http://www.3com.com/Part Number TECHD-176 Rev B01Published April 20073Com® X Family Local Security Manager User’s GuideX5 (25-user license) – 3CRTPX5-
Contentsx X Family LSM User’s Guide V 2.5.1
Chapter 4 Firewall84 X Family LSM User’s Guide V 2.5.1Configuring Virtual ServersFor device maximum configurable values, see “Appendix D‚ “Devi
Web FilteringX Family LSM User’s Guide V 2.5.1 85Configure a Virtual Server and Provide One-to-One NATSTEP 1 From the LSM menu, select Firewall >
Chapter 4 Firewall86 X Family LSM User’s Guide V 2.5.1used to determine whether a Web site may be accessed or not. You must specify all rules t
Web FilteringX Family LSM User’s Guide V 2.5.1 87STEP 5If there is no pattern match in the URL Block List, the device checks to see if the Web Filter
Chapter 4 Firewall88 X Family LSM User’s Guide V 2.5.1If you create a Custom Filter, can select the Create default firewall rule option to auto
Web FilteringX Family LSM User’s Guide V 2.5.1 89For details, see the following topics:• “Web Filter General Configuration Parameters” on page 89• “C
Chapter 4 Firewall90 X Family LSM User’s Guide V 2.5.1STEP 3In the Filtering Action table, configure the behavior for web filter events. This c
Web FilteringX Family LSM User’s Guide V 2.5.1 91in a variety of languages (65 languages) from over 200 countries.Web sites are classified into two m
Chapter 4 Firewall92 X Family LSM User’s Guide V 2.5.1STEP AClear the check box next to a category name to allow access. To block access, check
Web FilteringX Family LSM User’s Guide V 2.5.1 93You can complete the following tasks from the Custom Filter List page:• Enable/disable Manual URL fi
X Family LSM User’s Guide V 2.5.1 xiAbout This GuideExplains who this guide is intended for, how the information is organized, where information updat
Chapter 4 Firewall94 X Family LSM User’s Guide V 2.5.1STEP 3Create and add the URL patterns to the Permit/Block lists:STEP AIn the Add URL Patt
Web FilteringX Family LSM User’s Guide V 2.5.1 95Regular expression pattern matching enables you to enter regular expressions into the Permit/Block l
Chapter 4 Firewall96 X Family LSM User’s Guide V 2.5.1URL TestUse the URL Test dialog to determine if a URL is covered by one of Web Filter Ser
5X Family LSM User’s Guide V 2.5.1 97Events: Logs, Traffic Streams, ReportsThe Events section describes the logs, views and reports available to monit
Chapter 5 Events: Logs, Traffic Streams, Reports98 X Family LSM User’s Guide V 2.5.1OverviewThe Events menu pages of the LSM allow you to monit
LogsX Family LSM User’s Guide V 2.5.1 99Log MaintenanceThe X family device maintains two files for each log: a historical log file and a current log
Chapter 5 Events: Logs, Traffic Streams, Reports100 X Family LSM User’s Guide V 2.5.1Audit LogThe audit log tracks user activity that may have
LogsX Family LSM User’s Guide V 2.5.1 101IPS Block LogThe IPS Block log contains information about packets that have triggered an IPS filter configur
Chapter 5 Events: Logs, Traffic Streams, Reports102 X Family LSM User’s Guide V 2.5.1Firewall Block LogThe Firewall Block Log captures informat
LogsX Family LSM User’s Guide V 2.5.1 103Firewall Session LogFor firewall and web filter permit rules with logging enabled, this log captures informa
About This Guidexii X Family LSM User’s Guide V 2.5.1ConventionsThis guide follows several procedural and typographical conventions to better provide
Chapter 5 Events: Logs, Traffic Streams, Reports104 X Family LSM User’s Guide V 2.5.1VPN LogThe VPN log captures diagnostic messages relating t
LogsX Family LSM User’s Guide V 2.5.1 105System LogThe System Log contains information about the software processes that control the X family device,
Chapter 5 Events: Logs, Traffic Streams, Reports106 X Family LSM User’s Guide V 2.5.1For details on configuring the Syslog Server contact for t
LogsX Family LSM User’s Guide V 2.5.1 107For additional details, refer to the following topics:• “Viewing Logs” on page 107• “Downloading a Log” on p
Chapter 5 Events: Logs, Traffic Streams, Reports108 X Family LSM User’s Guide V 2.5.1Download a LogSTEP 1 On the log page in the Log Functions
LogsX Family LSM User’s Guide V 2.5.1 109Searching a LogSome logs provide a search function to help locate specific entries. This feature is availabl
Chapter 5 Events: Logs, Traffic Streams, Reports110 X Family LSM User’s Guide V 2.5.1Managed StreamsThe Managed Streams menu pages provide opti
Managed StreamsX Family LSM User’s Guide V 2.5.1 111The Blocked Log Entries table displays up to 50 entries. Entries are added when the block event o
Chapter 5 Events: Logs, Traffic Streams, Reports112 X Family LSM User’s Guide V 2.5.1Rate Limited StreamsWhen traffic triggers an IPS filter co
Managed StreamsX Family LSM User’s Guide V 2.5.1 113Search rate-limited streamsSTEP 1 From the LSM menu, select Events > Managed Streams > Rate
ConventionsX Family LSM User’s Guide V 2.5.1 xiiiMenu NavigationThe LSM provides drop-down menu lists to navigate and choose items in the user interf
Chapter 5 Events: Logs, Traffic Streams, Reports114 X Family LSM User’s Guide V 2.5.1From the Quarantined Addresses page, you can:• View and se
Managed StreamsX Family LSM User’s Guide V 2.5.1 115STEP 3Click Search. The Quarantined Addresses table updates with addresses matching the search cr
Chapter 5 Events: Logs, Traffic Streams, Reports116 X Family LSM User’s Guide V 2.5.1HealthThe Health menu pages show the current status and ne
HealthX Family LSM User’s Guide V 2.5.1 117To access the Monitor page, select Events > Health > Monitor, or click Health on the System Summary
Chapter 5 Events: Logs, Traffic Streams, Reports118 X Family LSM User’s Guide V 2.5.1require notification, but this difference only comes into
HealthX Family LSM User’s Guide V 2.5.1 119Module State A description of the current operation state of the module. Possible values: • Active — The m
Chapter 5 Events: Logs, Traffic Streams, Reports120 X Family LSM User’s Guide V 2.5.1Performance/ThroughputTo view the current throughput perfo
