SETUP GUIDE. IronMail Messaging Gateway Security. S-Class.
|
|
|
- Esther Armstrong
- 10 years ago
- Views:
Transcription
1 SETUP GUIDE IronMail Messaging Gateway Security S-Class
2
3 Copyright 2007 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Secure Computing Corporation. Trademarks Secure Computing, IronMail, IronMail Edge, SafeWord, Sidewinder, Sidewinder G2, SmartFilter, Type Enforcement, SofToken, Enterprise Strong, Mobile Pass, G2 Firewall, PremierAccess, SecureSupport, SecureOS, Bess and Strikeback are trademarks of Secure Computing Corporation, registered in the U.S. Patent and Trademark Office and in other countries. G2 Enterprise Manager, SmartReporter, On-Box, Application Defenses, RemoteAccess, Sentian, Securing connections between people, applications and networks are trademarks of Secure Computing Corporation. All other trademarks, tradenames, service marks, service names, product names, and images mentioned and/or used herein belong to their respective owners. Technical Support information Secure Computing works closely with our reseller partners to offer the best worldwide Technical Support services. Your Secure Computing reseller is the first line of support when you have questions about our products and services; however, if you require additional assistance, contact us directly. To contact Secure Computing Technical Support directly, telephone If you prefer, send an to [email protected]. To inquire about obtaining a support contract, refer to our "Contact Secure" Web page for the latest information at To use the Secure KnowledgeBase, go to Enter your company ID. Customer Advocate information To suggest enhancements in a product or service, or to request assistance in resolving a problem, please contact a Customer Advocate at If you prefer, send an to [email protected]. If you have comments or suggestions you would like to make regarding this document or any other Secure Computing document, please send an to [email protected]. Publication history Date Part number Software release April 2007 IROP-MN-STUP65-A IronMail S-class 6.x i
4 ii
5 CONTENTS CHAPTER 1 SERVER HARDWARE SETUP... 1 Hardware...1 General safety notes on IronMail appliances...2 Specific temperature recommendations...2 Installation for IronMail S-class Model Installation for IronMail S-class Models 25, 50 and Slide rail installation...6 Uninterruptible power supply...10 Attaching keyboard, mouse, and monitor...11 Server power, controls, and indicators...11 Model 10 front panel...12 Models 25, 50 and 100 front panel...13 Model 10 rear panel...14 Models 25, 50 and 100 rear panel...15 CHAPTER 2 NETWORK CONFIGURATION Network connectivity...17 Network firewall configuration...17 Internal mail server configuration...24 DNS configuration...24 CHAPTER 3 SETTING UP SECURE COMPUTING IRONMAIL Configuring IronMail...27 CHAPTER 4 BEST PRACTICES CONFIGURATION SmartStart...43 Using SmartStart...44 Screen 1: Network Connectivity...47 Screen 2: Software Updates...48 Screen 3: Pre-Configuration...49 Screen 4: Threat Response Updates...50 Screen 5: Virus Updates...51 Screen 6: SMTP Route Setup...52 Screen 7: Internal Server List...53 Screen 8: Allow Relay...54 iii
6 Table of Contents Screen 9: Report Setup...55 Screen 10: Alerts Setup...56 Screen 11: Add Accounts...57 Screen 12: Change the Admin Password...58 Screen 13: Finishing SmartStart...59 When You Have Finished SmartStart...60 iv
7 CHAPTER 1 Server Hardware Setup Hardware Physical installation of the IronMail appliance entails installing the device into a rack, and providing power and network connectivity. The following server platform is currently supported for the IronMail S-class. IronMail S-class is a 1U rackmount server platform designed with state-of-the-art features. The S- class is comprised of two main components: a rackmount chassis and a server with a single Intel processor. Figure 1: IronMail S-class Model 10 Figure 2: IronMail s-class Models 25, 50 and 100 Secure Computing 1
8 General safety notes on IronMail appliances There are no user-serviceable components inside the appliance. Opening IronMail s chassis will void the service agreement. Adequate spacing above, below, and behind the IronMail appliance should be provided to allow proper airflow, and to prevent excessive heat build-up. Use only the mounting kits provided with IronMail appliances when installing IronMail, as improper mounting may result in hardware failure and hazardous conditions. Do not block any air vents; usually 15 cm (6 inches) of air space provides proper airflow. Plan the device installation starting from the bottom of the rack cabinet and install the heaviest device in the bottom of the rack. Do not extend more than one device out of the rack cabinet at the same time extending two or more devices simultaneously may cause the rack to become unstable. Remove the rack doors and side panels to provide easier access during installation Connect the server to a properly grounded outlet. Do not overload the power outlet when installing multiple devices in the rack cabinet. Follow accepted electrical and general safety precautions when installing any IronMail. Specific temperature recommendations The operating temperature range for the IronMail S-class is C /50-90 F. Rack precautions Ensure that the leveling jacks on the bottom of the rack are fully extended to the floor with the full weight of the rack resting on them. In a single rack installation, stabilizers should be attached to the rack. In multiple rack installations, the racks should be coupled together. Always make sure the rack is stable before extending a component from the rack. Server precautions Determine the placement of each component in the rack before installing the rails. Install the heaviest server components on the bottom of the rack first, and then work up. Use a regulating uninterruptible power supply (UPS) to protect the server from power surges and voltage spikes, and to keep the system operating in case of a power failure. 2 IronMail S-class
9 Allow the power supply units to cool before touching them. Always keep the rack's front door and all panels and components on the servers closed when not servicing in order to maintain proper cooling. Lifting and weight precautions Use safe practices when lifting. Figure 3: Weight precaution indicators For lifting objects with the following weights use the designated number of people: For objects weighing more than or equal to18 kg (39.7 lb) use two people to lift the object. For objects weighing more than or equal to 32 kg (70.5 lb) use three people to lift the object. For objects weighing more than or equal to 55 kg (121.2 lb) use four people to lift the object. Do on place any object weighing more than 50 kg (110 lb) on top of rack-mounted devices. Figure 4: Weight object icon Installation for IronMail S-class Model 10 The IronMail S-class Model 10 may easily be mounted in a 2-post or 4-post rack. Tools required: One Phillips #2 screwdriver is the only tool required. Secure Computing 3
10 Figure 5: Contents of the S-class Model 10 mounting kit: The following is a list of the items you need to install the server in your server rack. If any items are missing or damaged, contact Secure Computing product support at or [email protected]. 2 mounting brackets Mounting screws needed to attach the brackets to the appliance and install the system into the rack. 4 IronMail S-class
11 Figure 6: Side view of Model 10 showing bracket mounting holes Installing the appliance in the rack 1 Attach the brackets to each side of the Model 10 appliance using the screws supplied. 2 When the brackets have been mounted, position the appliance in the rack at the desired place. 3 Use the mounting screws to attach the appliance securely to the rack. Installation for IronMail S-class Models 25, 50 and 100 The IronMail S-class should be mounted in standard 4-post data center racks having a 19-inch-wide opening. Tools required: A Phillips #2 screwdriver is the only tool required. Secure Computing 5
12 Figure 7: Contents of the S-class mounting kit: Power cord Network Connection cord Bezel mounts with screws Mounting screws Slide rail installation The Slide Rails consist of individual left and right slide rails. Details are shown in the illustration below. 6 IronMail S-class
13 Figure 8: Slide mounting rails Front Multi-Pin Adapter and Bracket 2. Component Release Lever 3. Slide Extension Release Lever 4. Component Mounting Channel (3 per rail) 5. Rear Multi-Pin Adapter and Bracket 6. Anti-Sag Bar Slider Setting the multi-pin adapters for rack type The threaded hole in the center of the Multi-Pin Adapter is for securing the rails during shipping, and for the attachment of front panel blanks (if desired). The Slide rails are shipped with the Multi-Pin Adapters set for square holes. If your rack has square mounting holes, skip this section. 1. On each Slide Rail, reverse the Multi-Pin Adapter position to match the rack mounting hole type if necessary. Remove the Multi-Pin Adapter by rotating the Swivel Lock up, pressing the mounting pins together, and then pulling the adapter from the Multi-Pin Bracket. Secure Computing 7
