Deep Edge 2.5 Service Pack 2 Administrator's Guide
Total Page:16
File Type:pdf, Size:1020Kb
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at: http://docs.trendmicro.com/en-us/home.aspx © 2014 Trend Micro Incorporated. All Rights Reserved.Trend Micro, the Trend Micro t-ball logo, Trend Micro Antivirus, Deep Discovery, TrendLabs, TrendEdge, and Smart Protection Network are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Document Part No.: CTEM26692_140930 Release Date: November 2014 Protected by U.S. Patent No.: Patents pending. This documentation introduces the main features of the product and/or provides installation instructions for a production environment. Read through the documentation before installing or using the product. Detailed information about how to use specific features within the product may be available in the Trend Micro Online Help and/or the Trend Micro Knowledge Base at the Trend Micro website. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at [email protected]. Evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp Table of Contents About This Manual About This Manual ........................................................................................... ix Deep Edge Documentation .............................................................................. x Audience ............................................................................................................. xi Document Conventions ................................................................................... xi About Trend Micro .......................................................................................... xii Chapter 1: Deep Edge Next Generation Firewall Deep Edge Overview ..................................................................................... 1-2 What's New ..................................................................................................... 1-2 Main Features .................................................................................................. 1-9 Security Protection ................................................................................. 1-9 Operations Control .............................................................................. 1-10 Visibility and Monitoring .................................................................... 1-10 Network Connectivity ......................................................................... 1-11 Chapter 2: Getting Started Logging on to the Web Console .................................................................. 2-2 Accessing the Setup Wizard .......................................................................... 2-2 Changing the Deep Edge System Password ............................................... 2-3 Configuration Overview ................................................................................ 2-4 Summary of Operations ................................................................................ 2-5 Chapter 3: Processing and Identifying Traffic Network Traffic Overview ............................................................................ 3-2 Interfaces .......................................................................................................... 3-2 Editing Network Interfaces .................................................................. 3-2 i Deep Edge Administrator's Guide Monitoring Hosts ................................................................................... 3-5 Interface Bandwidth Settings ................................................................ 3-5 About VLANs ........................................................................................ 3-5 DNS .................................................................................................................. 3-7 DNS Best Practice Suggestions ............................................................ 3-7 Configuring DNS Settings .................................................................... 3-8 Addresses ......................................................................................................... 3-8 About Addresses and Address Objects .............................................. 3-9 Address Object Parameters .................................................................. 3-9 Adding Address Objects ..................................................................... 3-10 Configuring Address Objects ............................................................. 3-11 Viewing Address Objects .................................................................... 3-11 Deleting Address Objects ................................................................... 3-11 Deployment Settings .................................................................................... 3-12 About Deployment Modes ................................................................. 3-12 Bridging Interfaces ....................................................................................... 3-20 Important Notes About Bridging Interfaces ................................... 3-20 Adding a Bridge .................................................................................... 3-21 Removing a Network Bridge .............................................................. 3-23 Routing Traffic .............................................................................................. 3-25 About Static Routes ............................................................................. 3-25 About Policy-based Route Management .......................................... 3-28 About Dynamic Route Management ................................................ 3-31 Network Address Translation (NAT) ....................................................... 3-45 NAT Rules ............................................................................................ 3-46 Services ........................................................................................................... 3-50 About DNS Forwarding ..................................................................... 3-50 About DHCP ........................................................................................ 3-51 About Dynamic DNS .......................................................................... 3-54 Virtual Private Network .............................................................................. 3-58 User VPN .............................................................................................. 3-58 Secure Socket Layer Virtual Private Network ................................. 3-62 Mobile VPN .......................................................................................... 3-79 Customizing the VPN Portal ........................................................... 3-103 ii Table of Contents Site-to-Site VPN ......................................................................................... 3-104 IPsec Connections ............................................................................. 3-104 Site-to-site VPN Policies ................................................................... 3-107 Advanced IPsec Configuration ........................................................ 3-110 IPSec Status ......................................................................................... 3-111 IPsec Troubleshooting ...................................................................... 3-111 Chapter 4: Policies, Objects, and Security About Policies ................................................................................................. 4-2 How Firewall Policies Work ................................................................. 4-2 About Policy Rules ................................................................................. 4-2 About Policy Objects ................................................................................... 4-10 About Addresses and Address Objects ............................................ 4-11 About Zones and Zone Objects ........................................................ 4-11 About Services and Service Objects .................................................. 4-13 About Applications and Application Objects .................................. 4-15 About URL Category Objects ............................................................ 4-17 About Schedules and Schedule Objects ........................................... 4-29 About Action Profiles .......................................................................... 4-30 About Security Settings ............................................................................... 4-34 Network Intrusion Protection ............................................................ 4-35 IPS Security ........................................................................................... 4-36 Anti-Malware Security ......................................................................... 4-38 Anti-Spam Security .............................................................................. 4-47 WRS Profiles ........................................................................................