ReportsX Family LSM User’s Guide V 2.5.1 121ReportsThe Reports menu provides access to detailed information about the LSM system alert and traffic ac
Chapter 5 Events: Logs, Traffic Streams, Reports122 X Family LSM User’s Guide V 2.5.1STEP 3To update the report data, use the Refresh option. O
ReportsX Family LSM User’s Guide V 2.5.1 123Rate Limit ReportsIn the LSM, you can configure a rate limit action set to define the maximum amount of b
About This Guidexiv X Family LSM User’s Guide V 2.5.1NoteNotes tell you about information that might not be obvious or that does not relate directly
Chapter 5 Events: Logs, Traffic Streams, Reports124 X Family LSM User’s Guide V 2.5.1The following figure shows the Traffic Profile Reports pag
ReportsX Family LSM User’s Guide V 2.5.1 125Traffic Threshold ReportIn the LSM, traffic threshold filters track statistical changes in network traffi
Chapter 5 Events: Logs, Traffic Streams, Reports126 X Family LSM User’s Guide V 2.5.1The Configure Adaptive Filter Events report page provides
ReportsX Family LSM User’s Guide V 2.5.1 127whichever is more recent. Data is added when the firewall session is closed; therefore, a large file tran
Chapter 5 Events: Logs, Traffic Streams, Reports128 X Family LSM User’s Guide V 2.5.1
6X Family LSM User’s Guide V 2.5.1 129NetworkThe Network section describes IP interfaces, security zones, DHCP functionality, routing, and IP address
Chapter 6 Network130 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “Configuration Overview” on page 1
Deployment ModesX Family LSM User’s Guide V 2.5.1 131For additional information, see the following topics:• “Deployment Modes” on page 131• “Network
Chapter 6 Network132 X Family LSM User’s Guide V 2.5.1IP addresses, respectively. The LAN security zone is in one broadcast domain while the DM
Network Port ConfigurationX Family LSM User’s Guide V 2.5.1 133The following figure shows the Port Configuration page:The Port Configuration page pro
Customer SupportX Family LSM User’s Guide V 2.5.1 xvplease take a moment to gather some basic information from your records and from your system befo
Chapter 6 Network134 X Family LSM User’s Guide V 2.5.1Edit Port ConfigurationSTEP 1 From the LSM menu, select Network > Configuration > N
Security Zone ConfigurationX Family LSM User’s Guide V 2.5.1 135Security Zone ConfigurationA security zone is a section of the network which is assoc
Chapter 6 Network136 X Family LSM User’s Guide V 2.5.1The Security Zones page provides the following information about each zone:For additional
Security Zone ConfigurationX Family LSM User’s Guide V 2.5.1 137You can create and edit Security Zones from the Create/Edit Security Zone page. The f
Chapter 6 Network138 X Family LSM User’s Guide V 2.5.1Create or Edit a Security ZoneSTEP 1 From the LSM menu, select Network > Security Zone
Security Zone ConfigurationX Family LSM User’s Guide V 2.5.1 139Configure a Security ZoneSTEP 1 From the LSM menu, select Network > Security Zones
Chapter 6 Network140 X Family LSM User’s Guide V 2.5.1IP InterfacesConfiguration OverviewIP interfaces provide the X family device with the int
IP InterfacesX Family LSM User’s Guide V 2.5.1 141For additional information, see the following topics:• “Managing IP Interfaces” on page 141• “IP Ad
Chapter 6 Network142 X Family LSM User’s Guide V 2.5.1Manage IP InterfacesSTEP 1 From the LSM menu, select Network > Configuration > Inte
IP InterfacesX Family LSM User’s Guide V 2.5.1 143For details on configuring the IP address for each type of interface, see the following topics:• “I
About This Guidexvi X Family LSM User’s Guide V 2.5.1
Chapter 6 Network144 X Family LSM User’s Guide V 2.5.1After you have configured the basic options for the internal IP interface, you can manage
IP InterfacesX Family LSM User’s Guide V 2.5.1 145After you have configured the basic options for the internal IP interface, you can manage the secur
Chapter 6 Network146 X Family LSM User’s Guide V 2.5.1Configure PPTP client on the External IP interfaceSTEP 1 From the LSM menu, select Networ
IP InterfacesX Family LSM User’s Guide V 2.5.1 147Configure L2TP client on the External IP interfaceSTEP 1 From the LSM menu, select Network > Con
Chapter 6 Network148 X Family LSM User’s Guide V 2.5.1Configure PPPoE client on the External IP interfaceSTEP 1 From the LSM menu, select Netwo
IP InterfacesX Family LSM User’s Guide V 2.5.1 149Configure a GRE Tunnel to a Remote DeviceSTEP 1 From the LSM menu, select Network > Configuratio
Chapter 6 Network150 X Family LSM User’s Guide V 2.5.1STEP 4From the Security Zone drop-down list, select the zone you want to add to the IP in
IP InterfacesX Family LSM User’s Guide V 2.5.1 151Using RIP, the device determines the route for network packets based on the fewest number of hops b
Chapter 6 Network152 X Family LSM User’s Guide V 2.5.1STEP 7Select one of the following from the Receive mode drop-down list:• Do not receive u
IP Address GroupsX Family LSM User’s Guide V 2.5.1 153The device supports two multicast protocols. You can configure an IP interface with either or b
1X Family LSM User’s Guide V 2.5.1 1System OverviewThe X family device is a high-speed, comprehensive security system with a browser-based manager ca
Chapter 6 Network154 X Family LSM User’s Guide V 2.5.1IP Address Groups can be used when configuring the following features:• Firewall rules• D
DNSX Family LSM User’s Guide V 2.5.1 155The IP Address Groups page provides the following information about existing groups:Create or Edit IP Address
Chapter 6 Network156 X Family LSM User’s Guide V 2.5.1Obtain DNS Configuration from WAN ConnectionSTEP 1 From the LSM menu, select Network >
RoutingX Family LSM User’s Guide V 2.5.1 157RoutingOverviewThe device provides static and dynamic routing which can be managed and configured from th
Chapter 6 Network158 X Family LSM User’s Guide V 2.5.1The following figure shows the Routing Table page:The Network - Routing Table provides th