14 Figure 9: Side rail with swivel lock in locked position 2. Install the Multi-Pin Adapter by pressing the pins together while inserting the adapter into the bracket. The Multi-Pin Adapter must be fully locked in the bracket. Ensure both mounting pins on the Multi-Pin Adapter are fully engaged in the Multi-Pin Bracket, then lock the Multi-Pin Adapter in place using the Swivel Lock Figure 10: Side rail with swivel lock in open position. 8 IronMail S-class
15 3. Repeat these steps for both ends of each Slide Rail. Installing the slide rails into the rack 1. At all four rack uprights, determine the vertical position in the rack where the Slide Rails are to be installed. The top-most mounting hole for a particular rack unit (RU) mounting position is typically indicated by a mark or hole. Caution: If Slide Rails are mounted in holes which are not vertically aligned (level) from front to back, the Slide Rail may be damaged and mounting will not be secure. 2. Noting the holes determined in the previous step, align the left Slide Rail with its mounting holes. 3. Hold the Slide Rail in the desired rack mounting position. At the rear of the Slide Rail, press the Multi-Pin Adapter mounting pins together and insert the Slide Rail into the rack. 4. Ensuring you have selected the proper mounting holes on the rack upright, repeat the above step at the Slide Rail s front mounting position. Ensure the Slide Rail is level. 5. Extend the Slide Rail to its fully extended (locked) position. Press the Slide Rail Extension Release Levers to release the lock. Move the Slide Rail in and out through its entire range of motion to ensure it does not bind. If binding occurs, recheck the mounting positions. Figure 11: Slide rail showing release lever 6. Repeat steps 2 through 5 for the right Slide Rail, being certain that it is parallel and level with the left Slide Rail. Installing the component into the slide rails 1. Extend both Slide Rails to into their fully extended (locked) positions. Secure Computing 9
16 2. Align the mounting studs with the Component Mounting Channels on the Slide Rails. 3. Carefully place the component s mounting studs in the Component Mounting Channels on the Slide Rails. Allow the component mounting studs to fully seat in the Component Mounting Channels. The Component Release Levers (one on each rail) pivot out of the way and then back into place when the studs are fully engaged in the mounting channels. Ensure the Component Release Levers are in the locked position. 4. Press and hold both the left and right Slide Extension Release Levers and slowly slide the component and Slide Rails into the fully retracted position. Uninterruptible power supply IronMail should only be used in conjunction with an Uninterruptible Power Supply (UPS). While many UPS devices are suitable for providing power, not all are able to gracefully shut down IronMail in an emergency loss of power. Many are incapable of interfacing with IronMail s software. And worse, some are so incompatible they will shut down IronMail on their own, regardless of the presence or absence of adequate power! Therefore, Secure Computing encourages you to only connect the data cables for UPS models shown on the table on the following page which have been thoroughly tested for reliability and compatibility. If you use a UPS other than one shown in the following table, do not attach a data cable from the UPS to IronMail s serial port (when the serial port is configured as a UPS interface) TABLE 1. Recommended UPS Hardware Manufacturer Model Family Model Number APC Matrix-UPS MX3000 Smart-UPS 700 RM 2U 1000 RM 2U PowerStack IronMail S-class
17 Please contact Secure Computing product support at or send an to to confirm if your UPS has been tested since the publication of this Setup Guide. Attaching keyboard, mouse, and monitor IronMail accepts the connection of keyboard, mouse, and monitor allowing you to connect to the appliance directly (in addition to, or in lieu of connecting through your local area network). Attach a monitor to the VGA port on the back of the appliance. Attach keyboard to the bottom PS-2 port on the back of the appliance. (The mouse and keyboard must be connected to the appliance before power is turned on.) You only have access to the command line interface when connected directly to the appliance you do not have access to the graphical, browser-based Web Administration interface. The command line interface allows you to perform some of the functionality available in the Web Administration GUI, but more importantly, it allows you to restore the appliance to its factory default settings. Server power, controls, and indicators This section identifies the controls and indicators on the front and rear of the IronMail S-class server. It also describes the power features of the server. Secure Computing 11
18 Model 10 front panel Figure 12: Model 10 front detail TABLE 2. S-10 front panel controls Item number 1 Power indicator light 2 Database access indicator light 3 Ethernet connection (network) 4 Reset button Description 12 IronMail S-class
19 Models 25, 50 and 100 front panel Figure 13: Model 25, 50 and 100 front detail Control Panel Buttons The IronMail S-class control panel provides important system monitoring and control information. LEDs indicate power on, network activity, hard disk drive activity and system overheat conditions. The control panel also includes a main power button and a system reset button. There are two push-buttons located on the front of the chassis, accessed by removing the front bezel. These are (in order from left to right) a reset button and a power on/off button. Reset: The reset switch reboots the system. Caution: If IronMail is running and the Reset switch is pressed, IronMail is forced to hard boot it immediately reboots without first gracefully shutting down. Hard-booting the IronMail appliance by pressing this switch can corrupt its internal databases, requiring that damaged files be rebuilt. Power down or reboot the IronMail appliance only from within the Web Administration (GUI) or Command Line interface. Power: This is the main power switch, which is used to apply or turn off the main system power. Turning off system power with this button removes the main power but keeps standby power supplied to the system. Press and hold the power button four seconds to turn the server off. (See also the power supply on/off switch information in the Rear Panel section of this chapter). Secure Computing 13
20 Control panel LEDs The control panel located on the front of the server chassis has six LEDs. These LEDs provide critical information related to different parts of the system. This section explains what each LED indicates when illuminated and any corrective action you may need to take. Overheat: Indicates an overheat condition in the chassis. This may be caused by airflow obstruction in the rack, or the ambient room temperature being too warm. Check to make sure that the chassis cover is installed and that all fans are present and operating normally. If the overheat condition continues, contact Secure Computing product support at or The unit will overheat if operated with the top removed. NIC1: Indicates network activity on LAN1 when flashing. NIC2: Indicates network activity on LAN2 when flashing. This indicator is not currently in use. Power: Indicates power is being supplied to the system's power supply. This LED should normally be illuminated when the system is operating. Model 10 rear panel The IronMail S-class Server is a 1U rackmount chassis. Its I/O panel provides one COM port, a PS/2 keyboard port, a VGA port and two Ethernet ports (only one port is usable). 14 IronMail S-class
21 Figure 14: Model 10 rear panel TABLE 3. S-10 rear panel controls Item number 1 Power cord socket 2 On/off switch 3 USB ports 4 VGA port Description Models 25, 50 and 100 rear panel Figure 15: Model 25, 50 and 100 rear panel The following is a description of the connectors on the rear of the IronMail S-class Server: Power (black): A black power connector is on the left side of the server. Keyboard (purple): Use to plug in a keyboard when configuring the server or using the IronMail S- class as a console. Ethernet port mail traffic: Connect to second ethernet port from the left. Secure Computing 15
22 VGA port (blue): Use to plug in a VGA monitor when configuring or attaching a console to IronMail S-class. Serial port: May be configured as the port for an Uninterruptible Power Supply (UPS) or as the port for Command Line Interface (CLI) access. 16 IronMail S-class
