Activating the TCP/IP Protocol ............................... A-3
Setting t h e Propert ies for TCP/ IP ............................ A -5
Table of Contents
iii
Page 6
Trend Micro GateLock Getting Started Guide
iv
Page 7
Trend Micro I ncorporated makes no representations or warranties with respect to the contents
or use of this document or the pr oduct described herein and spec ifically disclaims any express
or implied warranties as to the merchantability and fitness for any particular purpose.
Furthermore, Trend Micro Incorporated reserves the right to make changes to this document
and to the products described herein without any obligation to notify any person or entity of
such cha ng es .
Trend Micro GateLock is a registered trademark of Trend Micro Incorporated.
All other brand and pr oduct names are trademarks or registered trademarks of their re spective
reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior
written consent of Tr end Micro Incorporated.
Document Part No.
Release Date: month-year
Page 8
This manual, Trend Micro GateLock Getting Started Guide, is intended to introduce the main
features of the software and install it into your production environment. You should read
through it prior to installing or using the software.
Detailed information about how to use specific features within the software are available in
the online help file and online Solution Bank at Trend Micro’s We b site.
At Trend Micro, we are always seeking to improve our documentation. If you have questions,
comments, or suggestions about this or any Trend documents, please contact us at
docs@trendmicro.com. Your feedback is always welcome. Please evaluate this
documentation on the following site: http://www.antivirus.com/download/documentation/
rating.asp?prod=[ ]&ver=[ ] &doc=[ ] .
Page 9
Chapter 1
Introducing GateLock
Chapter Overview
This cha p te r:
• Introduces the main features and advantages of using GateLoc k
• Lists and ill u strates the items included in the standard GateLock package
• E xplains the usage of GateLo ck’s indicator lights and ports
What is GateLock?
Trend Mic ro GateL ock is an all-in-one , plug-and-pla y Interne t applia nce de signed for
home and small office/home office (SOHO) networks that use a broadband
connection. GateLock protects you from hackers with its powerful firewall features
and scans your incoming and outgoing mail using Trend Micro’s market-tested
antivirus technology.
Your GateLock also serves as a router for your smal l office/home of fice network that
allows multiple computers to share a single broadband connection to simultaneously
access the Internet.
1-1
Page 10
Tren d Micro GateLock Getting Started Guide
Security
GateLock protects your PC and home network from hackers by blocking
unauthorized external connections and cloaking your IP address, making your
computer and home network "invisible" to other people on the Internet. With its
powerful firewall features, it monitors network traffic and detects and blocks
intrusion attempts. GateLock keeps records of detected hacker attempts and can also
be configured to send you email notifications about these attempts.
Aside f ro m an t i -h acker fea t u r es, G at eLock is al so pa c k ed w it h Trend M ic r o ’s
powerful antivirus technology. It can scan your incoming POP3 and outg oing SMTP
mail messages, and even your Web-based email attachments, for viruses. To ensure
that your antivirus protection is always up-to-date, you can set up GateLock to
automatically download updates for its antivirus components from Trend Micro’s
update server. GateLock automatically records details of up to 30 most recently
detected viruses and antivirus component updates.
Sharing Capability
Your new GateLock also functions as a router that makes it very easy for you to set
up your home network. It allows up to 32 users in your home network to
simultaneously ac cess the Internet using a single broadband connection. No driver or
software is needed to share your broadband connection as long as the TCP/IP
protocol is installed.
GateLock c an al so fu ncti on as a DH CP se rver t hat a uto mati cal ly a ssigns IP addre sse s
to your devices so that you do not have to choose and manually set up IP addresses.
Ease of Use
GateLock is a plug-n-play device that requires minimal setup. With your preferred
Web browser (Microsoft Internet Expl orer or Netscape Navigator , 4.0 or above), you
can configure GateLock in a matter of minutes.
To make it ev e n ea s i er, a Quick Setup wizard is incl uded to lead you through the
initial configuration steps. Advanced users who need to perform extra tasks like
mapping IP addresses or port numbers for their servers and customizing firewall
rules, Gatelock’s intuitive configurat ion console enabl es quick configuration. E ven if
1-2
Page 11
Introducing GateLock
you have no knowledge of networking, you can take advantage of the convenience,
protection, and speed afforded by GateLock within minutes.
Summary of Trend Micro GateLock Features
• Antivirus protection with no installation required. Scans POP3 and SMTP mail
messa ge an d Webmai l at tachments
• Automatic and manual updates of antivirus components, keeping you constantly
protected ag ainst virus attacks thro ugh the Internet.
• Robust anti-hacker protection and customizab le intrusion detecti on and network
traf fic contro l rules
• Email notification for detected hacker attempts and available GateLock software
updates
• Internet access sharing
• Multiple PCs (up to 32 computer s ) can access the Internet through a single xDSL
or cable modem line (Network Addre ss Translation) with only one purchased IP
address, by connecting GateLock to a hub. Works with any Ethernet connection
• Ca n act as a DHCP server on the LAN to dynamically ass ign IP addresses to
GateLock. This makes setting up your home network much easier
• If your ISP dynamically assigns IP addresses to you, GateLock can still act as a
DHCP client on the WAN to automatically receive each IP address assigned by
your ISP
• Hides the IP addresses of your PCs from poten tial intruders, making it harder for
hackers to attack your PC.
Contents of Package
Illustrated belo w are the item s in c l uded in y o ur G a teLoc k pa ckage .
1-3
Page 12
Tren d Micro GateLock Getting Started Guide
FIGURE 1-1. Contents of the GateLoc k Package
• T he GateLock main unit
• Power cord (connects GateLock to your power source )
• CAT5 UTP Ethernet cable (connects from local GateLock port to Ethernet port on
PC, or Uplink port on hub/switch)
•This GateLock Getting Started Guide
Layout of GateLock’s Back Panel
Figure 1-2 shows the back panel of your GateLock unit. This is where you connect
the power adapter and the network cable from you PC or hub and to your xDSL or
cable modem. The PC/HUB dipswitch and the Reset button can also be found here.
FIGURE 1-2. Back Panel of your GateLock unit
1-4
Page 13
Introducing GateLock
From left to right, the five items on the back panel are:
• PC-Hub Switch
• PC/Hub Port
• Internet Port
• Reset Button
• PWR (Power Input)
The usage of each of these five items is explained below.
PC-Hub Switch
The PC-Hub switch is a dipswitch which toggles betwee n “PC mode” and “Hub
mode.” If you will be using GateLock with one PC, move the switch to the right, the
PC side. If you will be using Gatelock with a hub which is connected to multiple
PCs, move the switch to the left, the HUB side.
PC/Hub Port
Provided in your GateLock package is a CAT5 UTP Ethernet straight-through cable.
Connect one e nd of this cable to GateLock’ s PC/Hub port, and connect the other end
to the Ethernet port on the PC or Hub.
Internet Port
This is where you will connect your cable or xDSL modem. Connect one end of the
UTP Ethernet cross-over cable (provided by your ISP) to GateLock’s Internet Link
port, and the other end to your cable or xDSL modem.
Reset Button
When you press Reset, GateLock’s configuration values will be reset to the default
values. To prevent accidental activation, the Reset button is slightly recessed within
the rear GateLock panel. To reach the Reset button, simply insert the tip of a pen or
similar object into the opening and push in lightly.
Note: To see all of GateLoc k’s defau l t setting s, a s w e ll as t he pr o cedure to a lte r t he va lu es to
your own specifications, please refer to Chapter 2.
1-5
Page 14
Tren d Micro GateLock Getting Started Guide
Power Input
The power input port is identified as PWR on the back of the GateLock router. This
is where you will connect the AC power cord which is included in the GateLock
package. (Output: 5 volt direct current, 3 amperes.)
Indicator Lights on Front Panel
Shown below is the front panel of the GateLock box. This is where the various
indicator lights are located. All indicator lights display in red when illuminated.
FIGURE 1-3. Front Panel of your GateLock unit
The eight lights on the front panel are:
• Power
• Antivirus
• Anti-Hacker
• Internet
• PC/Hub
The usage of each of these eight lights is explained below.
1-6
Page 15
Introducing GateLock
Power
When GateLock is connected to a power source, the Power light will be illuminated.
The Power light will be off when electricity is not reaching the unit.
Note: To connect Gatelock to a power source, plug the power adapter (furnished in your
GateLock package) into the PWR port on GateLock’s back panel.
