User's Manual
Index
Index
1 Introduction........................................................................................................4
2 Security Services...............................................................................................6
2.1 Assumptions..............................................................................................6
2.2 System.......................................................................................................6
2.2.1 Firewall...............................................................................................6
2.2.2 VPN....................................................................................................7
2.2.3 Removable Media (C-Plug) ................................................................8
2.2.4 Firmware Update................................................................................9
2.3 Configuration Management .......................................................................9
2.3.1 First Initiation ....................................................................................10
2.3.2 User Management:...........................................................................10
2.3.3 Learning ...........................................................................................10
2.4 Key Management ....................................................................................11
3 Security Analysis.............................................................................................12
3.1 Network and Protocol Analysis................................................................12
3.1.1 VPN..................................................................................................12
3.1.2 Firewall.............................................................................................13
3.1.3 Firmware Update..............................................................................14
3.1.4 Operating System.............................................................................14
3.1.5 Web Server ......................................................................................14
3.1.6 Time Synchronization and Logging ..................................................15
3.2 Configuration ...........................................................................................15
3.2.1 Configuration Files............................................................................16
3.2.2 Bridge...............................................................................................16
4 Summary.........................................................................................................17
5 References......................................................................................................18
19-Aug-05 escrypt GmbH 2