit from the interface list and click Edit.
Option Description
any zone.
IP Configuration
2. "Expand Interface Properties, configure properties for the interface." on Page 429
3. "Exapand Advanced Configuration, configure advanced options for the interface." on Page
431
4. "Click the Enable button after IPv6 Configuration configure IPv6 for the interface." on
Page 432
5. Click OK.
Notes:
l Before deleting an aggregate/redundant interface, you must cancel other inter-
faces' bindings to it, aggregate/redundant sub-interface's configuration, its IP
address configuration and its binding to the security zone.
Interface Group
The interface group function binds the status of several interfaces to form a logical group. If any
interface in the group is faulty, the status of the other interfaces will be down. After all the inter-
faces return to normal, the status of the interface group will be Up. The interface group function
can binds the status of interfaces on different expansion modules.
2. Click New.
3. In the Interface Group Configuration page, type the name for the interface group. Names of
the interface group can not be the same.
4. In the Member drop-down list, select the interface you want to add to the interface group.
The maximum number of interfaces is 8.
Note: Members of an interface group can not conflict with other interface groups.
5. Click OK.
You can click Edit or Delete button to edit the members of interface group or delete the
interface group.
LLDP
Network devices are increasingly diverse, and their configurations are respectively complicate.
Therefore, mutual discovery and interactions in information of system and configuration between
devices of different manufacturers are necessary to facilitate management. LLDP (Link Layer Dis-
covery Protocol ) is a neighbor discovery protocol defined in IEEE 802.1ab, which provides a dis-
covery method in link layer network. By means of the LLDP technology, the system can quickly
master the information of topology and its changes of the layer-2 network when the scale of net-
work expands rapidly.
By means of LLDP, the LLDP information of the device, including the device information, sys-
tem name, system description, port description, network management address and so on, can be
sent in the form of standard TLV (Type Length Value) multicast message from the physical port
l Transmit and Receive: the port transmits and receives LLDP messages.
l Not work: the port neither transmits nor receives LLDP messages.
Related links:
l Configuring LLDP
Configuring LLDP
Configuring LLDP can enable neighbor devices' collection of network topology changes.
l Enabling LLDP
Enabling LLDP
LLDP is enabled only when the "Global LLDP" and the "LLDP of Port" are enabled at the same
time, so the corresponding port can transmit and receive LLDP messages.
l When the global LLDP is enabled, the LLDP of port of all the ports of the system will be
enabled.
l When the global LLDP is disabled, the LLDP of port of all the ports of the system will be dis-
abled.
l When the global LLDP is enabled, the user does not have to modify LLDP configuration, for
LLDP can be enabled by default configuration. If there is a need to optimize LLDP con-
figuration, please see Modifying LLDP Configuration.
Notes: Only the physical port of the device supports enabling LLDP. Logical port
does not support this function.
1. Select Configuration Management > Network Configuration > LLDP > LLDP Con-
figuration.
Option Default
Initialization 2 seconds
Delay
Transmission 1 seconds
Delay
Transmission 30 seconds
Interval
port LLDP is enabled in all the physical ports with the work
mode being Transmit and Receive.
According to the loading condition of network, the user can modify related LLDP configuration
to reduce the consumption of system resources and optimize the LLDP performance.
To modify LLDP configuration, take the following steps:
l Select Configuration Management > Network Configuration > LLDP > LLDP
Configuration.
Option Description
Initialization When the LLDP work mode of the port changes, the sys-
Delay tem will operate initialization on the port. Configuring the
initialization delay of the port can avoid continuous ini-
tialization of the port due to frequent changes of the LLDP
work mode.
Type the delay time of initialization of the port in the Ini-
tialization Delay text box. The measurement is second-
based, and the range is from 1 to 10.
TTL Mul- TTL (Time to Live) refers to the living time of the local
tiplier device information in the neighbor device.
TTL multiplier is used to adjust the living time of the local
device information in the neighbor device. The com-
Port Click the Enable button under LLDP Enable to enable the
LLDP function of the port.
Select LLDP work mode from the Work Mode drop-down
menu to modify the LLDP work mode of the port.
Note: For the introduction of the LLDP work mode,
please see LLDP Work Mode.
l Click OK.
The user can view the LLDP local information and the neighbor information (the LLDP inform-
ation sent from the neighbor device to the local device) of the port in the MIB Topology page.
To view the MIB topology, take the following steps.
1. Select Configuration Management > Network Configuration > LLDP > MIB Topology.
2. Click the Local Information button to open the Local Information page and view the LLDP
local information, including chassis ID, system name, system description, system-supported
3. View the MIB topology and neighbor information of all the ports which enable LLDP in the
list in the MIB Topology page.
l Server: Configures DNS servers and default domain names for the security device.
l Analysis: Sets retry times and timeout for device's DNS service.
l Cache: DNS mappings to cache can speed up query. You can create, edit and delete DNS
mappings.
You can configure a DNS server for system to implement DNS resolution. To create a DNS
server, take the following steps:
1. Select Configuration Management > Network Configuration > DNS > DNS Server.
3. In the DNS Server Configuration page, type the IP address for the DNS server into the
Server IP box.
4. Select a VRouter from the VR drop-down list. The default VRouter is trust-vr.
5. Click OK.
Configuring an Analysis
l Timeout: System will wait for the DNS server's response after sending the DNS request
and will send the request again if no response returns after a specified time. The period of
waiting for a response is known as timeout.
To configure the retry times and timeout for DNS requests, take the following steps:
1. Select Configuration Management > Network Configuration > DNS > Analysis
4. Click Apply.
When using DNS, system might store the DNS mappings to its cache to speed up the query.
There are three ways to obtain DNS mappings:
l Register: DNS hosts specified by some modules of security devices, such as NTP, AAA,
etc.
For convenient management , DNS static cache supports group function, which means users
make the multiple domain hosts with the same IP address and virtual router is a DNS static cache
group.
To add a static DNS mapping to cache, take the following steps:
2. Click New.
Option Description
Notes:
l Only DNS static cache group can support new, edit and delete operation ,
while dynamic and register cache cannot .
l The DNS dynamic cache can be deleted by command or the lifetime reset.
For detailed information , refer to StoneOS CLI User Guide and download
PDF on website.
l User can clear the register cache only by deleting the defined hosts in func-
tion module.
l DNS static cache is superior to dynamic and register cache, which means the
static cache will cover the same existed dynamic or register cache.
NBT Cache
System supports NetBIOS name resolution. With this function enabled, system can automatically
obtain all the NetBIOS host names registered by the hosts within the managed network, and store
them in the cache to provide IP address to NetBIOS host name query service for other modules.
Enabling a NetBIOS name resolver is the pre-requisition for displaying host names in NAT logs.
For more information on how to display host names in the NAT logs, see "Managing Logs" on
Page 146.
To enable NetBIOS for a zone, select the NBT cache check box when creating or editing the
zone. For more details, see "Security Zone" on Page 423. The security zone with NetBIOS
enabled should not be the zone that is connected to WAN. After NetBIOS is enabled, the query
process might last for a while, and the query result will be added to the NetBIOS cache table. Sys-
tem will perform the query again periodically and update the result.
1. Select Configuration Management > Network Configuration > DNS > NBT Cache.
2. Select a VRouter from the VR drop-down list to display the NBT cache in that VRouter.
3. Select a NBT cache entry from the list and click Delete.
l DHCP client: The interface can be configured as a DHCP client and obtain IP addresses from
the DHCP server. For more information on configuring a DHCP client, see "Configuring an
Interface" on Page 429.
l DHCP server: The interface can be configured as a DHCP server and allocate IP addresses
chosen from the configured address pool for the connected hosts.
l DHCP relay proxy: The interface can be configured as a DHCP relay proxy to obtain DHCP
information from the DHCP server and forward the information to connected hosts.
The devices are designed with all the above three DHCP functions, but an individual interface
can be only configured with one of the above functions.
Option Description
DNS1 Configures a primary DNS server for the client. Type the
server's IP address into the box.
4. Configure Reserved Address (IP addresses in the Reserved Address, within the IP range of
the address pool, are reserved for the DHCP server and will not be allocated).
To configure a reserved address, expand Reserved Address, type the start and end IP for an
IP range into the Start IP and End IP box respectively, and then click New. To delete an IP
range, select the IP range you want to delete from the list and then click Delete.
5. Configure IP-MAC Binding. If the IP is bound to a MAC address manually, the IP will only
be allocated to the specified MAC address.
To configure an IP-MAC Binding, expand IP-MAC Binding and type the IP and MAC
address into the IP address and MAC box respectively, type the description in the Descrip-
tion text box if necessary, and then click New. Repeat the above steps to add multiple
entries. To delete an IP-MAC Binding, select an entry from the list and click Delete.
Option Description
1. Click New.
1. Click New.
click Delete.
1. Click New.
1. Click New.
1. Click New.
138 The DHCP server uses option 138 to carry a list of 32-bit
(binary) IPv4 addresses indicating one or more CAPWAP
1. Click New.
1. Click New.
click Delete.
1. Click New.
Server
SMTP server Configures a SMTP server for the client. Type the
server's IP address into the box.
POP3 server Configures a POP3 server for the client. Type the
server's IP address into the box.
News server Configures a news server for the client. Type the
server's IP address into the box.
Relay agent When the device1 with DHCP server enabled is con-
nected to another device2 with DHCP relay enabled,
and the PC obtains device1's DHCP information from
device2, then only when the relay agent's IP address
and netmask are configured on device1 can the DHCP
information be transmitted to the PC successfully.
Relay agent: Type relay agent's IP address and netmask,
i.e., the IP address and netmask for the interface with
relay agent enabled on device2.
VCI-match- The DHCP server can verify the VCI carried by option
string 60 in the client’s DHCP packets.When the VCI in the
client's DHCP packet matches the VCI matching string
you configured in the DHCP server, the DHCP server
will offer the IP address and other corresponding inform-
ation. If not, the DHCP server will drop the client's
DHCP packets and will not reply to the client. If you do
not configure a VCI matching string for the DHCP
server, it will ignore the VCI carried by option 60.
8. Click OK.
To create a DHCPv6 server to appropriate IPv6 addresses, take the following steps:
Option Description
rapid-commit Clicking this button can help fast get IPv6 address from
the server. You need to enable both of the DHCP client
and server's Rapid-commit function.
DNS1 Configures a primary DNS server for the client. Type the
server's IP address into the box.
Preferred Specifies the preferred lifetime for the IPv6 address. The
Lifetime preferred lifetime should not be larger than the valid life-
time.
4. Click OK.
The device can act as a DHCPv6 relay proxy to receive requests from a DHCPv6 client and send
requests to the DHCPv6 server, and then obtain DHCP information from the server and return it
to the client.