RoutingX Family LSM User’s Guide V 2.5.1 159Static RoutesA Static Route defines the gateway to use for a particular network. The device supports the
Chapter 6 Network160 X Family LSM User’s Guide V 2.5.1The Static Routes page provides the following information:Create a Static RouteSTEP 1 Fro
RoutingX Family LSM User’s Guide V 2.5.1 161number of hops between the source and the destination. RIP regularly broadcasts routing information to ot
Chapter 6 Network162 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “Enable RIP Globally” on page 162•
Multicast (IGMP and PIM-DM)X Family LSM User’s Guide V 2.5.1 163For more information on configuring interfaces, see “Enable Bridge Mode on an IP Inte
Chapter 1 System Overview2 X Family LSM User’s Guide V 2.5.1The X family firewall functionality provides service-level, stateful inspection of
Chapter 6 Network164 X Family LSM User’s Guide V 2.5.1This following figure shows the IGMP Setup page:On the IGMP Setup page, the IP Interfaces
Multicast (IGMP and PIM-DM)X Family LSM User’s Guide V 2.5.1 165For additional information, see the following topics:• “Enable IGMP Globally” on page
Chapter 6 Network166 X Family LSM User’s Guide V 2.5.1This following figure shows the PIM-DM Setup page:Enable PIM-DM globallySTEP 1 Check Enab
Default GatewayX Family LSM User’s Guide V 2.5.1 167Default GatewayThe default gateway is the route to which the device will forward any packet whose
Chapter 6 Network168 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “DHCP Server Page” on page 168• “D
DHCP ServerX Family LSM User’s Guide V 2.5.1 169For additional information, see the following topics: • “Release a DHCP Lease” on page 169• “Configur
Chapter 6 Network170 X Family LSM User’s Guide V 2.5.1Enable and Configure the DHCP ServerSTEP 1 From the LSM menu, select Network > DHCP Se
DHCP ServerX Family LSM User’s Guide V 2.5.1 171DHCP RelayDHCP Relay allows DHCP to operate between a DHCP client on one security zone and a DHCP ser
Chapter 6 Network172 X Family LSM User’s Guide V 2.5.1Configuring DHCP RelayYou can configure DHCP Relays from the DHCP Relay page (Network >
DHCP ServerX Family LSM User’s Guide V 2.5.1 173Configure DHCP Relay as a Central DHCP Relay in the Main OfficeSTEP 1 From the LSM menu, select Netwo
X Family DeviceX Family LSM User’s Guide V 2.5.1 3usage policy by prohibiting the download of non-work related web sites and offensive or illegal Web
Chapter 6 Network174 X Family LSM User’s Guide V 2.5.1Configure the DHCP Relay Mode as Remote VPN Relay AgentSTEP 1 From the LSM menu, select N
DHCP ServerX Family LSM User’s Guide V 2.5.1 175The following figure shows the DHCP Static Reservations page:The Current Reservations table provides
Chapter 6 Network176 X Family LSM User’s Guide V 2.5.1Network ToolsThe LSM provides the following network tools:• DNS Lookup — a network tool t
Network ToolsX Family LSM User’s Guide V 2.5.1 177DNS LookupUse the DNS Lookup tool to find the IP address for a given DNS name. DNS lookup can be us
Chapter 6 Network178 X Family LSM User’s Guide V 2.5.1From the Traffic Capture page, you can:• View and manage existing packet capture files.To
Network ToolsX Family LSM User’s Guide V 2.5.1 179STEP 4If required, configure any of the following options:• Inter Packet Interval —the number of se
Chapter 6 Network180 X Family LSM User’s Guide V 2.5.1STEP 4Configure any of the following options:• First Hop — you can choose which is the fi
7X Family LSM User’s Guide V 2.5.1 181VPNThe VPN section provides an overview of Virtual Private Networks and describes how they are implemented.Overv
Chapter 7 VPN182 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “About VPN” on page 182• “IPSec Config
About VPNX Family LSM User’s Guide V 2.5.1 183• Authentication establishes the identity of a remote user or device to verify that they have permissio
3Com Corporation 350 Campus Drive Marlborough, MA 01752-3064Copyright © 2005–2007, 3Com Corporation and its subsidiaries. All rights reserved. No par
Chapter 1 System Overview4 X Family LSM User’s Guide V 2.5.1When the X family device is installed and configured, it protects your network zone
Chapter 7 VPN184 X Family LSM User’s Guide V 2.5.1STEP 3For client-to-site VPNs, determine whether you will use the PPTP, L2TP, or L2TP over IP
IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 185The following figure shows the IPSec Status page:From this page, you can complete the followi
Chapter 7 VPN186 X Family LSM User’s Guide V 2.5.1Status The current status of the connection:Phase 1: Idle — Phase 1 negotiation has not start
IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 187IPSec ConfigurationUse the IPSec Configuration page (VPN > IPSec Status, IPSec Configurati
Chapter 7 VPN188 X Family LSM User’s Guide V 2.5.1IPSec Configuration Parameters and IP Security Association DetailsThe following table describ
IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 189Enable and Configure IPSec Global SettingsSTEP 1 From the LSM menu, select VPN > IPSec Sta
Chapter 7 VPN190 X Family LSM User’s Guide V 2.5.1STEP 1 IPSec Security Association Setup — configure the Peer ID address, terminated security
IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 191Terminated Security Zone Select the remote security zone on which to terminate the VPN from t
Chapter 7 VPN192 X Family LSM User’s Guide V 2.5.1Manual Setup: These configuration parameters are available if Manual is selected as the Keyin
IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 193Tunnel SetupLocal Networks Select one of the following methods to determine what local traffi
2X Family LSM User’s Guide V 2.5.1 5LSM NavigationLSM Navigation describes the LSM interface, how to log in, and the general sections of the applicati
Chapter 7 VPN194 X Family LSM User’s Guide V 2.5.1For details on configuring IPSec Security Associations, see the following topics:• “IPSec Sec
IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 195STEP 7Click Save to save the configuration.Click Cancel to return to the IPSec Configuration
