Panda GateDefender Performa - User Guide

Transcription

Panda GateDefender Performa - User Guide
User Guide
Panda GateDefender Performa User Guide
If your company has acquired this program and you do not have a CORPORATE USER
LICENSE, please contact Panda Software so that you can extend the use of this program to
more than one computer.
Copyright Notice
© 2010 Panda Security. All rights reserved.
Neither the documentation nor the programs included in this package may be copied,
reproduced, translated or reduced to any medium or electronic or machine-readable support
without prior written consent from Panda Security.
Trademarks
Panda Security is a registered trademark owned by Panda Security.
Windows is a registered trademark of Microsoft Corporation. Other product names that are
mentioned in this guide may be registered trademarks of their respective owners.
© 2010 Panda Security.
All Rights reserved.
Printed in the European Union. Printed in 2010.
1008-PGDPMA-US-02
2
Panda GateDefender Performa-User Guide
Table Of Contents
INTRODUCTION ................................................................................... 9
KEY FEATURES OF PANDA GATEDEFENDER PERFORMA ..........................................................9
FUNCTIONS.................................................................................................................11
PROTECTION ...............................................................................................................12
NEW FEATURES ON THIS VERSION ................................................... 13
INTRODUCTION ...........................................................................................................13
IMPROVED DESIGN AND USABILITY .................................................................................13
PROTECTION IMPROVEMENTS .........................................................................................14
Improvements to the anti-malware protection ...............................................................14
Improvements to the Content Filter and anti-spam protection .........................................15
Web and IM/P2P/VoIP filter .........................................................................................15
OTHER IMPROVEMENTS .................................................................................................16
New security reports and improvements to the filtering and............................................16
Improvements to quarantine management ....................................................................16
Integration of new proxy for HTTP/HTTPS.....................................................................16
New agent to identify domain users ..............................................................................17
New Quality of Service (QoS) feature............................................................................17
Collective Intelligence..................................................................................................17
IMPLEMENTATION ............................................................................. 19
ACTIVATING PANDA GATEDEFENDER PERFORMA ...............................................................19
CONFIGURING THE APPLIANCE .......................................................................................19
Points to bear in mind before configuring the appliance..................................................19
Data required to configure the appliance.......................................................................20
Default settings...........................................................................................................21
CREATING THE USB INSTALLER......................................................... 22
DOWNLOADING FILES AND PREPARING THE USB DEVICE ....................................................22
Preparing the USB device.............................................................................................22
CREATING THE USB INSTALLER ......................................................................................23
COMMAND LINE INTERFACE (CLI)..................................................... 27
COMMAND LINE INTERFACE (CLI)..................................................................................27
Readonly role .............................................................................................................27
Admin role..................................................................................................................27
Access........................................................................................................................27
3
Panda GateDefender Performa-User Guide
COMMANDS ALLOWED IN READ-ONLY MODE ......................................................................27
COMMANDS ALLOWED IN ADMINISTRATOR MODE ...............................................................28
STATUS SCREEN ................................................................................. 29
INTRODUCTION ...........................................................................................................29
Warnings....................................................................................................................29
Protection...................................................................................................................29
System.......................................................................................................................29
LICENSE MANAGEMENT .................................................................................................29
Products contracted ....................................................................................................30
PROTECTION STATUS ....................................................................................................30
Preferences for viewing the protection status.................................................................30
Scan and detection statistics ........................................................................................31
Details of the anti-malware protection...........................................................................32
Details of the Content Filter protection ..........................................................................33
Details of the anti-spam protection ...............................................................................34
Information on Web filtering ........................................................................................35
IM/P2P/VoIP filter details .............................................................................................37
VERSION DETAILS ........................................................................................................38
SYSTEM STATUS ...........................................................................................................38
INTRODUCTION TO THE SETTINGS ................................................... 41
Protection settings ......................................................................................................41
System settings ..........................................................................................................42
PROTECTION SETTINGS..................................................................... 43
ANTI-MALWARE PROTECTION .........................................................................................43
Malware types ............................................................................................................43
Anti-malware protection settings ..................................................................................43
Antivirus protection settings .........................................................................................44
Heuristic protection settings .........................................................................................48
Anti-phishing protection settings...................................................................................49
Protection against other security risks settings...............................................................50
Trusted sites and domains settings in the anti-malware protection ..................................51
CONTENT FILTER PROTECTION .......................................................................................52
Content Filter protection settings ..................................................................................52
HTTP/S and FTP protection settings..............................................................................52
Mail and news protection settings .................................................................................54
Trusted sites and domains settings in the Content Filter protection..................................57
ANTI-SPAM PROTECTION ...............................................................................................57
Anti-spam protection settings .......................................................................................57
4
Panda GateDefender Performa-User Guide
Spam white list and blacklist ........................................................................................60
Advanced SMTP anti-spam protection settings ...............................................................60
WEB AND IM/P2P/VOIP FILTER ..................................................................................70