To create a DHCPv6 relay proxy, take the following steps:
3. In the DHCP Relay Proxy page, select an interface to which the DHCPv6 Relay Proxy will
be applied from the Interface drop-down list.
4. Type the IPv6 addresses of DHCPv6 servers into the Server 1/Server 2/Server 3 boxes.
5. If the DHCPv6 server is specified as link-local address, you need to select the egress inter-
face name from Egress Interface 1/Egress Interface 2/Egress Interface 3 dropdown list.
6. Click OK.
l Destination routing: A manually-configured route which determines the next routing hop
according to the destination IP address.
l SBR: Source IP based route which selects router and forwards data according to the source
IP address.
l PBR: A route which forwards data based on the source IP, destination IP address and ser-
vice type.
l RIP: A dynamic routing protocol that selects routers and forwards data according to the
dynamic routing table generated by RIP.
l ECMP: Load balancing traffic destined to the same IP address or segment in multiple
routes with equal management distance.
When forwarding the inbound packets, the device selects a route in the following sequence: PBR
> SIBR > SBR > Destination routing/RIP.
The destination route is a manually-configured route entry that determines the next routing hop
based on the destination IP address. Usually a network with comparatively a small number of out-
bound connections or stable Intranet connections will use a destination route. You can add a
default route entry at your own choice as needed.
1. Select Configuration Management > Network Configuration > Route > Destination Route.
2. Select the IPv4 or IPv6 page, and create an IPv4 destination route or IPv6 destination route
on the corresponding page. This step is only applicable for IPv6 version.
Option Description
Virtual From the Virtual Router drop-down list, select the Vir-
Router tual Routerouter for the new route. The default value is
"trust-vr".
Destination Type the IP address for the route into the text box.
Netmask Type the corresponding subnet mask into the text box.
Schedule Specifies a schedule when the rule will take effect. Select
a desired schedule from the Schedule drop-down list.
After selecting the desired schedules, click the blank area
in this page to complete the schedule configuration.
To create a new schedule, click .
Precedence Type the route precedence into the text box. The smaller
the parameter is, the higher the precedence is. If multiple
routes are available, the route with higher precedence will
be prioritized. The value range is 1 to 255. The default
value is 1. When the value is set to 255, the route will be
invalid.
Weight Type the weight for the route into the text box. This para-
meter is used to determine the weight of traffic for-
warding in load balance. The value range is 1 to 255. The
default value is 1.
4. Click OK.
Source route is designed to select a router and forward data based on the source IP address of a
packet.
1. Select Configuration Management > Network Configuration > Routing > Source Route.
2. Select the IPv4 or IPv6 page, and create an IPv4 source route or IPv6 source route on the
corresponding page. This step is only applicable for IPv6 version.
Virtual From the Virtual Router drop-down list, select the Vir-
Router tual Routerouter for the new route. The default value is
"trust-vr".
Source IP Type the source IP for the route into the box.
or Virtual Router.
Schedule Specifies a schedule when the rule will take effect. Select
a desired schedule from the Schedule drop-down list.
Precedence Type the route precedence into the box. The smaller the
parameter is, the higher the precedence is. If multiple
routes are available, the route with higher precedence will
be prioritized. The value range is 1 to 255. The default
value is 1. When the value is set to 255, the route will be
invalid.
Weight Type the weight for the route into the box. This para-
meter is used to determine the weight of traffic for-
warding in load balance. The value range is 1 to 255. The
default value is 1.
4. Click OK.
Source interface route is designed to select a router and forward data based on the source IP
address and ingress interface of a packet.
1. Select Configuration Management > Network Configuration > Routing > Source Interface
Route.
2. Select the IPv4 or IPv6 tab page, and create an IPv4 Source-Interface route or IPv6 Source-
Interface route on the corresponding page. This step is only applicable for IPv6 version.
3. Click New. In the Source Interface Route Configuration page, enter values.
Option Description
Virtual From the Virtual Router drop-down list, select the Vir-
Router tual Routerouter for the new route. The default value is
"trust-vr".
Ingress Inter- Select an interface for the route from the drop-down list.
face
Source IP Type the source IP for the route into the textbox.
Schedule Specifies a schedule when the rule will take effect. Select
a desired schedule from the Schedule drop-down list.
After selecting the desired schedules, click the blank area
in this dialog to complete the schedule configuration.
To create a new schedule, click .
Precedence Type the route precedence into the textbox. The smaller
the parameter is, the higher the precedence is. If multiple
routes are available, the route with higher precedence will
be prioritized. The value range is 1 to 255. The default
Weight Type the weight for the ISP route into the textbox. This
parameter is used to determine the weight of traffic for-
warding in load balance. The value range is 1 to 255. The
default value is 1.
4. Click OK.
Policy-based Route (PBR) is designed to select a router and forward data based on the source IP
address, destination IP address and service type of a packet.
1. Select Configuration Management > Network Configuration > Route > Policy Based Rout-
ing.
Option Description
Virtual From the Virtual Router drop-down list, select the Vir-
Router tual Router for the new route. The default value is "trust-
vr".
3. Click OK.
1. Select Configuration Management > Network Configuration > Route > Policy Based Rout-
ing.
Option Description
Source
Source User Specifies a role, user or user group for the PBR rule.
Destination
down list.
Other
click button.
Schedule Specifies a schedule when the PBR rule will take effect.
Record log Click the Enable button to enable the logging function
for PBR rules.
Option Description
Set Next-hop To specify the type of next hop, click IP Address or Inter-
face.
Track Object Select the track object from the drop-down list. See
"Track Object" on Page 591.
Weight Specifies the weight for the next hop. The value range is 1
to 255. The default value is 1. If a PBR rule is configured
Delete Select next-hop entries from the next hop table and click
this button to delete.
1. Select Configuration Management > Network Configuration > Route > Policy Based Rout-
ing.
2. Select the rule you want to adjust priority from the list below, click Priority.
Option Description
Top Click this option button to move the PBR rule to the top.
Bottom Click this option button to move the PBR rule to the bot-
tom.
Before ID Click this option button and type the ID into the box
behind to move the PBR rule to the position before
the ID.
After ID Click this option button and type the ID into the box
behind to move the PBR rule to the position after the ID.
1. Select Configuration Management > Network Configuration > Route > Policy Based Rout-
ing.
Option Description
PBR Name Select a route from the PBR name drop-down list.
Virtual From the Virtual Router drop-down list, select the Vir-
Router tual Router for the new route. The default value is "trust-
vr".
or No Binding.
3. Click OK.
DNS Redirect
System supports the DNS redirect funtion, which redirects the DNS requests to a specified DNS
server. For more information about specifying IP addresses of the DNS server, see Configuring a
DNS Server. Currently, the DNS redirect function is mainly used to redirect the video traffic for
load balancing. With the policy based route working together, system can redirect the Web video
traffic to different links, improving the user experience.
To enable the DNS redirect function, take the following steps:
1. Select Configuration Management > Network Configuration > Routing > Policy-based
Routing.
By default, if the PRB rule is bound to both an interface, VRouter and the security zone the inter-
face belongs to, the traffic matching sequence will be: Interface > Zone > VRouter. You can
1. Select Configuration Management > Network Configuration > Routing > Policy-based
Routing.
5. Click OK.
RIP, Routing Information Protocol, is an internal gateway routing protocol that is designed to
exchange routing information between routers. Currently, devices support both RIP versions, i.e.,
RIP-1 and RIP-2.
RIP configuration includes basic options, redistribute, Passive IF, neighbor, network and dis-
tance. You will also need to configure RIP parameters for different interfaces, including RIP ver-
sion, split horizon, and authentication mode.
Creating RIP
1. Select Configuration Management > Network Configuration > Routing > RIP.
2. From the Virtual Router drop-down list, select the Virtual Router for the new route.
3. Click New.
Option Description
Network
New Click New to add the network. All the networks that have
been added will be displayed in the list below.
Option Description
route is redistributed.
Update inter- Specifies an interval in which all RIP routes will be sent
val to all the neighbors. The value range is 0 to 16777215
seconds. The default value is 30.
Invalid time If a route has not been updated for the invalid time, its
metric will be set to 16, indicating an unreachable route.
The value range is 1 to 16777215 seconds. The default
value is 180.
Flush time System will keep on sending the unreachable routes (met-
ric set to 16) to other routers during the flush time. If the
route still has not been updated after the end of flush
time, it will be deleted from the RIP information data-
base. The value range is 1 to 16777215 seconds. The
Redistribute
Protocol Select a protocol type for the route from the Protocol
drop-down list. The type can be Connected, Static, OSPF
or BGP.
New Click New to add the Redistribute route entry. All the
entries that have been added will be displayed in the
Redistribute Route list below.
Neighbor
New Click New to add the neighbor IP. All the neighbor IPs
that have been added will be displayed in the list below.
Distance
Distance Type the distance into the Distance box. The priority of
the specified distance is higher than than the default dis-
tance.
New Click New to add the distance. All the distances that have
been added will be displayed in the list below.
Option Description
4. Click OK.
Notes: Configuration for RIP on device's interfaces includes: RIP version, split hori-
zon and authentication mode. For more information on how to configure RIP on an
interface, see "Configuring an Interface" on Page 429.
Host Book
You can specify a name to be a collection of one domain name or several domain names, and ref-
erence this host book when configuring. Host book is the database to store the relationships of
domain integrations and the specified names in system.
The entry of the relationship of domain integrations and the specified name is called host entry.
2. Click New.
Option Description
3. Click OK.
l Ensures the proper operation of VoIP applications such as SIP and H.323 in NAT mode, and
performs monitoring and filtering according to policies.
Enabling ALG
The system allows you to enable or disable ALG for different applications. Devices support ALG
for the following applications: FTP, HTTP, MSRPC, PPTP, Q.931, RAS, RSH, RTSP, SIP,
SQLNetV2, SUNRPC, TFTP, DNS, Auto and XDMCP. You can not only enable ALG for applic-
ations, but also specify H323's session timeout.
To enable the ALG for applications, take the following steps:
2. In the Application Layer Gateway page, select the applications that require ALG.
3. To modify H323's session timeout, type the value into the H323 session timeout box. The
value range is 60 to 1800 seconds. The default value is 60.
Notes: Only when the FTP ALG is enabled can the FTPS ALG be selected.
1. Select Configuration Management > Network Configuration > Global Network Parameters
> Global Network Parameters.
Option Description
IP Fragment
TCP
TCP MSS Specifies a MSS value for all the TCP SYN/ACK pack-
ets. Click the Enable button, and type the value into the
Maximum MSS text box below.
