Stormshield SN Series Configuration manual

Category
Software
Type
Configuration manual
GUIDE
STORMSHIELD NETWORK SECURITY
SNS - USER CONFIGURATION
MANUAL
SN Range
Date Version
Details
November 2016 V 3 Creation
Reference : sns-en-user_configuration_manual-v3
Table of contents
WELCOME 11
Recommendations on the operating
environment 11
Introduction 11
Security watch 12
Physical security measures 12
Organizational security measures 12
Human media 13
IT security environment 13
User awareness 15
Administrator management 15
User password management 16
Work environment 17
User access management 17
ACCESS PRIVILEGES 19
Default options tab 19
SSL VPN Portal 19
IPSEC 19
SSL VPN 19
Sponsorship 20
Detailed access” tab 20
Possible operations 20
Configuration table 20
PPTP tab 22
ACTIVE UPDATE 23
Automatic updates 23
Advanced configuration 23
Update servers 23
Update servers of the Stormshield
Network URL database 23
AUDIT LOGS 24
Collaborative security 24
Storage device: SD Card 24
Logs 25
Possible operations 25
Interactions 27
Views 28
Logs 29
ADMINISTRATORS 31
Administrators” tab 31
Possible operations 31
Table of privileges 32
Administrator account tab 34
ANTISPAM 36
General tab 36
Page 2/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
SMTP parameters 36
Advanced properties 37
Whitelisted domains” tab 38
Blacklisted domains” tab 38
ANTIVIRUS 40
Antivirus engine 40
Parameters 40
Analysis of ClamAV files 40
Analysis of Kaspersky files 40
APPLICATIONS AND PROTECTIONS 41
View by inspection profile 41
Selecting the configuration profile 41
The various columns 43
View by context 44
AUTHENTICATION 46
Available methods tab 46
Authentication methods 46
Authentication policy tab 53
Actions on the rules of the authentication
policy 53
New rule 54
"Captive portal" tab 55
Captive portal 55
SSL server 56
Conditions of use for Internet access 56
Advanced properties 56
Internal interfaces” and External
interfaces” tabs 57
User passwords 57
Authentication periods allowed 57
Advanced properties 57
Transparent or explicit HTTP proxy and
multi-user objects 59
Multi-user objects 59
Transparent proxy (implicit) 59
Explicit proxy 60
BLOCK MESSAGES 61
Antivirustab 61
POP3 protocol 61
SMTP protocol 61
FTP protocol 61
HTTP block page tab 61
Block page tabs 62
Editing block pages 62
CERTIFICATES AND PKI 64
Possible operations 64
Search bar 64
Filter 64
Add 65
Delete 65
Action 65
Download 66
Check usage 66
Adding authorities and certificates 67
CLI CONSOLE 75
List of commands 75
Data entry zone 75
CONFIGURATION 77
General configuration” tab 77
General configuration 77
Cryptographic settings 77
Password policy 78
Date/Time settings 78
Hardware 79
Advanced properties 80
Firewall administration” tab 81
Access to the firewall’s administration
interface 81
Access to firewall administration pages81
Remote SSH access 82
Network settings” tab 82
IPv6 Support 82
Proxy server 82
DNS resolution 83
CONFIGURATION OF MONITORING 84
Interval between refreshments 84
Configuration of interfaces and QoS
queues to be monitored 84
"Interface configuration" tab 84
"QoS configuration" tab 84
DASHBOARD 85
The module configuration menu 85
My favorites 85
Configuration 85
The dynamic area: widgets 86
Network 87
Alarms 87
Resources 88
License 88
Hardware 88
Properties 89
New applications 90
Services 90
Active Update 90
Interfaces 90
Page 3/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
High availability 90
Stormshield Management Center 90
Sandboxing 91
DHCP 92
General 92
DHCP server service 92
Default settings 92
Address range 92
Reservation 93
Advanced properties 94
DHCP relay” service 95
Parameters 95
Listening interfaces on the DHCP relay
service 95
DIRECTORIES CONFIGURATION 97
Main window 97
"Add a directory" button 97
"Action" list 97
Creating an internal LDAP 97
Step 1: Selecting the directory 98
Step 2: Accessing the directory 98
Internal LDAP directory screen 98
Connecting to an external LDAP directory 99
Step 1: Selecting the directory 99
Step 2: Accessing the directory 99
External LDAP directory screen 100
Connecting to a PosixAccount external
LDAP directory 103
Step 1: Selecting the directory 103
Step 2: Accessing the directory 103
External LDAP directory screen 103
Connecting to a Microsoft Active Directory 106
Step 1: Selecting the directory 106
Step 2: Accessing the directory 106
Microsoft Active Directory screen 107
DNS CACHE PROXY 110
Enable DNS cache 110
List of clients allowed to used the DNS
cache 110
Advanced properties 110
DYNAMIC DNS 112
List of Dynamic DNS profiles 112
Configuring a profile 112
DNS resolution 112
Dynamic DNS service provider 112
Advanced properties 113