Web filtering...............................................................................................................70
IM/P2P/VoIP application filter.......................................................................................74
USERS EXEMPT FROM FILTERING .....................................................................................75
Users excluded from web filtering.................................................................................75
Users exempt from P2P/IM filtering ..............................................................................76
Export/Import a list of computers. ................................................................................77
PROFILES ...................................................................................................................77
Configuration by profiles ..............................................................................................77
Managing settings .......................................................................................................77
Creating and modifying protection profiles.....................................................................78
Centralized protection settings .....................................................................................78
SYSTEM SETTINGS ............................................................................. 83
GENERAL SETTINGS ......................................................................................................83
Introduction ...............................................................................................................83
Console access settings ...............................................................................................83
Load balancing/high availability ....................................................................................86
System clock...............................................................................................................92
Explicit proxy ..............................................................................................................92
HTTPS connections and certificates...............................................................................93
Advanced settings .......................................................................................................96
Quality of Service (QoS) settings ..................................................................................96
NETWORK SETTINGS ...................................................................................................102
Network environment ................................................................................................102
Network interfaces ....................................................................................................103
Additional port settings..............................................................................................104
Managing internal networks .......................................................................................105
Managing internal domains ........................................................................................106
CONFIGURING THE UPDATES ........................................................................................106
Introduction to updates .............................................................................................106
Updating the protection software................................................................................107
Updating the system software ....................................................................................108
Hotfix management...................................................................................................108
DOMAIN USERS .........................................................................................................109
Managing LDAP servers .............................................................................................109
Management of servers with validation .......................................................................110
User management.....................................................................................................111
5
Panda GateDefender Performa-User Guide
DEFINITIONS ............................................................................................................112
Introduction .............................................................................................................112
Managing IP addresses..............................................................................................113
Domain management ................................................................................................114
WARNINGS ...............................................................................................................114
Introduction .............................................................................................................114
Events to report settings............................................................................................115
Syslog warnings settings............................................................................................116
SNMP warnings settings.............................................................................................117
EMAIL WARNINGS ......................................................................................................117
Email warnings settings .............................................................................................117
Recipient mail account details ....................................................................................118
Periodic activity notification........................................................................................118
Periodic activity notification settings............................................................................120
CUSTOMIZING THE TEXTS/PAGES ..................................................................................120
Customizing the texts ................................................................................................120
Customization of the substitute HTTP/S page ..............................................................121
QUARANTINE ................................................................................... 122
INTRODUCTION TO QUARANTINE ..................................................................................122
MALWARE QUARANTINE ..............................................................................................122
Possible actions in malware quarantine .......................................................................123
Malware quarantine settings ......................................................................................124
Items excluded from quarantine .................................................................................124
CONTENT FILTER QUARANTINE .....................................................................................125
Possible actions in content-filter quarantine .................................................................126
Content Filter quarantine settings ...............................................................................126
SPAM QUARANTINE ....................................................................................................127
Possible actions in spam quarantine............................................................................128
Spam quarantine settings ..........................................................................................128
QUARANTINE FILTERS .................................................................................................129
Introduction .............................................................................................................129
Malware quarantine filtering.......................................................................................130
Content-filter quarantine filtering................................................................................130
Span quarantine filtering............................................................................................130
REPORTS .......................................................................................... 132
INTRODUCTION .........................................................................................................132
CONFIGURING AND FILTERING REPORTS ........................................................................132
Report settings .........................................................................................................132
Filtering information in the reports..............................................................................133
6
Panda GateDefender Performa-User Guide
Stored filters.............................................................................................................134
Additional features in the report views ........................................................................135
PROTECTION REPORTS ................................................................................................135
Introduction .............................................................................................................135
Protection report .......................................................................................................136
