User manual
- BaseWall VPN 6000 user manual -
5.1 Manage the Intrusion Prevention System................................................42
5.2 Adding a host or network to the blacklist................................................43
5.3 Removing from blacklist or whitelist........................................................44
6 Wizard: VPN IPSec tunnels..............................................................................45
6.1 VPN IPSec tunnels....................................................................................45
6.2 Managing VPN IPSec tunnels...................................................................45
6.3 Adding a VPN IPSec tunnel to a remote network.....................................45
6.4 Adding a VPN IPSec tunnel to a single dynamic host...............................47
6.5 Editing a VPN IPSec tunnel.......................................................................47
6.6 Deleting a VPN IPSec tunnel....................................................................48
7 Wizard: Certificate management....................................................................49
7.1 Adding Signed Certificate........................................................................49
7.2 Adding Certificate Authority.....................................................................49
8 Wizard: VPN PPTP/L2TP users.........................................................................50
8.1 VPN PPTP/L2TP.........................................................................................50
8.2 Setting up PPTP/L2TP...............................................................................50
8.3 Managing PPTP/L2TP users......................................................................51
8.4 Rights of PPTP/L2TP users........................................................................52
8.5 Changing the base address.....................................................................52
9 Wizard: DMZ setup.........................................................................................53
9.1 DMZ.........................................................................................................53
9.2 Create a DMZ segment............................................................................53
9.3 Managing DMZ-servers............................................................................54
9.4 Netview picture of DMZ servers...............................................................55
10 Wizard: Shaping/VoIP....................................................................................56
10.1 Shaping..................................................................................................56
10.2 Bandwidth..............................................................................................56
10.3 Hosts......................................................................................................56
10.4 The Netview...........................................................................................57
11 E-mail...........................................................................................................58
11.1 First mail domain...................................................................................58
11.2 Administrator mailbox...........................................................................58
11.3 Secondary mail domains........................................................................59
11.4 White and blacklists...............................................................................60
11.5 Reading external mail boxes.................................................................60
11.6 User mail boxes.....................................................................................60
12 HTTP Proxy...................................................................................................62
13 Netview........................................................................................................63
13.1 Policies...................................................................................................63
13.2 Adding or removing ports......................................................................63
13.3 Adding or removing port ranges............................................................64
13.4 Policy overview of a network or host.....................................................64
13.5 Block a host or network.........................................................................64
13.6 IPSec authentication..............................................................................64
13.7 Road warrior(s) authentication..............................................................65
14 IPSec configuration.......................................................................................66
14.1 Identification options.............................................................................66
14.2 IPSec options.........................................................................................66
14.3 Policy options.........................................................................................67
Page 4 / 79