Antivirus
If GateLock’s Antivirus feature is enabled, the Antivirus ligh t will be illuminated.
By default, the Antivirus function is enabl ed and is set to a value of Delete. Tha t is,
GateLock will scan your incoming email for viruses, and if a virus is found, it will
delete the file c ontaining the vi rus. See Chapter 2 to learn how to change thi s setting .
Anti-Hacker
If GateLock’s Anti-Hacker feature is enabled, the Anti-Hacker light will be
illuminated. By default, the Anti-Hacker function is enabled and will block
unsolicited inbound traffic according to GateLock’s internal pre-defined rules. See
Chapter 2 to learn how to change this setting.
Note: To see all of GateLoc k’s defau l t setting s, a s w e ll as t he pr o cedure to a lte r t he va lu es to
your own specifications, please refer to Chapter 2.
Internet
If the Internet light is blinking or flickering, this indicates that there is currently
some traffic on the Internet line. When there is no traffic, the light will be off.
PC/HUB
The PC/HUB light will blink every few seconds when there is any traffic being sent
from a PC to GateLock on the PC/HUB line.
You are now ready for Chapter 2 which explains how to set up your GateLock.
1-7
Page 16
Tren d Micro GateLock Getting Started Guide
1-8
Page 17
Chapter 2
Installing GateLock
This chapter explains how to set up and connect your GateLock to your PC or hub.
Requirements
• You must have a broadband connection installed in your home. The broadband
connection may be via an xDSL (ADSL, SDSL, IDSL, or VDSL) modem or cable
modem.
• If you are using GateLock to connect multiple PCs to the Internet, you will need a
hub. The hub is not include d in the GateLock pa ckage. You can purchase it at most
computer stores. Please refer to the Appendix of this Getting Started Guide and to
the user manual furnished with your hub for information about how to connect
your PCs to a hub.
FIGURE 2-1. Broadband Connection of One Computer to the ISP Without GateLock
2-1
Page 18
Tren d Micro GateLock Getting Started Guide
Step 1 of 2: Connect the Cables
If you are connecting a single PC to the Internet:
FIGURE 2-2. Connectin g One PC to the Inte r ne t w ith G at eL o c k
1. Plug one end of your network cable to your PC’s LAN/Ethernet card port and
plug the other end in to the PC/HUB port on GateLock’ s rear panel.
2. Take the red net work cable that comes with your GateLock package:
a. Plug one end of the red network cable into the Internet port on GateLock’s
rear panel.
b. Plug the other end of the red network cab le into your xDSL or cable modem’s
network port.
c. Move the PC/HUB dipswitch on GateLock’s rear panel to the PC side.
3. Connect the power adapter that comes with your GateLock to the PWR por t on
the rear panel and plug the other end into a power socket.
If you are connecting multiple PCs to the Internet:
FIGURE 2-3. Connecting Multiple PCs to the Internet with GateLock
2-2
Page 19
Installing GateLock
1. For each PC, plug one end of the network cable into your PC’s LAN/Ethe rnet
port and plug the othe r end into one of the ports of your hub.
2. Take the red net work cable that comes with your GateLock package:
a. Plug one end of the red cable into the PC/HUB port on the rear panel of
GateLock.
b. Connect the hub to your GateLock:
• If your hub has a network port label ed “Uplink,” plug the other end of the
red network cable into the “Uplink” port of the hub. Move the PC/HUB
dipswitch on GateL ock’s rea r panel to the PC side.
• If your HUB does not have a network port labeled “Uplink,” plug the
other end of the red network cable into any port of the HUB. Move the
PC/HUB dipswitch on GateLock’s rear panel to the HUB side.
3. Plug one end of another network cab le into the Internet port on GateLock’s rear
panel and plug the other end into your xDSL or cable modem’s network port.
4. Connect the power adapter that comes with your GateLock to the PWR por t on
the rear panel and plug the other end into a power socket.
Step 2 of 2: Make Sure Your PC Can Talk to GateLock
For each PC that is directly connected to GateLock, or indirectly connected to
GateLock through a hub:
1. Restart your PC.
2. Open your We b brows er (Netscape Navigator ver si on 4.0 or above, or Microsoft
Internet Expl orer 4.0 or above) on your PC, and go to http://192.168.1.254. If
you can see the welcome screen of GateLock’s configuration console, your PC
can successfully recognize GateLock. Skip the succeeding step s and go directly
to
Configuring GateLock starting on page 2-1.
3. If you cannot see the welcome screen of GateLock’s configuration console:
• Verify that your PC is obtaining its IP address automatically via DHCP.
Detailed instructions for this proce dure can be found in the section of the
Appendix entit led
changed your PC’s TCP/IP settin gs , please repeat Steps 1 and 2.
• If, after you have changed your PC’s TCP/IP setting s, you still cannot see the
welcome screen of GateLock’s configuration console, check if your Web
browser’s proxy settings are correct. Detailed instructions for this procedure
Setting the Properties for TCP/IP on page A-5. If you
2-3
Page 20
Tren d Micro GateLock Getting Started Guide
can be found in the section of the Appendix entitled Setting the Proxy
Servers in Your Browser
on page A-1.
• Toggle the PC/HUB dipswitch on GateLock’s rear panel and repeat Steps 1
and 2.
• For further assistance, contact your GateLock dealer.
If you see the welcome screen of the configuration console, you are now ready for
Chapter 3 which explains how to configure your GateLock’s various functions.
2-4
Page 21
Chapter 3
Configuring GateLock
This chapter discusses the pre-configuration tasks you should perform and explains
how to access the setup screens to configure GateLock. It also tells you how to
upgrade GateLock and submit a question to Trend Micro’s technical support.
GateLock is remarkably easy to set up with its intuitive Web browser-based
configuration console. To facilitate confi guration, GateLock’s configura tion console
includes a Quick Setup wizard that makes changes after asking questions about your
environment. For those who have to perform advanced setup tasks or who want to
change GateLock’s settings, hyperlinks on the sidebar have been provided for easy
access and seamless configuratio n.
Configuration Console Layout
The browser-based configuration console has been designed for quick and easy
access to GateLock’s various functions and features. It has two parts:
• T he s idebar (left-hand navigation frame) contains links that open the main
functional ar eas.
• T he main frame of the configuration console displays the screens that you use to
configure your GateLock settings, includ ing antivirus, anti-ha cker and firewall
settings.
3-1
Page 22
Tren d Micro GateLock Getting Started Guide
Opening the Configuration Console
After connecting GateLock to your PC or hub, the next step is to customize
GateLock’s settings. Do the following:
1. Open your Web browser. In the Address field, enter the followi ng IP addre ss:
http://192.168.1.254
2. Press the <Enter> key. Your Web browser will display the first setup screen, as
shown in Figure 3-1.
FIGURE 3-1. GateLock’s We lcome Screen
3. GateLock ships with a b la nk pas sword , by de fau lt. Simpl y cl ic k Ente r to open th e
configuration console. The Quick Setup screen load s .
4. Note there are 8 main hyperlinks on the s idebar as shown in Figure 3-2. Clicking
these hyperlinks will open GateLock’s main configu r ation screens. What these 8
main screens are and how use them to configure GateLock’s settin gs are
discu s sed in the order of their app e ar ance in th e li s t .
3-2
Page 23
Configuring GateLock
FIGURE 3-2. The Sidebar
Quick Setup
The Q uick Setup screen opens when you click the Enter button on GateLock’s
welcome screen. Quick Setup allows you to easily set up GateLock by providing you
with step-by-step onscreen instructions .
Specify how GateLock will obtain its IP address
Click one of the three option buttons on this screen (Metered xDSL, Static IP
Address, o r Dynamic IP Address). A bri ef descripti on foll ows each option to help you
determine which button to select. By default, Metered xDSL is selected as shown in
Figure 3-3.
3-3
Page 24
Tren d Micro GateLock Getting Started Guide
FIGURE 3-3. "Specify how GateLock will obtain its IP address" scre en
Metered xDSL
If you are an xDSL/broadband user and your Internet Service Provider uses PPPoE
(Point-to-Point Protocol over Etherne t), cl ick the Metered xDSL button. Remember
to remove any existing PPPoE appl ication s you have on your compute r . Cl ick S tart at
the bottom of the screen to advance to the next screen.
3-4
Page 25
Configuring GateLock
FIGURE 3-4. "Metered xDSL" screen
1. On the next screen (see Figure 3-4.), type Your email address and the Password
you use to log on to your ISP.
