Zonealarm Z100G Manual
Total Page:16
File Type:pdf, Size:1020Kb
Check Point ZoneAlarm Secure Wireless Router Z100G User Guide Version 7.5 August 2007 COPYRIGHT & TRADEMARKS PREAMBLE Copyright © 2007 SofaWare, All Rights Reserved. No part of this The licenses for most software are designed to take away your document may be reproduced in any form or by any means without freedom to share and change it. By contrast, the GNU General Public written permission from SofaWare. License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This Information in this document is subject to change without notice and General Public License applies to most of the Free Software does not represent a commitment on part of SofaWare Technologies Foundation's software and to any other program whose authors Ltd. commit to using it. (Some other Free Software Foundation software is SofaWare, Safe@Home and Safe@Office are trademarks, service covered by the GNU Library General Public License instead.) You marks, or registered trademarks of SofaWare Technologies Ltd. can apply it to your programs, too. Check Point, AlertAdvisor, Application Intelligence, Check Point When we speak of free software, we are referring to freedom, not Express, Check Point Express CI, the Check Point logo, Check Point price. Our General Public Licenses are designed to make sure that you Pointsec Protector, ClusterXL, Confidence Indexing, ConnectControl, have the freedom to distribute copies of free software (and charge for Connectra, Connectra Accelerator Card, Cooperative Enforcement, this service if you wish), that you receive source code or can get it if Cooperative Security Alliance, CoSa, DefenseNet, Dynamic Shielding you want it, that you can change the software or use pieces of it in new Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia free programs; and that you know you can do these things. Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, To protect your rights, we need to make restrictions that forbid anyone FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, to deny you these rights or to ask you to surrender the rights. These INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, restrictions translate to certain responsibilities for you if you distribute Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, copies of the software, or if you modify it. NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Policy Lifecycle Management, Provider-1, For example, if you distribute copies of such a program, whether SecureClient, SecureClient Mobile, SecureKnowledge, gratis or for a fee, you must give the recipients all the rights that you SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, have. You must make sure that they, too, receive or can get the source SecureUpdate, SecureXL, SecureXL Turbocard, Sentivist, code. And you must show them these terms so they know their rights. SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter We protect your rights with two steps: (1) copyright the software, and Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, (2) offer you this license which gives you legal permission to copy, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter distribute and/or modify the software. Security, SmartLSM, SmartMap, SmartPortal, SmartUpdate, Also, for each author's protection and ours, we want to make certain SmartView, SmartView Monitor, SmartView Reporter, SmartView that everyone understands that there is no warranty for this free Status, SmartViewTracker, SofaWare, SSL Network Extender, software. If the software is modified by someone else and passed on, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, we want its recipients to know that what they have is not the original, User-to-Address Mapping, UTM-1, VPN-1, VPN-1 Accelerator Card, so that any problems introduced by others will not reflect on the VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, original authors' reputations. VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, Finally, any free program is threatened constantly by software patents. VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti- We wish to avoid the danger that redistributors of a free program will Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security Suite, individually obtain patent licenses, in effect making the program ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and proprietary. To prevent this, we have made it clear that any patent the Zone Labs logo are trademarks or registered trademarks of Check must be licensed for everyone's free use or not licensed at all. Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a The precise terms and conditions for copying, distribution and Check Point Software Technologies, Inc. Company. All other product modification follow. names mentioned herein are trademarks or registered trademarks of their respective owners. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 0. This License applies to any program or other work which 6,850,943, and 7,165,076 and may be protected by other U.S. Patents, contains a notice placed by the copyright holder saying it may be foreign patents, or pending applications. Any reproduction of this alert distributed under the terms of this General Public License. The other than as an unmodified copy of this file requires authorization "Program", below, refers to any such program or work, and a "work from Check Point. Permission to electronically redistribute this alert in based on the Program" means either the Program or any derivative its unmodified form is granted. All other rights, including the use of work under copyright law: that is to say, a work containing the other media, are reserved by Check Point Software Technologies Inc. Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee GNU GENERAL PUBLIC LICENSE is addressed as "you". Version 2, June 1991 Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running Copyright © 1989, 1991 Free Software Foundation, Inc. the Program is not restricted, and the output from the Program is 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA covered only if its contents constitute a work based on the Program Everyone is permitted to copy and distribute verbatim copies of this (independent of having been made by running the Program). Whether license document, but changing it is not allowed. that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's distributed under the terms of Sections 1 and 2 above on source code as you receive it, in any medium, provided that you a medium customarily used for software interchange; or, conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices b) Accompany it with a written offer, valid for at least that refer to this License and to the absence of any warranty; and give three years, to give any third party, for a charge no more any other recipients of the Program a copy of this License along with than your cost of physically performing source the Program. distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the You may charge a fee for the physical act of transferring a copy, and terms of Sections 1 and 2 above on a medium you may at your option offer warranty protection in exchange for a customarily used for software interchange; or, fee. 2. You may modify your copy or copies of the Program or any c) Accompany it with the information you received as to portion of it, thus forming a work based on the Program, and copy and the offer to distribute corresponding source code. (This distribute such modifications or work under the terms of Section 1 alternative is allowed only for noncommercial above, provided that you also meet all of these conditions: distribution and only if you received the program in object code or executable form with such an offer, in a) You must cause the modified files to carry prominent accord with Subsection b above.) notices stating that you changed the files and the date of any change. The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source b) You must cause any work that you distribute or code means all the source code for all modules it contains, plus any publish, that in whole or in part contains or is derived associated interface definition files, plus the scripts used to control from the Program or any part thereof, to be licensed as a compilation and installation of the executable. However, as a special whole at no charge to all third parties under the terms of exception, the source code distributed need not include anything that this License. is normally distributed (in either source or binary form) with the major c) If the modified program normally reads commands components (compiler, kernel, and so on) of the operating system on interactively when run,