SECURITY REPORTS ....................................................................................................137
Introduction .............................................................................................................137
Report on access restricted by the explicit proxy ..........................................................138
Report on invalid SSL certificates ................................................................................139
SYSTEM REPORT ........................................................................................................139
System report ...........................................................................................................139
TOOLS .............................................................................................. 141
INTRODUCTION .........................................................................................................141
DIAGNOSIS TOOLS .....................................................................................................141
Ping .........................................................................................................................141
Traceroute................................................................................................................142
DNS resolution..........................................................................................................142
Connectivity with Panda Security ................................................................................143
Display system network status ...................................................................................143
Packet capture..........................................................................................................143
INTERNAL LOG FILES ..................................................................................................144
ONLINE SERVICES ......................................................................................................145
EXPORTING/IMPORTING THE SETTINGS .........................................................................145
Exporting the current settings ....................................................................................146
Importing settings.....................................................................................................146
SENDING STATISTICS .................................................................................................146
RESTARTING THE SYSTEM SERVICES ..............................................................................147
COMPLETE SYSTEM RESTART ........................................................................................147
SHUTTING DOWN THE SYSTEM ......................................................................................148
HOW DO I......................................................................................... 149
ACTIVATING PANDA GATEDEFENDER PERFORMA .............................................................149
HOW DO I KNOW WHEN MY LICENSE EXPIRES?................................................................149
HOW DO I UPDATE THE PRODUCT? ................................................................................150
HOW DO I MODIFY THE WARNING MESSAGES? ................................................................150
ENABLING AND DISABLING REPORT GENERATION .............................................................150
INSTALLING SEVERAL UNITS IN LOAD BALANCING MODE ....................................................150
EXPORTING/IMPORTING THE SETTINGS .........................................................................151
Exporting the current settings ....................................................................................151
Importing settings.....................................................................................................152
7
Panda GateDefender Performa-User Guide
TRUSTED SITES AND DOMAINS SETTINGS IN THE ANTI-MALWARE PROTECTION ......................152
RESTORING THE INITIAL VALUES FOR SIGNING IN TO THE WEB CONSOLE. ............................153
RESTORING THE APPLIANCE .........................................................................................153
RESCOVERY VIA CD ...................................................................................................153
RESTORING USING THE LIVE DVD ................................................................................154
Using the Live DVD ...................................................................................................154
RECOVERY WITH A USB DEVICE ...................................................................................155
THE LCD SCREEN: DEFINITION AND USE ........................................................................156
CONFIGURING INTERNAL NETWORKS .............................................................................157
CONFIGURING INTERNAL DOMAINS ...............................................................................158
USING THE BASIC ANTI-SPAM SETTINGS .........................................................................158
USING THE ADVANCED ANTI-SPAM SETTINGS ..................................................................159
8
Panda GateDefender Performa-User Guide
Introduction
Panda
GateDefender Performa
Panda GateDefender Performa is a scalable and ultra-reliable SCM (Secure Content Management)
perimeter security appliance. It delivers maximum proactive protection in the gateway against contentbased Web and email threats. It blocks all types of malware, spam, undesirable content and other
Internet threats before they enter the company.
Its simple "connect and forget" operation and complete anti-malware protection, along with content
filtering, anti-spam, Web filtering and IM/P2P/VoIP filtering, make Panda GateDefender Performa a
highly effective security solution.
Key features of Panda GateDefender Performa
•
Complete protection
It includes best-of-breed protection against malware, potentially dangerous content, spam,
inappropriate Web content, and IM, P2P and VoIP protocols.
It scans inbound and outbound traffic in all protocols (HTTP/S, FTP, SMTP, POP3, IMAP4 and NNTP)
helping enforce security policies, and doesn’t require additional protection or supporting devices,
therefore reducing complexity and operational costs.
•
Modular structure
It provides specific protection for different threats, reinforcing the risk management systems where
necessary. The cost is optimized since the organization only purchases the protection required.
•
Integrated proactive technology
9
Panda GateDefender Performa-User Guide
Heuristic engines, Collective Intelligence and Quarantine combined in the perimeter optimize threat
detection, ensuring reception of important information.
•
High performance
The hardware is designed to operate transparently in the perimeter, scanning large traffic volumes in
real-time.
Each unit’s performance adapts to each organization’s traffic, optimizing the risk management system.
Its high performance improves user productivity, making sure that standard security policies are met
and ensuring business continuity.
•
Zombie detection
Outbound SMTP detection allows administrators to identify internal computers that are infected and
which are sending spam and malware to clients and contacts without users’ knowledge.
•
This improves corporate image and reputation with clients.
•
Automatic updates
Updates are automatically carried out every hour in the case of malware and every minute in the case
of spam. The protection is always updated against the latest threats, constantly improving the risk
management system. The solution does not require continuous administration, thereby reducing
complexity and operational costs.
•
'Connect and Forget'
It operates as a transparent bridge, and as installation does not require changes or redirections in the
network settings, complexity is reduced. Once connected, it starts to work immediately, reducing
operational costs.
•
Guaranteed reception of data
Panda GateDefender Performa scans, disinfects, restores and resends files containing unknown
malware without administrator intervention, reinforcing the risk management system. It also prevents
critical information losses and protects the organization against known and unknown threats, helping
enforce security policies. Additionally, it ensures business continuity and reduces operational costs.
•
Console access levels
Different console access levels reinforce security in the risk management system, as security settings
are protected and business continuity is ensured.
Access permission adapts to users’ different needs and reduces complexity for non-expert users.
•
Guaranteed traffic flow
10
Panda GateDefender Performa-User Guide
The hardware models for large organizations include a bypass option to ensure traffic flow continues in
the case of system failure.
Functions
The main functions of Panda GateDefender Performa include:
•
Load balancing
Automatic, native load balancing ensures high service availability in the event of unexpected failure,
optimizes investment in the organization’s computers, and improves the risk management system. It
also prevents traffic reception delays, improving user productivity and ensuring business continuity. As
it is native and automatic, it eliminates configuration complexity and reduces operational costs.