2. Click Connect automatic a lly when disconnecte d if you want GateLock to keep
you always connected to your ISP.
Click Do not connect automatically if you want to manually connect to your ISP
whenever you are disc onnected. This option is sel ected by default.
3. Click Disconnect if idle for X minutes if you want GateLock to automatically
disconnect your Internet connection when it det ec ts no Internet activit y for the
specified length of time. Using the drop-down menu, you can change the default
length of time to any of these: 5 minutes, 10 minutes, 30 min utes or 1 hour.
Click Disable maximum idle time if you do not want GateLock to automatically
disconnect your Internet connection.
Click Next when you finish typing your information and selecting from the options.
The information screen appears, displaying the settings you have just specified, as
shown in Figure 3-5. These settings were already saved when you clicked Next in the
previous screen; it simply shows you what has been saved.
When Metered xDSL is selected, the Internet light on GateLock’s front panel will be
illuminated after it has success f ully connected to your ISP, indicating that you can
connect to the Internet.
3-5
Page 26
Tren d Micro GateLock Getting Started Guide
FIGURE 3-5. Metered xDSL in fo rm a tion screen
Note: Select Metered xDSL if your ISP has given you a user name and a password. You must
use Ga teL ock ’s setup scr een s to spe cify thi s in form at ion so t hat it ca n b e re cog nize d
by Gat eL ock .
WARNING! When using GateLock with Metered xDSL, always remember to disconnect your
Internet connection using On-Dema nd Connection on GateLock’s configurat ion
console. You will stay connected to the Internet even if you turn off your PC as
long as GateLock is on. You will only be automatically disconnected when the
maximum idle ti me you have specified is reached.
St atic IP Address
If you select the Static IP address option:
1. Type the required information in the bla nk fields on the screen that appear s af ter
you click Start. See Figure 3-6.
• IP address: Type the IP address given to you by your ISP.
• Subnet mask: Type the Subnet Mask address given to you by your ISP.
3-6
Page 27
Configuring GateLock
• Gateway: Type the IP address of the gateway device that allows contact
between GateLock and your ISP.
• Primary DNS: Your ISP will give you at least one DNS (Domain Name
System) address. You must type one here.
• Secondary DNS: It is common to have multiple DNS IP sett ings. If you have
another DNS address, you may type it here. This field is optional.
Note: Even if you selected Static IP Address, you should still select Obtain an IP address
automatically in your PC’s TCP/IP Properties. GateLock will automatically assign
each of your PC an IP address between 192.168.1.100 and 192.168.1.131. For detailed
instructions on how to set the TCP/IP Properties, see
Setting the Properties for
TCP/IP starting on Page A-5.
FIGURE 3-6. St atic IP Address scre en
2. Click Next when done typing the required information. The information screen
appears, displaying the information you have just specified, as shown in
Figure 3-7. These settings were alrea dy saved when you clicked Next in the
previous screen; it simply shows you what has been saved.
3-7
Page 28
Tren d Micro GateLock Getting Started Guide
FIGURE 3-7. St atic IP address informat ion scre en
When this but ton i s act ive, the Internet light on Ga teLock’s front panel should always
be illuminated, indicating that you can connect to the Internet.
Note: Select Static IP Address if your ISP has given you a specific IP address. Your ISP
should have also provided information on how to set up your subnet mask, gateway,
primary DNS, and secondary DNS. You must use GateLock’s setup screens to specify
this information so that it can be recognized by GateLock.
Tip:
Dynamic IP Address
Selecting Dynamic IP addr es s m eans DHCP (Dynamic Host Confi guration Protocol)
will be used to automatically assign an IP address to GateLock. You do not have to
manually assign a permanent IP address to your GateLock device. Simply click the
Start button at the bottom of the screen to advance.
The information screen shown in Figure 3-8. appears, indicating that you have
chosen to use Dynamic IP Address for GateLock to connect to the Internet.
3-8
Page 29
FIGURE 3-8. Dynamic IP Address
Configuring GateLock
Note: Select Dynamic IP Address if your ISP assigns you an IP address automatically using
DHCP. If this is the case, you do not have to do anything. The Internet light on
GateLock’s front will be illuminated, and you should now be able to connect to the
Internet. You can confirm this by successfully connecting to http://www.antivirus.com
with your Web browser.
Antivirus Options
One of GateLock’s powerful features is antivirus protection. It scans incoming and
outgoing POP3 and SMTP email messages and Web-based email attachments for
viruses.
After configuring how GateLock will connect to the Internet, click Next to advance
to Antivirus Options screen, shown in Figure 3-9.
3-9
Page 30
Tren d Micro GateLock Getting Started Guide
FIGURE 3-9. Antivirus Protection screen
GateLock’s antivirus feature is enabled by default. If you wish to disable antivirus
protection, deselect the Enable virus scanning of incoming and outgoing mail
checkbox. However, we highly recommend that you keep GateLock’s antivirus
feature enabled to protect your computer environment against virus es.
If you keep antivirus protection on, you must specify the action that GateLock will
take when it detects a virus in your email messages.
1. Specify the action that you want GateLock to take if it finds a virus in your email
message.
•Click Clean if you want GateLock to try to remove the virus from the infected
file. T his i s se lecte d by de fa ult. You must also s elec t a n al ter nativ e a ct ion fro m
the drop-down menu in case GateL ock is unable to clean the file.
i. Select Delete i f you want GateLock to delete the entire file c ontaining the
uncleanable virus.
ii. Select Pass if you want GateLock to do n othing to the infect ed or
malicious file.
3-10
Page 31
Configuring GateLock
WARNING! Passing an uncleaned virus to your computer puts your system at risk
and is not recommended.
•Click Delete if you want to remove the infected or malicious file from your
computer. Some malicious files, for example those infected by Trojans or
worms, cannot be clea ned and must therefore be dele ted.
•Click Pass if you want GateLock to record the details of the infected or
malicious file in the antivirus log but do nothing to it.
2. Click Next to save your antiviru s protection settings. The information screen
shown in Figure 3-10. appears, displaying the settings you have just saved.
FIGURE 3-10. An tiv ir u s P rotec ti o n in fo r m at io n scree n
3. Click Next to advance to the Anti-Hacker Protection screen.
Anti-Hacker Protection
Another very important security fea ture of GateL ock is anti-hacker protection. It can
protect your computer from hacker attacks with its built-in firewall and intrusion
detection features.
To protect your computer from unwanted intrusion, GateLock uses “port blocking.”
Think of a port as being similar to a door into your computer. Each service on the
3-11
Page 32
Tren d Micro GateLock Getting Started Guide
Internet has a port associated with it, which hypothetically leaves a lot of “doors”
open. GateLock guards these "open doors" against hackers.
GateLock offers 3 anti-hacker security levels to choose from.
1. Select your preferred security level:
•Click High if you want GateLock to block hacker attacks and record intrusion
attempts to the anti-hacker logs.
•Click Medium if you only want Gate Loc k to block hacker attacks.
•Click Low if you want to use minimum firewall features.
2. Click Next. The anti-hacker inf ormation screen loads, as shown in Fi gure 3-11.
FIGURE 3-11. Anti-H a ck er Protecti on in fo rm a t io n sc reen
3. Click Next to advance to the next configuration screen
Email Notification Options
You can configure GateLock to send you email notifications about det ect ed hack er
intrusion attempts and available GateLock software updates.
Although this section is optional, we strongly recommend that you provide your
email address to stay informed about hacker attacks on your computer or network
and new versions of the GateLock software to which you may upgrade.
1. Type the name of your ISP’s SMTP server in the ISP’s SMTP server field. This
information shoul d be included in the account information sheet that you
received from your servi ce provider. It can either be a SMTP name
(SMTP.yourisp.com) or an IP address (254.254.1.1). If you are not sure about
this information, please contact your Internet Service Provider.
2. Type your email address(es) in the field provided. This is where Gate Loc k will
send the email notifications. If you are typing more than one email address,
separate each entry with a semicolon (e.g., mail1@isp.com; mail2@is p.com)
3. Confirm your email ad dresses b y retypi ng t he emai l addre ss( es) you ha ve entered
in the previous fi el d. You can simply select the emai l addre ss(es ) you have t yped,
copy and paste into the second email address f ield.
4. Click the Hacker I nt ru si o n check box if you want to receive notifications about
detected hacker attempts on your computer or network. Click the sample email
hyper li n k to vi e w an ex a m p le of the email mes s ag e tha t yo u wil l receiv e fro m
GateLock.