E-MAIL ALERTS 114
Configuration” tab 114
Enable e-mail notifications 114
SMTP server 114
E-mail sending frequency (in
minutes) 114
Intrusion prevention alarms 115
System events 115
Recipients” tab 116
Creating a group 116
Deleting a group 116
Check use 116
Templates tab 117
Editing the template (HTML) 117
Vulnerability manager 117
Certificate request 117
User enrollment 117
List of variables 118
Example of a report received by e-
mail regarding alarms 118
ENROLMENT 119
The enrolment table 119
Possible operations 119
User enrolment and certificate
requests 119
Advanced properties 120
FILTERING AND NAT 121
Evaluation of filtering and the impact
of NAT 121
"Fast-Path" mode 121
Policies 121
Selecting the filter policy 122
Possible operations 123
Selecting multiple objects 123
Drag & drop 123
Filtering” tab 123
Actions on filter policy rules 124
Filter table 126
NAT" tab 138
Actions on NAT policy rules 138
NAT table 140
HIGH AVAILABILITY 147
Step 1: Creating or joining a high
availability cluster 147
Step 2: Configuring network
interfaces 148
If you have chosen to create a cluster148
If you have chosen to join a cluster 148
Step 3: Cluster’s pre-shared key and
data encryption 149
Page 4/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
If a cluster is being created 149
If a cluster exists 150
Step 4: Summary and finalizing the
cluster 150
If a cluster is being created 150
If a cluster exists 150
High availability screen 151
Communication between firewalls in the
high availability cluster 151
Advanced properties 151
HOST REPUTATION 153
Configuration” tab 153
General 153
Alarms 153
Antivirus 153
Sandboxing 153
"Hosts" tab 154
Included list 154
Advanced properties 154
IDENTIFICATION PORTAL 155
Connection 155
Presentation 155
Logging off 156
IMPLICIT RULES 158
Implicit filter rules 158
Rule table 158
Advanced properties 159
INSPECTION PROFILES 160
Security inspection 160
Global configuration for each profile 160
Configuring profiles 161
IPSEC VPN 162
Encryption policy Tunnels tab 162
Site to site (Gateway-Gateway) 163
Anonymous – Mobile users 166
Peers tab 169
List of peers 170
Peer information 170
Identification” tab 175
Approved certificate authorities 175
Mobile tunnels: pre-shared keys 176
Encryption profiles tab 176
Default encryption profiles 176
INTERFACES 180
Operating mode between interfaces 180
Advanced mode 180
Bridge mode or transparent mode 180
Hybrid mode 181
Link aggregation (LACP) – SN510,
SN710, SN910, SN2000, SN3000,
SN6000 and NG models 181
Conclusion 181
Presentation of the configuration
screen 181
Directory of interfaces 182
Toolbar 183
Creating a bridge 183
Identifying the bridge 183
Address range 184
Modifying a bridge 184
“General” tab 184
“Advanced properties” tab 185
“Bridge members” tab 187
Deleting a bridge 187
Modifying an Ethernet interface (in
bridge mode) 187
“Configuration of the interface” tab 187
“Advanced properties” tab 189
Modifying an Ethernet interface
(advanced mode) 191
Creating a VLAN 191
VLAN attached to a single interface
(VLAN endpoint) 191
VLAN attached to 2 interfaces
(crossing VLAN) 192
Adding a VLAN 193
Modifying a VLAN 194
“Configuration of the interface” tab 194
“Advanced properties” tab 195
Deleting a VLAN 197
Creating a modem 197
Step 1 197
Customized 3G/4G modem profile 198
Step 2 199
Modifying a modem 199
PPPoE modem 199
PPTP Modem 200
PPP Modem 200
3G/4G modem 201
Deleting a modem 202
General remarks on configuring
modems 202
Creating a GRETAP interface 202
Modifying a GRETAP interface 202
“Configuration of the interface” tab 203
“Advanced properties” tab 204
Converting an interface to link
aggregation (LACP) 205
Page 5/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
"Link aggregation (LACP)" Tab 206
Configuring an aggregated link 206
LICENCE 208
General tab 208
Buttons 208
Dates 208
Important information about the license 208
Installing from a file 209
Advanced properties 209
License details” tab 210
Buttons 210
The table 210
LOGS - SYSLOG - IPFIX 213
Local storage tab 213
Configuration of the space reserved for
logs 214
Syslog” tab 215
Table of Syslog profiles 215
Configuring a profile 215
IPFIX” tab 216
Advanced properties 216
MAINTENANCE 218
Configuration” tab 218
System disk 218
Maintenance 218
High availability 218
System report (sysinfo) 219
Backup tab 219
Configuration backup 219
Configuration automatic backup 219
Restore” tab 221
Restore configuration 221
Automatic backup restoration 221
System update tab 222
Advanced properties 222
MONITORING 224
Monitoring 224
The table 224
System monitoring 224
Interface monitoring 225
QoS monitoring 226
Host monitoring 227
User monitoring 232