23 CHAPTER 2 Network Configuration Network connectivity Your network administrator must assign an IP address, subnet mask, and host name for the IronMail appliance. (A host name yourname and domain name yourdomain.com results in the fully qualified domain name (FQDN) yourname.yourdomain.com. ) The first time you connect to IronMail, you will be required to enter this and other information into its configuration database. Establishing network connectivity may require the assistance of your network administrator. Based on your company s network design, IronMail may be connected to the corporate network either in a De-Militarized Zone (DMZ) or on the internal LAN. Once the physical connection has been established, some configuration of the network firewall and Domain Name Service (DNS) will be required. Network firewall configuration It is recommended that you place IronMail in a DMZ if your network supports it. If so, you must create rules to allow the protocols for the following: Secure Computing 17
24 IronMail to internet Internet to IronMail IronMail to the internal mail server Internal mail server to Ironmail Figure 1: De-militarized zone (DMZ) firewall routing TABLE 1. DMZ firewall routing ID number Description 1 The internet 2 The firewall 18 IronMail S-class
25 TABLE 1. DMZ firewall routing ID number Description 3 The DMZ IronMail 4 The mail server 5 Outgoing to the internet 6 Incoming from the internet 7 Incoming from the internal network 8 Outgoing to the internal network. Installing IronMail in a DMZ There should be no open protocols from outside to inside (bypassing IronMail) when using a DMZ configuration. The following tables describe the ports you must open in your firewall to allow IronMail to function: TABLE 2. IronMail to the internet Port TCP/ UDP Protocol Description 25 TCP SMTP Required for mail delivery 53 TCP/ UDP DNS Optional for an IronMail (if your DNS is ouitside the network, you must open the port allowing IronMail to connect to it. 123 TCP NTP Required if using Network Time Protocol 162 SNMP trap manager (optional) 389 LDAP (used only if LDAP is enabled) 6277 UDP SLS Required if you wish to enable Statistical Lookup Service (SLS) lookup as part of your anti-spam strategy TCP Secure Computing Required in order for IronMail to request updates. Secure Computing 19
26 TABLE 3. Internet to IronMail Port TCP/ UDP Protocol Description 25 TCP SMTP Required for mail delivery. 80 TCP HTTP Optional for WebMail (secure HTTPS on port 443 is preferable). 110 TCP POP3 Optional (secure POP# on port 995 is preferable). 143 TCP IMAP4 Optional (secure IMAP4 on port 993 is preferable). 443 TCP HTTPS Optional for WebMail (for secure HTTPS proxying). 465 TCP SMTPS Optional for secure incoming messages. 993 TCP IMAP4S Optional (this is the preferred port to securely receive mail via IMAP4). 995 TCP POP3S Optional (this is the preferred port to securely receive mail via POP3) UDP SLS Required only if SLS lookups are enabled TCP Secure Computing Required (allows Secure Computing to connect to your IronMail for technical support. TABLE 4. IronMail to intenal network Port TCP/ UDP Protocol Description 21 TCP FTP Optional if using FTP. 22 TCP SCP Optional if using SCP. 25 SMTP Required for mail delivery. 53 UDP DNS Optional for an IronMail (if your DNS is inside the network, you must open the port allowing IronMail to connect to it. 80 TCP HTTP Optional for WebMail (you should open secure port 443 for HTTPS instead). 20 IronMail S-class
27 TABLE 4. IronMail to intenal network Port TCP/ UDP Protocol Description 110 TCP POP3 Optional (you should open secure port 995 for POP3S instead). 143 TCP IMAP4 Optional (you should open secure port 993 for IMAP4S instead). 162 TCP SNMP Optional if using SNMP trap manager. 389 TCP LDAP Optional if using LDAP. 443 TCP HTTPS Optional for WebMail (for secure HTTPS proxying). 514 UDP Optional if using syslog server. 993 TCP IMAP4S Optional (this is the preferred port to securely retrieve mail via IMAP4S). 995 TCP POP3S Optional (this is the preferred port to securely retrieve mail via POP3S). TABLE 5. Internal mail server to IronMail Port TCP/ UDP Protocol Description 22 TCP Command Line Interface Optional (only if you want to access the command line interface from inside the network). 25 TCP SMTP Required for mail delivery TCP HTTPS Required (this is the port used to connect to IronMail s WebAdmin interface). Installing IronMail in a network with no DMZ If you do not have a DMZ, the IronMail may be installed on your internal network. If you install Iron- Mail inside the network, simply open the necessary ports in the firewall. Secure Computing 21
28 Figure 2: No demilitarized zone (DMZ) firewall routing TABLE 6. Non-DMZ firewall routing ID number 1 The internet 2 The firewall 3 The IronMail appliance 4 The mail server Description Ensure that your firewall s port settings match the table below: 22 IronMail S-class
29 TABLE 7. IronMail to internet Port TCP/ UDP Protocol Description 25 TCP SMTP Required for sending mail. 123 TCP NTP Required if using Network Time Protocol. 53 UDP DNS Optional for an IronMail (if your DNS is outside the network, you must open the port to allow IronMail to connect to it) TCP Secure Computing Required in order for IronMail to request updates UDP SLS Required if you wish to enable Statistical Lookup Service (SLS) lookup as part of your anti-spam strategy. TABLE 8. Internet to IronMail Port TCP/ UDP Protocol Description 25 TCP SMTP/SMTPS Required for mail delivery. 80 TCP HTTP Optional (you should open secure port 443 for HTTPS instead). 110 TCP POP3 Optional (you should open secure port 995 for POP3S instead). 143 TCP IMAP4 Optional (you should open secure port 993 for IMAP4S instead). 443 TCP HTTPS Optional for WebMail (for secure HTTPS proxying). 465 TCP SMTPS Optional (this is the preferred port to securely send mail). 993 TCP IMAP4S Optional (this is the preferred port to securely retrieve mail via IMAP4). 995 TCP POP3S Optional (this is the preferred port to securely retrieve mail via POP3). Secure Computing 23
30 TABLE 8. Internet to IronMail Port TCP/ UDP Protocol Description 6277 UDP SLS Required for IronMail s Statistical Lookup Service spam-blocking tool TCP Secure Computing Optional (allows Secure Computing to connect to your IronMail for technical support). Most mail servers use only ports 25, 110, and 143 for sending and retrieving . However, messages transmitted through these ports are unencrypted attackers can read or intercept sent this way. We recommend that you open the secure ports instead: 995 for POP3S and 993 for IMAP4S to force external users to retrieve their mail via SSL. (IronMail also provides the ability to send mail encrypted via TLS/SSL (Transport Layer Security/Secure Sockets Layer) on port 25.) Internal mail server configuration Configuration of your internal mail servers is very simple. Make IronMail the only IP address allowed to connect to your mail server, and re-direct your servers outbound mail flow to IronMail using a static route. DNS configuration DNS is a very complex subject, and there is no standard way in which it is implemented. In addition to the DNS server s MX (Mail Exchange), A (address), PTR (pointer) and other records, some networks use Network Address Tables (NAT) to map servers internally. However you implement DNS, you must at least do the following: The MX record pointing to the IronMail must have a lower preference number (i.e. higher priority) than the other MX records for the domain. This allows all mail addressed to your domain to be routed to the IronMail appliance, and allows all other servers to perform DNS lookups and reverse lookups on IronMail. Follow these configuration steps: Step 1. Step 2. Create the A record for the IronMail. The A records provide the forward mapping of hostnames to IP addresses. Create the PTR record for the IronMail. PTR records provide the reverse mapping of IP addresses. 24 IronMail S-class
31 Step 3. Step 4. Create the MX record for each domain for which the IronMail will relay . Create the MX record number lower than the existing MX records. Note: Spammers have begun targeting secondary MXs for delivery of spam because often the anti-spam features are not as robust as the primary MX. Secure Computing recommends that you remove all other MX records. You can check whether reverse lookup is working using the ping command, with the -a switch. Pinging an IP address with that switch will do a reverse lookup, and display the resolved name: C:\>ping -a Pinging servername.yourdomain.com [ ] with 32 bytes of data: Reply from : bytes=32 time=731ms TTL=242 Reply from : bytes=32 time=1081ms TTL=242 Reply from : bytes=32 time=1052ms TTL=242 Reply from : bytes=32 time=611ms TTL=242 Secure Computing 25
32 26 IronMail S-class