3-13
Page 34
Tren d Micro GateLock Getting Started Guide
5. Click the Available Software Updates check box if you want to receive
information about new software versions of GateLock. Click the sample email
hyper li n k to vi e w an ex a m p le of the email mes s ag e tha t yo u wil l receiv e fro m
GateLock.
6. Click Next when finished. The email notification information screen loads, as
shown in Figure 3-13., displaying the information you have just provided. This
information has already been saved.
FIGURE 3-13. Email Notification information screen
7. Click Nextto open the next configuration screen.
Online Registration
Your GateLock comes with one-year free software upgrades and maintenance
service. However, you must register your GateLock online before you can receive
these benefits.
Use the Register Your GateLock configuration screen to register online . Your product
information, which incl ude your Gate Lock version and s erial number, is displayed on
the upper part of the configuration screen.
3-14
Page 35
Configuring GateLock
FIGURE 3-14. Ga te Lo c k Online Re gi st ra tion form
To register your GateLock:
1. Type your First name, Last name, Email address, and Telephone number in the
fields provided and select your Country from the drop-down menu. This is
required information. We recommend that you also complete the other optional
fields.
2. Click Finish to submit your regi stration form online.
3-15
Page 36
Tren d Micro GateLock Getting Started Guide
FIGURE 3-15. Registration Successful screen
3. The screen shown in Figure 3-15. will appear if your registration successfully
completed. After a few seconds, a second screen (shown in Figure 3-16.) will
load, informing you that you have completed Quick Setup.
3-16
FIGURE 3-16. Quick Setup completed screen
Page 37
Configuring GateLock
Connection
Clicking the Connection hyperlink on the sidebar display two menu items:
Connection Settings and On-Demand Connection.
Connection Settings
Connection Settings allows you to change your Quick Setup configuration about how
GateLock obtains its IP address.
For example, assume that you were using a dynamic IP address to connect to the
Internet but later decided to change your ISP. Your new ISP has assigned you a static
IP address. You must modify your GateLock’s connection settings to be able to
connect to the Internet.
FIGURE 3-17. Connection Settings screen
3-17
Page 38
Tren d Micro GateLock Getting Started Guide
To modify your connection settings:
1. Click Connection > Connection Settings on the s i debar.
2. Specify how GateLock will obtain its IP address from the 3 options.
•Click Dynamic IP address if your ISP automat ical ly assign s you an IP address.
•Click Static IP address if your ISP has assigned you a fixed IP addres s a nd
type the required information in the blank fields provided. See
Address
• Click Metered xDSL if you use PPPoE to connec t your ISP. Type Your email
address and the Password you use to connect to the Internet. Indicate if you
want GateLock to automatically connect to your ISP if disconnected and if
you want it to automa tical ly di sconn ect your Int ernet connect ion when the re is
no activity for a specified length of time. See
3. Click Apply.
on page 6 for details.
Meter ed xDSL on pag e 4.
Static IP
On-Demand Connection
On-demand connection is only fo r GateLock users with metered xDSL. This allows
the user to check the Internet co nnect ion and to manually connect or disconnect from
the Internet.
To verify if you are connected to the Internet, click Connection > On-Demand Connection from the sidebar. The On-Demand Connection page loads, dis p laying
your connection status and your connection settings.
• If you are disconnected from the Internet and want to connect, cli ck Connect
Now at the bottom of the page.
• If you are connected from the Internet and want to disconnect, click
Disconnect at the bottom of the page.
3-18
Page 39
Configuring GateLock
FIGURE 3-18. The On-Demand Connection screen displaying your connection settings and the
Connect Now button
Security
Clicking the Security hyperlink on the sidebar exposes four menu items: Antivirus
Options, Antivirus Logs, Anti-Hacker Options , and Anti -Hacke r Logs.
Antivirus Options
Antivirus Options allows you to change your antivirus protection settings. You can
disable GateLock’s antivirus protection or change the action GateLock will take
when a virus is detected in your incoming and outgoing email messages. However,
we recommend that you keep the antivirus protection enabled to secure your
computer and network environment.
See Antivirus Options on page 9 for detailed information on how to configure your
GateLock’s antivirus settings.
3-19
Page 40
Tren d Micro GateLock Getting Started Guide
Antivirus Logs
GateLock keeps a record of the viruses that have been detected in your incoming and
outgoing email messages. It can record up to 30 of the most recent virus-detection
incidents.
To view the antivirus logs, click Security > Antivirus Logs.
The next screen displays recently detecte d viruse s, including the date and time of
detection, the result of the action you have configured, the sender and the other
recipient(s), and the name of the file that contained the virus.
FIGURE 3-19. Sample of an Antivirus Log
Anti-Hacker Options
Anti-Hacker Options allows you to change your anti-hacker protection settings. You
can select from GateLock’ s 3 anti-hacker security levels: High, Medium, or Low .
See Anti-Hacker Protection on page 11 for detailed information on how to
configure your anti-hacker settings.
Anti-Hacker Logs
GateLock also records detected hacker intrusion atte mpts on your computer or
network. It can keep up 30 of the most recent hacker attack records.
To view your anti-hacker logs, click Security > Anti-Hacker Logs.
3-20
Page 41
Configuring GateLock
The log loads, displaying the most recent hacker intrusion attempts that were
detected by your GateLock. The record includes the date and time of the hacker
attack, the method used by the hacker, the IP address of the computer used by the
hacker and the number of attempts made.
FIGURE 3-20. Sample of an Anti-Hacker Log
Update
Clicking the Update hyperlink on the sidebar loads 2 more hyperlinks: Product
Update and Update History.
Product Update
To maintain up-to-date antivirus and anti-hacker protection, you should regularly
update your GateLock software components. These components include the
GateLock software, virus pattern file, scan engine and firewall rule.You must be
connected to the Internet for GateLock to check for updates.
To check for available updates, click Update > Product Update. GateLock will
automatically connect to Trend Micro’ s Inte rnet update site and look for new
GateLock components.
3-21
Page 42
Tren d Micro GateLock Getting Started Guide
If updates are available, a pop-up dialog box will appear as the Product Update
screen opens with the message "New components are available for download." Click
Update Now to immediately download the updates.
If there is no update available, the pop-up dialog box will show the message, "No
available updates."
FIGURE 3-21. The Product Update screen
If you want GateLock to automatically check for and download available updates
whenever you are connected to the Internet, click the Enable automatic update check
box.
The screen also tells you if you have configured your GateLock to receive email
notifications whenever ther e are available updates.
Update History
You can track how many times you have updated your GateLock components by
accessing its Update History scree n.
3-22
Page 43
Configuring GateLock
To view your GateLock’s update history, click Update > Update History from the
sidebar. The Update History loads, displaying X of your most recent update dates,
including the versions of your GateLock software, scan engine, virus pattern and
firewall rule.
FIGURE 3-22. Update Histor y screen
Settings
Clicking the Settings hyperlink on the sidebar loads 3 more hyperlinks: Email
Notification, Pass word Protec tion and Time Zone.
Email Notification
Email Notification allows you to change your settings for receiving email messages
about detected hacker attacks or available software updates.
To open the email notification screen, click Settings > Email Notification on the
sidebar. The same window you used to configure your email notification settings in
Quick Setup loads.
You may change your ISP’s SMTP server or add, delete or modify your email
address(es). You may also disable email notification for Hacker Intrusion or Available Software Updates to stop receiving email messages about detected hacker
attacks on your computer or network and information about new GateLock
3-23
Page 44
Tren d Micro GateLock Getting Started Guide
components. However, we strongly recommend that you keep the email notifications
enabled to stay informed about hacker attacks and available updates.
See Email Notification Options on page 12 for detailed configuration instructions.
Password Protection
To control access to the GateLock configuration console, you can enable
password-protection. This will ensure that only you can change GateLock’s settings
thus allowing you to continually secure your computing or network environment.
To enable the GateLock console’s password-protection:
1. Click Settings > Password Protection on the sidebar.
2. Select the Password-protect GateLock’s configuration console check box.
3. Type your Current password. If this is your first time to password-protect the
configuration console, leave the Current password field blank.
4. Type your New password. Your password must ha ve be tween 6 to 10
alphanumeric characters and must not include a space.