Connection monitoring 236
Route monitoring 238
NETWORK OBJECTS 239
Possible actions 239
Filter 240
The different types of objects 240
Host 240
Network 241
IP address range 241
Port – port range 241
IP protocol 242
Group 242
Port group 243
Router 243
Geographic group 245
DNS name (FQDN) 245
Time object 246
PPTP SERVER 247
General configuration 247
Parameters sent to PPTP clients 247
Advanced configuration 247
Traffic encryption 247
PREFERENCES 248
Logon settings 248
Application settings 248
Management interface behavior 249
External links 249
Log settings 249
PROTOCOLS 250
Search 250
List of protocols 250
Profiles 250
Selecting a profile 250
Buttons 251
Global protocol configuration 251
Global configuration of the TCP/UDP
protocol 252
Global configuration of the SSL
protocol 252
HTTP 253
“IPS” tab 253
“Proxy” tab 256
“ICAP” tab 257
“Analyzing files” tab 258
"Sandboxing" tab 259
SMTP 260
“IPS” tab 260
“Proxy” tab 261
“SMTP Commands” tab 261
“Analyzing files” tab 262
"Sandboxing" tab 263
POP3 263
“IPS - PROXY” tab 263
Page 6/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
“POP3 Commands” tab 264
“Analyzing files” tab 264
"Sandboxing" tab 265
FTP 265
“IPS” tab 265
“Proxy” tab 266
“Commands FTP” tab 267
«FTP Users» tab 271
“Analyzing files” tab 271
"Sandboxing" tab 271
SSL 272
“IPS” tab 272
“Proxy” tab 273
TCP-UDP 274
Profiles screen 275
IP 276
“IPS” tab 276
ICMP 276
“IPS” tab 276
DNS 276
Profiles screen 276
Yahoo Messenger (YMSG) 277
Profiles screen 277
ICQ – AOL IM (OSCAR) 278
Profiles screen 278
Live Messenger (MSN) 278
Profiles screen 278
TFTP 278
Profiles screen 278
MS-RPC protocol 279
NetBios CIFS 280
Profiles screen 280
NetBios SSN 280
EPMAP protocol 280
MGCP 281
Profiles screen 281
RTP 281
“IPS” tab 281
RTCP 282
“IPS” tab 282
RTSP 282
RTSP commands 282
Maximum size of elements (bytes) 282
RTSP session settings 283
RTSP features 283
Support 283
SIP 283
SIP commands 284
Maximum size of elements (bytes) 284
SIP session parameters 284
SIP protocol extensions 284
Support 285
MODBUS 285
General settings 285
Modbus settings 285
Managing Modbus function codes 286
Support 286
S7 286
S7 Settings 286
Managing S7 function codes 286
Support 287
OPC UA 287
OPCUA parameters 287
Managing OPC UA services 287
Support 287
Others 288
QUALITY OF SERVICE (QoS) 289
Network traffic 289
Bandwidth reservation or limitation
(CBQ) 289
Queues 289
Class-based queue (CBQ) 290
Monitoring queue 291
Priority queue 292
Available queues 292
Examples of application and usage
recommendations 292
REPORTS 295
Collaborative security 295
Storage device: SD Card 295
Activity Reports 295
Possible operations 296
Interactions 296
Reports 298
REPORT CONFIGURATION 302
"General" menu 302
Table of reports and history graphs 302
"List of reports" tab 302
"List of history graphs" tab 303
ROUTING 304
Static routes” tab 304
Button bar 304
Presentation of the table 305
Dynamic routing” tab 305
Advanced properties 305
Sending the configuration 305
Return routes” tab 306
Button bar 306
Presentation of the table 306
Page 7/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
SMTP FILTERING 307
Profiles 307
Selecting a profile 307
Buttons 307
Rules 307
Possible operations 308
The table 308
Errors found in the SMTP filter policy 308
SNMP AGENT 310
General tab 310
Configuration of MIB-II information 310
Sending of SNMP alerts (traps) 310
SNMPv3” tab 311
Connection to the SNMP agent 311
Authentication 311
Encryption (optional) 311
Sending of SNMPv3 alerts (traps) 311
SNMPv1 - SNMPv2c” tab 312
Connection to the SNMP agent 312
Sending of SNMPv2c alerts (traps) 313
Sending of SNMPv1 alerts (traps) 313
MIBS and Traps SNMP 313
Stormshield Network SNMP event and alert
(traps) format 313
Management information bases (MIBs) 315
SSL FILTERING 328
Profiles 328
Selecting a profile 328
Buttons 328
Rules 329
Possible operations 329
The table 329
Errors found in the SSL filter policy 330
SSL VPN 331
General configuration 331
Advanced properties 332
SSL VPN Portal 334
General tab 334
Advanced properties 335
Web servers” tab 335
Adding a web server 335
Adding an OWA web server 337
Adding a Lotus Domino web server 338
Application servers” tab 338
Configuration with an application server 338
Configuration with a Citrix server 339
Deleting a server 339
User profiles” tab 340
Operating principle 340
Configuring a profile 340
SSL VPN services on the Stormshield
Network web portal 341
Accessing your company’s web sites
via an SSL tunnel 341
Accessing your company’s resources
via an SSL tunnel 341
STATIC MULTICAST ROUTING 342
Actions on multicast routing policy
rules 342
New rule 342
STORMSHIELD MANAGEMENT
CENTER 343