33 CHAPTER 3 Setting Up Secure Computing IronMail The initial setup for IronMail includes at least two major components, and possibly a third. The Installer or Administrator must set up the basic IronMail appliance to allow its further configuration after the basic initialization is completed; they must also perform essential setup for connectivity to the internet and to the mail network. The third component is necessary only if the IronMail appliance is being set up as a Centralized Management Console (CMC). Setup results in only the most basic configuration of IronMail. Once all initial setup is complete, the Administrator will perform the detailed configuration that prepares IronMail to protect the specific network. In this chapter: In this chapter, you will find information about the following topics: Configuring IronMaill Initial Configuration Wizard Configuring IronMail Preliminary Information IronMail whether intended as a stand-alone appliance or as a Centralized Management Console uses a simple wizard to set the initial values required for it to become minimally functional. Before you run the wizard, obtain the information requested in the form below. Your network administrator should be Secure Computing 27
34 able to assist you in determining the network information. (A copy of this Information Gathering Form appears at the back of the Setup Guide so it may be removed for easy information gathering.) Step 1. Step 2. Step 3. Step 4. Step 5. Step 6. Step 7. Step 8. Step 9. Have on hand the License Key that was ed to you for the IronMail appliance. The License Key contains information that determines whether this appliance is a Centralized Management Console for enterprise environments or a stand-alone IronMail. Create a host name for this appliance. Determine the domain name to which this appliance belongs. Assign an IP address for this appliance. Determine the Subnet Mask for this appliance. Specify the Default Router the appliance will use. Specify the IP Address of at least one of your DNS Servers (This appliance must be able to connect to it.) Provide the fully qualified domain names of up to three Network Time Protocol servers. (IronMail identifies three servers by default.) Specify the appliance s time zone by selecting from the pick list the city nearest the appliance. (The selected city must be in the same time zone as IronMail.) Step 10. For stand-alone IronMail only! Specify the fully qualified domain name of your default mail server. (If you have dedicated servers handling incoming and outgoing mail, or other services, select one to enter during the wizard setup the remaining servers will be configured later.) This information is not necessary for configuring a Centralized Management Console. Step 11. Specify the IP address of the default mail server you identified above. Step 12. Specify your default domain. Step 13. Determine if you want IronMail to use secure POP3 or IMAP 4 with your internal server. (Your internal server must have a Security Certificate installed on it for secure POP3 or IMAP4 to be implemented.). Verify this information with your Network Administrator prior to running the appliance s Initial Configuration Wizard. Initial Configuration Wizard IronMail ships with a pre-installed, albeit unsigned, Security Certificate. IronMail only allows administrative sessions with it over a secure SSL (https) connection, for which a Security Certificate is required. The default Security Certificate is adequate for creating these secure connections from your browser to the IronMail appliance, but is not adequate for providing SSL security for your infra- 28 IronMail S-class
35 structure. Until you install a valid Security Certificate from a Certificate Authority, your browser will display a Security Alert each time you logon to the appliance. Clicking Yes at the prompt allows you to proceed. You must connect to the appliance to enter some preliminary values in an Initial Configuration Wizard in order to make the appliance initially functional. Use a client workstation (any Windows PC) as Iron- Mail s front end. There are two ways you can connect to the appliance: Use a network cross-over cable to physically connect a PC workstation to IronMail. (The cable plugs into the network port on each device.) Install IronMail in your existing network, but set a PC workstation s netmask to match IronMail s default IP address and netmask. For either type of connection, the client workstation must temporarily change its IP address and netmask to match IronMail s default values (IP Address: , Netmask: ). That is, change your workstation IP address to xxx, and the netmask to (where xxx is any number between 0-253). 1. Launch Internet Explorer on the client workstation and navigate to IronMail s built-in default IP address: You must add the letter s after http. The opening screen for the Installation Wizard displays. Click Next to begin the installation process. Secure Computing 29
36 Step 2. The first screen to appear is the Master Sale and License Agreement. After you have read the agreement, click Accept or Decline. If you choose to Decline, the installation wizard will close and the appliance will not run. If you choose Accept, the wizard proceeds to the next step. 30 IronMail S-class
37 Step 3. The next screen that opens displays the Support Services Agreement. After you have read the agreement, click Accept or Decline. If you choose to Decline, the installation wizard will close and the appliance will not run. If you choose Accept, the wizard proceeds to the next step. Secure Computing 31
38 Step 4. Select the language you wish to use for this installation of IronMail by choosing the name of the language from the pick list. Select the character set for this IronMail from the second list. Click Next. Step 5. Copy the text file containing the License Key for the appliance, and paste the key into the input field on the next screen. You must include all of the beginning and ending lines that appear with the License Key, as shown: "======Begin CipherTrust License======" and "======End CipherTrust License======." 32 IronMail S-class
39 After pasting in the key, click Next. Step 6. Enter the host name for the appliance, created by your Network Administrator. The host name is the text preceding the domain name. In the example "servername.yourdomain.com" "servername" is the host name, and "yourdomain.com" is the domain name. Secure Computing 33
40 Step 7. Click Next. Enter the domain name for the domain to which the appliance will belong (e.g., "yourdomain.com"). Step 8. Click Next. Enter the IP address assigned by your Network Administrator for this appliance. 34 IronMail S-class
41 Step 9. Click Next. Enter the subnet mask for this IronMail, as provided by your Network Administrator. Click Next. Secure Computing 35
42 Step 10. Enter the IP address for the Default Router for this appliance. The router address is provided by the Network Administrator. Click Next. Step 11. Enter the IP address for at least one of your DNS Servers (you may have up to three). The DNS server will be used as a client for this IronMail. 36 IronMail S-class
43 Click Next. Step 12. Enter the IP address or the fully qualified domain name for up to three Network Time Protocol (NTP) servers, as provided by the Network Administrator. Click Next. Step 13. Specify the appliance's time zone by selecting from the pick list your own location or city, or a location/city that is in the same time zone. Secure Computing 37
44 Click Next. Step 14. If you are configuring a stand-alone IronMail appliance, you must enter information about your default server. If you have more than one server, enter only the information about the default server. You can configure additional servers after you complete the Installation Wizard. 38 IronMail S-class
45 If you are configuring a Centralized Management Console, you do not have to provide information about internal mail servers. Skip this step by clicking Next, and proceed to verifying your information. Step 15. Verify that the information you have provided is correct. You can use the Back buttons to return to previous steps and make corrections, should you detect errors. You may want to print this screen for your records once you have verified the information. Secure Computing 39
46 If you inadvertently enter the IP address incorrectly and fail to print this page showing the appliance's dot-decimal number, you will be unable to log onto IronMail when you later browse to what you thought was the correct address. Log onto IronMail via attached keyboard and command line interface to reset the appliance to its default factory settings. Click Finish after the information has been verified. CAUTION. Do not press Enter a second time or click the Refresh icon. This can cause problems with program integrity. IronMail will automatically restart. The following message will display. 40 IronMail S-class
47 When the restart process has had time to finish (wait at least three minutes), you may log onto the appliance. Using your network browser, go to the IP address for the appliance and log in. IronMail's opening SmartStart screen will display, allowing you to continue with best practices configuration. Secure Computing 41
48 Once a stand-alone IronMail is running, it is now acting as a proxy incoming and outgoing mail will flow through IronMail to the server you specified, and your exposure to the outside world has been "hardened. However, many of IronMail s features have not yet been enabled. Additional configuration is required as described in the remainder of the User Manual. 42 IronMail S-class
