WatchGuard Technologies V10.0 manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation WatchGuard Technologies V10.0. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel WatchGuard Technologies V10.0 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation WatchGuard Technologies V10.0 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation WatchGuard Technologies V10.0 devrait contenir:
- informations sur les caractéristiques techniques du dispositif WatchGuard Technologies V10.0
- nom du fabricant et année de fabrication WatchGuard Technologies V10.0
- instructions d'utilisation, de réglage et d’entretien de l'équipement WatchGuard Technologies V10.0
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage WatchGuard Technologies V10.0 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles WatchGuard Technologies V10.0 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service WatchGuard Technologies en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées WatchGuard Technologies V10.0, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif WatchGuard Technologies V10.0, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation WatchGuard Technologies V10.0. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    W atchGuard®Mobile VPN with IPSec Administrator Guide W atchGuard Mobile VPN v10.0 R evised: November 28, 2007[...]

  • Page 2

    ii Mobile User VPN ADDRESS: 505 Fifth Avenue South Suite 500 Seattle, W A 98104 SUPPORT : www .w atchguard.com/suppor t U.S. and Canada +877.232.3531 All Other Countries +1.206.521.3575 SALES: U.S. and Canada +1.800.734.9905 All Other Countries +1.206.613.0895 ABOUT WA TCHGUARD WatchGuard is a leading provider of networ k security solutions for sma[...]

  • Page 3

    Administrator Guide 1 1 Configure the Firebox X Edge to use Mobile VPN with IPSec The W atchGuard® Mobi le VPN with IPSec clien t is a software applica tion that is ins talled on a r emote computer . The client makes a secur e connection from the remote c omputer to your pr otected network through an unsecured network. The Mobile VPN client uses I[...]

  • Page 4

    Enabling Mobil e VPN for a Fir ebox User Account 2 Mobile User VPN The F irebox X Edge creates a .wgx file for a user when a Fir ebox user ’ s account i s configured f or Mobile VPN, as described in this chapter . If you want to lock the profiles for mobile users by making them read- only , see “Configuring Global Mobile VPN Client Settings” [...]

  • Page 5

    Administrator Guide 3 Configur ing Global Mobi le VPN Client Settings 10 Set MUVPN key exp iration in kilobytes and/or ho urs. The d efault values are 81 92 KB and 24 hours. T o remov e a size and/or time ex piration, set the v alue to zer o (0). 11 Make su re the VPN Client T ype drop- down list is set to Mobile User . This is true whether you use[...]

  • Page 6

    Distributing the Software and Profiles 4 Mobile User VPN 1 Y ou can choose to make the .wgx file r ead- only so that the user cannot change the secu rity polic y file. T o do this, select the Make the MUVPN client security polic y r ead- only check box. 2 Mobile VPN clients use shared Windows Internet Naming Service ( WINS) and Domain Name Syst em [...]

  • Page 7

    Administrator Guide 5 Distributing the Softwar e and Profiles • The end-user p rofile This file contains the user name, shared key , and settings that enable a remote computer t o connect securely over the Internet to a protected, private computer network . F or information on how to get the profile fr om the Edge, see “ Get the user’ s .wgx [...]

  • Page 8

    Distributing the Software and Profiles 6 Mobile User VPN[...]

  • Page 9

    Administrator Guide 7 2 Using Fireware Policy Manager to Configure Mobile VPN with IPSec The W atchGuard® Mobi le VPN with IPSec clien t is a software applica tion that is ins talled on a r emote computer . The client makes a secur e connection from the remote c omputer to your pr otected network through an unsecured network. The Mobile VPN client[...]

  • Page 10

    About Mobile VPN Client Configuration Files 8 Mobile User VPN About Mobile VPN Client Configuration Files With Mobile VPN with IPSec, the network security administrator contr ols end-user profiles. P olicy Man- ager is used to set the name of the end user and create a clien t configura tion file , or profil e, with the file extension .wgx. The .wgx[...]

  • Page 11

    Administrator Guide 9 Configuring the Firebox for Mobile VPN 3 Use the instruc tions pro vided here to go through each screen of the wizard. Click Next after each step . 4 Select a user aut hentica tion server Select an authentication ser ver fr om the Authentica tion Ser v er drop- down list. Y ou can authenticat e users with the internal F irebo [...]

  • Page 12

    Configuring the Firebox for Mobile VPN 10 Mobile User VPN 6 Direct the flow of Internet traffic: Select an option for Internet tr affic . Y ou can allow all Internet traffic between th e Mobile VPN client and the Inte rnet to use the ISP of t he client, or you can make all Internet traffic use th e VPN tunnel. If you choose to force all Internet tr[...]