Attaching the firewall to SMC 343
Buttons 343
SYSTEM EVENTS 344
Possible operations 344
Search 344
Restore the default configuration 344
List of events 344
System alarms list 345
TEMPORARY ACCOUNTS 348
Configuration” tab 348
"Temporary accounts list" tab 348
The table 348
Possible operations 349
URL FILTERING 351
Profiles 351
Selecting a profile 351
Buttons 351
Rules 351
Possible operations 352
The table 352
Errors detected 353
USERS 354
Possible operations 354
Search bar 354
Filter 355
Creating a group 355
Creating a user 355
Delete 356
Check usage 356
List of users (CN) 356
“Account” tab 357
“Certificate” tab 357
Page 8/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
“Member of these groups” tab 357
VIRTUAL INTERFACES 358
Creating or modifying an IPSec interface
(VTI) 358
Button bar 358
Presentation of the table 358
Creating or modifying a GRE interface 359
Button bar 359
Presentation of the table 359
Creating or modifying a loopback interface360
Button bar 360
Presentation of the table 360
VULNERABILITY MANAGEMENT 361
General configuration 361
List of monitored network objects 362
Advanced configuration 363
Exclusion list (unmonitored objects) 363
WEB OBJECTS 364
URL” tab 364
URL category table 364
URL table 365
Certificate name (CN)” tab 366
Groups of categories tab 366
Table of groups 366
URL database” tab 367
IPv6 Support 368
Details of supported features 368
System 368
Network 368
Objects 369
Users 369
Security policy 369
Monitoring 369
VPN 369
Notifications 370
Unsupported features 370
General points 370
IPv6 Support 371
Details of supported features 371
Unsupported features 372
General points 373
Configuration 373
Network Settings tab 374
Interfaces 374
Modifying a bridge 374
Creating a bridge 376
Modifying an Ethernet interface (in bridge
mode) 377
Modifying an Ethernet interface
(advanced mode) 377
Creating a VLAN 378
Modifying a VLAN 378
Virtual interfaces 379
“IPSec interfaces (VTI)” tab 379
“Loopback tab 379
Routing 379
“IPv6 static route” tab 379
“IPv6 dynamic routing” tab 380
“IPv6 return routes” tab 381
DHCP 381
General 381
“DHCP server” service 382
“DHCP relay” service 384
Network objects 385
Possible actions 385
The different types of objects 386
Filtering 386
“Filtering” tab 386
HOW TO: Implementing a filter rule 388
Requirements 388
Creating network objects 388
Selecting a filter policy 389
Adding a filter rule 389
Activating the filter policy 391
Testing the Filter / NAT policy 391
HOW TO: setting up a NATrule 392
Purpose 392
Creating network objects 392
Selecting a filter policy 393
Creating a filter and NAT rule 393
Activating the filter policy 395
Testing the Filter-NAT policy 395
HOW TO: IPSec VPN - Authentication
by pre-shared key 397
Implementation 397
Configuring the main site 397
Configuring the remote site 400
Checking the tunnel setup 401
Checking in Stormshield Network
Realtime Monitor 401
Incident resolution - Common errors 401
HOW TO: IPSec VPN - Authentication
by certificate 404
Implementation 404
Configuring the main site 405
Configuring remote sites A and B 410
Page 9/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
Checking the tunnel setup 413
Checking in Stormshield Network Realtime
Monitor 413
Incident resolution - Common errors 413
HOW TO: IPSec VPN - Hub and Spoke
Configuration 415
Architectures shown 415
Case no.1: internal traffic via IPSec tunnels415
Case no.2: all traffic via IPSec tunnels 415
Configuration requirements 416
Case no.1: internal traffic via IPSec
tunnels 417
417
Configuring the Hub site 417
Configuring the satellite sites Spoke A and
Spoke B 419
Case no.2: all traffic via IPSec tunnels 421
Configuring the central Hub site 422
Configuring the satellite sites Spoke A and
Spoke B 423
Checking the tunnel setup 424
Via the Stormshield Network administration
suite 424
Information and diagnosis tools in console
mode 425
Incident resolution - Common errors 427
Appendix A: Allowed names 428
Firewall name 428
Login and password 428
Comments (prohibited characters) 428
Interface names 428
Objects 428
DNS (FQDN) name objects 429
Certificates 429
Users 429
IPSEC VPN 429
SSL VPN 429
E-mail alerts 429
Appendix B: Structure of an objects
database in CSV format 430
Host 430
IP address range 430
DNS name (FQDN) 430
Network 431
Port 431
Port range 431
Protocol 432
Host group, IP address group or
network group 432
Service group 432
GLOSSARY 433
A 433
B 434
C 435
D 436
E 437
F 437
G 438
H 438
I 439
K 440
L 440
M 440
N 441
O 441
P 441
Q 443
R 443
S 444
T 445
U 446
V 446
W 447
Page 10/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
WELCOME
Welcome to the Stormshield Network V3 user configuration manual.