Chapter 7 VPN196 X Family LSM User’s Guide V 2.5.1The same pre-shared key must be configured on the remote device establishing a VPN tunnel wit
IPSec ConfigurationX Family LSM User’s Guide V 2.5.1 197STEP AIn the Tunnel Setup, check Enable IPSec Tunnel connections.STEP BIn the Local Networks
Chapter 7 VPN198 X Family LSM User’s Guide V 2.5.1Click Cancel to return to the IPSec Configuration page without saving the changes.IKE Proposa
IKE ProposalX Family LSM User’s Guide V 2.5.1 199The following figure shows the IKE Proposals summary page.From this page you can complete the follow
Chapter 7 VPN200 X Family LSM User’s Guide V 2.5.1Configuring IKE ProposalsIKE proposals provide the authentication and encryption methods that
IKE ProposalX Family LSM User’s Guide V 2.5.1 201The following figure shows the Create/Edit IKE Proposal page:For additional information, see the fol
Chapter 7 VPN202 X Family LSM User’s Guide V 2.5.1IKE Proposal Configuration Parameters: Phase 1 and 2The following table describe the IKE Phas
IKE ProposalX Family LSM User’s Guide V 2.5.1 203Lifetime Specify the length of time the security association remains valid before new authentication
Chapter 2 LSM Navigation6 X Family LSM User’s Guide V 2.5.1In addition, you can configure the LSM to communicate using either an HTTP or an HTT
Chapter 7 VPN204 X Family LSM User’s Guide V 2.5.1Options: Enable Aggressive ModeTo enable Aggressive mode, check Enable Aggressive Mode. Aggre
IKE ProposalX Family LSM User’s Guide V 2.5.1 205Delete Phase 2 SA when Phase 1 SA terminatesCheck this option to delete all Phase 2 security associa
Chapter 7 VPN206 X Family LSM User’s Guide V 2.5.1Configure Phase 1 Setup Parameters for an IKE ProposalThe values specified for Phase 1 IKE ne
IKE ProposalX Family LSM User’s Guide V 2.5.1 207STEP 9If you are using Pre-Shared Key with Aggressive Mode:•From the Local ID Type drop-down list, s
Chapter 7 VPN208 X Family LSM User’s Guide V 2.5.1STEP 3To provide enhanced security, check Enable Perfect Forward Secrecy, and then select the
L2TP ConfigurationX Family LSM User’s Guide V 2.5.1 209The following figure shows the L2TP Status page:From this page, you can complete the following
Chapter 7 VPN210 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “L2TP Server Configuration” on page 21
L2TP ConfigurationX Family LSM User’s Guide V 2.5.1 211L2TP ConfigurationEnable L2TP Server and Configure L2TP Client and AddressesEnable L2TP Server
Chapter 7 VPN212 X Family LSM User’s Guide V 2.5.1STEP 7To configure your DNS Servers, either:•Select Device Acts as DNS Relay if you want the
PPTP ConfigurationX Family LSM User’s Guide V 2.5.1 213From this page, you can complete the following tasks:• View current PPTP connections on the de
Logging InX Family LSM User’s Guide V 2.5.1 7STEP 2Enter your Username.STEP 3Enter your PasswordSTEP 4 Click Log On.The LSM validates your account in
Chapter 7 VPN214 X Family LSM User’s Guide V 2.5.1The following figure shows the PPTP Server Configuration page:PPTP Server Configuration Param
PPTP ConfigurationX Family LSM User’s Guide V 2.5.1 215Enable PPTP Server and Configure PPTP Client and AddressesSTEP 1 If you are not using RADIUS t
Chapter 7 VPN216 X Family LSM User’s Guide V 2.5.1
8X Family LSM User’s Guide V 2.5.1 217SystemThe System menu provides options to update and manage TOS and Digital Vaccine packages, configure timekeep
Chapter 8 System218 X Family LSM User’s Guide V 2.5.1For details, see the following sections:• “Update TOS and Digital Vaccine Software” on pag
Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 219The following figure shows the Update page.For additional information, se
Chapter 8 System220 X Family LSM User’s Guide V 2.5.1Rolling Back to a Previous TOS VersionA rollback operation reverts the currently running s
Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 221Perform a Software RollbackSTEP 1 On the Update page in the Current Insta
Chapter 8 System222 X Family LSM User’s Guide V 2.5.1For additional information, see the following:• “Updating the Digital Vaccine (Filters)” o
Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 223When you select the check box, the scheduling fields appear so you can es
Chapter 2 LSM Navigation8 X Family LSM User’s Guide V 2.5.1LSM Screen LayoutThe LSM provides features in two main areas of the browser window:•
Chapter 8 System224 X Family LSM User’s Guide V 2.5.1MB. If the update package that you downloaded is smaller than <number>, proceed to S
Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 225During a graceful shutdown, as during an update or reboot (in the LSM or
Chapter 8 System226 X Family LSM User’s Guide V 2.5.1STEP 1 If necessary, download a software update package from TMC.STEP 2From the LSM menu,
Update TOS and Digital Vaccine SoftwareX Family LSM User’s Guide V 2.5.1 227System SnapshotsFrom the System Snapshots page, you can create, manage, r
Chapter 8 System228 X Family LSM User’s Guide V 2.5.1The following figure shows the System Snapshots page:Figure 8–2: System: System Snapshots
Time OptionsX Family LSM User’s Guide V 2.5.1 229Import a SnapshotSTEP 1 From the LSM menu, select System > Update. Then, click the System Snapsho
Chapter 8 System230 X Family LSM User’s Guide V 2.5.1Use the Time Options page (System > Configuration > Time Options) to configure the t
Time OptionsX Family LSM User’s Guide V 2.5.1 231Internal CMOS ClockSet the Internal CMOS Clock TimeSTEP 1 From the LSM, select System > Configura
Chapter 8 System232 X Family LSM User’s Guide V 2.5.1Configure the X family device for NTP ServersSTEP 1 From the LSM menu, select System >
SMS/NMSX Family LSM User’s Guide V 2.5.1 233From an NMS, you can remotely monitor the events and system status of the X family device. Configuring an
LSM Screen LayoutX Family LSM User’s Guide V 2.5.1 9Main Menu BarThe dark blue bar at the top of the LSM screen provides quick access to basic logon
Chapter 8 System234 X Family LSM User’s Guide V 2.5.1The following figure shows the Configure - SMS and NMS page:Figure 8–4: Configure - SMS an