Maximum Type the max MSS value into the Maximum MSS text box
MSS below. The value range is 64 to 65535. The default value
is 1448.
TCP MSS Specifies a MSS value for IPSec VPN's TCP SYN pack-
VPN ets. Click the Enable button, and type the value into the
Maximum MSS text box below.
Maximum Type the max MSS value for IPSEC VPN into the Max-
MSS imum MSS text box below. The value range is 64 to
65535. The default value is 1380.
TCP SYN Click the Enable button to enable this function and spe-
Packet cify the action for TCP non-SYN packet. When the
Check received packet is a TCP SYN packet, the TCP con-
nection will be established. When the received packet is a
TCP non-SYN packet, the packet will be processed
according to the specified action.
Others
Non-IP and Specifies how to process packets that are neither IP nor
Non-ARP ARP.
Packet
3. Click OK.
1. Select Configuration Management > Network Configuration > Global Network Parameters
> Protection Mode.
l Log only - System only generates protocol anomaly alarms and attacking behavior
logs, but will not block attackers or reset connections.
l Protect - System not only records attack behavior detected by Intrusion Prevention
System, Anti-Virus or AD, Policy, Black list, but also reset the connection or block
the access.
Notes: Log & reset mode is recommended. In this mode, the security performance
of the device can take effect normally. If log only mode is selected, system can only
record logs, and functions which can block traffic in system will be invalid, includ-
ing policy, IPS, AV, QoS, etc.
Bypass Configuration
Under certain conditions, such as system restart, abnormal operation and power off, system will
automatically enter the bypass state. In the bypass state, the bypass interface pairs each other are
directly connected physically and the traffic will pass directly. In general, the device's etherent
1. Select Configuration Management > Network Configuration > Bypass Configuration, and
enter the bypass configuration page.
2. Select the check-box of Bypass Configuration to enable bypass configuration. This option is
only supported when the device ha function is on.
3. Select one or more bypass interface pair entries in the list, and click Enable to force the
bypass function of the interface to make them physically connected.
4. To restore the initial bypass status that can be enabled automatically in certain condition,
select the corresponding bypass interface pair in the list, and then click Auto.
Notes:
l Under normal operation of the device, it is not allowed to be enabledbypass
function and HA function at the same time.
l "Address" on Page 520: Contains address information, and can be used by multiple modules.
l "Service Book" on Page 524: Contains service information, and can be used by multiple mod-
ules.
l "Application Book" on Page 532: Contains application information, and can be used by mul-
tiple modules.
l "Schedule" on Page 557: Specifies a time range or period. The functions that use the schedule
will take effect in the time range or period specified by the schedule.
l "User" on Page 573: Contains user information. User means the people or the machines that
uses the functions of the devices, or the people and machines that are under the management
of the device.
l "Role" on Page 582: Contains role information that associates users to privileges.
l "Track Object" on Page 591: Tracks if the specified object (IP address or host) is reachable or
if the specified interface is connected.
l All address books contain the following default address entries named Any and private_net-
work. The IP address of Any is 0.0.0.0/0, which is any IP address. Any can neither be
edited nor deleted. The IP addresses of private_network are 10.0.0.0/8, 172.16.0.0/12,
192.168.0.0/16, that all private network address. The private_network can be edited and
deleted.
l One address entry can contain another address entry in the address book.
l If the IP range of an address entry changes, system will update other modules that reference
the address entry automatically.
2. Click New.
Basic
Name Type the address entry name into the Name box.
Type Select the IP type, including IPv4 or IPv6. Only the IPv6
firmware supports to configure IPv6 type.
Member
member added.
Excluded Member
Delete Delete the selected excluded member entry from the list.
3. Click OK.
Viewing Details
To view the details of an address entry, take the following steps, including the name, member,
description and reference:
2. In the Address Book page, select "+" before an address entry from the member list, and
view the details under the entry.
System ships with multiple predefined services, and identifies the corresponding application types
based on the service ports. The supported predefined services may vary from different device
models. Predefined service groups contain related predefined services to facilitate user con-
figuration.
User-defined Service
Except for the above predefined services, you can also create your own user-defined services eas-
ily. The parameters that will be specified for the user-defined service entries include:
l Name
l Protocol type
l The source and destination port for TCP or UDP service, and the type and code value for
ICMP service.
l Timeout
l Application type
You can organize some services together to form a service group, and apply the service group to
policies directly to facilitate management. The service group has the following features:
l Each service of the service book can be used by one or more service groups.
l A service group can contain both predefined services and user-defined services.
l A service group can contain another service group. The service group of the system sup-
ports up to 8 layers of nests.
l The service group being used by any policy cannot be deleted. To delete such a service
group, you must first end its relationship with other modules.
l If a user-defined service is deleted from a service group, the service will also be deleted
from all the service groups using it.
This section describes how to configure a user-defined service and service group.
1. Select Configuration Management > Object Configuration > Service Book > Service.
2. Click New.
Option Description
Service Type the name for the user-defined service into the text-
box.
Notes:
l The minimum port
number cannot exceed
the maximum port
number.
Notes:
l The minimum code
cannot exceed the max-
imum code.
code.
Description If it's needed, type the description for the service into the
text box.
3. Click OK.
1. Select Configuration Management > Object Configuration > Service Book > Service
Group.
Option Description
Name Type the name for the user-defined service group into the
text box.
Description If needed, type the description for the service into the
text box.
3. Click OK.
Viewing Details
To view the details of a service entry, including the name, protocol, destination port and ref-
erence, take the following steps:
1. Click OConfiguration Management > Object Configuration > Service Book > Service.
2. In the service page, click "+" before an address entry from the member list, and view the
details under the entry.
You can view and use all the supported predefined applications and edit TCP timeout, but cannot
delete any of them. To edit a predefined application, take the following steps:
1. Select Configuration Management > Object Configuration > APP Book > Application.
2. Select the application you want to edit from the application list, and click Edit.
3. In the Application Configuration page, edit TCP timeout for the application.
You can create your own user-defined applications. By configuring the customized application sig-
nature rules, system can identify and manage the traffic that crosses into the device, thus identi-
fying the type of the traffic.
To create a user-defined application, take the following steps:
2. Click New.
Option Description
Signature Select the signature of the application and then click Add.
To create a new signature, see "Application Book" on
Page 532.
3. Click OK.
1. Select Configuration Management > Object Configuration > APP Book > Application
Groups
2. Click New.
Option Description
Application Filter Group allows you to create a group to filter applications according to applic-
ation category, sub-category, technology, risk, and attributes.
To create an application filter group:
1. Select Configuration Management > Object Configuration > APP Book > Application Fil-
ters.
2. Click New.
4. Specifies the filter condition. Choose the category, subcategory, technology, risk and char-
acteristic by sequence in the drop-down list. You can click Clear Filter to clear all the selec-
ted filter conditions according to your need.
5. Click OK
By configuring the customized application signature rules, system can identify and manage the
traffic that crosses into the device. When the traffic matches all conditions defined in the sig-
nature rule, it hits this signature rule. Then system identifies the application type.
To create a new signature rule, take the following steps:
2. Click New.
Option Description
Source
Address Specify the source address. You can use the Address
Book type or the IP/Netmask type.
Destination
Address Specify the source address. You can use the Address
Book type or the IP/Netmask type.
Protocol
Action
App-Sig- Select Enable to make this signature rule take effect after
nature Rule the configurations. Otherwise, it will not take effect.
3. Click OK.
Viewing Details
To view the details of an application entry, including the name, category, risk and reference, take
the following steps:
2. In the application page, click "+"before an address entry from the member list, and view the
details under the entry.
SSL Proxy
This feature may not be available on all platforms. Please check your system's actual page to see if
your device delivers this feature.
To assure the security of sensitive data when being transmitting over networks, more and more
websites adopt SSL encryption to protect their information. The device provides the SSL proxy
function to decrypt HTTPS/POP3S/SMTPS/IMAPS traffic. The SSL proxy function works in
the following two scenarios:
The first scenario, the device works as the gateway of Web clients. The SSL proxy function
replaces the certificates of encrypted websites with the SSL proxy certificate to get the encrypted
information and send the SSL proxy certificates to the client’s Web browser. During the pro-
cess, the device acts as a SSL client and SSL server to establish connections to the Web server
and Web browser respectively. The SSL proxy certificate is generated by using the device's local
certificate and re-signing the website certificate. The process is described as below:
The second scenario, the device works as the gateway of Web servers. The device with SSL proxy
enabled can work as the SSL server, use the certificate of the Web server to establish the SSL con-
nection with Web clients (Web browsers), and send the decrypted traffic to the internal Web
server.
There are two work modes. For the first scenario, the SSL proxy function can work in the client-
inspection proxy mode; for the second scenario, the SSL proxy function can work in the server-
inspection proxy /offload mode.
When the SSL proxy function works in the client-inspection proxy mode, it can perform the SSL
proxy on specified websites.
For the websites that do not need SSL proxy, it dynamically adds the IP address and port of the
websites to a bypass list, and the HTTPS/POP3S/SMTPS/IMAPS traffic will be bypassed.
For the websites proxied by the SSL proxy function, the device will check the parameters of the
SSL negotiation. When a parameter matches an item in the checklist, the corresponding
HTTPS/POP3S/SMTPS/IMAPS traffic can be blocked or bypassed according to the action you
specified.
The device will decrypt the HTTPS/POP3S/SMTPS/IMAPS traffic that is not blocked or
bypassed.
When the SSL proxy function works in the server-inspection offload mode, it will proxy the SSL
connections initialized by Web clients, decrypt the HTTPS traffic, and send the HTTPS traffic as
plaintext to the Web server.
You can integrate SSL proxy function with the following:
l Integrate with the application identification function. Devices can decrypt the
HTTPS/POP3S/SMTPS/IMAPS traffic encrypted using SSL by the applications and identify
the application. After the application identification, you can configure the policy rule, QoS,
l Integrate with the Web content function, Web post function, and email filter function.
Devices can audit the actions that access the HTTPS website.
l Support unilateral SSL proxy in WebAuth. SSL client can use SSL connection during
authentication stage. When authentication is completed, SSL proxy will no longer take
effect, and the client and server communicate directly without SSL encryption.
l Integrate with AV, IPS , and URL. Devices can perform the AV protection, IPS protection,
and URL filter on the decrypted HTTPS traffic.
To implement the SSL proxy, you need to bind a SSL proxy profile to the policy rule. After bind-
ing the SSL proxy profile to a policy rule, system will use the SSL proxy profile to deal with the
traffic that matches the policy rule. To implement the SSL proxy, take the following steps:
1. Configure the corresponding parameters of SSL negotiation, including the following items:
specify the PKI trust domain of the device certificates, obtain the CN value of the subject
field from the website certificate, configure the trusted SSL certificate list, and import a
device certificate to the Web browser.
