Port Based VLANs. Secure Computing SG570, SG300, SG560, SG565, SG550, SG530, SG580, SG575
Add to My manuals341 Pages
Secure Computing SG570 is a rack-mountable network security appliance that provides comprehensive protection for enterprise networks. It offers a wide range of features including firewall, intrusion detection, virtual private networking, and web filtering. SG570 is ideal for businesses that need to secure their networks from a variety of threats.
advertisement
Port Based VLANs
Note
SG560, SG565 and SG580 only.
The SG560, SG565 and SG580 have a VLAN-capable switch built in. This gives you the flexibility to either use it as a simple switch that allows access between all ports (this is the default), or use port based VLANs to control access between each individual port in the switch.
This port based VLAN configuration makes it possible to assign each of the four ports its own subnet address, declare it to be a LAN, WAN or DMZ independent of the other ports and generally treat it as if it was a completely separate physical port.
The SnapGear unit may also participate on an existing VLAN. When you add a VLAN interface to connect to the existing VLAN, you may associate it with one or more of the
SnapGear unit’s ports.
Tagged and untagged VLANs
When using port based VLANs, it is important to understand the differences between tagged and untagged VLANs.
Tagged VLAN interfaces add a VLAN header (see the VLAN Overview section earlier in this chapter) to outgoing network packets, and only accept incoming network packets that contain an appropriate VLAN header. Untagged VLAN interfaces do not add a VLAN header to outgoing network packets, and do not accept incoming packets that contains a
VLAN header.
A port may be a member of either a single untagged VLAN, or one or more tagged
VLANs. A port may not be a member of both tagged and untagged VLANs.
Once switch A has had port based VLANs enabled, ports that have not been explicitly assigned to one or more VLANs are assigned to the default VLAN. The default VLAN is untagged.
Typically, a tagged VLAN interface is used when you want to join an existing VLAN on the network, and an untagged VLAN interface is used when you are using the port based
VLAN feature to isolate the ports so that you can configure each of them individually.
Network Setup
97
Limitations of port based VLANs
There are few further limitations to keep in mind when using port based VLANs:
The total bandwidth from the switch into the CPU is 100Mbits/s, which is shared between the 4 ports. This may limit the bandwidth available to a single port when perform general routing, packet filtering, and other activities.
Port based VLANs can only be enabled if there are less than 16 total VLANs.
Switch A can only have one default VLAN, and any ports that are not explicity assigned to another VLAN are automatically placed on the default VLAN. The default VLAN is untagged.
You cannot add tagged VLANs to port A1; it is a member of the default VLAN only.
Enabling port based VLANs
Note
If you previously selected 1 LAN Port, 3 Isolated Ports in the Switch Configuration step of the Quick Setup Wizard, port based VLANs are already enabled.
Select Network Setup from the Networking menu. Next to the port based VLAN capable interface (Switch A on the SG560, SG565 and SG580), click the Edit icon then the Ethernet Configuration tab.
Network Setup
98
The following settings pertain to port based VLANs:
Enable port based VLANs: Check to enable port based VLANs.
Default port based VLAN ID: As the default VLAN is always untagged, typically you only need to change this from the default setting of 2 if you want another port to participate on an existing tagged VLAN with the ID of 2.
Adding port based VLANs
Note
If you previously selected 1 LAN Port, 3 Isolated Ports in the Switch Configuration step of the Quick Setup Wizard, a single isolated VLAN for each port has already been added.
Select Network Setup from the Networking menu. Under the Connection table, select
VLAN and click Add.
Network Setup
99
The following settings are displayed:
Interface: The port based VLAN capable interface on which to add the VLAN.
VLAN ID: If you are adding a VLAN interface to participate on an existing VLAN, enter its ID number here. Otherwise enter the next available VLAN ID; if the Default port
based VLAN ID has been left at its default setting of 2, Port A2 uses VLAN ID 3, Port
A3 uses VLAN ID 4, and so on.
Note
Some Cisco equipment uses tagged VLAN 1 for its own purposes. We therefore recommend setting the default VLAN ID to 2 or greater for tagged VLANs, unless you intend for the SnapGear unit and Cisco equipment to interact over tagged VLAN 1.