High AvailabilityX Family LSM User’s Guide V 2.5.1 235STEP 4 Click Apply.View or Configure NMS InformationSTEP 1 From the LSM menu, select System >
Chapter 8 System236 X Family LSM User’s Guide V 2.5.1How High Availability WorksThe following sections describe how high availability works in
High AvailabilityX Family LSM User’s Guide V 2.5.1 237PollingThe High Availability function provides an optional polling feature that can be configur
Chapter 8 System238 X Family LSM User’s Guide V 2.5.1You can configure and manage High Availability from the High Availability page available f
Thresholds to Monitor Memory and Disk UsageX Family LSM User’s Guide V 2.5.1 239STEP AOn the High Availability page in the Communication Channel tab
Chapter 8 System240 X Family LSM User’s Guide V 2.5.1You can specify the following settings for the disk and memory thresholds:• Major Level —
Email ServerX Family LSM User’s Guide V 2.5.1 241Email ServerThe X family device can be configured to send an email message when an IPS filter is tri
Chapter 8 System242 X Family LSM User’s Guide V 2.5.1STEP 7Click Apply.STEP 8 Click Test E m a i l to verify your configuration settings.For
Setup WizardX Family LSM User’s Guide V 2.5.1 243You can also setup the X family devices from an ssh command line using the CLI setup wizard. The CLI
Chapter 2 LSM Navigation10 X Family LSM User’s Guide V 2.5.1NavigationYou can access the available features of the LSM by selecting an option f
Chapter 8 System244 X Family LSM User’s Guide V 2.5.1
9X Family LSM User’s Guide V 2.5.1 245AuthenticationThe Authentication section describes how to create and manage users accounts and configure the Pri
Chapter 9 Authentication246 X Family LSM User’s Guide V 2.5.1OverviewThe LSM Authentication menu pages enable Administrators to create and mana
User ListX Family LSM User’s Guide V 2.5.1 247TOS and Local User AccountsThe X family device has two types of user accounts:A TOS User account provid
Chapter 9 Authentication248 X Family LSM User’s Guide V 2.5.1Username and Password RequirementsRestrictions on username and password values for
User ListX Family LSM User’s Guide V 2.5.1 249Managing User Accounts From the User List menu, you can complete the following tasks:• Create an accoun
Chapter 9 Authentication250 X Family LSM User’s Guide V 2.5.1Create a New User Account in the TOS Authentication DatabaseSTEP 1 From the LSM me
How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 251See “Username and Password R
Chapter 9 Authentication252 X Family LSM User’s Guide V 2.5.1STEP 1 A user logs on to the device to gain access to network resources.To access
How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 253You may choose to use RADIUS
LSM Screen LayoutX Family LSM User’s Guide V 2.5.1 11Content and FunctionalityThe LSM displays all data in the central area of the browser window. As
Chapter 9 Authentication254 X Family LSM User’s Guide V 2.5.1The following figures shows the Privilege Groups page.Privilege Group Parameter De
How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 255STEP 3On the Create/Edit Pri
Chapter 9 Authentication256 X Family LSM User’s Guide V 2.5.1own CA server or use a third-party organization for creating certificates. The sam
How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 257CA CertificatesCA Certificat
Chapter 9 Authentication258 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “X.509 Certificates” on pag
How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 259Certificate Revocation Lists
Chapter 9 Authentication260 X Family LSM User’s Guide V 2.5.1Configure CRL Parameters for a CA CertificateSTEP 1 From the LSM menu, select Auth
How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 261The following figure shows t
Chapter 9 Authentication262 X Family LSM User’s Guide V 2.5.1Managing Certificate RequestsYou can perform the following managment functions fro
How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 263STEP A In the DN Attribute
Chapter 2 LSM Navigation12 X Family LSM User’s Guide V 2.5.1System Summary The System Summary page automatically displays when you first log on
Chapter 9 Authentication264 X Family LSM User’s Guide V 2.5.1The device uses PKCS#12 format for importing Local Certificates with their private
How Local User Authentication Works: RADIUS, Privilege Groups and X.509 CertificatesX Family LSM User’s Guide V 2.5.1 265For additional information,
Chapter 9 Authentication266 X Family LSM User’s Guide V 2.5.1STEP 4Type the Local Certificate File path and filename for the signed local certi
PreferencesX Family LSM User’s Guide V 2.5.1 267The following figure shows the Preferences page used to configure LSM user security settings: Prefere
Chapter 9 Authentication268 X Family LSM User’s Guide V 2.5.1TOS User PreferencesSecurity Level Determines the length and complexity requiremen
PreferencesX Family LSM User’s Guide V 2.5.1 269Set User PreferencesSTEP 1 From the LSM menu, select Authentication > Preferences.The Preferences
Chapter 9 Authentication270 X Family LSM User’s Guide V 2.5.1
A=1AX Family LSM User’s Guide V 2.5.1 271Browser CertificatesDetails creating browser certificates for use in Internet Explorer to ensure notification
Appendix A Browser Certificates272 X Family LSM User’s Guide V 2.5.1Client Authentication MessageThe X family device uses the same HTTPS channe
Security AlertX Family LSM User’s Guide V 2.5.1 273STEP 1 Open Microsoft Internet Explorer (version 6.0 or later).STEP 2Select Tool s > Internet
System SummaryX Family LSM User’s Guide V 2.5.1 13Packet StatsThe Packet Stats section provides basic traffic statistics including the following:• Re
Appendix A Browser Certificates274 X Family LSM User’s Guide V 2.5.1Certificate AuthorityThe following dialog warning displays for a certificat
Security AlertX Family LSM User’s Guide V 2.5.1 275STEP 3Select the Root Authority. Click View Certificate.STEP 4The Certificate Import Wizard opens.