2. Configure a SSL proxy profile, including the following items: choose the work mode, set the
website list (use the CN value of the Subject field of the website certificate), configure the
actions to the HTTPS traffic when its SSL negotiation matches the item in the checklist,
enable the audit warning page, and so on.
3. Bind a SSL proxy profile to a proper policy rule. The device will decrypt the HTTPS traffic
that matches the policy rule and is not blocked or bypassed by the device.
By default, the certificate of the default trust domain trust_domain_ssl_proxy_2048 will be used
to generate the SSL proxy certificate with the Web server certificate together, and then system
will issue the generated SSL proxy certificate to the client. You can specify another PKI trust
domain in system as the trust domain of the device certificate. The specified trust domain must
have a CA certificate, local certificate, and the private key of the local certificate. To specify a
trust domain, take the following steps:
l The trust domain of trust_domain_ssl_proxy uses RSA and the modulus size is 1024
bits.
l The trust domain of trust_domain_ssl_proxy_2048 uses RSA and the modulus size is
2048 bits.
To get the CN value in the Subject field of the website certificate, take the following steps (take
www.gmail.com as the example):
4. In the Details tab, click Subject. You can view the CN value in the text box.
In the proxy process, the SSL proxy certificate will be used to replace the website certificate.
However, there is no SSL proxy certificate's root certificate in the client browser, and the client
cannot visit the proxy website properly. To address this problem, you have to import the root cer-
tificate (certificate of the device) to the browser.
To export the device certificate to local PC firstly, take the following steps:
1. Export the device certificate to local PC. Select Configuration Management > System Con-
figuration > PKI > Trust Domain Certificate.
l Content: CA certificate
l Action: Export
3. Click OK and select the path to save the certificate. The certificate will be saved to the spe-
cified location.
Then, import the device certificate to the client browser. Take Internet Explorer as an example:
1. Open IE.
5. Click Import. Import the certificate following the Certificate Import Wizard.
Configuring a SSL proxy profile includes the following items: choose the work mode, set the web-
site list (use the CN value of the Subject field of the website certificate), configure the actions to
the HTTPS/POP3S/SMTPS/IMAPS traffic when its SSL negotiation matches the item in the
checklist, enable the audit warning page, and so on. System supports up to 32 SSL proxy profiles
and each profile supports up to 10,000 statistic website entries.
To configure a SSL proxy profile, take the following steps:
2. At the top-left corner, click New to create a new SSL proxy profile.
Option Description
Mode When the device works as the gateway of Web clients, the
SSL proxy function can work in the client-inspection
proxy mode.
When the device works as the gateway of Web servers,
the SSL proxy function can work in the server-inspection
offload mode.
Common Set the website list based on the work mode. When the
Name SSL proxy is in the Require mode, set the websites that
will be proxied by the SSL proxy function. When the SSL
proxy is in the Exempt mode, set the websites that will
not be proxied by the SSL proxy function and the device
will perform the SSL proxy on other websites.To set the
website list, click New and specify the CN value of the
subject field of the website certificate.
Root Cer- Click the Enable button to enable the Root Certificate
tificate Push Push. When the HTTPS traffic is decrypted by the SSL
proxy function, the Install Root Certificate page will dis-
play in your Web browser. In the Install Root Certificate
page, you can select Download or Downloaded, Ignored
as needed.
Decryption Configuration
Key Modulus Specify the key pair modulus size of the private/public
keys that are associated with the SSL proxy certificate.
You can select 1024 bits or 2048 bits.
items.
Blocking SSL When the SSL server uses the specified version of SSL
version protocol, system can block its
HTTPS/POP3S/SMTPS/IMAPS traffic.
Expired cer- Check the certificate used by the server. When the cer-
tificate tificate is overdue, you can select Block to block its
HTTPS/POP3S/SMTPS/IMAPS traffic, or select Bypass
to bypass its HTTPS/POP3S/SMTPS/IMAPS traffic, or
select Decrypt to decrypt the
HTTPS/POP3S/SMTPS/IMAPS traffic.
Client veri- Check whether the SSL server verifies the client cer-
fication tificate.
l When the SSL server does not verify the client cer-
tificate, it will continue to check other items.
To implement SSL proxy, you need to bind a SSL proxy profile to the policy rule. After binding
the SSL proxy profile to a policy rule, system will use the SSL proxy profile to deal with the traffic
that matches the policy rule. To implement SSL proxy, take the following steps:
1. Configure a SSL proxy profile includes the following items: choose the work mode, specify
the trust domain of the Web server certificate and the HTTP port number of the Web
server.
2. Bind a SSL proxy profile to a proper policy rule. The device will decrypt the HTTPS traffic
that matches the policy rule.
Configuring a SSL proxy profile includes the following items: choose the work mode, specify the
trust domain of the Web server certificate and the HTTP port number of the Web server.
To configure a SSL proxy profile, take the following steps:
2. At the top-left corner, click New to create a new SSL proxy profile.
Option Description
Service Port Specify the HTTP port number of the Web server.
Server Trust Since the device will work as the SSL server and use
After binding the SSL proxy profile to a policy rule, system will process the traffic that is matched
to the rule according to the profile configuration. To bind the SSL proxy profile to a policy rule,
see "Security Policy" on Page 164.
Periodic Schedule
Periodic schedule is the collection of periods specified by all the schedule entries within the
schedule. You can add up to 16 schedule entries to a periodic schedule. These entries can be
divided into 3 types:
l Daily: The specified time of every day, such as Everyday 09:00:30 to 18:00:20.
l Days: The specified time of a specified day during a week, such as Monday Tuesday
Saturday 09:00:15 to 13:30:45.
l Period: A continuous period during a week, such as from Monday 09:30:30 to Wednesday
15:00:05.
Timeframe
Timeframe is a time range in which periodic schedule will take effect. If no timeframe is spe-
cified, the periodic schedule will take effect as soon as it is used by some module.
Creating a Schedule
2. Click New.
Option Description
Add Click Add and then specify a type for the periodic
schedule.
ively.
Delete Select the entry you want to delete from the period sched-
ule list below, and click Delete.
Timeframe
3. Click OK.
l Local server: a local server is the firewall itself. The firewall stores user identity information
and handles requests. A local server authentication is fast and cheap, but its storage space is
limited by the firewall hardware size.
l External servers:
l Radius Server
l TACACS+ Server
1. Select Configuration Management > Object Configuration > AAA Server, and click New >
Local Server.
Name Type the name for the new server into the text box.
Role mapping Specifies a role mapping rule for the server. With this
rule option selected, system will allocate a role for the users
who have been authenticated to the server according to
the specified role mapping rule.
3. Click OK.
1. Select Configuration Management > Object Configuration > AAA Server, and select New
> Radius Server.
Basic Configuration
Port Specifies a port number for the Radius server. The value
range is 1024 to 65535. The default value is 1812.
Secret Specifies a secret for the Radius server. You can specify
at most 31 characters.
Optional Configuration
Role mapping Specifies a role mapping rule for the server. With this
rule option selected, system will allocate a role for the users
who have been authenticated to the server according to
the specified role mapping rule.
default value is 3.
3. Click OK.
2. Click New > TACACS+ Server, and the TACACS+ Server Configuration page opens.
Port Enter port number for the TACACS+ server. The default
value is 49. The value range is 1 to 65535.
Optional
Role map- Select a role mapping rule for the server. With this option
ping rule selected, system will allocate a role for the users who
have been authenticated to the server according to the
specified role mapping rule.
Connectivity Test
When AAA server parameters are configured, you can test if they are correct by testing server con-
nectivity.
1. Select Configuration Management > Object Configuration > AAA Server, and click New.
2. Select your AAA server type, which can be Radius or TACACS+. The local server does not
need the connectivity test.
4. For Radius or TACACS+ server, enter a username and password in the Test Connectivity
page.
5. Click Test Connectivity. If "Test connectivity success" message appears, the AAA server
settings are correct.
l Connect AAA server timeout: Wrong server address, port or virtual router.
As shown above, User1, User2 and User3 belong to UserGroup1, while User3 also belongs to
UserGroup2, and UserGroup2 also contains User4, User5 and UserGroup1.
1. Select Configuration Management > Object Configuration > User > Local User.
3. Click OK.
Option Description
Name Type the name for the user group into the Name box.
Add Specifies members for the user group. Expand User
or User Group in the Available list, select a user or
user group and click Add to add it to the Selected list
on the right.
One user group can contain multiple users or user
groups, but system only supports up to 12 layers of
nested user groups, and does not support loopback
nest, i.e., a user group should not nest the upper-layer
user group it belongs to.
Remove To delete a selected user or user group, select it in
the Selected list and then click Remove.
3. Click OK.
The system exports the user-list file in .csv format, of which the content is the real-time inform-
ation of the user list in the system.
Export user binding list from system to local, take the following steps:
2. Click Export User List to open the Export User List page, and select the saved position in
local.
The system supports the import of user-list files in UTF-8 or GBK ecoding with .txt and .csv
format.csv format. When the user-list file is imported, the system will carry out validity test and
complexity check of the user password. If the results turn out to be successful, the importing is
successful; if the results turn out to be unsuccessful, the importing is unsuccessful.
The user-list in .csv file is illustrated in the figure below.
1. Select Configuration Management > Object Configuration > User > Local User.
2. Click Import User List to open the Import User List page.
Notes:
l The user password in the import/export file is not encrypted, unless the pass-
word strings match the AES encryption format.
l Please try to keep the import file format consistent with the export file.
l When imported, if the same user name exists under the same server, the ori-
ginal user information will be overwritten.
l When imported, if a user is new to the system, it and its user information will
be added to the system automatically.
l In the imported user-list file, the "username" field should not contain slash/-
comma/double quotation marks/question mark/@; the "group" field should
not contain comma/double quotation marks/question mark.
l In the imported user-list file, the date in the "expire" field should be typed in
the format of DD/MM/YYYY HH:SS.
l If a parameter does not exist, use a half-width comma to replace it, etc.
"123123,,local".
l The sequence of the parameters in the first row is fixed and case-insens-
itive, etc. "Servername,userName,pAssWord".
l The file should not contain blank lines or gibberish lines, or it is not
able be imported successfully.
Synchronizing Users
To synchronize users in a LDAP server, firstly, you need to configure a LDAP server, refer to
Configuring LDAP Server. To synchronize users:
2. Select a server from the LDAP Server drop-down list, and click Sync Users.
Notes: By default, after creating a LDAP server, system will synchronize the users
of the LDAP server automatically, and then continue to synchronize every 30
minutes.