This guide explains the features of the web administration interface modules, and provides
information on how to configure your Stormshield Network Firewall for your network.
For any questions, if you wish to report an error or suggest an improvement, feel free to contact us
at documentation@stormshield.eu.
Products concerned
U30S, U70S, U150S, U250S, U500S, U800S,
SN150, SN200, SN300
SN500, SN510, SN700, SN710, SN900, SN910,
SN2000, SN3000, SN6000,
SNi40,
VS5, VS10, V50, V100, V200, V500 and VU.
Copyright © Stormshield 2016. All rights reserved.
Any copying, adaptation or translation of this material without prior authorization is prohibited.
The contents of this document relate to the developments in Stormshields technology at the time
of its writing. With the exception of the mandatory applicable laws, no guarantee shall be made in
any form whatsoever, expressly or implied, including but not limited to implied warranties as to
the merchantability or fitness for a particular purpose, as to the accuracy, reliability or the
contents of the document.
Stormshield reserves the right to revise this document, to remove sections or to remove this whole
document at any moment without prior notice.
Recommendations on the operating environment
DEFINITION
The common criteria evaluate (on an Evaluation Assurance Level or EAL scale of 1 to 7) a
product’s capacity to provide security functions for which it had been designed, as well as the
quality of its life cycle (development, production, delivery, putting into service, updates).
Introduction
The installation of a Firewall often comes within the scope of setting up a global security policy. To
ensure optimal protection of your assets, resources or information, it is not only a matter of
installing a Firewall between your network and the Internet. This is namely because the majority
of attacks come from the inside (accidents, disgruntled employees, dismissed employee having
retained internal access, etc.). And one would also agree that installing a steel security door
defeats its purpose when the walls are made of paper.
Page 11/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
WELCOME
Backed by the Common Criteria, Stormshield Network advises taking into consideration the
recommendations of use for the Administration Suite and Firewall product stated below. These
recommendations set out the usage requirements by which to abide in order to ensure that your
Firewall operates within the context of the common criteria certification.
Security watch
Please regularly check Stormshield security advisories published on
https://advisories.stomshield.eu.
Always update your firewall if it allows fixing a security flaw. Updates are available here:
https://mystormshield.eu.
Physical security measures
Stormshield Network Firewall-VPN appliances must be installed and stored in compliance with
the state of the art regarding sensitive security devices: secured access to the premises,
Shielded cables with twisted pairs, labeled cables, etc.
Organizational security measures
The default password of the admin” user (super administrator) must be changed the very first
time the product is used. The wizard will prompt the user to change his password during the
initial installation, in the Administration of the appliance window. In the web administration
interface, this password can be changed in the Administrator module (System menu), under the
Administrator account tab.
The definition of this password must observe the best practices described in the following
chapter, under User password management.
A particular administrative role that of the super- administrator has the following
characteristics:
l Only the super-administrator is permitted to connect via the local console on NETASQ
firewall- VPN appliances, and only when installing the Firewall or for maintenance
operations, apart from actual use of the equipment.
l He is in charge of defining the profiles of other administrators,
l All access to the premises where the appliances are stored has to be under his
supervision, regardless of whether the access is due to an intervention on the appliance
or on other equipment. He is responsible for all interventions carried out on appliances.
User and administrator passwords have to be chosen in such a way that successful attempts at
cracking them will take longer. This can be assured with the implementation of a policy regulating
their creation and verification.
Example
Combination of letters and numbers, minimum length, addition of special characters, words
which are not taken from ordinary dictionaries, etc.
Administrators are attuned to these best practices in the course of their functions and have the
responsibility of directing users’ awareness to these practices ( Cf. Next chapter : User
Awareness).
For equipment in trusted networks which have to be protected, the control policy for traffic to be
implemented should be defined in the following manner:
Page 12/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
WELCOME
l Complete: the standard scenarios of how equipment is used have all been considered
when defining the rules and their authorized limits have been defined.
l Strict: only the necessary uses of the equipment are authorized.
l Correct: rules do not contradict each other.
l Unambiguous: the wording of the rules provides a competent administrator with all the
relevant elements for direct configuration of the appliance.
Human media
Administrators are non hostile, competent persons with the necessary means for accomplishing
their tasks. They have been trained to launch operations for which they are responsible. In
particular, their skills and organization imply that:
l Different administrators having the same rights will not perform administrative actions
which conflict.
l Logs are used and alarms are processed within the appropriate time frames.
Example
Incoherent modifications to the control policy for traffic.