Mode: This is where you associate one or more of switch A’s ports with this VLAN interface. Select Disabled for the ports to exclude from this VLAN. If you are configuring a port or ports to participate on an existing tagged VLAN, set them
Tagged. Otherwise, to isolate a single port so that it may be configured individually, set the port Untagged.
Refer to the section entitled Tagged and untagged VLANs earlier in this chapter for further discussion of these settings.
Click Update. This VLAN interface now appears in the Connections table, and you may configure it as you would any other network interface.
Network Setup
100
advertisement
Key Features
- Advanced firewall with stateful packet inspection
- Intrusion detection and prevention system
- Virtual private networking (VPN) support
- Web filtering and content control
- Load balancing and failover
- High availability clustering
Related manuals
Frequently Answers and Questions
What is the maximum number of VPN tunnels that the SG570 can support?
Does the SG570 support IPv6?
Can the SG570 be managed remotely?
advertisement
Table of contents
- 7 SG Gateway Appliances (SG3xx, SG5xx Series)
- 8 Front panel LEDs
- 9 Rear panel
- 9 Specifications
- 10 SG Rack Mount Appliances (SG7xx Series)
- 11 Front panel LEDs
- 11 Front panel
- 12 Rear panel
- 12 Specifications
- 13 SG PCI Appliances (SG6xx Series)
- 13 Bridged mode
- 14 Secure by default
- 14 LEDs
- 15 Specifications
- 18 SG Gateway Appliance Quick Setup
- 18 Unpack the SnapGear unit
- 19 Set up a single PC to connect to the SnapGear unit
- 21 Set up the SnapGear unit’s password and LAN connection settings
- 24 Set up the SnapGear unit’s Internet connection settings
- 25 Set up the SnapGear unit’s switch
- 26 Connect the SnapGear unit to your LAN
- 26 Set up your LAN to access the Internet
- 27 Automatic configuration of your LAN
- 28 Automatic configuration of your LAN using an existing DHCP server
- 28 Manual configuration of your LAN
- 29 SG Rack Mount Appliance Quick Setup
- 29 Unpack the SnapGear unit
- 30 Set up a single PC to connect to the SnapGear unit
- 32 Set up the SnapGear unit’s password and LAN connection settings
- 34 Connect the SnapGear unit to your LAN
- 35 Set up the PCs on your LAN
- 35 Automatic configuration of your LAN
- 36 Automatic configuration of your LAN using an existing DHCP server
- 37 Manual configuration of your LAN
- 38 Set up the SnapGear unit’s Internet connection settings
- 40 SG PCI Appliance Quick Setup
- 40 Unpack the SnapGear unit
- 40 Install the SnapGear unit in an unused PCI slot
- 40 Install the network driver on your PC
- 40
- 41 Set up your PC to connect to the web management console
- 42 Set up the SnapGear unit’s password and network connection settings
- 43 Automatic configuration
- 45 Manual configuration
- 47 Disabling the reset button on your SnapGear PCI appliance
- 48 The SnapGear Management Console
- 48 Help
- 48 Backup/restore configuration
- 49 Configuring Connections
- 50 Multifunction vs. Fixed-function Ports
- 50 SG710, SG710+: Multifunction Switches and Ports
- 51 SG560, SG565 and SG580: Multifunction Ports
- 51 All Other SG Models: Fixed-function Ports
- 52 Direct Connection
- 52 Network settings
- 53 Firewall class
- 53 Ethernet configuration
- 54 Interface aliases
- 55 IPv6
- 55 ADSL
- 57 PPPoE
- 58 PPTP
- 58 DHCP
- 58 Manually assign settings
- 59 Connection (dial on demand)
- 60 Ethernet configuration
- 60 Aliases
- 60 Cable Modem
- 61 Ethernet configuration
- 61 Aliases
- 61 Dialout and ISDN
- 62 Port settings
- 62 Static addresses
- 62 Aliases
- 62 Connection (dial on demand)
