PLANET Technology does not warrant that the hardware will work properly in all environments and
applications, and makes no warranty and representation, either implied or expressed, with respect to the
quality, performance, merchantability, or fitness for a particular purpose.
PLANET has made every effort to ensure that this User’s Manual is accurate; PLANET disclaims liability
for any inaccuracies or omissions that may have occurred.
Information in this User’s Manual is subject to change without notice and does not represent a commitment
on the part of PLANET. PLANET assumes no responsibility for any inaccuracies that may be contained in
this User’s Manual. PLANET makes no commitment to update or keep current the information in this User’s
Manual, and reserves the right to make improvements to this User’s Manual and/or to the products described
in this User’s Manual, at any time without notice.
If you find information in this manual that is incorrect, misleading, or incomplete, we would appreciate your
comments and suggestions.
Trademarks
The PLANET logo is a trademark of PLANET Technology.
This documentation may refer to numerous hardware and software products by their trade names. In most, if
not all cases, these designations are claimed as trademarks or registered trademarks by their respective
companies.
CE mark Warning
This is a class A device, in a domestic environment; this product may cause radio interference, in which case the user may
be required to take adequate measures.
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to
Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses, and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause harmful interference to
radio communications. However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or television reception, which can
be determined by turning the equipment off and on, the user is encouraged to try to correct the interference
by one or more of the following measures:
1. Reorient or relocate the receiving antenna.
2. Increase the separation between the equipment and receiver.
3. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
4. Consult the dealer or an experienced radio technician for help.
To assure continued compliance (example-use only shielded interface cables when connecting to computer or
peripheral devices). Any changes or modifications not expressly approved by the party responsible for
compliance could void the user’s authority to operate the equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the Following two conditions: (1)
This device may not cause harmful interference, and (2) this Device must accept any interference received,
including interference that may cause undesired operation.
R&TTE Compliance Statement
This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE EUROPEAN
PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication
terminal Equipment and the mutual recognition of their conformity (R&TTE)
The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal
Equipment and Satellite Earth Station Equipment) As of April 8, 2000.
WEEE Caution
To avoid the potential effects on the environment and human health as a result of the presence of hazardous
substances in electrical and electronic equipment, end users of electrical and electronic equipment should
understand the meaning of the crossed-out wheeled bin symbol. Do not dispose of WEEE as unsorted
municipal waste and have to collect such WEEE separately.
Safety
This equipment is designed with the utmost care for the safety of those who install and use it. However,
special attention must be paid to the dangers of electric shock and static electricity when working with
electrical equipment. All guidelines of this and of the computer manufacture must therefore be allowed at all
times to ensure the safe use of the equipment.
Customer Service
For information on customer service and support for the UTM Content Security Gateway, please refer to the following
Website URL:
http://www.planet.com.tw
Before contacting customer service, please take a moment to gather the following information:
♦
UTM Content Security Gateway serial number and MAC address
♦
Any error messages that displayed when the problem occurred
♦
Any software running when the problem occurred
♦
Steps you took to resolve the problem on your own
Revision
User’s Manual for PLANET UTM Content Security Gateway
CHAPTER 3: SYSTEM ....................................................................................................................................11
3.2.9 Language ....................................................................................................................................... 42
4.1 LAN ....................................................................................................................................................................... 46
5.9.2 Example 1 .................................................................................................................................... 162
5.9.3 Example 2 .................................................................................................................................... 177
5.9.4 Example 3 .................................................................................................................................... 223
5.9.5 Example 4 .................................................................................................................................... 237
5.9.6 Example 5 .................................................................................................................................... 257
7.1.2 Mail Relay .................................................................................................................................... 303
7.1.3 Mail Account................................................................................................................................. 309
7.1.4 Mail Notice ................................................................................................................................... 318
7.2.2 Personal Rule .............................................................................................................................. 336
7.2.3 Global Rule .................................................................................................................................. 337
7.2.6 Training ........................................................................................................................................ 340
7.2.7 Spam Mail .................................................................................................................................... 341
7.2.8 The Advanced Description ........................................................................................................... 343
7.3.2 Virus Mail ..................................................................................................................................... 398
12.6.2 System Info ................................................................................................................................ 560
Spam Signature, Graylist, Checking sender account and IP address in RBL), and Heuristics Analysis to
block over 95% spam mail. Customizable notification options and spam mail report are provided for
administrator. Varied actions toward spam mail include: Delete, Deliver, Forward and Store in the
quarantine. Built-in auto-training system to rise identify rate of spam mail substantially.
Anti-Virus Protection: Built-in double virus scan engines can detect viruses, worms, and other threats
from email transfer. Scan mission-critical content protocols-SMTP, POP3 in real time as traffic enters the
network to provide maximum protection. Customizable notification options and virus mail report are
provided for administrator. Varied actions toward spam mail include: Delete, Deliver, Forward and Store
in the quarantine.
Anti-Virus for HTTP, FTP, P2P, IM, NetBIOS: The CS-2000 not only can provide Anti-virus feature for
mail, it also can filter the virus from varied protocol. The virus pattern can be updated automatically or
manually.
VPN Connectivity: The CS-2000 supports several VPN features -- IPSec VPN, SSL VPN and PPTP
server/client. The VPN Tunnel with DES / 3DES / AES encryption and SHA-1 / MD5 authentication that
provide secured network traffic over public Internet. VPN Wizard can help administrator to have an easy
way to configure VPN settings.