49 CHAPTER 4 IronMail S-class Setup Guide Best Practices Configuration The concept of Best Practices configuration is derived from Secure Computing s desire to streamline the process of preparing the IronMail appliance for effective operation. SmartStart offers the means to do precisely that. In this chapter In this chapter, you will find information about the following topics: SmartStart Using SmartStart SmartStart The purpose for SmartStart is to provide the Administrator the ability to install best practices IronMail configurations at the time of initial appliance installation and setup. It allows the Administrator to install the current software upgrades, current Anti-Virus upgrades, the Pre-Configuration package, the current Threat Response Update (TRU), and several other common configuration entries. The Administrator will complete the initial IronMail setup and installation as usual, applying the standard Installation Wizard, as explained in the previous chapter and in the IronMail Setup Guide. Then, at the Administrator s first login, the initial SmartStart screen displays. Unless the SmartStart installation is interrupted, subsequent logons will bypass SmartStart and take the user directly to the Dashboard, as discussed later in this manual. Note. SmartStart functionality is available only to the Admin user account. For any other user, the first login will open the Dashboard, IronMail s regular opening screen. Secure Computing 43
50 Using SmartStart Complete SmartStart installation requires completing the actions on 12 screens. It is important for the Administrator to remember a few basic rules for navigating SmartStart. Step 1. Step 2. Step 3. Step 4. You must select the specific SmartStart screen you wish to use by clicking the screen s link in the left menu. When you finish one screen, you can go to the next by clicking its link. If you need to leave the SmartStart Wizard before you have completed work with all screens, you must leave by clicking Log Out at the top of the screen. The next time you log in, Iron- Mail will return you to the SmartStart screen from which you logged out. If you click Quit at the top of the screen, you will leave SmartStart, and will be taken to the Dashboard screen. You will not automatically return to SmartStart when you log in again. Since some SmartStart steps need to be done in a specific order, please read the instructions on each screen before you apply it. The SmartStart Screen As illustrated in the screen shot that follow, SmartStart screens are divided into three sections. 44 IronMail S-class
51 Left Side: Menu The left side of the screen contains the menu listing all 12 screens that may be used in SmartStart. You will use this menu to select the portion of the wizard you wish to apply. You may click on any SmartStart screen link to open it without regard for the order on the menu. However, some of the steps must be taken in order. Read the screen instructions before you apply the screen. Screen 1, the Network Connectivity check, is the opening screen for SmartStart, since connectivity is required to apply some of the other steps. Upper Right: SmartStart information The upper portion of the screen, as seen below, extending across the screen except for the left menu area, contains informative text about the screen you are currently viewing. It may provide instructions and other important information about the step you are about to complete. Lower Right: Configuration screens The lower portion of all SmartStart screens, like the sample below, will contain the actual IronMail configuration screens required to complete the specific step you are applying. Secure Computing 45
52 IMPORTANT. The screen images that populate this portion of the SmartStart screen will retain their own instruction text or help text. Accessing SmartStart To access SmartStart as part of the initial installation and setup of the IronMail, the Administrator (Admin user account) simply logs into IronMail the first time. 46 IronMail S-class
53 Screen 1 of the SmartStart process opens. Screen 1: Network Connectivity The initial screen is designed to welcome the administrator, give basic SmartStart instruction, and test for Network Connectivity. SmartStart Network Connectivity Check This step tests the connectivity between your IronMail appliance and the Secure Computing update infrastructure. Connectivity is required in order to use the SmartStart feature for configuring your Iron- Mail. You will use the update infrastructure in some of the following steps to update the version of software installed on your appliance, to download the latest best practices Pre-Configuration or Threat Response Update packages, and to install the most current Anti-Virus engine updates and virus signatures. When you have tested your network connectivity, go to the next screen by clicking that screen s link in the left menu. Secure Computing 47
54 Screen 2: Software Updates This step allows you to update the software on your IronMail appliance to the most current available version. SmartStart Software Updates Network connectivity is required for this step. Depending upon the version of the IronMail software currently installed, this update may require more than one step and may involve rebooting the appliance. If you need to install more than one release to get to the most current version, use this screen to download and install each upgrade in order, one upgrade at a time. If the appliance must be rebooted, you will be brought back to the SmartStart feature when you log in again. After you have set up configuration changes on the screen shown at the bottom of the SmartStart page, use the commands on that screen to record your configuration. Then you may proceed to the next screen by clicking that screen s link in the left menu. 48 IronMail S-class
55 Screen 3: Pre-Configuration This screen allows you to access and install the Pre-Configuration package for your version of the Iron- Mail appliance software. SmartStart Pre-Configuration Installation This package sets general configuration parameters representing the current best practices in general administration for your IronMail appliance. Network connectivity is required for this step. IMPORTANT. You should install the Pre-Configuration package after upgrading to the most recent version of the IronMail appliance software, and you should only install the Pre-Configuration that is appropriate for your version of the software. Secure Computing 49
56 After you have set up the installation on the screen at the bottom of the SmartStart page, use the commands on that screen to record your configuration. Then you may proceed to the next screen by clicking that screen s link in the left menu. Screen 4: Threat Response Updates This screen allows you to access and install the latest Threat Response Update (TRU) package for your version of the IronMail appliance software. SmartStart Threat Response Updates This package sets optimal configuration parameters for protection from inbound threats. Network connectivity is required for this step. 50 IronMail S-class
57 IMPORTANT. You should install the TRU package after upgrading to the most recent version of the IronMail appliance software and after installing the Pre-Configuration package that is appropriate for your version of the software. After you have set up the installation on the screen at the bottom of the SmartStart page, use the commands on that screen to record your configuration. Then you may proceed to the next screen by clicking that screen s link in the left menu. Screen 5: Virus Updates This screen allows you to access and install the latest Anti-Virus engines and virus signatures for your version of the IronMail appliance software. Secure Computing 51
58 SmartStart Anti-Virus Updates After you deploy the IronMail appliance, you will automatically receive new updates as they become available. Connectivity is required for this step. Note. Anti-Virus protection is a licensed feature for your IronMail appliance. If you have not licensed this protection, please contact Secure Computing Support. IMPORTANT. You should update Anti-Virus protection only after upgrading to the most recent version of the IronMail appliance software and after installing the Pre-Configuration package that is appropriate to your version. After you have set up the updates on the screen at the bottom of the SmartStart page, use the commands on that screen to record your configuration. Then you may proceed to the next screen by clicking that screen s link in the left menu. Screen 6: SMTP Route Setup This screen allows you to configure SMTP routes for any additional internal (inbound) domains or external (outbound) domains you will need in order to route mail properly in your environment. 52 IronMail S-class