- 62 Dial-in
- 62 Dial-in setup
- 65 Connecting a dial-in client
- 68 Failover, Load Balancing and High Availability
- 68 Configure Internet connections
- 69 Internet Failover
- 70 Edit connection parameters
- 72 Modify failover levels (primary, secondary, tertiary)
- 74 Internet Load Balancing
- 75 Enabling load balancing
- 75 Limitations of load balancing
- 76 High Availability
- 78 Enabling high availability
- 79 DMZ Network
- 80 Configuring a DMZ connection
- 80 Services on the DMZ network
- 81 Guest Network
- 82 Configuring a Guest connection
- 83 Wireless
- 83 Configuring a wireless connection
- 84 Basic wireless settings
- 86 Wireless security
- 86 WEP security method
- 87 WEP with 802.1X
- 87 WPA-PSK (aka WPA-Personal) security method
- 88 WPA-Enterprise
- 88 ACL (Access Control List)
- 89 WDS
- 91 Advanced
- 93 Connecting wireless clients
- 97 Bridging
- 98 Adding a bridge interface
- 99 Edit bridge configuration
- 100 Bridging across a VPN connection
- 100 VLANs
- 101 Adding VLANs
- 102 Editing VLANs
- 102 Removing VLANs
- 103 Port Based VLANs
- 103 Tagged and untagged VLANs
- 104 Limitations of port based VLANs
- 104 Enabling port based VLANs
- 105 Adding port based VLANs
- 107 Editing port based VLANs
- 107 Removing port based VLANs
- 107 GRE Tunnels
- 108 Adding a GRE interface
- 108 GRE over IPSec
- 111 GRE troubleshooting
- 112 Routes
- 112 Static routes
- 112 Policy routes
- 113 Route management
- 113 RIP
- 116 OSPF
- 118 BGP
- 121 System
- 121 Hostname
- 121 Workgroup/domain
- 121 Administrative contact
- 121 Device location
- 122 DNS
- 122 DNS proxy
- 123 Dynamic DNS
- 123 Static hosts
- 124 DHCP Server
- 124 DHCP configuration
- 125 DHCP addresses
- 125 Address list
- 126 Adding and removing addresses
- 127 Reserving IP addresses
- 127 DHCP status
- 128 DHCP Proxy
- 129 Web Cache
- 129 Enabling the web cache
- 129 Selecting a cache size
- 130 Storage
- 130 Local storage
- 131 Network storage share
- 133 Set up LAN PCs to use the web cache
- 133 Peers
- 134 ICAP client
- 135 Advanced
- 136 Web cache with access control
- 136 Transparent web cache with access control
- 136 QoS Traffic Shaping
- 137 QoS autoshaper
- 137 QoS traffic shaping
- 139 IPv6
- 139 SIP
- 140 Configuring the SIP proxy
- 141 Incoming Access
- 142 Administration services
- 143 Web Management
- 144 SSL/HTTPS (Secure HTTP)
- 145 Upload SSL certificates
- 145 Create SSL certificates
- 146 Customizing the Firewall
- 146 Definitions
- 147 Service groups
- 148 Addresses
- 149 Interfaces
- 150 Packet Filtering
- 150 Packet filter rules
- 152 Rate limiting
- 154 Custom firewall rules
- 154 Network Address Translation (NAT)
- 155 Port forwarding
- 158 Port forwarding to an internal mail server
- 160 Source NAT
- 163 1-to-1 NAT
- 164 Masquerading
- 165 Universal Plug and Play Gateway
- 165 Configuring the UPnP Gateway
- 166 Configuring UPnP rules from Windows XP
- 167 Connection Tracking
- 167 Configuring connection tracking
- 169 Intrusion Detection
- 169 The benefits of using an IDS
- 170 Basic Intrusion Detection and Blocking (IDB)
- 170 IDB Configuration
- 171 Dummy services
- 172 Advanced Intrusion Detection and Prevention (Snort and IPS)
- 173 Snort and IPS configuration
- 174 Logging to an analysis server (Snort IDS only)
- 175 Setting up the analysis server
- 177 Access Control and Content Filtering
- 177 How access controls are applied
- 177 Enabling access control
- 179 User authentication
- 180 Browser setup
- 181 ACL
- 182 Web lists
- 182 Policy
- 185 Content filtering
- 185 Obtaining a content filtering license
- 185 Content or Webwasher?