•
Customizable security policies
Different user profiles and groups can be defined to establish different security policies for each
network user, reinforcing the risk management system. This way, user productivity is optimized and
security policies are enforced.
•
Integration with LDAP/AD
Due to integration with directory systems, the user responsible for each action taken on the network is
identified and the risk management system is improved. In addition, monitoring of internal users
enforces security policies.
•
Centralized settings
All the units deployed can be configured from a single console. Centralized configuration of different
access points improves the risk management system and reduces complexity.
•
Detailed graphic reports
The real-time activity graphic reports significantly reinforce the risk management system.
Administrators and operators therfore have important information to hand, reducing complexity and
operational costs.
• Quarantine
It stores potentially dangerous files and messages in quarantine if they are suspected of containing
unknown malware or are considered to be spam or probable spam. The aim of quarantine is to ensure
access to any important files or emails.
•
Malware quarantine
Reserved for contaminated files that cannot be disinfected or are suspected of containing unknown
malware.
•
Spam quarantine
11
Panda GateDefender Performa-User Guide
Reserved for emails classified as spam or probable spam.
•
Content Filter quarantine
Reserved for files or messages blocked by the application of security policies.
Protection
The protection units offered by Panda GateDefender Performa are:
•
Anti-malware
Detects and blocks damaging threats before they enter the corporate network: viruses, worms, Trojans,
spyware, dialers, jokes, phishing, hacking tools, security risks and -through its heuristic engine- threats
not yet cataloged.
•
Content Filter
The Content Filter lets you customize the types of files and messages to be filtered. It applies filters
such as maximum file size, maximum number of compressed files, password protection…
With respect to messaging it analyzes and filters by content, subject, type, etc.
•
Anti-spam protection
It includes advanced spam detection techniques, such as DNSBL, anti-backscatter and SMTP Relay,
minimizing the impact of spam on user productivity.
•
Web filtering
The Web filter can restrict access to Web pages with unproductive content simply by selecting
prohibited categories. It therefore optimizes resource usage and improves user productivity.
•
IM, P2P and VoIP protocol filter
Used to block attempts to access applications that can represent security holes. These include instant
messaging (IM), peer-to-peer (P2P) and Voice over IP (VoIP), whose use from inside the network can
be restricted.
12
Panda GateDefender Performa-User Guide
New Features on this version
Introduction
This new version of Panda GateDefender Performa contains a series of new features and improvements
making it one of the most advanced and complete perimeter security solutions for SMBs on the market.
The development of this version of Panda GateDefender Performa has been undertaken with a special
effort to make configuration as simple as possible, and reduce the total cost of ownership derived from
maintenance of the solution. At the same time, new technologies have been integrated for scanning
your company's traffic, in order to adapt the platform to the cloud computing ethos, essential in order
to handle the increasing volume of malware circulating on the Internet.
In addition to this commitment to improve the usability of the Web console, other functional aspects
have been improved, enhancing the reliability and efficiency of Panda GateDefender Performa and
better adapting it to the needs of users. The new agent for identifying domain users and the integrated
proxy for HTTP/HTTPS are just two examples.
This help file contains information about all features of Panda GateDefender Performa. We hope you
find this documentation useful.
Welcome to the new version of Panda GateDefender Performa.
Improved design and usability
Panda Security has completely redesigned the product administration console, simplifying configuration,
and making the information clearer and more accessible. It is now much more intuitive and simpler to
manage, speeding up and easing technical decision-making regarding corporate security. Administratororiented experience improvements have been complemented by extending user Help files, containing
clear and specific examples and cases of basic and more advanced configuration.
Improvements to the Status screen
The warnings in the Status screen are now classified (in different colors) depending on their severity.
This will allow your network administrator to easily detect the most important problems threatening
your network security. In addition to the problem description, the recommended action is implemented
through a link that is redirected to the console screen where the problem can be effectively solved.
Resolution optimized up to 1024x768 pixels and support for new
browsers
In order to present additional information without compromising clarity, the administration console is
adapted to 1024x768 resolution and takes advantage of new browser features to present improved
activity graphs with plenty of information available through the mouse pointer.
Simpler and more manageable menu at the top of the page
Given the increased technical complexity of the tools provided by Panda Security, and in order to
improve usability, the Web administration console menus have been overhauled, in order to minimize
the time spent searching or navigating through the application. Numerous links to the most frequently
used sections have been included, in order to speed up and simplify the operation of Panda
GateDefender Performa.
13
Panda GateDefender Performa-User Guide
Protection improvements
Improvements to the anti-malware protection
HTTPS protocol scanning
As there is now more malware affecting user interaction with banking applications, and this type of
communication is usually encrypted, Panda GateDefender Performa scans encrypted HTTPS traffic
through “man-in-the-middle” technology. This will allow administrators to detect attempts made to
send or receive malware in Web connections marked as safe.