59 SmartStart SMTP Route Setup After you have set up the routes on the screen at the bottom of the SmartStart page, use the commands on that screen to record your configuration. Then you may proceed to the next screen by clicking that screen s link in the left menu. Screen 7: Internal Server List This screen allows you to add additional servers to your internal server list. Secure Computing 53
60 SmartStart Internal Server Setup After you have added internal servers on the screen at the bottom of the SmartStart page, use the commands on that screen to record your configuration. Then you may proceed to the next screen by clicking that screen s link in the left menu. Screen 8: Allow Relay This screen allows you to add servers to your Allow Relay List. 54 IronMail S-class
61 SmartStart Allow Relay Setup Allow Relay is the list of servers that are allowed to send to your IronMail appliance for any destination domain, not just for domains the appliance hosts through the SMTP Routing setup. After you have added internal servers to the Allow Relay list on the screen at the bottom of the Smart- Start page, use the commands on that screen to record your configuration. Then you may proceed to the next screen by clicking that screen s link in the left menu. Screen 9: Report Setup This screen allows you to configure the reporting features for your IronMail appliance. Secure Computing 55
62 SmartStart Report Setup After you have set up the reports using the screen at the bottom of the SmartStart page, use the commands on that screen to record your configuration. Then you may proceed to the next screen by clicking that screen s link in the left menu. Screen 10: Alerts Setup This screen allows you to configure the alerting features of your IronMail appliance. 56 IronMail S-class
63 SmartStart Alerts Setup After you have set up the alerts using the screen at the bottom of the SmartStart page, use the commands on that screen to record your configuration. Then you may proceed to the next screen by clicking that screen s link in the left menu. Screen 11: Add Accounts This screen allows the Administrator to add new user accounts that may access the IronMail appliance, and to configure the roles (permissions) assigned to those accounts. Secure Computing 57
64 SmartStart Add Accounts The roles govern the functions these users may use and their ability to make changes to the configuration of the IronMail appliance. After you have set up the accounts using the screen at the bottom of the SmartStart page, use the commands on that screen to record your configuration. Then you may proceed to the next screen by clicking that screen s link in the left menu. Screen 12: Change the Admin Password This screen allows you to change the password assigned to the Administrator account. 58 IronMail S-class
65 SmartStart Change Admin Password IMPORTANT. To protect the Admin account, it is essential that the password be changed from the default to a new password. This step is strongly recommended. After you have changed the Admin password on the screen at the bottom of the SmartStart page, use the commands on that screen to record your configuration. Then you may proceed to another screen by clicking that screen s link in the left menu. Screen 13: Finishing SmartStart This screen provides information that allows you to exit SmartStart gracefully, taking you back to the login screen. Secure Computing 59
66 If you have finished SmartStart, you may proceed from the opening screen (the Dashboard) to monitor IronMail s status and activity. Note. If you exit SmartStart before completing all the steps, be sure to note the steps you have completed and those that still remain. It may be to your advantage to complete SmartStart before you exit, to ensure nothing is forgotten. When You Have Finished SmartStart If you have applied all the steps of SmartStart, your IronMail appliance is now configured for deployment, using best practices configuration. When you have completed all steps of the SmartStart process, you may exit SmartStart by clicking the Exit SmartStart button at the bottom of Finish SmartStart screen. This will close SmartStart and take you to the IronMail login screen. 60 IronMail S-class
67 Log into IronMail using your user name and password, and you will see the IronMail What s New screen (IronMail s opening screen for your first login). Secure Computing 61
68 62 IronMail S-class
69
70 your trusted source TM for enterprise security Web Gateway Comprehensive protection against malware, viruses, data leakage and Internet misuse, while ensuring policy enforcement, regulatory compliance, and a productive application environment. Messaging Gateway Inbound defense against spam, viruses, denial-of-service and intrusions; outbound protection against data leaks and policy violations. Network Gateway World s strongest firewall appliance contains the most comprehensive set of security solutions consolidated in one appliance and automatically discards huge volumes of unwanted traffic from known bad entities. Identity & Access Management Providing safe access to applications, data and resources through policy-driven security and strong authentication. Secure Computing Corporation Corporate Headquarters 4810 Harwood Road San Jose, Ca USA Tel Tel Fax European Headquarters 1, The Arena Downshire Way Bracknell Berkshire, RG12 1PU UK Tel Fax Asia/Pac Headquarters MLC Tower 248 Queen s Road East Wan Chai, Hong Kong Tel Fax Japan Headquarters Level 15 JT Bldg Toranomen Minato-Ku Tokyo Japan Tel Fax For more information visit us at: Trademarks Secure Computing, SafeWord, Sidewinder, SmartFilter, Type Enforcement, SofToken, Enterprise Strong, Mobile Pass, G2 Firewall, PremierAccess, SecureSupport, SecureOS, Bess, Cyberguard, Total Stream Protection, Webwasher, Strikeback, and Delivering the Web You Want are trademarks of Secure Computing Corporation, registered in the U.S. Patent and Trademark Office and in other countries. G2 Enterprise Manager, SmartReporter, Security Reporter, Application Defenses, RemoteAccess, IronIM, IronMail, IronMail Edge, SecureWire, SnapGear, Trusted Source, Securing connections between people, applications and networks, and Access Begins with Identity are trademarks of Secure Computing Corporation. All other trademarks, tradenames, service marks, service names, product names, and images mentioned and/or used herein belong to their respective owners. IROP-MN-STUP65-A 2007 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Secure Computing Corporation.
QUICK START GUIDE. Cisco C170 Email Security Appliance
1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
1 You will need the following items to get started:
QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide
Product Guide Addendum. SafeWord Check Point User Management Console Version 2.1
Product Guide Addendum SafeWord Check Point User Management Console Version 2.1 Copyright 2005 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted,
Barracuda IM Firewall Administrator s Guide
Barracuda IM Firewall Administrator s Guide Version 3.0 Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2007, Barracuda Networks www.barracuda.com
QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance
1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation
QUICK START GUIDE Cisco M380 and Cisco M680 Content Security Management Appliance
QUICK START GUIDE Cisco M380 and Cisco M680 Content Security Management Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance in a Rack 6 Plug
ISA Server Plugins Setup Guide
ISA Server Plugins Setup Guide Secure Web (Webwasher) Version 1.3 Copyright 2008 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,
Cisco S380 and Cisco S680 Web Security Appliance
QUICK START GUIDE Cisco S380 and Cisco S680 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance in a Rack 6 Plug In the Appliance
Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Barracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2004, Barracuda Networks www.barracudanetworks.com All rights reserved. Use of this product and this manual is subject to license. Information
eprism Email Security Suite
Guide eprism 2505 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered
Unified Threat Management
Unified Threat Management QUICK START GUIDE CR35iNG Appliance Document Version: PL QSG 35iNG/96000-10.04.5.0.007/250121014 DEFAULTS Default IP addresses Ethernet Port IP Address Zone A 172.16.16.16/255.255.255.0
Thank for choosing the Dominion KX III, the industry's highest performance enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch.
QS Rule Dominion KX III Quick Setup Guide Thank for choosing the Dominion KX III, the industry's highest performance enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch. This Quick Setup
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
Quick Start Guide. Cisco Small Business. 200E Series Advanced Smart Switches
Quick Start Guide Cisco Small Business 200E Series Advanced Smart Switches Welcome Thank you for choosing the Cisco 200E series Advanced Smart Switch, a Cisco Small Business network communications device.