5. Confirm your new password by retyping it in the Re-enter new password field.
6. Click Apply when finish ed.
3-24
Page 45
FIGURE 3-23. The Password Protection scr een
Configuring GateLock
Time Zone
For accurately recording of the date and time on GateLock’s various logs, you need
to specify your correct time zone.
To specify your time zone:
1. Click Settings > Time Zone .
2. Select your time zone from the drop-down menu.
3. Click Apply.
3-25
Page 46
Tren d Micro GateLock Getting Started Guide
FIGURE 3-24. The Time Zone screen
Advanced
Clicking the Advanced hyperlink on the sidebar loads 2 hyperlinks that allow you
configure GateLock’s advanced options: IP Port Forwarding and Network Traffic
Control.
IP Port Forwarding
If you are connecting GateLock to your home network and you have servers (e.g.,
Web, FTP, email) that you want to publish outside your network, you need to
configure GateLock for this purpose. This configuration task is called IP port
forwarding.
IP port forwarding allows you to redirect service requests from outside sources to
your internal servers. With GateLock, you have total control over incoming network
traffic: you can allow, reject, or ignore connection requests to your servers.
3-26
Page 47
Configuring GateLock
To configure IP port forwarding for GateLock:
1. Select Advanced > IP Port Forwarding from the sidebar. The IP Port
Forwarding screen loads, as shown in Figure 3-25.
2. By default, no connection requ es t from external sources will be allowed to pass
through GateLock, thus your servers cannot be accessed from outside your
network. Click Add Service.
FIGURE 3-25. Use the IP Port Forwarding screen to control access to your servers
Adding a service
The Add Service screen, shown in Figure 3-26 , is where you assign a port for an
Internet service that you want to publish.
1. Choose the type o f servi ce t hat you want to add , eit her Commonl y-used s erv ice or
User- specifie d service. Commonly-used service includes a drop-down list of
popular Internet services, such HTTP, FTP, Telnet, Netmeeting, and the port
numbers that are normally assigned to them.
3-27
Page 48
Tren d Micro GateLock Getting Started Guide
FIGURE 3-26. Add IP Port Forwar ding Service
• If you select Commonly-used service:
a. Choose the service that you want add from the drop-down list.
b. Assign an IP address to the server that will host the Internet service you are
adding by completing the blank field for Service IP address . GateLoc k will
direct connection requests for this Inter net service to this IP address.
c. If there are specific Web addresses or IP addresses that you do not want to
access the service you are publishing, add these sources in the Deny Service
3-28
Page 49
Configuring GateLock
List. You can choose to Reject or Drop the connection request from these
sources.
• To reject a request from a specific source, type the Web address or IP
address in the blank field under Reject Connection and click the ">>"
button. When this address attempts to connec t to your server, it will be
informed that it is not authorized to connect.
• To ignore a request from a specific source, type the Web address or IP
address in the blank field under Drop Connection and click the ">>"
button to add to the list. This address will not be able to conect to your
server and will not receive any information.
• To remove a Web address or IP address from the Deny Service List,
highlight the address and click the "<<" button.
• If you select User-specified service:
a. Assign any port number between 1 to 65535 that is currently not in use in the
Port field.
b. Type a description for this service (optional), e.g. , File T ransfe r (FTP), to help
you easily identify it.
c. Assign an IP address to the server that will host the Internet service you are
adding by completing the blank field for Service IP address . GateLoc k will
direct connection requests for this Inter net service to this IP address.
d. If there are specific Web addresses or IP addresses that you do not want to
access the service you are publishing, add these sources in the Deny Service List. You can choose to Reject or Drop the connection request from these
sources.
• To reject a request from a specific source, type the Web address or IP
address in the blank field under Reject Connection and click the ">>"
button. When this address attempts to connec t to your server, it will be
informed that it is not authorized to connect.
• To ignore a request from a specific source, type the Web address or IP
address in the blank field under Drop Connection and click the ">>"
button to add to the list. This address will not be able to conect to your
server and will not receive any information.
• To remove a Web address or IP address from the Deny Service List,
highlight the address and click the "<<" button.
2. Click Apply when finished. The IP Port Forwarding screen opens, displaying
details of the service you have added. See Figure 3-27.
3-29
Page 50
Tren d Micro GateLock Getting Started Guide
FIGURE 3-27. What the IP Port For w arding screen looks like after Internet services have been
added
Deleting an existing service
To delete an existing service:
1. Click the corresponding icon for the service. A confirmation dialog box
appears.
2. Click OK.
Editing an existing service
To edit an existing service:
1. Click the corresponding icon. The Edit Service screen loads.
2. Modify the settings by changing the port number or the description for the
service. You may also add or delete Web or IP address es to the Deny Service List.
3. Click Save when finished.
3-30
Page 51
Configuring GateLock
Network Traffic Control
In addition to giving you total control over incoming traffic, GateLock likewise
allows you to control your network’s outgoing traffic by custom izing outgoing traf fic
rules. For example, you can prevent the computer used by your children on your
home network from accessing adult Web sites. To do this, you must configure
GateLock to drop or reject connection requests from your network to specific Web
sites or Internet destinations.
By default, all outgoing traffic is allowed to pass through GateLock.
Adding an outgoing traffic rule
To customize GateLock’s outgoing traffic rules:
1. Select Advanced > Network Traffic Control on the sidebar. The screen , as sh o w n
in Figure 3-28, loads.
FIGURE 3-28. The Network Traffic Control sc reen
2. Click Add Outgoing Rule to add an outgoing rul e. The screen shown in Figure
3-29 loads.
3. Create a outgoing traffic rule.
3-31
Page 52
Tren d Micro GateLock Getting Started Guide
•In Priority Level, specify the level of imp ortance for the rule you are creating.
There are four prio rity levels, with 1 having the highest priority. Specifying
Priority 1 for your rule will ensure that this will be followed first before the
other rules, including the default rule.
•In Source, spe cify to which IP address or addresses the rule will be applied.
Since GateLock as signs an IP address to every PC on your network beginning
with 192.168.1.x, you only need to type the la st digit or set of digits of the IP
address. If you want to apply the rule to all PCs on your network, type the
wildcard character which is the asterisk (*) symbol.
•In Protocol, specify th e type of prot ocol to which the rule wi ll be app lied. This
gives you more flexibility in implementing the rule. For example, you apply
the rule to all PCs on your net work, thus 192.168.1.*, but you only want to
specifically apply this to PCs that use the Hypertext Transfer Tranfer Protocol
(HTTP) which is used to conne ct to the Internet. You must thus select HTTP
from the drop-down list to apply the rule to ALL computers on your network
that us e H T TP.
•In Destination address, type the We b address or IP address.
•In Destination port, type the destination port number f or which th e rul e will be
applied . Typing the wildcard character in this field will apply the rule to all
ports of the destination address.
•In Action, click the action that you want GateLock to take when connection
requests for the specified destination address are made by the specified
sources.
i. Choose Allow to allow the connection to be made.
ii. Choose Ignore to block the outgoing request without notifying the user.
iii.Choose Reject to block the outgoing request and inform the user that
he/she is not authorized to connect to the des tination.
4. Click Save when finished. The IP Port Forwarding page loads, displaying the
rules you have crea ted, as shown in Figure 3-29.
5. To add another rule, click Customiz e rules again.
Deleting an outgoing traffic rule
To delete an existing outgoing rule:
1. Click the corresponding icon. A confirmation dialog box appears.
2. Click OK.
3-32
Page 53
Configuring GateLock
Editing an outgoing traffic rule
To edit an existing outgoing rule,
1. Click the corresponding icon. The Modify Out going Tr affic Rule screen loads.
2. Edit the rule by changing the Priority Level or Protocol for t he rule. You can also
change the entries in Source and Destination ports or the specified Action.
3. Click Save when finished.
FIGURE 3-29. The Add Outgoing Traffic page with sample data
Support Information
If you have any questions concerning GateLock that are not answered by this
GateLock Getting Started Guide, you can submit them to Trend Micro via email. In
the Support Information screen, click the Gatelock@trend.com.tw
open an email window similar to the one shown in Figure 3-31.
link. This will
3-33
Page 54
Tren d Micro GateLock Getting Started Guide
FIGURE 3-30. Support Information screen
3-34
FIGURE 3-31. Send your questions to Tren d Micro using this email format.
Page 55
Configuring GateLock
In this email window, type your question, comment, and/or a description of the
problem you are experiencing. Then click the Send button.
The Button Bar
Near the top of the GateLock setup screen is a button bar, illustrated in Figure 3-32.,
which contains 5 buttons. This section briefly explains the usage of these buttons.