Integration of Collective Intelligence with queries to the cloud and
integrated cache of queries
With so much diverse malware in existence, it is impossible for a single network computer or appliance
to make reliable detections. Panda Security has opted to move all scanning and malware detection
intelligence out of the client's infrastructure and into the cloud, while respecting data confidentiality at
all times. The system means that any item suspected of containing malware can be checked against
Panda Security's cloud database.
Panda GateDefender Performa intelligently uses this resource, combining the benefits provided by ‘total
detection’ with increased detection speed resulting from an intelligent internal cache of previously
scanned items. This way, the data flow required to detect and disinfect malware is reduced to a
minimum.
Latency reduction in HTTP/HTTPS navigation
In the past, files had to be downloaded in order to reliably determine whether they contained
dangerous malware. This caused an annoying slowdown of Web content delivery. This was because
Panda GateDefender Performa required the whole file to scan before delivering it to the user.
In this new version of Panda GateDefender Performa, the detection algorithm for dangerous items has
been updated, and so delays are reduced to a minimum, making the service practically transparent to
end-users.
Cache of infected URLs in HTTP/HTTPS navigation
In order to save network resources, Panda GateDefender Performa stores any URLs with malware, in
order to avoid the files being downloaded and scanned every time they are requested by a corporate
network user.
Additionally, intelligent management of the URL cache allows the items to be accessed once the
malware is eliminated from the server, preventing the resource from being inaccessible for an indefinite
period.
Customization of the page displayed on detecting malware in
HTTP/HTTPS
In order to improve the feedback returned to end-users, the screen displayed on accessing an item
suspect of containing malware can be customized.
14
Panda GateDefender Performa-User Guide
Improvements to the Content Filter and anti-spam
protection
Improvements to the Content Filter protection
The HTTPS protocol has been added to the numerous Content Filtering options available since the first
versions of Panda GateDefender Performa.
Now users are protected against all malicious items included by third parties on Web pages marked as
secure, generally those belonging to banks and financial institutions, and which are specifically targeted
by criminals trying to obtain confidential user data (account numbers, passwords, etc.)
The customization improvement mentioned in the previous section also applies to the Content Filter
protection.
Improvements to the anti-spam protection
Spam detection was no longer an issue with Panda GateDefender Performa once the anti-spam engine
was implemented.
However, the invention and application of new spam generation methods make it necessary to
frequently check mail scanning methods in order to meet the 99% detection commitment to Panda
Security clients and reduce the false positive detection ratio. Consequently, Panda GateDefender
Performa implements self-learning technologies to report emails that have been incorrectly classified as
spam and update its detection algorithms with the new information.
The new version of the anti-spam engine, already integrated in previous versions through the cloud,
leverages a huge database of knowledgeand is updated in real-time with new detections of spam
reported by users. This system offers the security of enjoying a clean email service, with the peace of
mind of knowing that you will not be losing messages that could be important for your company.
Web and IM/P2P/VoIP filter
Improvements to the Web filter
As the amount of malware and spam increases, so there are more and more websites with dangerous
or inappropriate content, and it is difficult for a single computer to store information about all such sites.
Panda Security updates the Web filter engine responsible for classifying downloaded pages in the cloud,
and allows you to apply standard actions (block, report, etc.). This way, Panda Security is coherent
with the rest of the detection engines, and also sends any knowledge accumulated to the cloud.
Given that cloud resources are virtually unlimited, the number of potentially inappropriate website
categories has been increased as well as the number of sites themselves. There are also greater
guarantees that any access to the Web will conform to the needs of the company. In addition, your
company can contribute actively to the cloud knowledge base, reporting any new inappropriate
websites.
As with the malware and content filtering, in this version of Panda GateDefender Performa, Web
filtering includes HTTPS, and the substitute page displayed (when necessary) can be customized, as
with the rest of the filters.
Improvements to the filtering of IM/P2P/VoIP applications
15
Panda GateDefender Performa-User Guide
One of the most significant problems when calibrating the bandwidth required for your company’s
activities, is to ensure there is sufficient bandwidth available to cover your employees’ needs.
To this end, the quick and accurate identification of restricted protocols -such as p2p (emule,
bittorrent), VoIP (Skype), messaging (Messenger-) and others is vital. Access to these protocols and
applications not only affects your bandwidth but also your company's productivity, and so it is essential
to accurately determine which should be allowed and which not.
Due to the constant evolution of these applications, Panda GateDefender Performa updates the set of
rules that allow the detection of these types of data transfers, so that new versions of messaging and
P2P programs are correctly identified and managed (block or report).
Given that not everyone's needs are the same, Panda GateDefender Performa lets you define individual
protection profiles for each user for P2P and messaging applications.
Other improvements
New security reports and improvements to the filtering
and presentation of current reports
The increasing amounts of malware being received and detected by companies means that there is also
more information to make available to network administrators.