IT security environment
Stormshield Network firewall-VPN appliances must be installed in accordance with the current
network interconnection policy and are the only passageways between the different networks on
which the control policy for traffic has to be applied. They are scaled according to the capacities
of the adjacent devices or these devices restrict the number of packets per second, positioned
slightly below the maximum treatment capacities of each firewall-VPN appliance installed in the
network architecture.
Besides applying security functions, NETASQ firewall-VPN appliances do not provide any network
service other than routing and address translation.
Example
no DHCP, DNS, PKI, application proxies, etc.*
Stormshield Network appliances are not configured to forward IPX, Netbios, AppleTalk, PPPoE or
IPv6 information flows.
Firewall-VPN appliances do not depend on external online” services (DNS, DHCP, RADIUS, etc.) to
apply the information flow control policy.
Remote administration workstations are secured and kept up to date on all known vulnerabilities
affecting operating systems and hosted applications. They are installed in protected premises
and are exclusively dedicated to the administration of firewall-VPN appliance and the storage of
backups.
Network devices that the firewall uses to establish VPN tunnels are subject to constraints relating
to physical access, protection and control of their configuration. These constraints are equivalent
to those faced by the TOE’s firewall-VPN appliances.
Workstations on which the VPN clients of authorized users are launched are subject to
restrictions regarding physical access control, protection and control over their configuration,
equivalent to the restrictions placed on workstations in trusted networks. They are secured and
kept up to date on all known vulnerabilities affecting operating systems and hosted applications.
Page 13/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
WELCOME
* These services are available on firewalls but are not part of the scope of evaluation of the
common criteria.
Evaluated configurations and usage
The usage of the environment being evaluated must possess the following characteristics:
l Certificates and CRLs are distributed manually (importing).
l The usage mode subject to evaluation excludes the fact that the TOE relies on services other
than PKI, DNS and DHCP servers and proxies. The optional modules provided by Stormshield
Network to manage these services are disabled by default and have to stay that way.
Specifically, these are:
l the internal public key infrastructure (PKI),
l User authentication module,
l SSL VPN module (Portal and Tunnel),
l antivirus engine (ClamAV or Kaspersky),
l Active Update module,
l Dynamic routing module (BIRD dynamic routing service),
l DNS cache (DNS/Proxy cache),
l SSH, DHCP, MPD and SNMPD servers (SSH server, DHCP server and SNMP agent),
l DHCP client (DHCP server),
l NTP daemon (NTP client),
l DHCP relay,
l Cloud backup service.
l Even though it is supported, the IPv6 feature is disabled by default and must remain so for the
duration of the evaluation.
l IPSec administrators and users are managed by the internal LDAP directory. The evaluation of
such usage excludes the fact that external LDAP clients outside the scope of the firewall-VPN
appliances network can connect to this base.
l Audit logs – depending on the model – are either stored locally or sent by Syslog.
l The ability provided by the filter policy to associate each filter rule with an application inspection
(HTTP, SMTP, POP3 and FTP proxies) and a schedule falls outside the scope of this evaluation
and must not be used.
l The option of associating a decrypt” action (SSL proxy) with a filter rule in the filter policy falls
outside the scope of this evaluation and must not be used.
Cryptographic algorithms needed for compliance with the RGS (General Security Guidelines
defined by ANSSI, the French Network and Information Security Agency) and used for the
evaluation
Algorithm Key size
Diffie-Hellman 2048, 3072, 4096
Algorithm Key size
RSA 2048, 4096
Page 14/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
WELCOME
Algorithms Fingerprint size
HMAC-SHA1 160
HMAC-SHA2 256, 384, 512
SHA2 256, 384, 512
Algorithms Key size
AES 128, 192, 256
Triple DES 168
Blowfish 128 to 256
CAST 128
The Perfect Forward Secrecy (PFS) option performs a new Diffie-Hellman key exchange during IKE
Phase 2. This allows ensuring that in the event a key has been stolen, the next or previous keys
cannot be deduced, thereby preventing the whole IPSec exchange from being decrypted, apart
from the segment of the communication protected by the corrupted key. You are strongly advised
to leave PFS enabled in order to comply with the RGS, which is the scenario that has been chosen
for the evaluation.
The security of the connection to the authentication portal and administration interface has been
strengthened, as per the recommendations of the ANSSI (French Network and Information
Security Agency). These connections have to go through certain versions of the SSL/TLSprotocol.
Version SSLv3 has been disabled to make way for TLS versions. The use of AES encryption suites
with Diffie-Hellman has also been imposed. As Internet Explorer in version 6, 7 and 8 does not
support this configuration, you are advised to use a higher version of this browser. This
configuration must not be disabled in order to stay within the scope of the evaluation.
User awareness
Administrator management
The Firewall administrator is in charge of instructing users on network security, the equipment
which make up the network and the information which passes through it.
Most users in a network are computer novices and even more so in network security. It is thus
incumbent upon the administrator or person in charge of network security to organize training
sessions or at least programs to create user awareness of network security.
These sessions should be used to state the importance of managing user passwords and the
work environment as well as the management of users access to the companys resources, as
indicated in the following chapter.