- 186 Webwasher
- 187 Content
- 188 Antivirus
- 189 Enable antivirus
- 190 Storage
- 190 Network share
- 193 Local storage
- 193 POP email
- 193 Scan all POP email
- 195 Scan POP email for specific clients only
- 196 SMTP email
- 197 Web
- 198 FTP
- 200 PPTP and L2TP
- 200 PPTP VPN Server
- 200 Enable the PPTP server
- 202 Add a PPTP user account
- 202 Set up the remote PPTP client
- 203 Windows 2000 PPTP client setup
- 205 Windows XP PPTP client setup
- 207 Connect the remote VPN client
- 208 L2TP VPN Server
- 208 L2TP server setup
- 210 Add an IPSec tunnel
- 212 Add an L2TP user account
- 212 Configure the remote L2TP client
- 215 Connect the remote VPN client
- 215 PPTP and L2TP VPN Client
- 217 IPSec
- 217 SnapGear unit to SnapGear unit
- 218 Quick Setup
- 218 Enable IPSec
- 221 Set Up the Branch Office
- 221 Enable IPSec
- 222 Configure a tunnel to connect to the headquarters office
- 222 Tunnel settings page
- 225 Local endpoint settings
- 226 Other options
- 228 Other options
- 230 Phase 1 settings
- 231 Other options
- 232 Phase 2 settings page
- 233 Configuring the Headquarters
- 233 Enable IPSec
- 233 Configure a tunnel to accept connections from the branch office
- 233 Tunnel settings page
- 234 Local endpoint settings page
- 234 Remote endpoint settings page
- 235 Phase 1 settings page
- 235 Phase 2 settings page
- 236 Tunnel List
- 236 Connection
- 236 Remote party
- 236 Status
- 239 NAT Traversal Support
- 239 Dynamic DNS Support
- 239 Certificate Management
- 240 The OpenSSL application
- 240 Extracting certificates
- 241 Creating certificates
- 241 Create a CA certificate
- 242 Create local certificate pairs
- 242 Using certificates with Windows IPSec
- 243 Add certificates
- 244 IPSec Failover
- 253 IPSec Troubleshooting
- 256 Port Tunnels
- 257 Tunnel server
- 258 Tunnel client
- 260 Attach the USB device
- 260 USB Mass Storage Devices
- 261 Share the storage device
- 261 Set access permissions
- 263 Join a Windows workgroup
- 264 Partitioning a USB mass storage device
- 267 USB Printers
- 267 Set up the print server
- 268 Set up the print spool
- 269 Join a Windows workgroup
- 269 Set up Windows PCs for remote printing
- 273 LPR / LPD setup
- 273 Printer Troubleshooting
- 273 Print driver installation fails
- 273 Printer shows up in Printers and Faxes, but printing fails
- 274 Printing still fails
- 274 USB Network Devices and Modems
- 275 Date and Time
- 275 Manually setting date and time
- 276 Network time
- 276 Synchronizing with an NTP server
- 276 Adding an NTP peer
- 277 Locality
- 277 Backup/Restore Configuration
- 278 Remote backup/restore
- 278 Local backup/restore
- 279 Text save/restore
- 280 Users
- 280 Administrative users
- 282 Local Users
- 283 RADIUS
- 284 TACACS+
- 285 Management
- 285 GCC
- 286 CMS
- 287 SNMP
- 288 Diagnostics
- 288 Diagnostics
- 288 System log
- 289 Local syslog
- 289 Remote syslog
- 290 Email delivery
- 291 Network tests
- 291 USB
- 291 Packet Capture
- 292 Advanced
- 292 Reboot and Reset
- 292 Reboot device
- 292 Erase configuration
- 293 Reset button
- 293 Disabling the reset button on your SG PCI appliance
- 293 Flash upgrade
- 294 Netflash
- 294 Flash upgrade via HTTP
- 294 Flash upgrade via TFTP
- 295 Configuration Files
- 295 Edit files
- 296 Upload file
- 296 Support
- 297 Technical support report
- 305 Access Logging
- 307 Creating Custom Log Rules
- 310 Rate Limiting
- 311 Administrative Access Logging
- 311 Boot Log Messages
- 314 Recovery using Netflash
- 316 Recovery using a BOOTP server
- 318 Units with a hardware clock
- 318 Units without a hardware clock
- 319 Enable null modem dial-in on the SnapGear unit
- 319 Connect the null modem cable
- 319 Enable null modem dialout of the local PC
- 320 Troubleshooting