Infinity C Reference Guide
1 2! Infinity C Reference Guide Table of Contents Components... 1 Hardware Setup... 5 SmartDrive Configuration... 12 Startup... 15 Login... 16 System Configuration... 19 DICOM Setup... 20 Monitoring Status...
SSL-VPN 200 Getting Started Guide
Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
Quick Start Guide. Cisco Small Business. 300 Series Managed Switches
Quick Start Guide Cisco Small Business 300 Series Managed Switches Welcome Thank you for choosing the Cisco 300 Series Managed Switch, a Cisco Small Business network communications device. This device
Quick Start Guide. Sendio Email System Protection Appliance. Sendio 5.0
Sendio Email System Protection Appliance Quick Start Guide Sendio 0 Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +949.274375 www.sendio.com QUICK START GUIDE SENDIO This Quick Start
How to Set Up Your NSM4000 Appliance
How to Set Up Your NSM4000 Appliance Juniper Networks NSM4000 is an appliance version of Network and Security Manager (NSM), a software application that centralizes control and management of your Juniper
Meraki MX50 Hardware Installation Guide
Meraki MX50 Hardware Installation Guide January 2011 Copyright 2010, Meraki, Inc. www.meraki.com 660 Alabama St. San Francisco, California 94110 Phone: +1 415 632 5800 Fax: +1 415 632 5899 Copyright: 2010
Deployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
emerge 50P emerge 5000P
emerge 50P emerge 5000P Initial Software Setup Guide May 2013 Linear LLC 1950 Camino Vida Roble Suite 150 Carlsbad, CA 92008 www.linearcorp.com Copyright Linear LLC. All rights reserved. This guide is
Broadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
Quick Start Guide. RV 120W Wireless-N VPN Firewall. Cisco Small Business
Quick Start Guide Cisco Small Business RV 120W Wireless-N VPN Firewall Package Contents Wireless-N VPN Firewall Ethernet Cable Power Adapter Quick Start Guide Documentation and Software on CD-ROM Welcome
V.I.P. Kit. Video Insight Pilot Kit. (Video Insight Pilot Kit).
V.I.P. Kit (Video Insight Pilot Kit). Video Insight Pilot Kit Please follow these instructions and everything should go very smoothly. Before you begin, you will need to establish (or obtain from your
Symantec Messaging Gateway 10.0 Installation Guide. powered by Brightmail
Symantec Messaging Gateway 10.0 Installation Guide powered by Brightmail The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK
Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
Elfiq Link Balancer (Link LB) Quick Web Configuration Guide
Elfiq Link Balancer (Link LB) Quick Web Configuration Guide Elfiq Operating System (EOS) - Version 3.5.0 and higher Document Version 2.0 -January 2012 Elfiq Networks (Elfiq Inc.) www.elfiq.com 1. About
nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.
nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances The information contained in this document represents the current view of Microsoft Corporation on the issues discussed
High-Speed Broadband Internet Guide
High-Speed Broadband Internet Guide Welcome Welcome to SkyBest High-Speed Broadband Internet. SkyBest High-Speed Broadband Internet allows for rapid downloading of large files, such as music and graphics.
DEPLOYMENT GUIDE. This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform.
This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform. Traffic Requirements The Vectra X-series platform detects threats and attacks
Barracuda SSL VPN Administrator s Guide
Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,
Multi-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
Barracuda Web Filter Administrator s Guide
Barracuda Web Filter Administrator s Guide Version 3.3 Barracuda Networks Inc. 3175 S. WInchester Blvd Campbell, CA 95008 http://www.barracuda.com 1 Copyright Notice Copyright 2004-2008, Barracuda Networks
Ultra Thin Client TC-401 TC-402. Users s Guide
Ultra Thin Client TC-401 TC-402 Users s Guide CONTENT 1. OVERVIEW... 3 1.1 HARDWARE SPECIFICATION... 3 1.2 SOFTWARE OVERVIEW... 4 1.3 HARDWARE OVERVIEW...5 1.4 NETWORK CONNECTION... 7 2. INSTALLING THE
SuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
Sophos UTM Software Appliance
Sophos UTM Software Appliance Quick Start Guide Product version: 9.300 Document date: Monday, December 01, 2014 Sophos UTM Minimum Hardware Requirements Intel compatible CPU 1.5 GHz+ 1 GB RAM (2 GB recommended)
Unpacking the Product. Rack Installation. Then, use the screws provided with the equipment rack to mount the firewall in the rack.
About This Guide This guide contains step-by-step instructions for setting up the D-Link DFL-260E/860E Firewall. Please note that the model you have purchased may appear slightly different from those shown
CounterACT 7.0 Single CounterACT Appliance
CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment
Barracuda Spam Firewall Administrator s Guide
Barracuda Spam Firewall Administrator s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license.
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...
LifeSize Transit Deployment Guide June 2011
LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address
LifeSize Networker Installation Guide
LifeSize Networker Installation Guide November 2008 Copyright Notice 2006-2008 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure
Emerson Smart Firewall
DeltaV TM Distributed Control System Product Data Sheet Emerson Smart Firewall The Emerson Smart Firewall protects the DeltaV system with an easy to use perimeter defense solution. Purpose built for easy
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
I N S T A L L A T I O N M A N U A L
I N S T A L L A T I O N M A N U A L 2015 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA is
Chapter 2 Preparing Your Network
Chapter 2 Preparing Your Network This document describes how to prepare your network to connect to the Internet through a router and how to verify the readiness of your broadband Internet service from
Overview of WebMux Load Balancer and Live Communications Server 2005
AVANU Load Balancing for Microsoft Office Live Communications Server 2005 WebMux Delivers Improved Reliability, Availability and Scalability Overview of WebMux Load Balancer and Live Communications Server
10/2011 - English Edition 1. Quick Start Guide. NWA1100N-CE CloudEnabled Business N Wireless Access Point
10/2011 - English Edition 1 Quick Start Guide NWA1100N-CE CloudEnabled Business N Wireless Access Point Package Contents - 1 x ZyXEL NWA1100N-CE Access Point - 2 x Detachable Antennas - 1 x Power Adapter
Hardware Guide CYBERSECURITY, EVOLVED V8.0. EdgeWave iprism Web Security. For more info, visit us at: www.edgewave.com
CYBERSECURITY, EVOLVED EdgeWave iprism Web Security Hardware Guide V8.0 15333 Avenue of Science, Suite 100 San Diego, CA 92128 Give us a call 1-855-881-2004 Send us an email: [email protected] For more
D-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
BR-800. ProHD Broadcaster. Easy Set-Up Guide V 1.01
BR-800 ProHD Broadcaster Easy Set-Up Guide V 1.01 BR-800 EASY SET-UP GUIDE BEFOREYOUBEGIN! Pleasedeterminethetypeofconfigurationbyselectingthescenariothatbest describesthewayyouwillbeusingyourbr-800prohdbroadcaster.onceyouhavedeterminedyour
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
WatchGuard XCSv Setup Guide
WatchGuard XCSv Setup Guide All XCSv Editions Copyright and Patent Information Copyright 2010 2013 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo, LiveSecurity, and
SOYO G668 VOIP IP PHONE USER MANUAL
SOYO G668 VOIP IP PHONE USER MANUAL Inglos Networks Industrial Global Solutions Teléfono: +1 (585) 217-9864, Fax: + 1 (585) 872-9627, Email: [email protected] Table of Content SAFETY INFORMATION... 1 INTRODUCTION...