  • Page 13

    Administrator Guide 11 Configuring the Firebox for Mobile VPN 8 Create the virtual IP address pool: Click Add to add one IP address or an IP address r ange. Repeat this step to add more virtua l IP addr esse s . Mobile VPN users will be assigned one of these IP a dd res se s w he n t he y co nn ec t t o yo ur ne tw or k. The number of IP addresses [...]

  • Page 14

    Modifying an Existing Mobile VPN Profile 12 Mobile User VPN Adding Users to a Firebox Mobile VPN Group T o create an Mobile VPN tunnel with the F irebox, remote users type their user nam e and passwor d to authenticate. W atchGuard® Sy stem Mana ger software uses this information to authenticate the u ser t o the Fir ebox®. T o authenticate, user[...]

  • Page 15

    Administrator Guide 13 Modifying an Existing Mobile VPN Profile 3 Click Edit . The Edit MUVPN Extended Authentication Group dialog box appears. Use the following fields to edit the gr oup profile: Authentication Server Select the authentication server to use for this Mobile VPN group . T o configure y our authentication ser ver , select Setup > [...]

  • Page 16

    Modifying an Existing Mobile VPN Profile 14 Mobile User VPN timeouts for the Mobile VPN group are always ignored because you set timeouts in the individual F irebox user ac counts. The session and idle timeouts cannot be longer than the value in th e SA Lif e field. T o set this field, from the IPSec T unnel tab of the Edit MUVPN Extended Authentic[...]

  • Page 17

    Administrator Guide 15 Modifying an Existing Mobile VPN Profile Phase2 Settings Select the proposal and key expiration sett ings f or the Mobile VPN tunnel. Y ou can also enable P er fect F or war d Secrecy ( PFS) or set the Diffie-Hellman group. T o change other proposal settings, click the Proposal button, and see the procedure de scribed in “D[...]

  • Page 18

    Modifying an Existing Mobile VPN Profile 16 Mobile User VPN Defining advanced Phase 1 settings T o define advanced Phase 1 set tings f or an Mobile VPN user profile: 1 Fro m th e IP Sec T unnel tab of the Edit MUVPN Extended A uthentication Group dialog box, select Adva nced . The Phase1 Advanced Settings dialog box appears. 2 T o change the SA (se[...]

  • Page 19

    Administrator Guide 17 Configuring WINS and DNS Servers 2 Fro m th e Ty p e drop- down list, select ESP or AH as the proposal method. Only ESP is suppor ted at this time. 3 Fro m th e Authentication drop- do wn list, select SHA1 or MD5 for the authenti cation method. 4 Fro m th e Encr yption drop-down list, select the encr yption method . The optio[...]

  • Page 20

    Locking Down an End-User Profile 18 Mobile User VPN Locking Down an End-User Profile Y ou can use the advanced se ttings to lock down th e end-user profile so that u sers can see some set- tings but not change them, and hide other settings so that users cannot change them. W e recommend that you lock down all pr ofiles so that users cannot make cha[...]

  • Page 21

    Administrator Guide 19 Configuring Policies to Filter Mobile VPN T raffic Configuring Policies to Filter Mobile VPN T raffic In a default configuration, Mobile VPN with I PSec users have full access privileges through a Fir ebox®, with the Any policy . T o put limits on Mobile VPN users, you must add policies to the MUVPN tab in Po li c y Ma n ag [...]

  • Page 22

    Re-creating E nd-User Profiles 20 Mobile User VPN Under MUVPN Group , Po lic y Manager di splays the authen tication server , in parentheses, f or the Mobil e VPN g roup . Using the Any Policy The Any policy i s added to all Mobile VPN use r gr oups by def ault. The Any policy allows traffic on all por ts and prot ocols between the Mobile VPN user [...]

  • Page 23

    Administrator Guide 21 Distributing the Softwar e and Profiles Distributing the Sof tware and Profiles W atchGuard® r ecommends distrib uting end-user profiles b y encr ypted email or with some other secure method. Each client computer must hav e: • Soft ware installation pack age The packages are locat ed on the W atchGuard LiveSecurity® Ser v[...]

  • Page 24

    Additional Mobile VPN T opics 22 Mobile User VPN T erminating IPSec connections T o fully stop VPN connections, the F irebo x must be restarted. Removing the IPSec polic y do es not stop current connections. Global VPN settings Global VPN settings on your F irebo x apply to al l manual BOVPN tunnels, managed tunnels, and Mobile VPN tunnels. Y ou ca[...]