Because of this, Panda Security provides search tools and filters for presenting reports as well as new
types of reports. These new reports concern the SSL certificates and the explicit proxy, in addition to
those offered in previous versions.
The reports screen has been redesigned to jointly display a breakdown of the malware detected for all
the protection modules purchased, minimizing the time spent navigating through the administration
console. The limits for storing old reports have also been updated and expanded, in line with the
increase in the amount of malware on the Web and the considerable increase in the information
provided by Panda GateDefender Performa regarding each security problem.
Now, Panda GateDefender Performa maximizes the potential of the reports, so that these show all
possible details about each of the protection and the new features implemented.
Improvements to quarantine management
Apart from the improvements made to malware detection and reports, the space used for the
quarantine of items suspect of containing malware has been increased. It is now easier to search for
items, restore them and to download messages.
Integration of new proxy for HTTP/HTTPS
In the case of networks that do not have a proxy Web server, Panda GateDefender Performa
implements a Web cache server that speeds up page and file downloads via HTTP and HTTPS, saving
data flow and allowing you to delay decisions on expanding resources. Additionally, by implementing
authentication methods that use local databases or LDAP, its use can be restricted to specific network
users, integrating with the user management infrastructure already installed in your company.
16
Panda GateDefender Performa-User Guide
Finally, the integrated proxy helps in the configuration and deployment of protection profiles, avoiding
the need for validation servers in your corporate network, optimizing the number of servers and
therefore the reducing the overall TCO.
New agent to identify domain users
In order to complement the deployment of protection profiles, Panda Security provides a Windows
application which can be installed on your main or secondary domain controller to help Panda
GateDefender Performa correctly identify users in your network domain. This way, all domain users are
identified and the selected protection profile is applied.
New Quality of Service (QoS) feature
As a perfect complement to the explicit proxy, and the Web filtering and IM/P2P/VoIP filtering tools,
Panda GateDefender Performa implements QoS technology in this version. This technology allows you
to prioritize Internet access for data flows marked as important by your company. This way, traffic can
be identified by type, and minimum and maximum bandwidth use can be assigned, in addition to
priorities, in order to effectively manage the use of the data flow delivered to local network users.
Collective Intelligence
Panda GateDefender Performa supports Collective Intelligence, meaning that the detection capacity of
the anti-malware protection is significantly increased as it is also based on queries to the Panda
Security knowledge server (“the cloud”). This server is continually updated and contains all Panda
Security's information about malware and security threats.
How does the Collective Intelligence scanning/detection process
work?
Collective Intelligence implies a new type of logic in the scan, which acts in the following way:
1. The signatures stored in the appliance are consulted.
2. If the sample is not found among the signatures, the local cache is consulted.
3. If the information is not in the local cache, a query is made to the server.
4. If malware is identified, the Collective Intelligence server returns the identifier and the generic
type of malware. To complete the information, for example with the name of the malware and
other useful data, a query is made to the Panda Security extended information server.
5. If there are any changes to the knowledge available, the Collective Intelligence server
automatically communicates the updates to the appliances, specifying those samples of
goodware that have recently undergone changes, or completely emptying the cache.
Collective Intelligence cache
The use of Collective Intelligence involves maintaining a local cache in the appliance storing the results
of queries to the cloud.
Malware-positive or suspicious results stored in the cache will expire in 24 hours, even if during this
time there has been frequent access to the item or even if the cache has not exceeded the limit. This
means that there will have to be a query to the cloud if the expired item is scanned again.
The cache is persistent, i.e. the content is maintained between restarts of the appliance and its
processors, but it is automatically emptied whenever a manual update is launched through the "Update
now", button in the Update screen of the Web console.
17
Panda GateDefender Performa-User Guide
In the case of several load-balancing appliances, the cache of each of them operates as an
independent entity.
Control over cloud connections
To avoid unnecessary delays in the case of connection problems, the connection to the cloud will be
interrupted for five-minute periods without impacting the scan in progress. The cloud availability status
will be monitored every 60 seconds, and a system event will be generated if there is a problem. During
this period of disconnection, the signatures and local cache will still be consulted.
The action policy will depend on the network of each user, por lo que el ajuste de la configuración de
los tiempos máximos de acceso a la nube está disponible in the Advanced Settings page of the Web
console. Three parameters can be configured in the "remote scan timers" section:
• Maximum time for cloud queries regarding the Internet (2 seconds by default).
• Maximum time for cloud queries regarding SMTP (10 seconds by default).
• Maximum time for cloud queries regarding other items (3 seconds by default).
Calculation of maximum scan times is based on maximum response times for each intercepted protocol,
grouped into three classes: HTTP/S/FTP, SMTP and POP3/IMAP4/NNTP.
Periodic scanning of items in malware quarantine uses the maximum time defined for SMTP, which
would normally be greater than for the Internet and interactive mail, as an immediate response is not
needed in this case.