Initial connection to the appliance
A security procedure must be followed if the initial connection to the appliance takes place
through an untrusted network. This operation is not necessary if the administration workstation is
plugged in directly to the product.
Access to the administration portal is secured through the SSL/TLS protocol. This protection
allows authenticating the portal via a certificate, thereby assuring the administrator that he is
indeed logged in to the desired appliance. This certificate can either be the appliance’s default
certificate or the certificate entered during the configuration of the appliance (Authentication >
Captive portal). The name (CN) of the appliances default certificate is the appliances serial
Page 15/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
WELCOME
number and it is signed by two authorities called NETASQ - Secure Internet Connectivity ("O") /
NETASQFirewall Certification Authority ("OU") and Stormshield ("O") / Cloud Services ("OU").
To confirm a secure access, the browser must trust the certificate authority that signed the
certificate used, which must belong to the browsers list of trusted certificate authorities. Therefore
to confirm the integrity of an appliance, the NETASQ and Stormshield certificate authorities must
be added to the browsers list of trusted certificate authorities before the initial connection. These
authorities are available at http://pki.stormshieldcs.eu/netasq/root.crt and
http://pki.stormshieldcs.eu/products/root.crt. If a certificate signed by another authority has
been configured on the appliance, this authority will need to be added instead of the NETASQ and
Stormshield authorities.
As a result, the initial connection to the appliance will no longer raise an alert in the browser
regarding the trusted authority. However, a message will continue to warn the user that the
certificate is not valid. This is because the certificate defines the Firewall by its serial number
instead of its IP address. To stop this warning from appearing, you will need to indicate to the DNS
server that the serial number is associated with the IP address of the Firewall.
NOTE
The default password of the admin” user (super administrator) must be changed the very
first time the product is used. The wizard will prompt the user to change his password
during the initial installation, in the Administration of the appliance window. In the web
administration interface, this password can be changed in the Administrator module
(System menu), under the Administrator account tab.
The definition of this password must observe the best practices described in the following
chapter, under User password management.
This password must never be saved in the browser.
User password management
Throughout the evolution of information technologies, numerous authentication mechanisms
have been invented and implemented to guarantee that companies’ information systems
possess better security. The result of this multiplication of mechanisms is a complexity which
contributes to the deterioration of company network security today.
Users (novices and untrained users) tend to choose simplistic passwords, in general drawn
from their own lives and which often correspond to words found in a dictionary. This behavior,
quite understandably, leads to a considerable deterioration of the information systems security.
Dictionary attacks being an exceedingly powerful tool is a fact that has to be reckoned with. A
study conducted in 1993 has already proven this point. The following is a reference to this
study: (http://www.klein.com/dvk/publications/). The most disturbing revelation of this study is
surely the table set out below (based on 8-character passwords):
Type of password Number of
characters
Number of passwords Cracking time
English vocabulary 8 char. and + Special 250000 < 1 second
Lowercase only 26 208827064576 9-hour graph
Lowercase + 1 uppercase 26/special 1670616516608 3 days
Upper- and lowercase 52 53459728531456 96 days
Letters + numbers 62 218340105584896 1 year
Printable characters 95 6634204312890620 30 years
Set of 7-bit ASCII characters 128 72057594037927900 350 years
Page 16/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
WELCOME
Another tendency which has been curbed but which is still happening is worth mentioning:
those now-famous post-its pasted under keyboards.
The administrator has to organize actions (training, creating user awareness, etc) in order to
modify or correct these “habits”.
Example
l Encourage your users to choose passwords that exceed 7 characters,
l Remind them to use numbers and uppercase characters,
l Make them change their passwords on a regular basis,
l and last but not least, never to note down the password they have just chosen.
One classic method of choosing a good password is to choose a sentence that you know by
heart (a verse of poetry, lyrics from a song) and to take the first letter of each word. This set of
characters can then be used as a password. For example:
l Stormshield Network, Leading French manufacturer of FIREWALL and VPN appliances…”
The password can then be the following: SNLFmoFaVa.
The ANSSI (French Network and Information Security Agency) offers a set of recommendations
for this purpose to assist in defining sufficiently robust passwords.
Users are authenticated via the captive portal by default, through an SSL/TLS access that uses a
certificate signed by two authorities not recognized by the browsers. It is therefore necessary to
deploy these certificate authorities used by a GPO on users’ browsers. These authorities are by
default the NETASQ CA and Stormshield CA, available from the following links:
l http://pki.stormshieldcs.eu/netasq/root.crt.
l http://pki.stormshieldcs.eu/products/root.crt.
For further detail, please refer to the previous chapter Administrator management, under Initial
connection to the appliance.
Work environment
The office is often a place where many people pass through every day, be they from the
company or visitors, therefore users have to be aware of the fact that certain persons (suppliers,
customers, workers, etc) can access their workspace and by doing so, obtain information about
the company.
It is important that the user realizes that he should never disclose his password either by
telephone or by e-mail (social engineering) and that he should type his password away from
prying eyes.