  • Page 25

    Administrator Guide 23 3 Mobile VPN Client Inst allation and Connection The W at chGuard® Mobile VPN with IPSec client is installed on an em plo yee computer , whether the employee travels or works from home. The employee uses a standard Internet connectio n and acti- vates the Mobil e VPN client. The Mobile VP N client then creates an encrypted t[...]

  • Page 26

    Installing the Mobile VPN with IPSec Client 24 Mobile User VPN > W indows F irewall > Change Settings > Exceptions ) for UDP port 4500. This will enable Mobile VPN keep -alive packets from the Fir ebox® to reach y our client and keep the VPN tunnel up. • W e recommend that y ou check to make sure all available ser vice packs are install[...]

  • Page 27

    Administrator Guide 25 Installing the Mobile VPN with IPSec Client Importing the end-user profile When the co mputer restarts, the W at chGuard Mobile VPN C onnection Monitor dialog box opens. When the soft war e star ts for the first time after you install it, you get this message: There is no profile for the VPN dial-up! Do you want to use the Co[...]

  • Page 28

    Connecting the Mobile VPN Client 26 Mobile User VPN If the password you use is y our password on an Active Directory or LDAP server and you choose to store it, the password becomes inv alid when it changes on the authentic ation server . 7 Click Fin ish . The computer is now r eady to use Mobile VPN with IPSec. Selecting a certificate and entering [...]

  • Page 29

    Administrator Guide 27 Connecting the Mobile VPN Client Star t y our connec tion to the Internet through a Dial-Up Net w ork ing connection or LAN connection. Then, use the instructions below or select your prof ile, c onnect, and disconnec t by righ t- clicking the Mobile VPN icon on your W indows toolbar . 1 F rom your Wi ndows desktop , select S[...]

  • Page 30

    Seeing Mobile VPN Log Messages 28 Mobile User VPN 4 Use the Connection Mode drop- down list to set the connection behavior you want for this profile. - Manual - When you select manual connection mode, the cl ient does not try to restart the VPN tunnel automatically if the VPN tunnel goes down. T o restart the VPN tunnel, you must click the Con ne c[...]

  • Page 31

    Administrator Guide 29 Securing Y our Computer with the Mobile VPN Firewall Securing Y our Computer with the Mobile VPN Firewall The W at chGuard® Mobile VPN with IPSec cl ient in cludes two fir ewall compone nts: Link firew all The link firewall is not enabled b y default. When the link firewall is enabled, your computer will discard any packets [...]

  • Page 32

    Securing Y our Computer with the Mobile VPN Firewall 30 Mobile User VPN 4 Fro m th e Stateful Inspec tion dr op- down list, select when connected or always . If y ou s ele ct when connected , the link fir ewall operat es only when the VPN tunnel is active f or this profile. If y ou s ele ct alway s , the link firewall is always active , whether the[...]

  • Page 33

    Administrator Guide 31 Securing Y our Computer with the Mobile VPN Firewall 3 Define friendly net works and create firewall rules as described in the subsequent sections. Defining friendly networks Use the Friendly Netw orks tab to define sp ecific known networks for which you want to generate a firewall r ule set. For ex ample, if you want to us e[...]

  • Page 34

    Securing Y our Computer with the Mobile VPN Firewall 32 Mobile User VPN T o create a rule, click New . Use the four tabs in the Fir ewa ll Ru le En tr y dialog box to defi ne the traffic you want to control. Each tab is described below. General tab On the Gener al tab, you define the basic proper ties of your rule . Rule Name T ype a descriptiv e n[...]

  • Page 35

    Administrator Guide 33 Securing Y our Computer with the Mobile VPN Firewall Loc al ta b Use the Local tab to define the local IP address and por ts that are controlled by this rule, if any . We r ec- ommend that, in any rule, you configure the Local IP Addr esses setting to enable the Any IP address radio button. If you are configur ing an incoming[...]

  • Page 36

    Securing Y our Computer with the Mobile VPN Firewall 34 Mobile User VPN Remote tab Use the Remote tab to define the remote IP address or addr esses and ports that are controlled by this rule, if any . For example, if your firewa ll is set to deny all traffic and you want to create a rule to allow outgoing POP3 con nections, you would add th e IP ad[...]

  • Page 37

    Administrator Guide 35 Securing Y our Computer with the Mobile VPN Firewall[...]

  • Page 38

    Securing Y our Computer with the Mobile VPN Firewall 36 Mobile User VPN[...]