FIGURE 3-32. The Button Bar
Online Help
When you click the Online Help button, a new Web browser window opens. It
contains a link that allows you to access HTML-based help files about all of
GateLock’s main functions.
Support
When you click the Support button, a new Web browser window will open,
displaying Trend Micro’s “Technical Support” home page.
Security Info
When you click the Security Info button, a new Web browser window will open
displaying Trend Micro’s “Virus Information Center” home page at
http://www.antivirus.com/vinfo/
an abundance of useful information concerning known viruses as well as alerts
concerning the newest threats. Several free services are also available.
. This site is a very comprehensi ve reference of feri ng
About
When you click the About button, the About screen displays, as shown below. It
displays copyright informat ion and the version number of GateLock, as well as links
to Trend Micro’s WWW home page.
3-35
Page 56
Tren d Micro GateLock Getting Started Guide
FIGURE 3-33. The A bo u t screen
Log Off
Clicking the Log Off button opens the Welcome screen of GateLock’s configuration
console. We recommend that you password-protect and log off the console every
time you finish configuring GateLock’s settings to control access.
3-36
Page 57
Chapter 4
Troubleshooting and Technical
Support
This cha p te r:
• Provides troubleshooting tips for common problems
• Tells you how to run a self-test on GateLock
• Presents various on-lin e resources provided by Trend Micro, where you can
register your product, test it and find additional information
• Tells you how you can contact Trend Micro if you need to speak with a support
engineer
Troubleshooting
This section lists possible solutions to problems that might arise while installing,
configuring, or using GateLock.
Ethernet Cables
GateLock’s ports are wired similar to a networ k adapter’s port. First, check if all
connected devices are powered on. Then verify if the cables are properly connected
as described in Chapter 2.
4-1
Page 58
Tren d Micro GateLock Getting Started Guide
Connection Timed Out
If you get a “Proxy Reports: Connection Timed Out” error message when you type
an IP Address or a URL, check if your GateLock is:
1. Powered on
2. Connected to your PC or hub
3. Properly configured
If it is, check your Internet connection (cable and modem). GateLock is compatible
with any cable or xDSL modem that supports Ethernet.
Using PING
“PING” (Packet Internet Groper) is a program that ca n be used to ch eck if a computer
is active an d av ailable. You can specify the destination na me of a computer when
using PING, or the actual IP address. “Destination name” refers to the text equivalent
assigned to the actual numeric IP addresses. For example, “www.antivirus.com” is a
destination name and “216.33.22.211” is its equivalent IP address. You can type
either of the two in your Web browser’s address bar and your Web browser will take
you to the Trend Micro home page.
In addition, sometimes an Internet Service Provider will shorten the server address to
a single word to make it easier to remember or type. If your ISP has configured your
email and Web server addresses as arbitrary single words, GateLock might have a
problem accessing the Internet or sending and receiving mail because it has not been
configured to recognize the ISP’s shorter addresses. If you can’t get the actual IP
address from your ISP directly via a phone call, you can use PING to determine the
actual IP address of your ISP’s servers. You will then be able to use that actual
address with GateLock.
You can initiate PING directly at the DOS prompt, or you can initiate it through
Windows.
To initiate PING through Windows:
1. Click the Start but ton, then click the Run... command.
2. Type ping followed by the destination name or IP addres s in the Open field of
the Run window . For exampl e, if your ISP has give n the name “e mail” to its mail
server, you can type:
ping email
4-2
Page 59
Troubleshooting and Technical Support
into the Run window, then click OK. The data will be displayed in a DOS
window. Write down the IP address given, for future reference.
To initiate PING directly at the DOS prompt:
1. Type the word command in the Open field of the Run window.
2. Click OK. A DOS window will open.
3. Type ping email at the DOS prompt. The data will appear in the same DOS
window. Write down the IP address given, for future reference. Figure 4-1 shows
that the IP address for this IS P ’s mail server is 203. 69.216.43.
FIGURE 4-1. Using PING to D etermine the IP Address for a Sample Mail Se rver
The example tells you the IP address of your ISP’s mail server . Now, to determine the
Web address of this IP address, precede it with ping -a at the DOS prompt. Since
the IP address returned in the example above is 203.69.216.43, you would type
ping -a 203.69.216.43 and then press <Enter>. The Web address will be
returned in the same DOS window (in thi s case, “sambaserver.”) This is s hown in the
illustration below.
Write the Web address down for your future reference. This is the W e b address that is
assigned to the IP address you pinged. Normally , it is bett er to configure GateLoc k to
recognize this Web address, because it is less likely to change than the IP address.
4-3
Page 60
Tren d Micro GateLock Getting Started Guide
FIGURE 4-2. Using PING to Determine the Web Addres s of an IP Address
In GateLock, replace the “shortened” server address from the ISP with the actual
server address you just discovered using PING. After you have done this, GateLock
should have no problem accessing the Internet.
If you can successfully PING the IP address of a device’s local port, this indicat es
that the device and the cable are working properly.
If you cannot successfully PING the IP address of your Internet Service Provider’s
gateway or DNS server, check if your cable/xDSL modem is working properly and if
GateLock is correctly configured to connect to your ISP.
If you can successfully PING your ISP’s gateway but cannot PING a site on the
Internet, the problem is probably located within the ISP.
Performing A Self-Test On GateLock
Your GateLock is equipped wit h a self-te st util ity that ca n help you de termine if it has
any hardware problems that might prevent you from optimally using it with your PC
or network of PCs. Symptoms of hardware problems can include your PC's inability
to connect to the Internet, etc.
Before performing a self-test on GateLock, do the following:
• Unplug GateLock from your PC or HUB.
• Take the red cable that came with the GateLock package. Plug one end of the cable
into the Interne t port on GateLock’s rear panel and the other end int o the PC/HUB
port.
4-4
Page 61
Troubleshooting and Technical Support
• Move the PC/HUB dipswitch to the PC side.
To start GateLock' self-test function, do the following:
1. Unplug your GateLock’s power cable from the PWR input port.
2. Press the Reset button on GateLock’s rear panel and plug in the power cable
while keeping the Reset button pressed. To rea ch the Reset button, insert the tip
of a pen or similar object through the small opening and push in lightly. The
Reset button must be pres sed for at least 5 seconds to trigger GateLock's self-te st
utility.
3. When GateLock’s self-test utility is triggered, the LED indicators for Antivirus ,
Anti-Hacker, and Internet will blink intermittently for a few seconds and then
stop.
4. The Internet LED indica tor will s tay illumina ted for a few seconds, after which it
will start blinking. The blinking indicates that GateLo ck is checking itself for
hardware problems. When the blinking stops, it indi cates that self-test is
complete. The wh ole self-test process takes only about a minute to complete.
5. If your GateLock does not have any hardware problems, the Antivirus,
Anti-Hacker, and Internet LEDs will be illuminated after the self-test.
If any of these 3 LEDs is not illuminated af ter the self - test, it indicates that your
GateLock has a hardware pr oblem. Call your GateLock vendor or contact Trend
Micro's support center.
6. If you want to use GateLock after the self-test is completed, unplug the power
cable first and plug it back in. This will ensure that GateLock will function
normally after the self-test.
Trend Micro Contact Info and Online Resources
Technical Support
Trend Micro provides a full year of free technical support for our customers
worldwide. If you need help or just have a question, please feel free to contact us. We
also welcome your comments.
In the United States, Trend Micro representatives can be reached via phone, fax, or
email. Our Web and email addresses follow:
Our US headquarters are located in the heart of Silicon Valley:
Trend Micro, Inc.
10101 N. De Anza Blvd., 2F
Cupertino, CA 95014
Registering GateLock
Registering GateLock with Trend Micro is important because it entitles you to the
following benefits:
• One year of free updates to the program files
• One year of free technical support
• Im portant product information
You can register via the Internet or by mail. To register over the Internet, use the
following URL:
http://www.antivirus.com/vinfo/
To register by regular postal mail, fill out and send the self-addressed, stamped
Registration Card included with the product.
Note: You must register via the Internet if you wish to obtain pattern file updates.
Testing Installation
After you have installed and configured GateLock, you can check its antivirus
function and see how it handles viruses.
The European Institute of Computer Antivirus Resea rch (EICAR), along with
antivirus vendors, has developed a test file that can be used in checking your
installation and configuration.