Synchronizing Users
To synchronize users in an AD server to the device, first you need to configure an AD server
,refer to Configuring Active Directory Server. To synchronize users, take the following steps:
1. Select Configuration Management > Object Configuration > User >AD User.
2. Select an AD server from the Active Directory Server drop-down list, and click Sync Users.
1. Select Configuration Management > Object Configuration > User > IP-User Binding.
User Select a user for the binding from the drop-down list.
Binding Type
Binding Type By specifying the binding type, you can bind the user
to a IP address or MAC address.
3. Click OK.
Import Binding
1. Select Configuration Management > Object Configuration > User > IP-User Binding.
To export a user binding list from system to local, take the following steps:
1. Select Configuration Management > Object Configuration > User > IP-User Binding.
2. Select the exported user category(include local, LDAP, AD and all users) in the Export
drop-down list to pop up the export dialog box, and select the saved position in local.
l Role-based policy rules: Implements access control for users of different types.
l Role-based statistics: Collects statistics on bandwidth and sessions for users of different
types.
Configuring a Role
Creating a Role
1. Select Configuration Management > Object Configuration > Role > Role.
2. Click New.
Option Description
Role Name Type the role name into the Role Name box.
Description Type the description for the role into the Description
box.
3. Click OK.
You can map the role to user, user group, CN or OU through this function or Creating a Role Map-
ping Rule. After Creating a Role Mapping Rule, you can click Mapping To to map the selected
role again.
To map the selected role again, take the following steps:
3. In the Mapping name section, select a created mapping rule name from the first drop-down
list ( For detailed information of creating a role mapping role, see Creating a Role Mapping
Rule.), and then select a user, user group, certificate name (the CN field of USB Key cer-
tificate), organization unit (the OU field of USB Key certificate) or any from the second
drop-down list. If User, User group, CN or OU is selected, also select or enter the cor-
responding user name, user group name, CN or OU into the box behind.
5. If needed, repeat Step 3 and Step 4 to add more mappings. To delete a role mapping, select
the role mapping you want to delete from the mapping list, and click Delete.
6. Click OK.
1. Select Configuration Management > Object Configuration > Role > Role Mapping.
2. Click New.
4. In the Member section, select a role name from the first drop-down list, and then select a
user, user group, certificate name (the CN field of USB Key certificate) or organization unit
(the OU field of USB Key certificate) from the second drop-down list. If User, User group,
CN or OU is selected, also select or enter the corresponding user name, user group name,
CN or OU into the box behind.
6. If needed, repeat Step 4 and Step 5 to add more mappings. To delete a role mapping, select
the role mapping you want to delete from the mapping list, and click Delete.
7. Click OK.
1. Select Configuration Management > Object Configuration > Role > Role Combination.
2. Click New.
Option Description
First Prefix Specifies a prefix for the first role in the role regular
expression.
First Role Select a role name from the First Role drop-down list to
specify a name for the first role in the role regular expres-
sion.
Second Pre- Specifies a prefix for the second role in the role regular
fix expression.
Second Role Select a role name from the Second Role drop-down list
to specify a name for the second role in the role regular
expression.
Result Role Select a role name from the Result Role drop-down list to
specify a name for the result role in the role regular
expression.
3. Click OK.
2. Click New.
Option Description
When critical assets or businesses are under attack, you can block the network of critical assets at
once. After clearing the attack, you can also connect with one-click to restore the previous net-
2. Select one or more critical asset item in the list, and click Block to disconnet network.
Option Description
Threshold Type the threshold for the track object into the text box. If
the sum of weights for failed entries in the track object
exceeds the threshold, system will conclude that the whole
track object fails.
Track Type Select a track object type. One track object can only be con-
figured with one type. Select Interface radio button:
from which
HTTP/ICMP/ICMPv6/ARP/NDP/DNS/TC-
P packets are sent.
is 255.
3. Click OK.
Administrators
Device administrators of different roles have different privileges. The system supports pre-
defined administrator roles and customized administrator roles. By default, the system supports
the following administrators, which cannot be deleted or edited:
l Administrator: Permission for reading, executing and writing. This role has the authority over
all features. You can view the current or historical configuration information.
l Administrator(read-only): Permission for reading and executing. You can view the current or
historical configuration information.
l Operator: You have the authority over all features except modify the Administrator's con-
figuration, and no permission for check the log information.
l Auditor: You can only operate on the log information, including view, export and clear.
Notes:
l The device ships with a default administrator named hillstone. You can
modify the setting of hillstone. However, this account cannot be deleted.
l System auditor can manage one or multiple logs, while only system admin-
istrator can manage the log types.
1. Select Configuration Management > System Configuration > Device Management >
Administrators.
2. Click New.
Option Description
Role From the Role drop-down list, select a role for the
administrator account. Different role have different
privilege.
Password Type a login password for the admin into the Password
box. The password should meet the requirement of Pass-
word Strategy.
Confirm Pass- Re-type the password into the Confirm Password box.
word
Login Type Select the access method(s) for the admin, including Con-
sole, Telnet, SSH, HTTP and HTTPS. If you need all
access methods, select Select All.
4. Click OK. The newly-created administrator account will be displayed in the list.
System has a default administrator "hillstone" and a default password "hillstone". However, there
is a risk that the default username and password may be cracked. To avoid that risk, when you
logs in with the default username and password, the system will prompt the following inform-
ation:
l Delete Default Administrator: Click the Delete Administrator radio button to delete the
default administrator (hillstone), and then specify a new username , password and other
l Ignore Once: Click the Ignore Once radio button, and you will immediately log in with the
default username (hillstone) and password (hillstone). You will be prompted again when log in
with the default username and password next time.
Notes: In the HA Active-Passive (A/P) mode, the backup device does not support
this function, and you can log in with the default username and password.
Device administrators of different roles have different privileges. The system supports pre-
defined administrator roles and customized administrator roles. The pre-defined administrator role
cannot be deleted or edited. You can customize administrator roles according to your require-
ments:
To create a new administrator role, take the following steps:
1. Select Configuration Management > System Configuration > Device Management >
Admin Roles.
2. Click New.
Option Description
WebUI Priv- Click module name to set the administrator role's priv-
ilege ilege. represents the administrator role does not have
Trusted Host
The device only allows the trusted host to manage the system to enhance the security. Admin-
istrator can specify an IP range, MAC address or MAC range, and the hosts in the specified range
are the trusted hosts. Only trusted hosts could access the management interface to manage the
device.
1. Select Configuration Management > System Configuration > Device Management > Trus-
ted Host.
2. Click New.
Option Description
Match Select the address type to match the trusted host. When
Address "IPv4" is selected, you need to specify the IP range, and
Type only the hosts in the IP range can be the trusted hosts;
when "IPv4&MAC" is selected, you need to specify the
IP range or MAC address/range, and only the hosts in the
specified IP range and MAC range can be the trusted
hosts.
Login Type Select the access methods for the trusted host, including
Telnet, SSH, HTTP and HTTPS.
4. Click OK.
Management Interface
The device supports the following access methods: Console, Telnet, SSH and WebUI. You can
configure the timeout value, port number, PKI trust domain of HTTPS,and PKI trust domain of
certificate authentication. When accessing the device through Telnet, SSH, HTTP or HTTPS, if
login fails three times in one minute, the IP address that attempts the login will be blocked for 2
minutes during which the IP address cannot connect to the device.
To configure the access methods, take the following steps:
1. Select Configuration Management > System Configuration > Device Management > Man-
agement Interface.
Option Description
3. Click OK.
Notes: When changing HTTP port, HTTPS port or HTTPS Trust Domain, the web
server will restart. You may need to log in again if you are using the Web interface.
System Time
You can configure the current system time manually, or synchronize the system time with the
NTP server time via NTP protocol.
1. Select Configuration Management > System Configuration > Device Management > Sys-
tem Time.
Option Description
Sync with Specify the method of synchronize with local PC. You
system time. l Time Zone: Select the time zone from the drop-
down list.
3. Click OK.
Configuring NTP
The system time may affect the establishment time of VPN tunnel and the schedule, so the accur-
acy of the system time is very important. To ensure the system is able to maintain an accurate
time, the device allows you to synchronize the system time with a NTP server on the network via
NTP protocol.
To configure NTP, take the following steps:
1. Select Configuration Management > System Configuration > Device Management > Sys-
tem Time.
2. Under NTP Configuration in the System Time tab, configure the followings.
NTP Server Specifies the NTP server that device need to syn-
chronize with. You can specify at most 3 servers.
Sync Interval Type the interval value. The device will synchronize
the system time with the NTP server at the interval
you specified to ensure the system time is accurate.
Time Offset Type the time value. If the time difference between the
system time and the NTP server's time is within the
3. Click OK.
NTP Key
After enabling NTP Authentication function, you need to configure MD5 key ID and keys. The
device will only synchronize with the authorized servers.
1. Select Configuration Management > System Configuration > Device Management > NTP
Key.
2. Click New.
Option Description
Key ID Type the ID number into the Key ID box. The value
range is 1 to 65535.
Password Type a MD5 key into the Password box. The value
range is 1 to 31.
Confirm Pass- Re-type the same MD5 key you have entered into the
word Confirm box.
4. Click OK.
Option
Specify system options, including system language, administrator authentication server, host
name, password strategy and reboot.
To change system option, take the following steps:
1. Select Configuration Management > System Configuration > Device Management >
Option
Option Description
Hostname Type a host name you want to change into the Host-
name box.
Lock IP
count of login IP. The value range is from 0 to 256. The default value
attempts is 256.
Locking Time Specify the locking time of the lock IP. The value range
is 1 to 65535 minutes, and the default value is 2
minutes.
Lock Account
Locking Time Specify the locking time of the lock account. The value
range is 1 to 65535 minutes, and the default value is 2
minutes.
Failure Feed- Click the Enable button. When errors occurred, system
back will automatically send the exception information to
Hillstone.
3. Click OK.
Some operations like license installation or image upgrading will require the system to reboot
before it can take effect.
To reboot a system, take the following steps:
1. Select Configuration Management > System Configuration > Device Management >
Option.
2. Select the System Option tab, click Reboot, and select Yes in the prompt.
3. The system will reboot. You need to wait a while before it can start again.
System Debug
System debugging helps you to diagnose and identify system errors by the exported file.
1. Select Configuration Management > System Configuration > Device Management >
Option.
2. Select the System Option tab, click Export, and then system will pack the file in /etc/-
local/core and prompt to save tech-support file. After selecting the saved location and click
OK, you can export the file successfully.