Appendix A Browser Certificates276 X Family LSM User’s Guide V 2.5.1The Certificate Store dialog displays.STEP 5Select the Place all certificat
Security AlertX Family LSM User’s Guide V 2.5.1 277STEP 6Click Finish to install the certificate. The Root Certificate Store indicates the status of
Appendix A Browser Certificates278 X Family LSM User’s Guide V 2.5.1STEP 1 When the warning displays, click View Certificate. The Certificate d
Example - Creating Personal CertificateX Family LSM User’s Guide V 2.5.1 279STEP 5When browsing to the X family device, enter the workstation name in
Appendix A Browser Certificates280 X Family LSM User’s Guide V 2.5.1
BX Family LSM User’s Guide V 2.5.1 281Web Filter ServiceDetailed information about the Filter Service subscription service used to control access to w
Appendix B Web Filter Service282 X Family LSM User’s Guide V 2.5.1Core CategoriesCore Categories are used to classify web sites that contain off
X Family LSM User’s Guide V 2.5.1 283a public or private agency that provides educational information on drug use.GamblingThis Core category includes
ContentsX Family LSM User’s Guide V 2.5.1 iiiContentsAbout This Guide xiTarget Audience xiKnowledge, Skills, and Abilities xiConventions xiiCross
Chapter 2 LSM Navigation14 X Family LSM User’s Guide V 2.5.1For more detailed information about these logs, select Events > Logs.Product Spe
Appendix B Web Filter Service284 X Family LSM User’s Guide V 2.5.1WeaponsThis Core Category includes sites on the following topics:• Instruction
X Family LSM User’s Guide V 2.5.1 285Advertisement•Banner Ad Servers • Pop-Up advertisements •Adware Arts & Entertainment• Museums, galleries, art
Appendix B Web Filter Service286 X Family LSM User’s Guide V 2.5.1Finance & Investment• Web sites that provide stock quotes, stock tickers a
X Family LSM User’s Guide V 2.5.1 287Hobbies & Recreation• Recreational pastimes such as collecting, gardening, kit airplanes • Outdoor recreation
Appendix B Web Filter Service288 X Family LSM User’s Guide V 2.5.1Photo Searches• Sites that provide resources for photo and image searches • On
X Family LSM User’s Guide V 2.5.1 289ShoppingThis Productivity category includes sites on the following topics:• Internet malls and online auctions.•
Appendix B Web Filter Service290 X Family LSM User’s Guide V 2.5.1Each license allows one year of filtering for a specific X family product. Lic
CX Family LSM User’s Guide V 2.5.1 291Log Formats and System MessagesDetails the formats of the downloadable logs and system update status messages.Ov
Appendix C Log Formats and System Messages292 X Family LSM User’s Guide V 2.5.1Log FormatsIn the LSM, you can view all the logs in the GUI. In a
Log FormatsX Family LSM User’s Guide V 2.5.1 293Comp Software component that generated the message:•ALT = Alert Log•BLK = IPS Block LogMessage (Contai
3X Family LSM User’s Guide V 2.5.1 15IPS FilteringLSM Navigation describes the LSM interface, how to log in, and the general sections of the applicati
Appendix C Log Formats and System Messages294 X Family LSM User’s Guide V 2.5.1Audit Log FormatAn example of a comma-delimited Audit Log entry f
Log FormatsX Family LSM User’s Guide V 2.5.1 295Entry_time Date and time of event. YYYY-MM-DD 24H:MI:SSAccess The access-level of the user performing
Appendix C Log Formats and System Messages296 X Family LSM User’s Guide V 2.5.1Firewall Block Log FormatAn example of a comma-delimited Firewall
Log FormatsX Family LSM User’s Guide V 2.5.1 297Message(cont.)Destination IP The destination IP address and port for the session. This represents the
Appendix C Log Formats and System Messages298 X Family LSM User’s Guide V 2.5.1The fields in this table are populated depending on the event bei
Log FormatsX Family LSM User’s Guide V 2.5.1 299VPN Log FormatAn example of a comma-delimited VPN Log entry follows:17,2006-10-05 17:12:31,INFO,VPN,&q
Appendix C Log Formats and System Messages300 X Family LSM User’s Guide V 2.5.1System Log FormatAn example of a comma-delimited System Log entry
Remote Syslog Log FormatX Family LSM User’s Guide V 2.5.1 301Remote Syslog Log Format The remote syslog format for the Alert, IPS Block, and the Firew
Appendix C Log Formats and System Messages302 X Family LSM User’s Guide V 2.5.1High Availability Log MessagesThe High Availability mechanism log
System Update Status MessagesX Family LSM User’s Guide V 2.5.1 303System Update Status MessagesThe LSM provides update status on the progress of the u
Chapter 3 IPS Filtering16 X Family LSM User’s Guide V 2.5.1The default security profile is set to the ANY ==> ANY security zone pair with al
Appendix C Log Formats and System Messages304 X Family LSM User’s Guide V 2.5.1If an error occurs, the information changes. The state displays a
DX Family LSM User’s Guide V 2.5.1 305Device Maximum ValuesDetails the maximum values for X family devices.The following table give the maximum values
Appendix B Device Maximum Values306 X Family LSM User’s Guide V 2.5.1NetworkIP Address Groups 25 200Entries per IP Address Group 50 200Virtual I
FX Family LSM User’s Guide V 2.5.1 307Glossaryaction setAn integral part of an attack or peer-to-peer filter, action sets determine what the X family
Glossary308 X Family LSM User’s Guide V 2.5.1Application ProtectionCategory of filter types that defend against known and unknown exploits that
X Family LSM User’s Guide V 2.5.1 309Digital Vaccine FiltersDigital Vaccine Filters block attacks and other malicious traffic from the network. Filt
Glossary310 X Family LSM User’s Guide V 2.5.1IKE (Internet Key Exchange)Internet Key Exchange (IKE) is used to negotiate the keying material tha
X Family LSM User’s Guide V 2.5.1 311Network Equipment filtersFilters that detect and block the malicious attacks that target equipment accessible th
Glossary312 X Family LSM User’s Guide V 2.5.1attack has gathered data by probing your system and scanning your network, it continues with pointe
X Family LSM User’s Guide V 2.5.1 313Streaming Media filtersStreaming Media filters detect and control traffic from Streaming Media applications that
Security ProfilesX Family LSM User’s Guide V 2.5.1 17Security ProfilesOn the X family device, Security Profiles are used to apply DV filter policies.