User access management
To round up this chapter on creating user awareness of network security, the administrator has to
tackle the management of user access. In fact, a Stormshield Network Firewalls authentication
mechanism, like many other systems, is based on a login/password system and does not
necessarily mean that when the application enabling this authentication is closed, the user is
logged off. This concept may not always be apparent to the uninitiated user. As such, despite
having shut down the application in question, the user (who is under the impression that he is
no longer connected) remains authenticated. If he leaves his workstation for just a moment, an ill-
Page 17/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
WELCOME
intentioned person can then usurp his identity and access information contained in the
application.
Remind users to lock their sessions before they leave their workstations unattended. This
seemingly tedious task can be made easier with the use of authentication mechanisms which
automate session locking (for example, a USB token).
Page 18/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
WELCOME
ACCESS PRIVILEGES
This module consists of 3 tabs:
l Default access: This tab allows you to define SSL VPN portal, IPSec VPN and SSL VPN access
parameters as well as the default sponsorship policy.
l Detailed access: Table of rules corresponding to SSL VPN portal, IPSec VPN and SSL VPN
access and access to users authorized to validate sponsorship requests.
l PPTP server: Allows adding and listing users who have access to PPTP VPN via their logins, and
creating passwords to enable them to log on.
“Default options tab
SSL VPN Portal
SSL VPN Portal profiles (see menu VPN>SSL VPN Portal module) represent the set of web and
application servers that you wish to list in order to assign them to your users or user groups.
Default SSL VPN Portal
profile
In this field, the default SSL VPN Portal profile can be defined for users. Prior to this,
ensure that you have already restricted access to servers defined in the configuration
of the SSL VPN in the menu VPN>\SSL VPN Portal>\User profiles tab (see SSL VPN
Portal document).
The drop-down list will display the following options:
l Block: Users will not have access to the SSL VPN Portal.
l Allow: The user will have access to all SSL VPN Portal profiles created previously.
----------------------------------
<Name of user1 profile>: the user will have access only to this SSL VPN Portal profile.
<Name of user2 profile>: the user will have access only to this other SSL VPN Portal
profile.
Click on Apply to confirm your configuration.
IPSEC
IPSec VPN enables the establishment of secure tunnels (peer authentication, data encryption
and/or integrity checking) between two hosts, between a host and a network, or between two
networks.
Default IPSec policy In this field, it is possible to Block or Allow users the privilege of negotiating IPSec VPN
tunnels by default.
Depending on your selection, internal users and user groups will or will not be able to
communicate over your private protected IP networks, thereby allowing their data to
be transmitted securely.
Click on Apply to confirm your configuration.
SSL VPN
The SSL VPN allows setting up a secure tunnel (peer authentication, encryption and/or
verification of data integrity) between two hosts, between a host and a network, or between two
Page 19/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
ACCESS PRIVILEGES
networks.
Default SSL VPN profile This field makes it possible to Block or Allow users by default from negotiating SSL VPN
tunnels in the absence of specific rules.
Depending on your selection, internal users and user groups will or will not be able to
communicate over your private protected IP networks, thereby allowing their data to
be transmitted securely.
Click on Apply to confirm your configuration.
Sponsorship
Sponsorship allows an external user located within the organization to submit a request for
Internet access from a captive portal for a limited duration.
Default sponsorship
policy
This field makes it possible to Block or Allow users from responding to sponsorship
requests submitted from the captive portal by default.
Click on Apply to confirm your configuration.
“Detailed access tab
Possible operations
Add button: Inserts a line to be configured after the selected line.
Delete button: Deletes the selected line.
Up button: Places the selected line before the line just above it.
Down button: Places the selected line after the line just below it.
A search field in which keywords/letters can be entered will allow you to find relevant users.
Configuration table
This table allows assigning access privileges to your users or user groups, with regards to SSL
VPN and IPSec VPN parameters.
The table contains the following columns:
Page 20/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
ACCESS PRIVILEGES
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407
  • Page 408 408
  • Page 409 409
  • Page 410 410
  • Page 411 411
  • Page 412 412
  • Page 413 413
  • Page 414 414
  • Page 415 415
  • Page 416 416
  • Page 417 417
  • Page 418 418
  • Page 419 419
  • Page 420 420
  • Page 421 421
  • Page 422 422
  • Page 423 423
  • Page 424 424
  • Page 425 425
  • Page 426 426
  • Page 427 427
  • Page 428 428
  • Page 429 429
  • Page 430 430
  • Page 431 431
  • Page 432 432
  • Page 433 433
  • Page 434 434
  • Page 435 435
  • Page 436 436
  • Page 437 437
  • Page 438 438
  • Page 439 439
  • Page 440 440
  • Page 441 441
  • Page 442 442
  • Page 443 443
  • Page 444 444
  • Page 445 445
  • Page 446 446
  • Page 447 447
  • Page 448 448

Stormshield SN Series Configuration manual

Category
Software
Type
Configuration manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI