Getting Started Utm Firewall Gui
Getting Started Utm Firewall Gui
Introduction
Allied Telesis Unified Threat Management (UTM) Firewalls are the ideal integrated security
platform for modern businesses. Our UTM Firewalls have an integrated architecture built
on the AlliedWare Plus™ OS, bringing its verified and superior operation to the security
needs of today's networks. As well as Allied Telesis' advanced feature set, and powerful
VPN connectivity options for remote network access, the firewalls utilize best of breed
security providers, for up-to-the-minute protection from all known threats.
The Virtual UTM Firewall is a virtualized version of the UTM Firewall that can be run on the
Vista Manager Network Appliance (VST-APL).
This guide shows how to configure a UTM Firewall using the Device GUI.
The Device GUI provides setup of the firewall, enabling the configuration of entities
(zones, networks and hosts) and then creating firewall, NAT and traffic-control rules for
managing traffic between these entities. Advanced firewall features such as Application
control and Web control, as well as threat management features such as Intrusion
Prevention, Malware protection, and Antivirus, can be enabled, configured and
customized for a comprehensive security solution.
The GUI also supports a number of other features such as interface, VLAN, file, log, and
wireless network management, as well as a CLI window and a Dashboard for network
monitoring. The Dashboard shows interface and firewall traffic, system and environmental
information, and the security monitoring widget lets you manage which security features
are enabled, as well as providing statistics. The top 10 applications, and top 10 categories
widgets show what is using the most firewall bandwidth, with rules able to be configured
in response to this monitoring.
Using rules.........................................................................................................................................20
Other features....................................................................................................................................69
File management ........................................................................................................................70
License management..................................................................................................................71
Logging management .................................................................................................................73
AMF Security mini on the AR4050S Series ................................................................................76
5G Mobile on the AR4050S-5G ..................................................................................................76
In addition, it also applies to the Virtual UTM Firewall, running version 5.5.1-2.x or later. This is
supported running on the Vista Manager Network Appliance (VST-APL).
Feature support may change in later software versions. For the latest information, see the following
documents:
These documents are available from the above links on our website at alliedtelesis.com.
Related documents
You also may find the following AlliedWare Plus Feature Overviews useful:
This document describes the Advanced Network Security features on the AR4050S, and
AR3050S, how to configure them, and the logging available for:
Anti-virus
Malware Protection
IP Reputation
Web Control
URL Filtering
It also provides information about: choosing a firewall and features to meet the security and
performance needs of your network using Unified Threat Management (UTM) Offload with the
AR4050S for sharing the processing load with a second physical or virtual device.
To configure an Allied Telesis VPN Router or switch using the Device GUI see the following guides:
Getting Started with the Device GUI for VPN Routers Guide
Once the wizard has run, the Setup Summary page displays the current configuration. You can
change other things in the GUI after having run the setup wizard, however if you choose to go back
and run the wizard again, all your previous configuration will be removed.
If you don't have an Internet connection configured, you'll see a blank Setup Summary
screen.
If you do have an Internet connection configured, then you’ll see those details displayed in
the Setup Summary screen. Click the Start Wizard button in that same screen to reconfigure
your current Internet connection settings:
C613-22078-00 REV T Using the wizard to configure Internet and VPN connections | Page 5
Step 3: Choose a connection method
The following section describes the configuration settings for each connection method.
Note: If you enable a DHCP server, the range of IP addresses that the DHCP server assigns to LAN-
side terminals is xxx.xxx.xxx.2 to xxx.xxx.254. Therefore, if the IP address of the LAN
interface is not xxx.xxx.xxx.1/24, select OFF for DHCP Server and manually configure the
DHCP server from the Network Services menu after the wizard is complete.
C613-22078-00 REV T Using the wizard to configure Internet and VPN connections | Page 6
IPv4 - DHCP Connection
Configure the IPv4 DHCP connection:
Field Description
WAN Interface Select the interface used to connect to the Internet, for example eth1.
DNS Servers Specify the DNS server to use for name resolution.
If you want DHCP to automatically obtain a DNS server address, use the default
Auto.
If fixed settings are required, click the down arrow on the right, click + Add DNS
Server, and enter the IP address of the DNS server.
Field Description
IP Address Enter the IP address of the WAN-side interface.
Default Gateway Enter the IP address of the default gateway used to connect to the Internet.
DNS Servers Specify the DNS server to use for name resolution.
Click the down arrow on the right, click + Add DNS Server, and enter the IP address
of the DNS server.
C613-22078-00 REV T Using the wizard to configure Internet and VPN connections | Page 7
Field Description
DHCP Server Select:
ON to operate the DHCP server function on the LAN-side interface of the device
and provide IP address etc. to the LAN-side terminals.