Glossary314 X Family LSM User’s Guide V 2.5.1
X Family LSM User’s Guide V 2.5.1 315Aaccess level, user 247action set 307action sets 44Block 45Block + Notify 45Block + Notify + Trace 45
316 X Family LSM User’s Guide V 2.5.1warning xiiirelated documentation xivscreen captures xiiiHhealthAuto Refresh option 267module 118p
X Family LSM User’s Guide V 2.5.1 317resetfilters 35packet statistics 13TCP 45RIP, definition of 312role, user 247rollbackstates, messages
Chapter 3 IPS Filtering18 X Family LSM User’s Guide V 2.5.1In Example 2, a packet going from the LAN zone to the WAN zone matches Security Prof
Security ProfilesX Family LSM User’s Guide V 2.5.1 19Managing Security ProfilesUse the Security Profiles page (IPS > Security Profiles) to create
Chapter 3 IPS Filtering20 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “Security Profile Details” on
Security ProfilesX Family LSM User’s Guide V 2.5.1 21For additional information, see the following topics:• “Create a Security Profile” on page 21• “
Chapter 3 IPS Filtering22 X Family LSM User’s Guide V 2.5.1Settings table, change the global State or Action for a filter Category Group if req
IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 23IPS Digital Vaccine (DV) FiltersTippingPoint IPS Digital Vaccine (DV) Filters are
Contentsiv X Family LSM User’s Guide V 2.5.1 Tabbed Menu Options 11System Summary 12System Status 12Health 12Packet Stats 13Network DHCP 1
Chapter 3 IPS Filtering24 X Family LSM User’s Guide V 2.5.1Filter ComponentsIPS filters have the following components which determine the ident
IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 25Filter Override SettingsFor the best system performance, we recommend that you us
Chapter 3 IPS Filtering26 X Family LSM User’s Guide V 2.5.1View DV FiltersYou can view and manage filters configured for a Security Profile usi
IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 27Filter SearchFilter search provides options to view all filters or only those mat
Chapter 3 IPS Filtering28 X Family LSM User’s Guide V 2.5.1Filter List DetailsThe following table describes the information and functions avail
IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 29For details on viewing filters on the Filter List page, see the following topics:
Chapter 3 IPS Filtering30 X Family LSM User’s Guide V 2.5.1installed on your network. From the LSM, you can modify the filter configuration for
IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 31The following figure shows the Category Settings table.Click Show Advanced Option
Chapter 3 IPS Filtering32 X Family LSM User’s Guide V 2.5.1Edit Individual Filter SettingsSTEP 1 From the LSM menu, click Security Profiles.STE
IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 33On the View Filter page, you can also add or remove the filter from Security Prof
ContentsX Family LSM User’s Guide V 2.5.1 vManaging Firewall Rules 68Configuring Firewall Rules 71Firewall Services 75Firewall Services Page Field
Chapter 3 IPS Filtering34 X Family LSM User’s Guide V 2.5.1Configure Filter Limits/Exceptions based on IP Address Limits and exceptions allow y
IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 35STEP 4In the Application Protection Filter Setting Exceptions section, specify th
Chapter 3 IPS Filtering36 X Family LSM User’s Guide V 2.5.1The Port Scan/Host Sweep Filters (Filter numbers 7000- 7004) available in the Applic
IPS Digital Vaccine (DV) FiltersX Family LSM User’s Guide V 2.5.1 37STEP 3Locate the Port Scan/Host Sweep filters:STEP AClick Search Filters. Then,
Chapter 3 IPS Filtering38 X Family LSM User’s Guide V 2.5.1Traffic Threshold FiltersTraffic threshold filters alert you and the device when net
Traffic Threshold FiltersX Family LSM User’s Guide V 2.5.1 39Managing Traffic Threshold FiltersYou can manage Traffic Threshold filters from the Traf
Chapter 3 IPS Filtering40 X Family LSM User’s Guide V 2.5.1Units The number of selected units per second. The unit values include packets, byte
Traffic Threshold FiltersX Family LSM User’s Guide V 2.5.1 41Create or Edit a Traffic Threshold FilterUse the Create or Edit Traffic Threshold Filter
Chapter 3 IPS Filtering42 X Family LSM User’s Guide V 2.5.1Traffic Threshold Configuration ParametersThe following table describes the Traffic
Traffic Threshold FiltersX Family LSM User’s Guide V 2.5.1 43Configure a Traffic Threshold FilterSTEP 1 From the LSM menu, select IPS > Traffic Th
Contentsvi X Family LSM User’s Guide V 2.5.1 Memory and Disk Usage 117Module Health 118Performance/Throughput 120Port Health 120Reports 121
Chapter 3 IPS Filtering44 X Family LSM User’s Guide V 2.5.1STEP DFor Below Normal Minor, select the Enabled check box, enter a percentage amou
Action SetsX Family LSM User’s Guide V 2.5.1 45in the action set. For example, the user can display a Quarantine web page to notify the user of the p
Chapter 3 IPS Filtering46 X Family LSM User’s Guide V 2.5.1Default Action SetsThe X family device is pre-configured with a collection of defaul
Action SetsX Family LSM User’s Guide V 2.5.1 47Managing ActionsUse the Action Sets page to review, create and modify Action Sets. The following figur
Chapter 3 IPS Filtering48 X Family LSM User’s Guide V 2.5.1Configure an Action SetSTEP 1 From the LSM menu, select IPS > Action Sets. The IP