In the following cases, events are generated in the system report and sent to the administrator via
SMTP, SNMP and Syslog:
• Cloud queries disabled
Cloud queries re-enabled
Extended information system
The detection results contain only the identifier and the generic type of malware, both for results from
the local cache and from the cloud. To complete the data with a name and a specific type of malware,
a query is made to an extended information server. So the report and the notifications on malware
detected, quarantine and the malware activity details page in the Web console have all the information
they need.
If the extended information system fails, the basic format is then used to display the report, using the
identifier to link to the Panda Security Malware Information Center website, where all the information is
available online.
Checking connectivity with the cloud
You can check connectivity with the cloud servers using the “Connectivity with Panda Security” tool in
the Web console.
Detection of malicious URLs
The system can detect malicious URLs, preventing users from accessing phishing pages or those
harboring malware. This protection is configured through a special Web filter category: "Malicious
websites".
18
Panda GateDefender Performa-User Guide
Implementation
Activating Panda GateDefender Performa
1.
2.
Click My license, next to the system clock.
In the window that appears, click
Registration/activation details.
3.
4.
A new window appears: Enter theuser name and password provided by Panda Security.
Click Save. Panda GateDefender Performa will contact the Panda Security server to get license
information (wait 10 seconds before consulting the information). If an error occurs, a message
will be displayed.
on
the
link
(here)
that
appears
under
More information.
Configuring the appliance
Points to bear in mind before configuring the appliance
The correct configuration of Panda GateDefender Performa ensures optimum protection of your
corporate network and improves your appliance’s performance.
Therefore, before configuring Panda GateDefender Performa, it is important that you have a clear idea
of the following:
1. Who will be able to change the settings and from which computers.
2. What type of malware you want Panda GateDefender Performa to detect.
3. What protocols you want to protect.
4. Whether a specific type of file to be allowed to enter or leave your organization through a certain
protocol (for example, executable files via email).
5. What type of warnings you want to receive (whether Panda GateDefender Performa should warn
you every time it detects a virus, updates, has connection problems, etc).
6. Who should receive the warnings.
7. Whether you want warning messages to display an explanatory text and the text it should include.
8. Whether there are trusted domains that will never send you malware.
9. Whether there are domains from which you never want to receive any email messages, as they
will always be spam. You can configure automatic blocking - without scanning- of the messages
received from those domains and optimize the performance of the appliance.
10. Whether you want to restrict access to certain Internet contents and what type of content.
11. Whether you want to allow access to a certain URL, regardless of whether it contains restricted
contents or not.
12. Whether you want to deny access to a certain URL, regardless of whether it contains restricted
contents or not.
13. Whether you want advanced log files with more detailed information.
Having a clear idea about these issues will allow you to configure the solution for optimized
performance from the start, the network traffic will adapt to your needs and you probably won’t need
to change the settings at a later stage.
19
Panda GateDefender Performa-User Guide
Before configuring the appliance, don't forget to have the necessary data to hand.
Once Panda GateDefender Performa is installed, access to the Web console is configured and the
product is activated you can start to configure the system and the protection.
Data required to configure the appliance
Before starting to configure the appliance for the first time, it is advisable to have the following data to
hand:
To establish the network connections
1.
2.
3.
4.
5.
Name of Panda GateDefender Performa: Name of the unit that allows it to be identified.
This name must be unique. If you have more than one appliance in your organization, make sure
that each of them has a different name. The default name is MachineName.
IP address and net mask: Use a free IP address and net mask associated to the in the
network in which the appliance has been installed. These must allow Panda GateDefender
Performa to access the Internet in order to activate and update, and connect with an SMTP
server in order to send warning messages. The default IP is 192.168.1.1 and the default net
mask is 255.255.255.0 .
This is the IP address used to establish connection and is totally different from the
Configuration IP , which is only used to access the Web administration console.
Default gateway: Default gateway for connecting to other networks without static routes
established (Internet). By default, the gateway is 192.168.1.200.
Additional routing table. Allows static routes to be defined for accessing computers or
networks that cannot be reached through the default gateway. For example, for sending warning
messages to an SMTP server in a different subnet, which cannot be accessed through the default
gateway.
You must specify the IP address and net mask associated to the target network or computer and
the IP of the gateway that will be used to establish the connections. If the target is a computer,
leave the net mask field blank or use the value 255.255.255.255 .
DNS servers: Panda GateDefender Performa can be configured with up to three DNS servers.
Firstly, Panda GateDefender Performa uses the primary DNS server. If the connection fails, it will
try to use the rest of the servers configured.
You probably won’t need to change the default settings. If you have your own DNS
servers or DNS servers provided by your ISP, you can configure Panda GateDefender Performa
to use them.
The appliance uses these DNS servers to establish its own connections, update, send warnings and
validate licenses, etc. As a result, if these servers are not configured correctly, Panda GateDefender
Performa will not work properly.
6.
Proxy server IP address and authentication data: If Panda GateDefender Performa is going
to connect to the Internet through an HTTP proxy, you will need to activate it here and specify
the IP address of the server and the port and if it requires authentication, activate this option and
enter the user name and password.