OFF if you do not want to use the DHCP server function.
Field Description
Service Name This is the PPPoE service name. You can usually leave it blank.
Enter the PPPoE service name only if your Internet service provider (ISP) has specified
it.
Username PPP user name. Enter the user name for the Internet connection notified by your ISP.
Password PPP password. Enter the password for the Internet connection provided by your ISP.
DNS Servers Specify the DNS server to use for name resolution.
If you want IPCP to automatically obtain the DNS server address when connecting
to PPPoE, you can leave it as the default.
If fixed settings are required, click the down arrow on the right, click + Add DNS
Server, and enter the IP address of the DNS server.
DHCP Server Select:
ON to operate the DHCP server function on the LAN-side interface of the device
and provide IP address etc. to the LAN-side terminals.
OFF if you do not want to use the DHCP server function.
C613-22078-00 REV T Using the wizard to configure Internet and VPN connections | Page 8
IPv6 - IPoE Connection
Configure the IPv6 IPoE connection. There are two tabs in this panel, SLAAC (Stateless Address
Auto-Configuration) and DHCPv6 PD (Prefix Delegation).
Field Description
WAN Interface The interface used to connect to the Internet, for example eth1.
Click Next.
Field Description
WAN interface Select the interface used to connect to the Internet, for example eth1.
C613-22078-00 REV T Using the wizard to configure Internet and VPN connections | Page 9
Click the drop down arrow to select the WAN interface.
Click Next
1. DS-Lite
2. IPv6
3. MAP-E
1. DS-Lite tab
Field Description
WAN Interface Select the interface used to connect to the Internet.
Tunnel Destination Enter the destination address for packets sent over the tunnel.
C613-22078-00 REV T Using the wizard to configure Internet and VPN connections | Page 10
2. IPv6 tab
There are two tabs here, SLAAC and DHCPv6 PD:
IPv6 - SLAAC
Configure the IPv4 connections with IPv6 IPoE connections (RA method) and IPv6 tunnels (fixed):
Field Description
WAN Interface Select the interface used to connect to the Internet.
Tunnel Destination Enter the destination address for packets traversing the tunnel.
DDNS Server Use the dynamic DNS client feature to notify the update server of the IPv6
address updates.
IPv6 - DHCPv6 PD
C613-22078-00 REV T Using the wizard to configure Internet and VPN connections | Page 11
Configure IPv4 connections with IPv6 IPoE connections (DHCPv6 PD method) and IPv6 tunnels
(fixed).
Field Description
WAN Interface Select the interface used to connect to the Internet.
Tunnel IP Enter the IPv4 address that you want to configure for the tunnel
interface.
Tunnel Destination Enter the end point (on-the-go device: operator router (BR)) address of
the delivery packet sent from the tunnel interface.
DDNS Server Use the dynamic DNS client feature to notify the update server of IPv6
address updates.
When enabled, the fields ‘DDNS update URL’, ‘DDNS user name’, and
‘DDNS password’ are displayed.
C613-22078-00 REV T Using the wizard to configure Internet and VPN connections | Page 12
3. MAP-E
Field Description
WAN Interface Select the interface used to connect to the Internet, for example eth1.
Softwire Configuration Method Select the softwire method: DHCP, Proprietary, or Static
Softwire Configuration Name Enter a name to create a new soft wire configuration.
IP Phone Select:
ON to use an IP phone. When enabled, the Prefix Name field is displayed.
OFF if you do not want to use the IP Phone function.
A summary screen of the connection status is displayed once the configuration save is complete.
The contents set in the simple setting are stored in the running configuration and reflected in the
operation, but are not automatically saved in the startup configuration.
After confirming that there are no problems with the settings, manually save the settings to the
startup configuration using the Save button in the navigation bar.
You can run the wizard again to make changes to your connection method settings.
C613-22078-00 REV T Using the wizard to configure Internet and VPN connections | Page 13
C613-22078-00 REV T Using the wizard to configure Internet and VPN connections | Page 14
Configuring a VPN connection
To configure a secure VPN connection, first make sure you have an Internet connection, and then
use the following steps:
If you don't have an existing VPN connection, you'll see a blank VPN Summary screen.
If you do have an existing VPN connection, then you’ll see those details displayed in the VPN
Summary screen. Click the Start Wizard button on that same screen to reconfigure your current
VPN connection settings:
C613-22078-00 REV T Using the wizard to configure Internet and VPN connections | Page 15
Field Description
Tunnel IP Enter the IPv4 address of the tunnel interface.
Tunnel Destination Enter the end IP address or host name of the VPN destination.
Tunnel Local Name Enter the ISAKMP IP (local ID) for the local router.
Tunnel Remote Name Enter the ISAKMP IP (remote ID) for the remote router.
Crypto Pre-shared Enter the password (ISAKMP pre-shared key) for the VPN connection.
Key
Destination LAN Enter the LAN-side IPv4 address of the destination network.
If you click Save with a VPN connection already set up, the existing settings on the running
configuration will be erased and replaced with the newly configured content.
When the configuration save is complete, a summary screen of the connection status is displayed.
The contents set in the simple setting are stored in the running configuration and reflected in the
operation, but are not automatically saved in the startup configuration.
After confirming that there are no problems with the settings, manually save the settings to the
startup configuration using the Save button in the navigation bar.
C613-22078-00 REV T Using the wizard to configure Internet and VPN connections | Page 16
You can always run the wizard again to make changes to your VPN connection settings.
C613-22078-00 REV T Using the wizard to configure Internet and VPN connections | Page 17
What is a firewall?
The next sections describe the AlliedWare Plus firewall and how to configure it. A firewall, at its
simplest level, controls traffic flow between a trusted network (such as a corporate LAN) and an
untrusted or public network (such as the Internet). Previous generations of firewalls were port-based
or used packet filtering. These traditional firewalls determined whether traffic is allowed or
disallowed based on characteristics of the packets, including their destination and source IP
addresses and TCP/ UDP port numbers. However, traditional firewalls have failed to keep pace with
the increased use of modern applications and network security threats.
Allied Telesis firewalls use a Deep Packet Inspection (DPI) engine that provides real-time, Layer 7
classification of network traffic. Rather than being limited to filtering packets based on protocols and
ports, the firewall can determine the application associated with the packet, for example social
networking, instant messaging, file sharing, or streaming. This allows Enterprises to accurately
differentiate business-critical from non-critical applications, and enforce security and acceptable-
use policies for applications in ways that make sense for the business.
This comprehensive application, content, and user identification provides full visibility into network
activity, to allow intelligent control of network traffic. Visibility and control, partnered with advanced
threat protection, together provide comprehensive online security.
When the firewall is deciding how it should treat a traffic stream, among the questions it needs to
ask are “where is the stream coming from?” and “where is it going to?”
To help answer those questions, the firewall needs to have a logical map of the network
environment, so that it can categorize the sources and destinations of the flows that it is managing.
Allied Telesis firewalls map out the network environment into regions, using three tiers of granularity.
The divisions into which it cuts up its environment are referred to collectively as entities. The three
levels of granularity in the dividing up of the environment are zones, networks, and hosts. This
hierarchy of entities empowers organizations to accurately apply security policies at company,
department, or individual level.
A network is a logical grouping of hosts within a zone, for example, the sales network within the
LAN zone. Networks consist of the IP subnets and interfaces over which they are reachable. The
allocating of networks to zones is the core activity in dividing the network up into logical regions to
which different security policies apply. A zone has no real meaning in itself until it has one or more
networks allocated to it. Once networks have been allocated to a zone, the zone is then the entity
that collectively represents that set of networks. Then rules can be applied to the zone as a whole, or
to individual networks within the zone.
A host is a single node in a network, for example, the PC of a specific employee. The diagram below
shows PC Wilma is a host within the sales network within the LAN zone. Host entities are defined so
that specific rules can be applied to those particular hosts - e.g. a server to which certain types of
sessions may be initiated.
Hos
t-Fr
ed
Hos
t-W
ilm
a
ales
r k - S Hos
e t wo t-B
arn
N ey
Hos
Zo
t-B
min
etty
ne
d
rk-A
-L
wo
Net
A
N
Firewall rules: are used to filter traffic, allowing or denying, between any two entities. This allows for
granular control, as rules can be based on traffic sources that might be zones, networks, or hosts,
and traffic destinations that might be zones, networks, or hosts.
For example, an organization may choose to block Skype™ company-wide (i.e. from ANY zone to
ANY zone), or allow it only for the marketing department (i.e. allow Skype from the Marketing
network to ANY zone, but block it from any other network, zone, or host).
Traffic control rules: are used to control the bandwidth that applications use. For example,
Spotify™ music streaming may be allowed, but limited in bandwidth due to an acceptable use
policy ensuring company Internet connectivity is prioritized for business traffic.
Network Address Translation (NAT) rules: are used to hide private network addresses for traffic
bound for the Internet. All company traffic leaving the corporate office can share a public network
address for routing through the Internet to its destination.
NAT with IP Masquerade, where private source addresses are mapped to a public source address
with source port translation to identify the association. The single public IP address masquerades
as the source IP on traffic from the private addresses as it goes out to the Internet.
Port forwarding, to provide public access to internal servers. Port forwarding redirects traffic to a
specific host, e.g. forwarding HTTP traffic to a web server in the DMZ.
2. Rules to allow Update Manager to update the firewalls components, see page 35
3. Free security features - IPS, and Custom URL Filtering, see page 38
4. Advanced firewall features - App Control, Web control, and URL Filtering, see page 42
5. Advanced threat protection features - IP Reputation, Malware Protection, and Antivirus, see
page 49
Hos
t
Hos
t
N
-LA
or k
Zo
e t w
ne
N
-P
riv
at
st st
Ho b
e
Ho P
Wever FT s
VLAN1 Ser er ver
rk-S
wo
Zo
Net
n e-
D
M
Eth1
Z
Eth2
Internet
rn et
k- I nte
r
Zo
wo
n
Net
e-
Pu
b
lic
Note: If your physical firewall is new and unused, it will already have the GUI installed from
the factory, the IP address 192.168.1.1 on VLAN1, and the HTTP service enabled. Connect to
any switch port and browse to 192.168.1.1 to begin.
For your virtual firewall, the IP address will be specified when you configure the Virtual UTM
Firewall in VST-APL.
To use the Device GUI, you need to add an IP address to an interface over which you will connect
with a browser, once the Device GUI resource file has been loaded onto the firewall.
You will also need to add IP addresses to the other interfaces that are used in the network.
Alternatively, you can just add an IP address to the interface over which you will connect with your
browser, and then add the other two IP addresses using the GUI Interface Management page.
Enable HTTP so the firewall will serve the Device GUI pages:
Browse to the IP address of the firewall on the interface you are connecting to - e.g. 192.168.1.1 for
VLAN1.
Note: The Device GUI currently supports the Firefox™, Chrome™, Microsoft Edge™,
Internet Explorer 11™, and Apple Safari™ web browsers.
You can log in using any valid username/password combination that has been configured on the
unit, or use the default username/password (manager/friend), if that has not been deleted.
The Dashboard has a number of useful widgets for monitoring the state of your firewall. We'll look
closer at the various Dashboard widgets later, after we've configured the firewall.
To configure the firewall, we'll first create entities to which rules can be applied. Entities are made up
of zones, networks, and hosts. First you create a zone, then you assign the zone a network and then
add hosts to that network.
The first zone we will add is the DMZ zone to be used for company servers that we want to be
accessible from the Internet.
Click Apply
Name the new network ‘servers’. Add an IP subnet and eth1 as the interface over which this
network will be reachable.
The DMZ zone now contains a network named servers with two hosts:
web-server
ftp
Repeat the same steps to create private and public zones/networks with the following details:
Private zone:
Public zone:
Clicking Expand All (on the right side of the page) will display all entities and their interfaces, IP
addresses, and so on.
Select CLI under the System menu. This opens a CLI tab.
Type ena to access Privileged Exec mode, then use the CLI commands:
Note the syntax that is used for identifying a network or host entity.
For example, dmz.servers.web-server indicates that this host named web-server is part of the
servers network within the dmz domain.
We now have a 3-zone network (Public, Private, and DMZ), so next let’s configure the firewall rules
to manage the traffic between these entities.
WARNING: Don’t enable the firewall yet. Enabling the firewall with the ON/OFF switch will block all
applications between all entities by default - no traffic will flow. It is therefore important to
create firewall rules to allow application usage as desired prior to enabling the firewall.
Click + New Rule and create a rule to allow Ping traffic from the Public zone to the Private zone.
This will allow us to test connectivity through the firewall.
Note: To select an application, simply start typing in the application field. Available options will be
filtered down until you select the desired application.
Allow private side firewall zones to initiate traffic flows with each other and out to the Internet:
Now that the firewall rules are created, you can turn the firewall on using the ON/OFF button at
the top right of the Firewall page.
Right-click on any firewall rule and the menu gives you the option to create a new rule above or
below that rule. This allows new rules to be immediately placed in the desired location, and order
of processing.
The right-click menu also has a copy-and-paste function, so you can copy an existing rule that
is similar to the new rule you wish to create, and paste it into a different location. It can then be
edited to suit.
If you'd like to see the updated firewall configuration, use the CLI window and the commands: show
firewall rule, show running-config firewall and show firewall.
Note that the firewall rules are numbered in the order in which they will be actioned (e.g. 10, 20, 30,
and so on). If a rule is dragged to a different location in the list displayed by the GUI, the rules will be
renumbered to reflect the change in order of operation.
Now let's configure NAT rules to manage IP address translation between the Internet and our
internal networks.
We need two NAT masquerade rules for private to public address translation, which are:
Any traffic going from the Private zone out to the Public zone will have NAT applied, so that it
appears to have come from the IP address of the eth2 interface.
Any traffic going from the DMZ zone out to the Public zone will have NAT applied, so that it
appears to have come from the IP address of the eth2 interface.
Click + New Rule to create the first rule for Private to Public traffic:
Click + New Rule again and create the second NAT masquerade rule in the same way for DMZ to
Public traffic with these details:
Click + New Rule and create the two NAT port-forward rules with the following details:
Now click the ON/OFF button at the top right of the Dashboard page to activate NAT.
Open the CLI window to see these new NAT rules. Enter the command show nat rule.
The configuration we have made so far is part of the running-configuration on the firewall.
Click the Save button at the top right of the GUI screen. The Save button will be orange anytime
there is unsaved configuration.
The leading security providers employed by the firewall, such as Emerging Threats, keep their
databases regularly updated with the very latest threat signatures, so security scanning of firewall
traffic catches the latest malicious threats. The firewall utilizes Update Manager to contact the
Allied Telesis update server and download the latest components at pre-defined intervals, or at
specific user request.
You must configure entities and rules to allow connectivity between Update Manager and the
Update Server.
Update Manager retrieves files using sessions initiated from the firewall unit itself.This means that
firewall rules are required that permit these sessions. So, a zone needs to be created that represents
the firewall itself, and the public interface of the firewall has to exist as a host within this zone.
Create zone/network/host entities for Update Manager source traffic with the following details:
The Update Manager uses HTTPS for secure connectivity, so we'll create a firewall rule with the
following details to allow HTTPS traffic out to the update server.
These new rules can be seen added to the firewall rule set.
Once again click the Save button on the GUI top bar to save the Update Manager configuration to
the boot configuration file.
This section configures the Intrusion Prevention System (IPS) and Custom URL Filtering, which are
both free to use on the firewall. “Part 4: Configure licensed firewall security features” and “Part 5:
Configure licensed Advanced Threat Protection (ATP) security features” of the guide configures
licensed firewall and threat protection features.
Click the ON/OFF switch on the top right of the page to enable IPS.
Threats are grouped into categories, for example suspicious web traffic (HTTP), or email traffic
(SMTP). For any threat that is detected in each of these categories, the engine can be set to log the
threat (which is the default action), ignore, or block - drop the matching packets.
Note: You can monitor IPS matches using the Dashboard’s security monitoring widget.
Save the IPS configuration changes to make them part of the boot configuration file.
URLs are matched in this order – user-defined whitelists, user-defined backlists, Kaspersky
blacklist. Pattern checking stops as soon as the first match is found, and that action (allow or block)
is taken. If no match is found, website access will be allowed.
You can now add user-defined whitelists of URLs to allow, and/or blacklists of URLs to block. You
can add multiple lists, and these can have a total maximum of 1000 whitelist URLs and 1000
blacklist URLs. The GUI page lets you know how many URLs are in each list and the total URLs
used.
The custom URL list must be a text file (.txt). All of your .txt files in flash, USB, or SD card are
shown. You can select and save them for the Custom URL Filtering feature to use.
See the URL Filtering Feature Overview Guide for more information about creating user-defined
URL Filtering lists.
Enable URL Filtering with the ON/OFF switch at the top of the page:
The firewall will now match any website URLs that users try to browse to against the whitelist/s, then
the blacklist/s, and then the Kaspersky blacklist (if you are using the Kaspersky licensed URL
Filtering). Pattern checking stops as soon as the first match is found, and that action (allow or block)
is taken. If no match is found, website access will be allowed.
Note: You can monitor URL Filtering hits using the Dashboard’s security monitoring widget.
Save your Custom URL Filtering changes to make them part of the boot configuration.
Allied Telesis firewalls are application aware, and so provide the visibility and control necessary to
safely navigate the increase in online applications and web traffic that are used for effective business
today.
The Advanced Firewall feature license includes Application Control, Web Control and URL
Filtering. The Advanced Firewall feature license is available in 1, 3, and 5 year subscriptions. You
can view current license status by navigating to the License page under the System menu.
Application Control
The Deep Packet Inspection (DPI) firewall engine allows fine-grained application control. Reliable
identification of the individual applications means that rules can be established to govern
application use, and to enforce security and acceptable use policies. For example, Skype chat may
be allowed company wide, while Skype video calls can only be made by the sales department.
Built-in - if a subscription license hasn't been purchased then the built-in application library may
be used. This supports around 200 individual applications.
Procera - the Procera Networks application visibility library identifies around 1400 individual
applications. The firewall will update the library from the Allied Telesis update server at the
specified interval to ensure the latest applications are known.
You can now create firewall or traffic shaping rules to manage how applications are allowed to be
used on the network.
For example, to block the use of Spotify™ (a music streaming service) company-wide, create a
firewall rule denying the Spotify application from the Public (Internet) zone to the Private (LAN) zone.
As well as using the firewall to block undesired traffic, you can also use the Traffic Control page to
manage the bandwidth that certain applications are able to use on the firewall.
For example, to limit Youtube traffic through the firewall to 10Mbps, go to the Traffic Control page
and add a new rule from the Public (Internet) zone to the Private (LAN) zone.
Save the Application Control configuration changes to make them part of the boot configuration.
When a user tries to browse to a website, the http request is intercepted and sent to the classifier
engine, which queries Digital Arts constantly updated URL database for the category that the
website belongs to.
Once a particular URL has been categorized, the result is cached in the firewall so that any
subsequent requests with the same URL can be immediately processed.
Select the Default Action - deny or permit, for web pages that do not match any specific rules,
but match a Web Control category.
Note: You can monitor URL Filtering and Web Control hits using the Dashboard’s security
monitoring widget.
The Web Control feature has its own set of rules, which are separate to the firewall rules. The Web
Control rules are created on the Web Control configuration page.
You can see the new rule applied to the Internet network in the Public zone.
As well as using the predefined website categories, you can also create your own custom categories
which match text strings you enter against website URLs. These custom categories can then have
rules applied (as we did for gambling websites above).
Go to the Custom Categories tab and click the + New Category button.
Create the ‘Movie’ category, and add text string matches for any website addresses containing
IMDB or Rotten Tomatoes.
Click Apply.
You can see the new category and its website matches below:
Use the Web Control Rules tab to add more rules for this category as desired.
Save the Web Control configuration changes to make them part of the boot configuration file.
Note: You can monitor category and rule hits using the Dashboard’s security monitoring widget.
This feature allows you to subscribe to the Kaspersky blacklist service if you have the URL Filtering
license installed. This blacklist contains approximately 64,000 URLs and it is updated regularly to
ensure protection from harmful websites.
Set an Update interval to contact the Update Server for updates to the Kaspersky URL Filtering
blacklist.
URLs are matched in this order – user-defined whitelists, user-defined backlists, Kaspersky
blacklist. Pattern checking stops as soon as the first match is found, and that action (allow or block)
is taken. If no match is found, website access will be allowed.
Save your URL Filtering changes to make them part of the boot configuration.
Note: You can monitor URL Filtering hits using the Dashboard’s security monitoring widget.
Allied Telesis firewalls provide comprehensive threat protection, utilizing security engines and threat
signature databases from the industry's leading vendors. Regular updates ensure up-to-the-minute
protection against cyber attacks.
The Advanced Threat Protection (ATP) license enables IP Reputation, Malware Protection, and
Antivirus (note that Antivirus is only available on the AR4050S).
The ATP license (like the Advanced Firewall license) is available in 1, 3, and 5 year subscriptions. You
can view current license status by navigating to the License page under the System menu.
Set an Update interval to contact the Update Server for IP Reputation list updates.
For any category, IP Reputation can be set to log the threat (which is the default action), ignore, or
block/drop the matching packets.
Save the IP Reputation configuration changes to be part of the boot configuration file.
Note: You can monitor IP Reputation blocked packets using the Dashboard’s security monitoring
widget.
Malware Protection
Malware Protection is a stream-based high performance technology that protects against the most
dangerous cyber threats. By considering threat characteristics and patterns with heuristics analysis,
unknown zero-day attacks can be prevented, along with server-side Malware, web-borne Malware,
and other attack types. Detection covers all types of traffic passing through the firewall, including
web, email, and instant messaging - any Malware is blocked. The Kaspersky anti-Malware signature
database is updated regularly to keep on top of the latest attack mechanisms.
Set an Update Interval to contact the Update Server for updates to the Malware signature
database.
Save the Malware Protection configuration changes so they become part of the boot configuration
file.
Note: You can monitor Malware packets dropped using the Dashboard’s security monitoring
widget.
Antivirus
The firewalls proxy-based Antivirus guards against threats such as viruses, Trojans, worms, spy-
ware, and adware. In addition to protecting the local network by blocking threats embedded in
inbound traffic, it also prevents compromised hosts or malicious users from launching attacks. This
is essential for protecting business reputation, and minimizing business disruption.
Using the Kaspersky Antivirus engine, the signature database containing known threat patterns is
regularly updated.
Set an Update Interval to contact the Update Server for updates to the Antivirus signature
database.
Save the Antivirus configuration changes to make them part of the boot configuration file.
Note: You can monitor how many files have been scanned, viruses found, etc. using the
Dashboard’s security monitoring widget.
1. Obtain the GUI file from our Software Download centre. The filename for v2.8.0 of the GUI is
awplus-gui_551_23.gui.
The file is not device-specific; the same file works on all devices.
Start a browser and browse to the device’s IP address, using HTTPS. You can access the GUI via
any reachable IP address on any interface.
The GUI starts up and displays a login screen. Log in with your username and password.
4. Click Upload.
6. Use a Serial console connection, or Telnet, or SSH to access the CLI, then use the following
commands to stop and restart the HTTP service:
awplus# configure terminal
awplus(config)# no service http
awplus(config)# service http
7. In the Device GUI, go to System > About to check that the latest file has been successfully added
to the device. Look for the GUI Version and GUI Build entries. The first part of the GUI Build entry
is the GUI build date.
The device GUI service expects a GUI resource file with a .gui extension. If there is more than one
.gui file then it will pick up the one with the highest number in its name.
awplus-gui_550_22.gui
awplus-gui_551_23.gui
The GUI service will use the .gui file with the 23 in its name, as this is the highest number.
Port Status
System Information
Traffic
Security Monitoring
Top 10 Applications
Top 10 Categories
Any ports that are currently ‘up’ are shown in green. Hovering your mouse over any port that is ‘up’
displays the Port Information panel, with statistics over the last 5 minutes. The panel lists the port’s
number, speed, packet transmit and receive counts, utilization percentages, and VLAN associations
and aggregation options. For example, display status information for port 1.0.1:
From the Port Configuration panel, you can enable or disable the port, or configure its speed,
duplex mode, polarity, and aggregator status.
Note: The Port Status widget is not available for the Virtual UTM Firewall.
Note: The Interface Traffic widget is not available for the Virtual UTM Firewall.
Firewall Firewall Traffic shows traffic passing through the firewall over a 24 hour period.
Traffic
Note: The Firewall Traffic widget is not available for the Virtual UTM Firewall.
Security The Security Monitoring widget shows the main security and threat protection features of the
monitoring firewall in one handy location. You can see which are currently enabled and which are not. You can
select edit to go to that features dedicated page to configure it further.
Top 10 The Top 10 Applications widget shows the top 10 applications using firewall bandwidth. You have
Applications the ability to take action based on this reporting, by adding a new firewall or traffic control rule. To
add a new firewall or traffic control rule, simply click on the ‘F’ or ‘T’ Add Rule buttons.
The Top 10 Applications table shows cumulative totals, and is live, so the MB used will change and
applications will move position in the table. Clicking the reset button will zero all totals and start to
display the top used applications from that time onwards.
Once you have created the rule it appears in this dialog from where you can view and edit it:
Top 10 Similar to the Top 10 Applications widget, the Top 10 Categories widget shows the top 10 Web
Categories control website categories that are using firewall bandwidth. Click on the ‘W’ button to create a new
Web control rule from the widget in response to this reporting.
System Further system information is available on the About page, under the System menu, such as model,
Page MAC address, serial number, firmware, GUI versions, and so on.
wired devices
APs
This section begins with a brief description of the network map window and the tasks you can
perform there. The section ends with a look at configuring the network topology view and
customizing node icon images.
Note that the screenshots in this section show an x930 Series switch, but the functionality is the
same for all models that include Vista Manager mini.
In the Topology Map view, select Configure - the menu is located at top right corner.
You can create an icon library to help store, organize, and find images.
1. In the Topology Map view, open the Node List (slide-out menu)
3. Click Edit.
5. Click Save.
When you click a node icon on the Network Map, the node information is displayed. In the node
information window, click on the Open button to access the device’s GUI.
You can use the Node List to help you locate a device in the network map. Simply click the device in
the Node List to see its Information details.
Note: The Vista Manager mini settings are not available for the Virtual UTM Firewall.
The device GUI includes a Wireless Management menu, which enables you to set up your wireless
network, monitor and configure the network, and manage AWC:
The device GUI also displays heat maps for managed APs on the network map.
For more information about heat maps, AWC and how to manage wireless devices, see the User
Guide: Wireless Management (AWC) with Vista Manager mini.
The System menu includes information about the device’s model name, MAC address, and
firmware/software etc. You can also manage your files, licenses, and logging here.
Note: The Time settings are not available for the Virtual UTM Firewall. They are managed through
the VST-APL menu.
The upload and download functions provide an easy way to add new files such as firmware,
configurations, scripts, or URL lists to the device.
You can use this page to set the device’s software release or upgrade its firmware and reboot.
To view files on a USB device, navigate back to the main file system (fs), and choose USB:
Use the upload option to browse and locate the file you wish to add to the firewall. From here it is
easy to add more files and change the release and configuration files to be used.
License management
You can use feature licenses to unlock advanced functionality on UTM firewalls.
Licenses such as advanced firewall, and advanced threat protection, enable additional security
features as described in Part 4 on page 42 and Part 5 on page 49 of this guide. You can purchase
AMF Master and AWC wireless licenses to manage your wired and wireless network devices. All of
the licenses are available in 1 or 5-year subscriptions.
The License Management page shows the licenses you currently have on your device. You can add
new purchased licenses from this page too.
Hover your mouse over a green license bar to show its details, such as duration and other relevant
feature information.
For example, to add a 1 year Advanced Threat Protection (ATP) subscription license:
3. Browse and select the .bin file you purchased. Once selected, the .bin file will be uploaded and
the subscription license added to your device.
You can filter logs in 3 different ways to focus your view and support easy analysis:
2. select the severity of logs to display, e.g Critical, Warning, Error etc.
3. search for any text string found in the logs. e.g. ‘received’
In the Logging Configuration page, you can create filters to manage which logs are stored on the
device and also set up a Syslog server(s) for remote log storage.
The Logging Configuration page has two tabs, Local and Remote (syslog server).
Use the Local tab (default) to create filters to manage the level of logs that are stored in the
buffered and permanent logs on the device. You can also delete the buffered or permanent logs
using the Clear Logs button.
2. Select a Notice level: All, Emergency, Alert, Critical, Error, Warning, Notice, Info, or Debug.
3. Select the Facility and Program - a drop-down list appears when you begin typing in these fields.
6. Click Apply.
Use the Remote tab and the +New Host button to set up a syslog server to send log messages
to for storage and analysis.
For more information on using AMF-Sec mini, see the User Guide: AMF Security mini.
5G refers to the internal Sierra Wireless EM9191 modem. It features a higher speed wireless
connection that creates two WWAN interfaces. The interface ‘wwan0’ is used for the internal
EM9191 modem. The interface ‘wwan1’ is available for external USB 3G and 4G cellular modems.
The Wireless WAN menu enables you to set up, monitor, and configure your 5G connections. For
detailed documentation on 5G mobile broadband configuration, see 5G Mobile UTM Firewall
Feature Overview and Configuration Guide.
Wireless WAN
The Wireless WAN page is located under the Network Infrastructure menu:
What system mode the network is operating in. For example, 4G LTE or 5G ENDC:
SIM Config The SIM Configuration dialog enables you to edit the failover interval time in seconds. Click the
Edit button to change the time:
The failover interval in seconds can be from the range 60 to 3600. Enter the number of seconds for
the interval in the Edit failover interval dialog:
SIM Cards The SIM Cards dialog displays information about the SIM cards and their slots, for example, the
SIM slot number, the interface, the APN profile, status, if the network is present or not and if 5G is
active or not:
Click on the down arrow next to the APN profile to select a different profile:
Click the Apply button to make the change or cancel to back out without changing anything. You
can adjust the SIM card state and force it to be admin down or admin up and click Apply to make
your changes.
APN An APN profile must have a minimum configuration that includes the APN Name. The name field
Profiles accepts any string. Some carriers do not require any configuration and will allow you to connect to
Information for these fields is supplied by your carrier. From this dialog you can change the APN
Name, Username, Password, Packet Data Protocol Type and Carrier Name. If you want to delete an
APN profile, you must remove it from all SIM cards before deleting.
Click the +New APN profile button to add a new APN profile:
C613-22078-00 REV T
NETWORK SMARTER
North America Headquarters | 19800 North Creek Parkway | Suite 100 | Bothell | WA 98011 | USA | T: +1 800 424 4284 | F: +1 425 481 3895
Asia-Pacific Headquarters | 11 Tai Seng Link | Singapore | 534182 | T: +65 6383 3832 | F: +65 6383 3830
EMEA & CSA Operations | Incheonweg 7 | 1437 EK Rozenburg | The Netherlands | T: +31 20 7950020 | F: +31 20 7950021
alliedtelesis.com
© 2022 Allied Telesis, Inc. All rights reserved. Information in this document is subject to change without notice. All company names, logos, and product designs that are trademarks or registered trademarks are the property of their respective owners.