Action SetsX Family LSM User’s Guide V 2.5.1 49STEP 6Choose one or more Contacts by checking the box next to the appropriate Contact Name. If there a
Chapter 3 IPS Filtering50 X Family LSM User’s Guide V 2.5.1For additional information on configuring Quarantine Action Sets, see the following
Action SetsX Family LSM User’s Guide V 2.5.1 51Configure a Quarantine Action SetSTEP 1 From the LSM menu, click Action Sets. STEP 2On the Action Sets
Chapter 3 IPS Filtering52 X Family LSM User’s Guide V 2.5.1STEP AIn the Allow quarantined hosts to access the following IP address(es) table,
Notification ContactsX Family LSM User’s Guide V 2.5.1 53minute timer starts. The device sends e-mail notifications until the threshold is reached. A
ContentsX Family LSM User’s Guide V 2.5.1 viiMulticast (IGMP and PIM-DM) 163IGMP Setup 163PIM-DM Setup 165Default Gateway 167 DHCP Server 167Over
Chapter 3 IPS Filtering54 X Family LSM User’s Guide V 2.5.1Configure the Remote System Log ContactSTEP 1 From the LSM menu, select IPS > Act
IPS ServicesX Family LSM User’s Guide V 2.5.1 55You cannot delete a Notification Contact if it is currently configured on an Action Set.STEP 3On the
Chapter 3 IPS Filtering56 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “IPS Services Page Details” o
PreferencesX Family LSM User’s Guide V 2.5.1 57PreferencesUse the IPS Preferences page (IPS > Preferences) to configure settings related to the Th
Chapter 3 IPS Filtering58 X Family LSM User’s Guide V 2.5.1Configure Threat Suppression Engine (TSE)On the IPS Preferences page, configure glob
PreferencesX Family LSM User’s Guide V 2.5.1 59Configure Global Settings for the TSESTEP 1 From the LSM menu, select IPS > Preferences.STEP 2On th
Chapter 3 IPS Filtering60 X Family LSM User’s Guide V 2.5.1Adaptive Filter ConfigurationYou can configure the global settings for the Adaptive
PreferencesX Family LSM User’s Guide V 2.5.1 61STEP 3 Select the Log Severity of the system log message that is automatically generated when a filter
Chapter 3 IPS Filtering62 X Family LSM User’s Guide V 2.5.1
4X Family LSM User’s Guide V 2.5.1 63FirewallThe Firewall section describes how to enable, disable, and modify firewall rules and various features usi
Contentsviii X Family LSM User’s Guide V 2.5.1 Updating the TOS Software 224System Snapshots 227Time Options 229Internal CMOS Clock 231NTP S
Chapter 4 Firewall64 X Family LSM User’s Guide V 2.5.1You can view and manage Firewall Rules and configuration options from the Firewall menu p
How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 65STEP 1 The user starts a web browser. The web browser resolves the DNS name fo
Chapter 4 Firewall66 X Family LSM User’s Guide V 2.5.1The firewall rule table is searched from the top of the table to the end (if necessary) l
How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 67For additional information on setting up firewall rules, see the following top
Chapter 4 Firewall68 X Family LSM User’s Guide V 2.5.1The default firewall rules configured for the this-device zone use the LAN security zone.
How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 69The following figure shows the Firewall Rules page.You can complete the follow
Chapter 4 Firewall70 X Family LSM User’s Guide V 2.5.1For additional information, see the following topics:• “Firewall Rules List Details” on p
How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 71Configuring Firewall RulesWhen configuring a firewall rules, you must define t
Chapter 4 Firewall72 X Family LSM User’s Guide V 2.5.1the device. If a local user has not been authenticated, the rule is ignored and lower pri
How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 73STEP GTo record sessions matching this firewall rule in the Firewall Session L
ContentsX Family LSM User’s Guide V 2.5.1 ixSecurity Alert 273Certificate Authority 274Invalid Certificate Name 277Example - Creating Personal Cert
Chapter 4 Firewall74 X Family LSM User’s Guide V 2.5.1To control the rate of traffic flow between zones, configure bandwidth management as foll
How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 75STEP 3On the Edit Firewall Rule page in the Firewall Rule Setup table, click t
Chapter 4 Firewall76 X Family LSM User’s Guide V 2.5.1Service and Service Groups have been configured, you can assign them to firewall rules or
How Firewall Rule Enforcement WorksX Family LSM User’s Guide V 2.5.1 77Firewall Services Page Field DescriptionsThe following table describes the fie
Chapter 4 Firewall78 X Family LSM User’s Guide V 2.5.1•From the Ty p e drop-down list, select the service type. Protocol types supported a r e
SchedulesX Family LSM User’s Guide V 2.5.1 79STEP 4For each service you want to add to the group, select the service from the Service drop-down list.
Chapter 4 Firewall80 X Family LSM User’s Guide V 2.5.1You can apply the same schedule to as many firewall rules as required. For device maximum
SchedulesX Family LSM User’s Guide V 2.5.1 81For additional information, see the following topics:• “Add or Edit a Schedule” on page 81• “Delete Days
Chapter 4 Firewall82 X Family LSM User’s Guide V 2.5.1STEP 5Click Save/Create.Click Cancel to return to the Firewall - Schedules page without s
Virtual ServersX Family LSM User’s Guide V 2.5.1 83Virtual Servers pageUse the Virtual Servers page (Firewall > Virtual Servers) to view and confi
Comments to this Manuals