Virtual Appliance Setup Guide
Virtual Appliance Setup Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
Dominion KX II-101-V2
Dominion KX II-101-V2 Quick Setup Guide Thank you for your purchase of the Dominion KX II-101-V2, the economical, full-featured, single-port digital KVM-over-IP device. For details on using the KX II-101-V2,
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
Rack Installation. Unpacking the System. Choosing a Setup Location. General Server Precautions. Barracuda Appliances
This set of instructions applies to racking and rail kit installation for 6XX and above. The Rack Mounting Instructions section below provides information on installing the SC825 chassis into a rack unit
MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
Volume. Instruction Manual
Volume 1 Instruction Manual Networking EVERFOCUS ELECTRONICS CORPORATION Networking Instruction Guide 2004 Everfocus Electronics Corp 2445 Huntington Drive Phone 626.844.8888 Fax 626.844.8838 All rights
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
BlackArmor NAS 110 User Guide
BlackArmor NAS 110 User Guide BlackArmor NAS 110 User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks
Chapter 2 Connecting the FVX538 to the Internet
Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.
Barracuda Web Filter Administrator s Guide
Barracuda Web Filter Administrator s Guide Version 4.x Barracuda Networks Inc. 3175 S. WInchester Blvd Campbell, CA 95008 http://www.barracuda.com 1 Copyright Notice Copyright 2004-2010, Barracuda Networks
CPEi 800/825 Series. User Manual. * Please see the Introduction Section
CPEi 800/825 Series User Manual * Please see the Introduction Section Contents Introduction...iii Chapter 1: CPEi 800/825 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the
Quick Start Guide. 500 Series Stackable Managed Switches
Quick Start Guide 500 Series Stackable Managed Switches Welcome Thank you for choosing the Cisco 500 Series Stackable Managed Switch, a Cisco network communications device. This device is designed to be
High-Speed Broadband Internet Guide
High-Speed Broadband Internet Guide Welcome Welcome to SkyBest High-Speed Broadband Internet. SkyBest High-Speed Broadband Internet allows for rapid downloading of large files, such as music and graphics.
3.5 EXTERNAL NETWORK HDD. User s Manual
3.5 EXTERNAL NETWORK HDD User s Manual Table of Content Before You Use Key Features H/W Installation Illustration of Product LED Definition NETWORK HDD Assembly Setup the Network HDD Home Disk Utility
Broadband Router ESG-103. User s Guide
Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
Broadband Router User s Manual
Broadband Router User s Manual Table of Contents Chapter 1 Introduction...4 1.1 The Broadband Router......4 1.2 Physical Features of Broadband Router...4 1.3 Non-Physical Features of Broadband Router..
ALOHA Load Balancer Quickstart guide
ALOHA Load Balancer Quickstart guide Summary 1 Package contents... 3 2 Preparing your Aloha... 4 3 Cabling... 5 3.1 Howto... 5 3.2 ALBBOX Overview... 6 3.3 ALB2K Overview... 7 3.4 ALB4K, ALB8K and ALB16K
Configuring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
Installing Policy Patrol on a separate machine
Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the
IP Power Stone 4000 User Manual
IP Power Stone 4000 User Manual Two Outlet Remote AC Power Controller Multi Link, Inc. 122 Dewey Drive Nicholasville, KY 40356 USA Sales and Tech Support 800.535.4651 FAX 859.885.6619 techsupport@multi
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
SIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3
SIP Proxy Server Administrator Installation and Configuration Guide V2.31b 09SIPXM.SY2.31b.EN3 DSG, DSG logo, InterPBX, InterServer, Blaze Series, VG5000, VG7000, IP590, IP580, IP500, IP510, InterConsole,
How To Set Up A Barcuda Email Server On A Pc Or Mac Or Mac (For Free) With A Webmail Server (For A Limited Time) With An Ipad Or Ipad (For An Ipa) With The Ip
Version Barracuda Spam Firewall Administrator s Guide Barracuda Networks Inc. 385 Ravendale Drive Mountain View, CA 94043 http://www.barracudanetworks.com 1 Copyright Notice Copyright 2005, Barracuda Networks
Quick Start Guide. RV0xx Series Routers
Quick Start Guide RV0xx Series Routers RV042 Dual WAN VPN Router RV042G Gigabit Dual WAN VPN Router RV082 Dual WAN VPN Router RV016 Multi-WAN VPN Router Package Contents VPN Router Power Adapter (Cisco
PFSENSE Load Balance with Fail Over From Version Beta3
PFSENSE Load Balance with Fail Over From Version Beta3 Following are the Installation instructions of PFSense beginning at first Login to setup Load Balance and Fail over procedures for outbound Internet
McAfee Firewall Enterprise
Hardware Guide Revision C McAfee Firewall Enterprise S1104, S2008, S3008 The McAfee Firewall Enterprise Hardware Product Guide describes the features and capabilities of appliance models S1104, S2008,
.Trustwave.com Updated October 9, 2007. Secure Web Gateway Version 11.0 Setup Guide
.Trustwave.com Updated October 9, 2007 Secure Web Gateway Version 11.0 Setup Guide Legal Notice Copyright 2012 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and
Multifunctional Broadband Router User Guide. Copyright Statement
Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. Other trademark or trade name mentioned herein are the trademark or registered trademark of above company. Copyright
Quick Start Guide. WAP371 Wireless AC/N Dual Radio Access Point with Single Point Setup Quick Start Guide. Cisco Small Business
Quick Start Guide Cisco Small Business WAP371 Wireless AC/N Dual Radio Access Point with Single Point Setup Quick Start Guide Versión en Español para México en el CD Version en français sur CD Versione
Visual Learning Served On Demand. WAN-880 / WAN 880X Rack-Mount Server Installation Guide
Visual Learning Served On Demand WAN-880 / WAN 880X Rack-Mount Server Installation Guide Welcome to SAFARI Montage! Thank you for choosing the SAFARI Montage Video-On-Demand and Digital Media Management
DVG-2101SP VoIP Telephone Adapter
This product can be set up using any current web browser, i.e., Internet Explorer 6 or Netscape Navigator 6.2.3. DVG-2101SP VoIP Telephone Adapter Before You Begin 1. If you purchased this VoIP Telephone
Acano solution. Acano Solution Installation Guide. Acano. January 2014 76-1002-03-B
Acano solution Acano Solution Installation Guide Acano January 2014 76-1002-03-B Contents Contents 1 Introduction... 3 1.1 Before You Start... 3 1.1.1 Safety information... 3 1.1.2 You will need the following
Managed Appliance Installation Guide
Managed Appliance Installation Guide Introduction The CrashPlan PROe managed appliance is a fully managed system that requires minimal user maintenance. This guide is intended to assist you in installing,
Quick Installation Guide DSL-2750U/NRU. 3G/ADSL/Ethernet Router with Wi-Fi and Built-in Switch
DSL-2750U/NRU 3G/ADSL/Ethernet Router with Wi-Fi and Built-in Switch BEFORE YOU BEGIN Delivery Package Router DSL-2750U/NRU Power adapter RJ-11 telephone cable Straight-through Ethernet cable (CAT 5E)
This guide explains how to install an Intel Solid-State Drive (Intel SSD) in a SATA-based desktop or notebook computer.
Installation Guide This guide explains how to install an (Intel SSD) in a SATA-based desktop or notebook computer. The instructions include migrating your data from your current storage device (such as