The file, named eicar .com, does not contain an ac tual virus . It wil l cause no ha rm and
will not replicate. Rather, it is a specially created file whose “signature” has been
4-6
Page 63
Troubleshooting and Technical Support
included in the Trend Micro virus pattern file, and therefore can be detected by the
scan engine used by GateLock.
You can download this file from Trend Micro at:
http://www.antivirus.com/vinfo/testfiles/
Click eicar.com to start downloading the file. If GateLock is properly installed and
configured to detect viruses, it should be able to detect the “i nfec ted” file.
Trend Micro Security Center
Comprehensive security information is available via the Internet at our free antivirus
center:
http://www.antivirus.com
Use the Security Informat io n Center to find out about:
• Computer virus hoaxes
• A weekly virus alert, listing the viruses that will tr igger during the current week
• Information about spam emai l, and a list of known spammers
• How to determine if a vi r u s de tection is a fa lse alarm
• Trend Micro’s V irus Encyclopedia, which includes a comprehensive list of names
and symptoms for known viruses and malicious mobile code
• A basic guide to computer viruses
• Trend Micro’s virus reading room, with dozens of articles about the latest issues in
computer viruses, including the threat posed by Java applets and ActiveX controls
• Product details and white papers
Sending Your Virus-Infected Files to Trend Micro
You can send your virus-infected files to Tre nd Micro via email. If you have a file
that you think is infected with a virus, but the scan engine does not detect it or cannot
clean it, we encourage you to send the suspect file to:
virus_doctor@trendmicro.com
Please include a brief description of the symptoms you are experiencing in the
message text. Our tea m of vir us engineers will “dissect” the file to identify and
characterize any virus it may contain, and return the cleaned file to you – usually
within 72 hours.
4-7
Page 64
Tren d Micro GateLock Getting Started Guide
4-8
Page 65
Appendix A
This appendix:
• E xplains how to set up the proxy properti es of your Web browser so that you can
successfully open GateLock’s browser-based configuration console.
• Provides more detailed instructions and illus trations about how to set up the
TCP/IP protocol on your co mput er (Chapter 2 furnished condensed instructions).
• Lists technical and environmental specifications.
• Provides a glossary of terms used in this document.
Setting the Proxy Servers in Your Browser
Since the IP address of GateLock’s PC/HUB port (h ttp://192.168.1.254) is a priva te
IP address, it is im portant tha t you set up your Proxy Server set tin g correctly. You c an
either:
• Disable the Proxy Server setting
— OR —
• Use a Proxy Server, but make 192.168.1.254 an exception
Disabling the Proxy Server using Internet Explorer
1. Select Internet Options... from the Tools Menu.
2. In the Connections tab , click the LAN Settings... butt on.
A-1
Page 66
Tren d Micro GateLock Getting Started Guide
3. Make sure the Use a Proxy Server checkbox is not selected.
4. Make sure the Bypass Proxy Server for Local Addresses checkbox is selected, then click OK.
Enabling the Proxy Server with an Exception using
Internet Explorer
1. Select Internet Options... from the Tools Menu.
2. In the Connections tab , click the LAN Settings... butt on.
3. Make sure the Use a Proxy Server checkbox is selected.
Note: If both Use a Proxy Server and Bypass Proxy Server for Local Addresses are selected ,
the GateLock IP address (192.168.1.254) will be bypassed because it is on the same
LAN as the IP address from the ISP.
4. Click the Advanced... button. The Proxy Setti ngs window will open.
5. In the Exceptions field, type 192.168.1.254 (this is the IP address of GateL o ck ) , th e n cl ick OK.
Disabling the Proxy Server using Netscape
1. Select Preferences... from the Edit Menu.
2. In the left frame, click Advanced, then click Proxies (under Advanced).
3. Select Direct Connection to Internet, then cl ick OK.
Enabling the Proxy Server with an Exception using
Netscape
1. Select Preferences... from the Edit Menu.
2. In the left frame, click Advanced, then click Proxies (under Advanced).
3. Select Manual Proxy Configuration.
4. In the Exceptions field, type 192.168.1.254 (this is the IP addre ss of GateL o ck ) , th e n cl ick OK.
A-2
Page 67
Appendix A
Activating the TCP/IP Protocol
Before you can use a PC for Internet a ccess, you must have TCP/IP software runnin g.
This must be done for each computer you wish to use in conjuncti on with GateLock.
(If you have already installed TCP/IP, skip to the next section now to set it up for use
with GateLock.)
1. Click the Start button. The Start menu will open.
2. Point to Settings on the Start menu, then select Control Panel from the menu.
3. Double-click on the Network icon in the Control Panel window.
FIGURE A-1. The Network icon in the Control Panel
The Network window will then appear, as shown below in Figure A-2.
FIGURE A-2. Making a TCP/IP Selection in the Conf iguration Tab
A-3
Page 68
Tren d Micro GateLock Getting Started Guide
4. Display the Configuration tab of the Net work window, then click on the
appropriate selec tion for the binding of TCP/IP and your Ethe rnet adapter. (You
might have more than one TCP /IP selection available.)
5. Click the Add... button. The Select Ne twork Component Type window will
appear, as shown in Figure A-3.
FIGURE A-3. Specifying Protocol for TCP/IP Installation
6. In the Select Network Component Type window, select Protocol (as shown
above) and t hen cl ick t he Add... b utt on. Or , si mply do uble -c lick o n Protocol. The Select Network Protocol window will open.
7. In the Select Network Protoc ol window, select Microsoft in the Manufacturers
list on the lef t si de of the window . Then select TCP/IP from th e Network Protocols list on the right si de of t he win dow. This is illustrate d in the Fig ure A-4
example.
A-4
Page 69
FIGURE A-4. Selecting Microsoft and TCP/IP in Select Network Protocol
Appendix A
8. Click OK. You are now ready to set the IP address property for TCP/IP.
Setting the Properties for TCP/IP
After each PC you wish to use in conjunction with GateLock has TCP/IP running as
its active network protocol, you need to set the IP Address properties, in addition to
checking other settings, as expla ined below.
1. Click the Start button. The Start menu will open.
2. Point to Settings on the Start Menu, then select Control Panel from the menu.
3. Do uble-click on the Network icon in the Control Panel window.
4. In the Configuration tab of the Network window, select TCP/IP from the list, as
shown in Figure A-5.
A-5
Page 70
Tren d Micro GateLock Getting Started Guide
FIGURE A-5. Selecting TCP/IP in the Network Window
5. Click the Properties button. The TCP/IP Properties window will appear, as shown in
Figure A-6.
A-6
FIGURE A-6. Configuring the IP Address Tab of the TCP/IP Properties Window
Page 71
Appendix A
6. Make sure the Obtain an IP address automatically button is select ed, as shown in the
illustration above. This will ensure that your computer gets its IP address from
GateLock via DHCP (Dynamic Host Configuration Protocol) after you complete the
connection and installation instructions as explained in Chapter 2.
Note: Do not assign a specific IP address or Subnet Mask to your PC in this tab. If you do,
you will not be able to access the Internet when using GateLock.
7. Click the WINS Configuration tab in th e T CP/IP Properties window, and select
Disable WINS Resolution, as shown in Figure A-7.
FIGURE A-7. Configuring the WINS Configur ation Tab
8. Click the Gateway tab in the TCP/IP Properties window, and make sure there are no
gateways installed. If there are, highlight any installed gateways and click the
Remove button until there are none lis ted in the Gateway tab, as sho wn in Figure A-8.
A-7
Page 72
Tren d Micro GateLock Getting Started Guide
FIGURE A-8. Configuring the Gateway Tab
5. Click the DNS Configuration tab and make sure the Disable DNS button is
selected, as shown in the illustration below.
A-8
FIGURE A-9. Configuring the DNS Configuration Tab
Page 73
Appendix A
6. Click OK, which will close the TCP/IP Properties window, and at the same time
will save all of the TCP/IP settings you specifie d. You will be retur ned to the
Network window.
7. Click the OK butt o n in th e Network window to close it. You will then be
prompted to resta r t the PC. At this time, power down the comput er, and follow
the connection and installation instructions as explained in Chapter 2.