Storage Management
The storage management function help you manage system storage space by deleting logs or stop-
ping logging.
To configure the storage management function, take the following step:
1. Select Configuration Management > System Configuration > Device Management > Stor-
age Management.
Option Description
Threshold When the system storage ratio or storage space reaches the specified
threshold, the system will perform the specified action to control the sys-
tem storage. The storage ratio ranges from 1% to 90%.
Threshold Alarm When the system storage ratio or storage space reaches the specified
threshold, the system will record a log message.
Action When reached the specified threshold, the system will perform the spe-
cified action, including override the earliest data and stop recording data.
l Override the earliest data: The system will delete earliest logs.
l Stop recording data: The system will stop storing new logs.
Custom Storage
View Current Show the Total Storage, Allocated Storage and Utilization. Click View
Storage Status Current Storage Status to view maximum storage space and utilization of
each module log and report files.
Report Storage Specify the disk space size of the report file. The system allocates a
Setting default disk space size for the report file, and you can customize the disk
space size for the report file as needed.
Log Storage Set- Click Enable button to specify the disk space size of each module log.
ting The system allocates a default disk space size for the log of each module,
and you can customize the disk space size for the log as needed.
1. Select Configuration Management > System Configuration > Configuration File Man-
agement > Configuration File List.
l Compare: Click Compare, and in the Configuration File Compare page, configure the
first file and the second file to be compared respectively. Click Compare, and the dif-
ference between the two files will be displayed below.
l Export: Select the configuration file you want to export, and click Export.
l Delete: Select the configuration file you want to delete, and click Delete.
l Backup Restore: You can restore the system configurations to the saved configuration
Option Description
Notes: Device will be restored to factory defaults. Meanwhile, all the system con-
figurations will be cleared, including backup system configuration files.
1. Select Configuration Management > System Configuration > Configuration File Man-
agement > Current Configurations.
SNMP Agent
The device is designed with a SNMP Agent, which provides network management and monitors
the running status of the network and devices by viewing statistics and receiving notification of
important system events.
To configure an SNMP Agent, take the following steps:
1. Select Configuration Management > System Configuration > SNMP > SNMP Agent.
2. Click Enable button. In the SNMP Agent page, configure these values.
SNMP Agent Click the Enable button to enable the SNMP Agent func-
tion.
Location Type the location of the device into the Location box.
Host Port Type the port number of the managed device into the
Host Port box.
Local Type the SNMP engine ID into the Local EngineID box.
EnginelID
3. Click Apply.
SNMP Host
1. Select Configuration Management > System Configuration > SNMP > SNMP Host.
2. Click New.
Type Select the SNMP host type from the Type drop-down
list. You can select IP Address, IP Range or IP/Net-
mask.
SNMP Ver- Select the SNMP version from the SNMP Version drop-
sion down list.
Community Type the community for the SNMP host into the Com-
munity box. Community is a password sent in clear text
between the manager and the agent. This option is only
effective if the SNMP version is V1 or V2C.
Permission Select the read and write permission for the com-
munity from the Permission drop-down list. This
option is only effective if the SNMP version is V1 or
V2C.
information.
4. Click OK.
Trap Host
1. Select Configuration Management > System Configuration > SNMP > Trap Host.
2. Click New.
Trap Host Type the port number for the Trap host into the Trap
Port Host Port box.
SNMP Agent Select the SNMP version from the SNMP Agent drop-
down list.
4. Click OK.
V3 User Group
SNMPv3 protocol introduces a user-based security module. You need to create an SNMP V3 user
group for the SNMP host if the SNMP version is V3.
To create a V3 user group, take the following steps:
1. Select Configuration Management > System Configuration > SNMP > V3 User Group.
2. Click New.
Option Description
Name Type the SNMP V3 user group name into the Name
box.
Security Select the security level for the user group from the
Read View Select the read-only MIB view name for the user group
from the Read View drop-down list. If this parameter is
not specified, all MIB views will be none.
Write View Select the write MIB view name for the user group from
the Write View drop-down list. If this parameter is not
4. Click OK.
V3 User
If the selected SNMP version is V3, you need to create an SNMP V3 user group for the SNMP
host and then add users to the user group.
To create a user for an existing V3 user group, take the following steps:
1. Select Configuration Management > System Configuration > SNMP > V3 User.
2. Click New.
Name Type the SNMP V3 user name into the Name box.
V3 User Select an existing user group for the user from the
Group Group drop-down list.
4. Click OK.
Upgrading Firmware
1. Select Configuration Management > System Configuration > Upgrade Management >
Upgrade Firmware.
Upgrade Firmware
Backup Con- Make sure you have backed up the configuration file
figuration before upgrading. Click Backup Configuration File to
File backup the current fireware file and the system will auto-
matically redirect the Configuration File Management
page after the backup.
sion
Upload Firm- Click Browse to select a firmware file from your local
ware disk.
Reboot Select the Reboot now to make the new firmware take
effect check box and click Apply to reboot system and
make the firmware take effect. If you click Apply without
selecting the check box, the firmware will take effect
after the next startup.
Select the Select the firmware that will take effect for the next star-
firmware that tup.
will take
effect for the
next startup.
Reboot Select the Reboot now to make the new firmware take
effect check box and click Apply to reboot system and
make the firmware take effect. If you click Apply without
selecting the check box, the firmware will take effect
after the next startup.
Option Description
Local Update Click Browse and select the signature file in your local
PC, and then click Upload.
To ensure that the root certificates stored on your device are sufficient and up-to-date, and to
reduce errors occurred during server certificate verification, you need to update the trusted root
certificate database timely. System supports both remote upgrade and local upgrade. When updat-
ing the trusted root certificate database, system will delete revoked certificates and expired cer-
tificates, and add new certificates.
To update the trusted root certificate database, take the following steps:
Option Description
Local Update Click Local Update, and click Browse to select a trusted
root certificate database file in your local PC, and then
click Upload.
Platform Trial Platform license is the basis of the You cannot modify
other licenses operation. If the plat- the existing con-
form license is invalid, the other figuration when the
licenses are not effective. license expired. Sys-
The device have been pre-installed tem will restore to
platform trial license for 15 days in factory defaults
the factory. when the device
reboot.
Before you apply for a license, you have to generate a license request first.
2. Click Apply For. Under License Request, input user information. All fields are required.
Installing a License
Option Description
Manual Input Select Manual Input. Type the license string into the box.
3. Click OK.
6. System will reboot. When it starts again, installed license(s) will take effect.
Name Type a name for the mail server into the box.
Server Type Domain name or IP address for the mail server into
the box.
Port Type the port number for the mail server into the box.
The range is 1 to 65535. The default port number is dif-
ferent for different transmission modes, PLAIN: 25,
STARTTLS: 25, SSL: 465.
Virtual From the Virtual Router drop-down list, select the Vir-
Router tual Router for the SMTP server.
3. Click Apply.
Extended Services
This feature may vary slightly on different platforms. If there is a conflict between this guide and
the actual page, the latter shall prevail.
System supports to connect to other Hillstone products to provide more services. Currently, the
extended services include connecting Hillstone Security Management (HSM) and Hillstone
Cloud. For specific configurations, refer to one of the following topics:
l Connecting to HSM
Hillstone Security Management (HSM) is a centralized management platform to manage and con-
trol multiple Hillstone devices and it supports device monitoring, upgrade management, and log
viewing.
Each device of S series has an HSM module inside it. When the device is configured with correct
HSM parameters, it can connect to HSM and be managed by HSM.
For more information about HSM, please refer to Hillstone Security Management User Guide.
HSM normally is deployed in one of the two scenarios: installed in public network or in private
network:
l Installed in public network: HSM is remotely deployed and connected to managed devices via
Internet. When the HSM and managed devices have a accessible route, the HSM can control
the devices.
Connecting to HSM
3. Input HSM server's IP address in the Sever IP/Domain text box. The address cannot be
0.0.0.0 or 255.255.255.255, or mutlicast address.
6. The Syslog Server part shows the HSM server's syslog server and its port.
This feature may not be available on all platforms. Please check your system's actual page if your
device delivers this feature.
Cloud·View is a SaaS products of security area and a cloud security services platform in the
mobile Internet era. Cloud·View deployed in the public cloud, to provide users with online on-
demand services. Users can get convenient, high quality and low cost value-added security ser-
vices through the Internet, APP, and get a better security experience.
After the Hillstone device is properly configured to connect the Cloud ·View , you can achieve
the Hillstone device registration to the public cloud and the connection with the Cloud ·View,
and then to achieve the Cloud ·View remote monitoring device.
When using the Cloud·View, the device needs to connect to the Cloud·View server.
3. Enter the URL of the Cloud·View server. The default configuration is cloud.hill-
stonenet.com.cn.
7. Select Threat Event to upload the threat events detected by Hillstone device.
9. Click Emergency response and select One-click Disconnect to permit Cloudview one-click
disconnect or reconnect Internet. Meanwhile, you can click Critical Assets to jump to the
critical assets page and disconnect or reconnect critical assets with internet via WebUI.
10. Select whether to join the Hillstone could security program. This program will upload the
threat prevention data to cloud intelligence server. The uploaded data will be used for
internal research to reduce false positives and to achieve better protection of the equipment.
When critical assets or businesses are under attack, you can disconnect their businesses from the
Internet temporarily with this function in the CloudView APP to minimize the losses.
After registered to the CloudView, the device will periodically report the critical assets inform-
ation to the cloud, and display some of configurations (such as protocol type, IP port and number
of connections), running status, statistics, etc., of critical assets in the APP.
To configure one-click disconnection, take the following the steps:
2. Click Emergency response and select One-click Disconnect, and click OK.
3. Open CloudView on your mobile phone. You can scan the QR code on the page to down-
load the CloudView APP.
4. Enter the username (for example: [email protected]) and password of your CloudView
account.
5. Click the Monitor module, and the registered device will be displayed on the Monitor page.
6. Click the device, and select the One-click Disconnection tab to display all critical assets
under the device and their status.
7. Click Enable to disconnect the selected critical assets with one click, or disconnect critical
assets in batch.
8. If necessary, click Disable to resume traffic forwarding for the down critical assets.
Send Object
This feature may not be available on all platforms. Please check your system's actual page to see if
your device delivers this feature.
After configuring the alarm rules, system will report the warning events to the recipient by send-
ing a warning email or message. In the Send Object page, configure the recipient information.
1. Click Configuration Management > System Configuration > Alarm Rule > Send Object
2. Click New.
Option Description
In the Relevant Warning Rules window, you can view the warning rules that relate to a selected
recipient after selecting recipients.
l Active-Passive (A/P) mode: In the HA cluster, configure two devices to form an HA group,
with one device acting as a primary device and the other acting as its backup device. The
primary device is active, forwarding packets, and meanwhile synchronizes all of its network
and configuration information and current session information to the backup device. When
the primary device fails, the backup device will be promoted to primary and takes over its
work to forward packets. This A/P mode is redundant, and features a simple network struc-
ture for you to maintain and manage.
l Peer mode: the Peer mode is a special HA Active-Active mode. In the Peer mode, two
devices are both active, perform their own tasks simultaneously, and monitor the operation
status of each other. When one device fails, the other will take over the work of the failure
device and also run its own tasks simultaneously. In the Peer mode, only the device at the act-
ive status can send/receive packets. The device at the disabled status can make two devices
have the same configuration information but its interfaces do not send/receive any packets.
The Peer mode is more flexible and is suitable for the deployment in the asymmetric routing
environment.
HA Cluster
For the external network devices, an HA cluster is a single device which handles network traffic
and provides security services. The HA cluster is identified by its cluster ID. After specifying an
HA cluster ID for the device, the device will be in the HA state to implement HA function.
HA Group
System will select the primary and backup device of the same HA group ID in an HA cluster
according to the HCMP protocol and the HA configuration. The primary device is in the active
state and processes network traffic. When the primary device fails, the backup device will take
over its work.
When assigning a cluster ID to the device, the HA group with ID 0 will be automatically created.
In Active-Passive (A/P) mode, the device only has HA group 0.
In the HA environment, each HA group has an interface to forward traffic, which is known as the
Virtual Forward Interface. The primary device of each HA group manages a virtual MAC (VMAC)
address which is corresponding with its interface, and the traffic is forwarded on the interface. Dif-
ferent HA groups in an HA cluster cannot forward data among each other. VMAC address is
defined by HA cluster ID, HA group ID and the physical interface index.
HA Selection
In an HA cluster, if the group ID of the HA devices is the same, the one with higher priority will
be selected as the primary device.
HA Synchronization
To ensure the backup device can take over the work of the primary device when it fails, the
primary device will synchronize its information with the backup device. There are three types of
information that can be synchronized: configuration information, files and RDO (Runtime
Dynamic Object). The specific content of RDO includes:
l ARP table
l DHCP information
l MAC table
System supports two methods to synchronize: real-time synchronization and batch syn-
chronization. When the primary device has just been selected successfully, the batch syn-
chronization will be used to synchronize all information of the primary device to the backup
device. When the configurations change, the real-time synchronization will be used to syn-
chronize the changed information to the backup device. Except for the HA related configurations
and local configurations (for example, the host name), all the other configurations will be syn-
chronized.
4. Configure a HA group. Specify the priority for devices and HA messages parameters.
Option Description
Control link Specifies the name of HA control link interface. The con-
interface 2 trol link interface 2 works as the backup of the control
link interface 1.
Assist link Specifies the name of the HA assist link interface. In the
interface Active-Passive (A/P) mode, you can specify the HA
assist link interface to receive and send heartbeat packets
(Hello packets), and ensure the main and backup device
of HA switches normally when the HA link fails. Note:
Data link Specifies the name of the HA data link interface 1. The
Data link Specifies the name of the HA data link interface 2. The
interface 2 data link interface is used to synchronize the data packet
information. After specifying this data link, the session
information will be synchronized over this data link. You
can configure the physical interface or aggregate interface
as the interface of the data link.
Note: You can specify at most one aggregate interface as
the HA data link interface, or at most two physical inter-
faces as the HA data link interface.
Peer-mode Click the Enable button to enable the HA Peer mode and
specifies the role of this device in the HA cluster. The
range is 0 to 1. By default, the group 0 in the device
whose HA Node ID is 0 will be active and the group 0 in
the device whose HA Node ID is will be in the disabled
status.
Group 0
Priority Specifies the priority for the device. The device with
higher priority (smaller number) will be selected as the
primary device.
Hello interval Specifies the Hello interval value. Hello interval refers to
the interval for the HA device to send heartbeats (Hello
packets) to other devices in the HA group. The Hello
interval in the same HA group must be identical.
Track object Specifies the track object you have configured. The track
object is used to monitor the working status of the
device. Once finding the device stop working normally,
system will take the corresponding action.
2. Click OK.
1. Select Configuration Management > System Configuration > Device Management > Man-
agement Interface.
2. In the Web section, select the Enable check box of Certificate authentication.
3. Select a trust domain from the Certificate Trust Domain drop-down list. You can create a
new in "PKI" on Page 662.
4. Select whether to check the CN field. If enabled, the login username must match the CN
field of the CA certificate.
1. To export the certificate from the device, select Configuration Management > System Con-
figuration > PKI > Trust Domain Certificate.
2. In the Trust Domain Certificate page, select a target trust domain, CA Certificate, and
Export.
Authentication 660
5. In the client, open the Web browser (e.g. IE), select Tools > Internet Options.
7. In the Certificates dialog, click the Trusted Root Certification Authorities tab.
8. Click Import. Import the certificate following the Certificate Import Wizard.
After all configurations, access the HTTPS management address of the device from the Web
browser. The browser pops up a dialog that asks you to select the correct certificate. Then, the
login page appears.
661 Authentication
PKI
PKI (Public Key Infrastructure) is a system that provides public key encryption and digital sig-
nature service. PKI is designed to automate secret key and certificate management, and assure the
confidentiality, integrity and non-repudiation of data transmitted over the Internet. The certificate
of PKI is managed by a public key by binding the public key with a respective user identity by a
trusted third-party, thus authenticating the user over the Internet. A PKI system consists of
Public Key Cryptography, CA (Certificate Authority), RA (Certificate Authority), Digital Cer-
tificate and related PKI storage library.
PKI terminology:
l Public Key Cryptography: A technology used to generate a key pair that consists of a public
key and a private key. The public key is widely distributed, while the private key is known
only to the recipient. The two keys in the key pair complement each other, and the data
encrypted by one key can only be decrypted by another key of the key pair.
l CA: A trusted entity that issues digital certificates to individuals, computers or any other
entities. CA accepts requests for certificates and verifies the information provided by the
applicants based on certificate management policy. If the information is legal, CA will sign
the certificates with its private key and issue them to the applicants.
l RA: The extension to CA. RA forwards requests for a certificate to CA, and also forwards
the digital certificate and CRL issued by CA to directory servers in order to provide dir-
ectory browsing and query services.
l CRL: Each certificate is designed with expiration. However, CA might revoke a certificate
before the date of expiration due to key leakage, business termination or other reasons.
Once a certificate is revoked, CA will issue a CRL to announce the certificate is invalid,
and list the series number of the invalid certificate.
l HTTPS/SSH: PKI applies to the situation where a user accesses a Hillstone device over
HTTPS or SSH.
Authentication 662
Creating a PKI Key
1. Select Configuration Management > System Configuration > PKI > Key.
2. Click New.
Option Description
Label Specifies the name of the PKI key. The name must be
unique.
Key Pair Specifies the type of key pair, either RSA, DSA or SM2.
Type
Key modulus Specifies the modulus of the key pair. The modulus of
RSA and DSA is 1024 (the default value), 2048, 512 or
768 bits, and the modulus of SM2 is 256.
663 Authentication
3. Click OK.
1. Select Configuration Management > System Configuration > PKI > Trust Domain.
2. Click New.
Authentication 664
Option Description
Basic
Subject
665 Authentication
4. Copy this code and send it to CA via email.
5. When you receive the certificate sent from CA. Click Browse to import the certificate.
URL 1-3 The URL address for receiving CRL. At most 3 URLs
are allowed, and their priority is from 1 to 3.
Authentication 666
Certification Revocation List
7. Click OK.
To simplify configurations, you can export certificates (CA or local) and private key (in the format
of PKSC12) to a computer and import them to another device.
To export a PKI trust domain, take the following steps:
1. Select Configuration Management > System Configuration > PKI > Trust Domain Cer-
tificate.
3. Select the radio button of the item you want to export, and click Export.
If you choose PKCS, you need to set up password.
1. Log in the other device, select Configuration Management > System Configuration > PKI
> Trust Domain Certificate.
667 Authentication
3. Select the radio button of the item you want to import, and click Import.
If you choose PKCS, you need to enter the password when it was exported.
System will not detect the PE file whose certification is trusted. To import trust certification of
PE files, take the following steps:
1. Select Configuration Management > System Configuration > PKI > Trusted Root Cer-
tificate.
l Global Fault Detection: Displays all information that matches the search conditions, which
facilitates the viewing of the related information. When there are network issues, you can use
the faults such as certain users/groups, certain IPs, or certain applications as the conditions to
search all information that relates to the faults. Then you can locate the cause of faults fast.
l Packet Path Detection: Detects the packets and shows the detection processes and results to
users by chart and description.
Authentication 668
l Packet Capture Tool: Captures packets in the system. After capturing the packets, you can
export them to your local disk and then analyze them by third-party tools.
l Test Tools: DNS Query, Ping and Traceroute can be used when troubleshooting the network.
This feature may not be available on all platforms. Please check your system's actual page to see if
your device delivers this feature.
Based on the packet process flow, the packet path detection function detects the packets and
shows the detection processes and results to the users with charts and descriptions. This function
can detect the following packet sources: emulation packet, online packet, and imported packet
(system provides the Packet Capture Tool for you that can help you capture the packets).
The detectable packets from different packet sources have different detection measures. System
supports the following measures:
l Emulation packet detection: Emulate a packet and detect the process flow in the system of
this packet.
l Online packet detection: Perform a real-time detection of the process flow of the packets in
system.
l Imported packet detection: Import the existing packets and detect the process flow in system
of the packets.
You can configure the packet path detection configurations and view the detection results in the
report.
Emulation Detection
669 Authentication
1. Select Configuration Management > System Configuration > Diagnostic Tool > Packet
Path Detection.
Option Description
Ingress Inter- Select the ingress interface of the emulation packet from
face the drop-down list.
Authentication 670
Option Description
boxes.
4. Click Start to starts the detection. The system displays the detection flow in the flow chart
and describes the detection process. The flow chart contains all modules the packets passes
in the system. After the detection for a particular module is completed, the status indicator
above the module indicates the detection results.
l Green indicator( ) - Indicates the detection for this module has been passed. Sys-
tem will proceed with the detection. Hover your mouse over this step to view its
introduction.
l Yellow indicator( ) - Indicates the detection for this module has been passed,
but there are potential security risks. System will proceed with the detection.
Hover your mouse over this step to view its introduction and the detection results.
You can click the View Results link to view the detailed detection report.
l Red indicator( ) - Indicates the detection for this module fails to pass. System
has stopped the detection. Hover your mouse over this step to view its intro-
duction and the detection results. You can click the View Results link to view the
detailed detection report. If the failure is caused by the policy rule configurations,
you can click the link in the Policy Rule step to jump to the policy rule con-
figuration page.
5. After the detection is completed, view the detection results in the Detection Result tab.
The detection results include the status indicator and detection result summary. You can
click the View Details link to view the detailed detection report. The meanings of status
indicators are as follows:
671 Authentication
l Green indicator( ) - Indicates the detected source has passed all detection.
l Yellow indicator( ) - Indicates the detected source has passed all detection, but
there are potential security risks in one or more steps. You can click the View
Details link to view the potential risks and advice.
l Red indicator( ) - Indicates not all detection is passed by the detected source.
You can click the View Details link to view the failure reasons and advice.
Online Detection
1. Select Configuration Management > System Configuration > Diagnostic Tool > Packet
Path Detection.
Authentication 672
Configure options as follows.
Option Description
Ingress Inter- Select the ingress interface of the online packet from the
face drop-down list.
Description Enter the description of the online packet in the text box.
673 Authentication
4. Click OK.
5. If needed, specify the detecting duration in the Detecting Duration section. After reaching
the specified duration, system will automatically stop the detection. The default value is 30
minutes
6. If needed, select Capture Packets check box to enable the capture packets function. You
can download the captured packets to a specified directory. Before selecting this check box,
make sure the Packets Capture Tools function is disabled. For more information, see
"Packet Capture Tool" on Page 678.
7. Click Start to start the detection. The system displays the detection process. If errors occurr
during the detection, a flow thumbnail in the area of the flow chart pops up to display the
corresponding errors. After the detection is completed, you can click the flow thumbnail to
view the details. During each detection process, the system can pop up at most six thumb-
nails.
8. After the detection is completed, view the detection results in the Detection Result tab.
The detection results include the status indicator and detection result summary. You can
click the View Details link to view the detailed detection report. About the meanings of
status indicators, view step 3 in Emulation Detection.
Notes: If one of the following situations happens during the detection, the system
will stop the detection.
l Reach the upper limit of the detecting duration. If you do not set the
detecting duration, the detecting duration keeps the default value (30
minutes).
l The total number of errors of the same type reaches 10. For example, the
flow is blocked by the same policy.
Authentication 674
l The total number of errors of different types reaches 5. Errors of different
types mean the errors occurred in different modules or errors occurred in
one module but are different types.
l After selecting the Capture Packets option, the size of the captured packet
file reaches 10M and errors occurred during the detection.
Imported Detection
1. Select Configuration Management > System Configuration > Diagnostic Tool > Packet
Path Detection.
Option Description
Packet Click the Browse button and select the packet file to
import it. The maximum size of the imported packet file
675 Authentication
Option Description
can be 20M.
Ingress Inter- Select the ingress interface of the imported packet from
Advanced
4. Click OK.
5. Click Start to start the detection. The system displays the detection process in the Detec-
tion Process tab. If errors occurred during the detection, a flow thumbnail in the area of the
flow chart pops up to display the corresponding errors. After the detection is completed,
you can click the flow thumbnail to view the details. During each detection process, the sys-
tem can pop up at most six thumbnails.
6. After the detection is completed, view the detection results in the Detection Result tab.
Authentication 676
The detection results include the status indicators and detection result summary. You can
click the View Details link to view the detailed detection report. For the meanings of the
status indicators, view step 3 in Emulation Detection.
Notes: If one of following situations happens during the detection, the system will
stop the detection.
l The total number of errors of the same type reaches 10. For example the
flow is blocked by the same policy.
Detected Sources
The Choose Source page lists all detected sources in the system, including the emulation packet,
online packet, and imported packet.
Click Choose Source. In the Choose Source page, you can then perform the following actions:
l Click Details in the Result column to view the detection report of the detected source.
l Click Export in the Export Packet column to export the detected packet to the desired dir-
ectory.
l Click Edit in the Option column to edit the configurations of the detected source.
677 Authentication
Packet Capture Tool
This feature may not be available on all platforms. Please check your system's actual page to see if
your device delivers this feature.
You can capture packets in the system with multiple capture tasks by Packets Capture Tools.
With one or more packets capture rules in the task, and system will capture packages with mul-
tiple conditions in real time. At the same time, you can view the current captured and lost pack-
ages at any time. The captured packages can be downloaded or exported to a local location and
then viewed through a third-party packet capture tool.
1. Select Configuration Management > System Configuration > Diagnostic Tool > Packet
Capture Tool.
2. Click New.
Option Description
Packet Cap- Click New, and configure the packet capture rules in the
ture Rule
Authentication 678
Option Description
3. Click OK.
4. For each task, click Start button in the Capture Packets column to start capturing packets,
and Start button will change to Capturing. Click the Status to view the current size/number
of packets captured.
5. To stop capturing packets, click Capturing button in the Capture Packets column.
6. After you stop capturing packets or the capturing is completed, click Download at the top-
right corner of the Capture Grid List to save the captured packets to a specified location.
7. You can select one or more file entries, and click Export at the top right corner of the list to
export the package files. The exported grab package files are in compressed format.
8. To clear packet capture data, select a packet capture task and click the Clear Data button.
All files captured under this task will be cleared.
Notes: The system allows you to create at most 5 packets capture tasks.
679 Authentication
Create a Packet Capture Rule
1. Select Configuration Management > System Configuration > Diagnostic Tool > Packet
Capture Tool.
2. Click New.
3. Click New at Package Capture Rule to open the Packet Capture Rule page.
Option Description
Authentication 680
Option Description
4. Click OK.
Notes: A maximum of 8 packet capture rules can be created in the same packet cap-
ture task.
The global configuration items of packet capture vary according to the type of device:
681 Authentication
l For devices with hard disks, you can configure the percentage of the packet capture files to
the total hard disk size.
l For devices without hard disks, you can configure the packet capture file save percent and the
packet capture file save time.
1. Select Configuration Management > System Configuration > Diagnostic Tool > Packet
Capture Tool.
2. Click the Global Configuration button in the upper right corner of the page to open the
Global Configuration page.
3. The global configuration page of the device with hard disk is as follows:
Option Description
Disk Space Enter the percentage of the packet capture file to the
Percent total hard disk size in the text box. The range is 5%-50%.
The default value is 10%.
4. The global configuration page of packet capture for devices without hard disk is as follows:
Authentication 682
Option Description
File Save Per- Enter the maximum percentage of the remaining memory
cent allowed by the packet capture file in the text box, the
range is 5%-50%, and the default value is 10%.
File Save Enter the length of time the packet capture file is saved
Time in the text box, the unit is minutes, the range is 1-1440
minutes, and the default value is 30 minutes.
5. Click OK.
Test Tools
DNS Query, Ping and Traceroute can be used when troubleshooting the network.
DNS Query
To check the DNS working status of the device, take the following steps:
1. Select Configuration Management > System Configuration > Diagnostic Tool > Test
Tools.
3. Click Test, and the testing result will be displayed in the list below.
Ping
683 Authentication
1. Select Configuration Management > System Configuration > Diagnostic Tool > Test
Tools.
3. Click Test, and the testing result will be displayed in the list below.
l The Ping packet response. If there is no response from the target after timeout, it will
print Destination Host Not Response, etc. Otherwise, the response contains
sequence of packet, TTL and the response time.
l Overall statistics, including number of packet sent, number of packet received, per-
centage of no response, the minimum, average and maximum response time.
Traceroute
Traceroute is used to test and record gateways the packet has traversed from the originating host
to the destination. It is mainly used to check whether the network connection is reachable, and
analyze the broken point of the network. The common Traceroute function is performed as fol-
lows: first, send a packet with TTL 1, so the first hop sends back an ICMP error message to indic-
ate that this packet can not be sent (because of the TTL timeout); then this packet is re-sent, with
TTL 2, TTL timeout is sent back again; repeat this process till the packet reaches the destination.
In this way, each ICMP TTL timeout source address is recorded. As the result, the path from the
originating host to the destination is identified. The system supports IPv4 and IPv6 peer
addresses.
To test and record gateways the packet has traversed by Traceroute, take the following steps:
1. Select Configuration Management > System Configuration > Diagnostic Tool > Test
Tools.
Authentication 684
4. Type an IP address into the Traceroute box.
5. Click Test, and the testing result will be displayed in the list below.
685 Authentication
Chapter 7 CLI
In CLI, you can configure the basic network settings of the device, including the interface set-
tings of ethernet0/0 or MGT0 and the route settings. You can also restore the device to the fact-
ory settings.
Configuring Interfaces
For the device without MGT0 interfaces, you can configure the ethernet0/0. This interface is
bound to the trust zone and its default IP address is 192.168.1.1.
For the device with MGT0 interface, you can configure the MGT0 interface. This interface is
bound to the mgt zone and its default IP address is 192.168.1.1.
In the global configuration mode, use the following command to enter into the interface con-
figuration mode.
interface ethernet0/0 or interface MGT0
In the interface configuration mode, use the command below to bind the interface to a layer 2
zone or a layer 3 zone. Use the no form to the cancel the settings.
zone zone-name
In the interface configuration mode, use the command below to set the IP address for a interface.
Use the no form to the cancel the settings.
ip address ip-address/mask
Configuring Route
In the global configuration mode, use the command below to add a static route:
l a - Enter a and press Enter to delete all configurations, including the backup system con-
figurations. The database content will not be cleared.
l b - Enter b and press Enter to delete all configurations and database content, including the
backup system configurations, threat logs, reports, and captured packets.
no force-close-bypass
Notes:
During device restart, if the system configuration information is not loaded, the
device is in Bypass state, and the pair of Bypass interfaces can still forward traffic
to each other.
Repairing/Reseting Database
When there is an alarm prompt such as database or data table exception in the WebUI, the data-
base of the device can be repaired or reset by the following command.
l When there is an alarm prompt "data table query exception" on the WebUI interface, it indic-
ates that part of the database tables in system may be damaged. You can repair the database
with the following command in the global mode:
exec database repair
l When there is an alarm prompt "database not started." or "system data is being initialized,
please wait."on the WebUI interface, and the current database file cannot be repaired through
the database repair command, it indicates that the current database file may be damaged ser-
iously. You can reset the database with the following command in the global mode:
exec database reset
Tips: This command will reset all database files, and the device will restart after reset. All data-
base history information will also be cleared. Please be careful.
Notes: It is very easy to cause database damage and historical data loss by forcibly
removing the power cord for shutdown. If you stop using the device, please operate
in strict accordance with the correct shutdown process, that is, first press the power