SSL VPN: SSL VPN does not need to install any software or hardware. Only need to use the web
browser and easily establish VPN connections for transferring the data by SSL encryption.
VPN Trunk: VPN trunk function provides VPN load balance and VPN fail-over feature to keep the VPN
connection more reliable.
Content Filtering: The CS-2000 can block network connection based on URLs, Scripts (The Pop-up,
Java Applet, cookies and Active X), P2P (eDonkey, Bit Torrent, WinMX and more), Instant Messaging
(MSN, Yahoo Messenger, ICQ, QQ, Skype and Google Talk) and Download / Upload. If there are new
updated version of P2P or IM software in client side, CS-2000 will detect the difference and update the
Content Filtering pattern to renew the filtering mechanism.
IDP: Built-in IDP function can detect and prevent the Hacker attacks, Anomaly Flow, and Signatures
from Internet. CS-2000 provides three kinds of the Signature to complete the intrusion detection system,
user can select to configure “Anomaly”, “Pre-defined” and “Custom” according to the current
environment’s request.
Policy-based Firewall: The built-in policy-based firewall prevent many known hacker attack including
SYN attack, ICMP flood, UDP flood, Ping of Death, etc. The access control function allowed only
specified WAN or LAN users to use only allowed network services on specified time.
QoS: Network packets can be classified based on IP address, IP subnet and TCP/UDP port number and
give guarantee and maximum bandwidth with three levels of priority.
User Authentication: Web-based authentication allows users to be authenticated by web browser.
User database can be configured on the devices; CS-2000 also supports the authenticated database
through external RADIUS, POP3 and LDAP server.
WAN Backup: The CS-2000 can monitor each WAN link status and automatically activate backup links
when a failure is detected. The detection is based on the configurable target Internet addresses.
Outbound Load Balancing: The network sessions are assigned based on the user configurable load
balancing mode, including “Auto”, “Round-Robin”, “By Traffic”, “By Session” and “By Packet”. User can
also configure which IP or TCP/UDP type of traffic use which WAN port to connect.
Inbound Load Balancing: The CS-2000 provides the Inbound Load Balancing for enterprise’s internal
server. The Inbound Load Balancing can reduce the server loading and system crash risks, in order to
improve the server working efficiency.
Multiple NA
T: Multiple NAT allows local port to set multiple subnet works and connect to the Internet
through different WAN IP addresses.
High Availability: The CS-2000 provides High Availability function, and the redundant system will avoid
influencing the network traffic because of the device crash down.
DES, 3DES and AES encrypting
SHA-1 / MD5 authentication algorithm
Remote access VPN (Client-to-Site) and Site to Site VPN
Script Blocking (Popup, Java Applet, cookies and Active X)
IM blocking (MSN, Yahoo Messenger, ICQ, QQ, Skype, Google Talk and more)
P2P blocking (eDonkey, Bit Torrent, WinMX and more)
Download and Upload blocking
Automatic or manual update virus and signature database
Anomaly: Syn Flood, UDP Flood, ICMP Flood and more
Pre-defined: Backdoor, DDoS, DoS, Exploit, NetBIOS and Spyware
Custom: User defined based on TCP, UDP, ICMP or IP protocol
Yearly, Monthly, Weekly and Daily Report support
Email attachment virus scanning by SMTP, POP3
Inbound scanning for internal and external Mail Server
ction of infected mail: Delete, Deliver to the recipient, forward to an account
and store in quarantine
Automatic or manual update virus database
Support Spam Fingerprint, Bayesian, Signature, RBL and Graylist filtering,
checking sender account and IP to filter the spam mail
Black list and white list support auto training system
Action of spam mail: Delete, Deliver to the recipient, forward to an account and
store in quarantine
Yearly, Monthly, Weekly and Daily Report support
Guarantee and maximum bandwidth with 3 priority levels
Classify traffics based on IP, IP subnet, TCP/UDP port
Connect both the Administrator’s PC and the LAN port of the Content Security Gateway to a hub or switch.
Make sure there is a link light on the hub/switch for both connections. The CS-2000 has an embedded web
server used for management and configuration. Use a web browser to display the configurations of the
Content Security Gateway (such as Internet Explorer 4 (or above) or Netscape 4.0 (or above) with full java
script support). The default IP address of the Content Security Gateway is 192.168.1.1 with a subnet mask of
255.255.255.0. Therefore, the IP address of the Administrator PC must be in the range between 192.168.1.2–
192.168.1.254.
By default, the CS-2000 is shipped with its DHCP Server function enabled. This means the client computers
on the LAN network including the Administrator PC can set their TCP/IP settings to automatically obtain an IP
address from the Content Security Gateway.
The following table is a list of private IP addresses. These addresses may not be used as a WAN IP address.
10.0.0.0 ~ 10.255.255.255
172.16.0.0 ~ 172.31.255.255
192.168.0.0 ~ 192.168.255.255
STEP 2:
Once the Administrator’s PC has an IP address on the same network as the Content Security Gateway, open
up an Internet web browser and type in http://192.168.1.1
STEP 3:
A pop-up screen will appear and prompt for a username and password. A username and password is required
to connect to the Content Security Gateway. Enter the default login username and password of Administrator
(Figure-1).
Username: admin
Password: admin
Click OK to login the CS-2000.
in the address bar.
Figure-1 Login Web UI
- 7 -
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.