LED Indicato rsPower, Antivirus, Anti-Hacker, Internet, PC/HUB
TopologyStar
A-10
Page 75
Environmental Data
Physical Dimensions16.3 x 21.3 x 4.3 centimeters (6.4 x 8.4 x 1.7
inches)
Unit weight14 ounces
CertificationsFCC Cl ass B, CE Mark Co mmer c ia l
Oper a ting Temperatu re 0 to 40 degrees Celsius (32 to 104 degrees F)
Operating Hu m idity10% to 80% non-condensing
Storage Temperature-20 to +70 degrees Celsius (-4 to 158 degrees F)
Storage HumidityMaximum 85% non-condensing
Appendix A
A-11
Page 76
Tren d Micro GateLock Getting Started Guide
Glossary
ADSL
Asymmetric Digital Subscriber Line. This is one popular type of broadband line. In
this manual, we use the term xDSL to denote all varieties of DSL, such as ADSL,
IDSL, SDSL, VDSL, G-lite, etc.
DHCP
Dynamic Host Configuration Protocol. DHCP is software that automatically assigns
IP addresses to clients who log into a TCP/IP network. (This type of IP address is
called a dynamic IP address.) This software usually runs on Routers, Servers, and
other network devices. By default, your GateLock router is set up to use DHCP so
that you do not have to manually assign permanent IP addresses to every device on
your network. We recommend that you not change this, so your PC will be
recognized as a DHCP server.
Ethernet Card
A plug-in circuit board in a PC that takes parallel data from the computer and
converts it into serial data. It then sends the data via 10BASE-T ca ble on the LAN in
packet format. Also referred to as a Network Interface Card (NIC).
Gateway IP
The IP address of the gateway device that allows GateLock and a host to make
contact.
Hub
A device that enables two or more computers to use one cable modem/broadband
line. You would need to connect GateLock to the Hub, and then you could connect up
to 32 computers to the Hub.
IP Address
Each IP (Internet Protocol) address is unique and consists of 32 bits. Every device on
a network must have an IP address. An IP address consists of a network address
(which is assigned by a government agency), and a host address (which is assigned
by a company administator to each host computer). Although text characters are
often used to represent an IP address, the actual address consists of digits. For
example, the IP address for http://www.antivirus.com is 216.33.22.211.
• Dynamic — A dynamic IP address is one that is assigned to a de vic e on a TCP/IP
network automatically by a DHCP server. The IP addre ss would change every time
A-12
Page 77
Appendix A
the device connec ts to the network, or when the modem is shut off. Therefore, a
dynamic IP address doe s not necessarily change very often.
• Static — A static IP address is a permanently assigned address to a device on a
TCP/IP network. For example, a printer would typically have a static IP address
because it is repeatedly accessed by users. Since the static IP address is a
“constant” address, it is more susceptible to attacks from hackers. GateLock helps
to hide the IP addresses to make it harder for hackers t o access your PCs. To check
whether you have static DHCP IP addresses, consult your Internet Service
Provider.
NAT
Network Address Translation. GateLock uses NAT and TCP/IP port inspections.
NAT “converts” IP addresses on a local area network so that only one address is sent
out publicly on the Internet. This means that the actual IP addresses of multiple
computers connected to a private local area network is never made public on the
Internet. In addition to this protection, NAT provides another benefit to users of
GateLock. If you are using a cable/xDSL modem and have only one TCP/IP address
provided by an Internet Service Provider, you can have multiple other private
addresses behind the one address provided by the ISP.
Subnet Mask
Also known as Network Mask. A subnet is actually a network subdivision. It
identifies the spec ific net work and host addres ses, by determining whic h part of an IP
(Internet Protocol) address constitutes the network portion, and which part identifies
the host portion. GateLock is furnished with a Subnet Mask of 255.255.255.0. The
first three numbers, with a val ue of “255,” indic ate that the first thre e numbers are the
IP address of a network. The last digit should be between 1 and 254 and identifies a
host on that network. So, when subnetting is used, the IP address is divided into a
subnet number and a host number. Hosts, as well as gateways, use the Subnet Mask
to identify the bits used for the network and subnet number.
A-13
Page 78
Tren d Micro GateLock Getting Started Guide
A-14
Page 79
Caution: Changes or modifications not expressly approved by
the party responsible for compliance could void the user’s
authority to operate the equipment.
Page 80
Index
A
B
C
D
E
G
H
I
M
N
O
P
R
S
T
U
V
W
Y
A
About button (on Button Bar) 35
Activating TCP/IP protocol 3
ADSL 12
Anti-Hacker
Light 7
Port blocking 12
Anti-Virus
Action on Viruses section of
screen 10
Light 7
Sending Trend your viruses 7
Specifying action to take on vi-
ruses 10
Testing the virus-detecting
function 6
B
Button Bar
About button 36
Help button 35
C
Connecting
GateLock to multiple PCs 3
GateLock to one PC 2
connecting 2
Connecting to Your ISP screen
Top half (illustration) 4
Your Email Address field 13
Contents of GateLock package 3
D
DHCP 12
ducing 1
Dynamic IP address 13
E
eicar.com file for testing 7
Email address for technical support
5
Environmental data for GateLock
To one PC 2
Contents of package 3
Email address for technical sup-
port 34
Environmental data 11
Installing 1
Internet light 7
Internet port 5
IP Address 2, 1
PC Hub switch 5, 2
PC/Hub Port 5
Connecting 2, 3
Power Input 6, 2, 3
Power light 7
Private IP address 3
Registering 6
Subnet Mask address 13
Summary of Features 3
Technical specifications 10
Testing the virus-detecting
function 6
Gateway IP address 12
H
Help button (on Button Bar) 35
Hub device, connecting to 12
I
Indicator lights (top panel) 6
Installing GateLock
Connecting the cables 2
Requirements 1
Testing the antivirus settings 6
Verifying the connection 3
Installing TCP/IP protocol 3
Internet light 7
Internet port 5, 3
Internet Service Pro vi de r
Connecting via PPPoE 6
IP address via DHCP 9
IP Address
Defined 12
Determining using PING 3
Dynamic 13
Static 13
IP Address of GateLock 3, 2, 1
M
Max. Idle Time field 5
N
NAT (Network Address Translation) 13
Network Interface card 12
Network Mask 13
Network window 4, 6
O
Obtain an IP Address Automatically button (TCP/IP Properties window) 7
Online documentation 35
I-2
Page 82
P
PC Hub switch 5, 2
PC/Hub port 5
Connecting to multiple PCs 3
Connecting to one PC 2
Private IP address 1
PING, using 2
Port
Internet 5, 2, 3
PC/Hub 5, 2, 3
Power Input 6, 2, 3
Port blocking 12
Power Input 6, 2, 3
Power light 7
PPPoE protocol 6
Private IP address of GateLock 3, 2
Proxy Server
Disabling using Internet Ex-
plorer 1
Disabling using Netscape 2
Enabling with an exception us-
ing Internet Explorer 2
Enabling with an exception us-
ing Netscape 2
R
Rear panel 4
Receiving email notifications from
Trend Micro 13
Registering GateLock with Trend
Micro 6
Requirements 1
Requirements for installing GateLock 1
S
Security Information Center of
Upper portion 4
Static IP address 13
Subnet Mask defined 13
Summary of GateLock features 3
Support, technical (contact info) 5
T
TCP/IP Properties window
DNS Configuration tab 8
Gateway tab 7
IP Address tab 7
WINS Configuration tab 7
TCP/IP protocol
Installing/Activating 3
Setting the properties 5
Technical specifications of GateLock 10
Technical support contact info 5
Testing the virus-detecting function
6
Trend Micro
Contact info 5
IP Address of home page 12
Security Information Center 7
Sending Trend your viruses 7
Virus Encyclopedia 7
Troubleshooting tips
Ethernet cables 1
I-3
Page 83
Tren d Micro GateLock Getting Started Guide
Using PING 2
U
Use a Fixed IP Address Assigned
by Your ISP button
Filling in the five fields 6
Use the PPPoE Protocol to Connect
to Your ISP button
User Name and Password fields
4, 6
V
Verifying the GateLock connection
3
Virus Encyclopedia of Trend Micro
7
W
Web address, determining using
PING 3
Y
Your Email Address field (in Connecting to Your ISP screen) 13
I-4
Page 84
Trend Micro Incorporated
10101 N. De Anza Blvd., 2nd Floor
Cupertino, CA., 95014 USA
www.antivirus.com
For Sales:
Tel: +1-800-228-5651 (US and Canada)
Tel: +1-408-257-1500 (outside US and Canada)
Fax: +1-408-257-2003
Item Code: xxxx-xxxx
Page 85
Tren d Micro GateLock Getting Started Guide
ii
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.