20
Panda GateDefender Performa-User Guide
To specify who can change the settings:
1.
2.
User name: Defines the user name that must be entered whenever a user tries to access the
console.
Password: Defines the password that must be entered whenever a user tries to access the
console. The password can include letters and numbers and must be six to twelve characters
long.
Configuration IP address: This is the IP address used to access the Web administration console.
The default address is 172.16.1.1. For more information, click here. To activate Panda GateDefender
Performa.
1.
2.
Registration details – User name: This is the user name provided by Panda Security with the
appliance. This will identify your appliance in the updates server.
Registration details – Password: This is the password provided by Panda Security with the
appliance. This will identify your appliance in the updates server.
The user name and password are different from the user details for accessing the Web
console. These are the details identifying the registered user of Panda Security and which
offer access, among other things, to the update servers. provided these when you bought the
appliance.
To configure sending of warnings
1.
2.
3.
4.
Email addresses: Email address or addresses to which Panda GateDefender Performa must
send alerts.
SMTP server: DNS-resolvable IP address or name of the SMTP to use to send warnings.
Port: Port number if the SMTP server uses a different port from the standard port (25).
Authentication details: If the SMTP server requires authentication, keep the user name and
password that Panda GateDefender Performa must use to identify itself to hand.
Default settings
The default settings defined are:
• Appliance name: MachineName.
• Network IP address: 192.168.1.1.
• Net mask: 255.255.255.0.
• Default gateway: 192.168.1.200.
• Primary DNS server: 207.200.7.21
Console login
•
•
•
•
User name: defaultuser.
Password: defaultpass.
Configuration IP address: 172.16.1.1.
Net mask: 255.255.255.0.
21
Panda GateDefender Performa-User Guide
Creating the USB installer
Downloading files and preparing the USB device
The first step to create a USB installer with which to install or restore the ISO image of Panda
GateDefender Performa involves getting the files required as well as the tool with which to create the
installer.
The ISO and the unetbootin tool to create the installer are available at the following URL:
http://www.pandasecurity.com/spain/enterprise/downloads/clients/default.htm
Preparing the USB device
You will then need to prepare the USB on which you are going to create the installer.
It is IMPORTANT to ensure that the USB device does not contain data that you want to keep,
as all information will be deleted when the process of creating the installer is complete.
Follow these steps:
1.
2.
3.
Insert the device in the USB port and find the assigned drive in your file explorer. (Windows
Explorer-> My Computer-> Removable drives).
Right-click the removable drive icon and click Format.
Select FAT32 as the file system and click Start.
You will then see a warning about the loss of data from the device after formatting. If you are sure
there is no important data on the device, click OK to format it.
22
Panda GateDefender Performa-User Guide
Once formatting is complete you will see the corresponding notification:
Click OK.
Creating the USB installer
Once the required files have been downloaded and the USB device prepared, it is time to create
the installer.
To do this:
1.
2.
3.
4.
5.
Copy the ISO of the CD downloaded previously to the root folder of your USB device.
Extract the compressed file with the Unetbootin tool to a folder on your computer el comprimido
que contiene la herramienta Unetbootin.
In the same folder, extract the compressed file Performa-4.00.00.buildnumber.FILES4USB.zip.
Start the process by double-clicking the Unetbootin executable file
In the screen that appears, select Custom, and in the Kernel field enter the complete path of the
vmlinuz file, and in Initrd, enter the complete path of the file initrd.gz.
23
Panda GateDefender Performa-User Guide
6.
7.
8.
Make sure the value of the Type field is USB drive and the value of the Drive field corresponds to
that of the USB device.
Click OK.
Once this process has finished, click Exit.
Click OK. The selected ISO image will be copied to the USB device.
Click Exit .
IMPORTANT: Do not click Restart now, as this will cause all the data on the computer to be
lost.
24
Panda GateDefender Performa-User Guide
Remember to use the Safely remove hardware option to remove the USB device.
Then,
1.
2.
3.
4.
5.
follow the steps below:
Export the current settings of Panda GateDefender Performa to a file.
Insert the USB device in one of the appliance ports.
To continue with the process, connect a screen to the VGA socket in the appliance.
Also, connect a keyboard.
Restart the appliance.
Once the restart is complete, the restore process will start. When it has finished, you will see the
following notice:
25
Panda GateDefender Performa-User Guide
To complete the restore process, press ENTER and remove the USB device.
Do not shut down the system while the appliance is working, other the entire system will be
corrupted. The recovery process must not be interrupted once it has started.
Panda GateDefender Performa will display the factory settings. Import the settings file that you have
just exported to apply the settings defined before restoring the appliance.
26
Panda GateDefender Performa-User Guide
Command Line Interface (CLI)
Command Line Interface (CLI)
The Command Line Interface (CLI) in Panda GateDefender Performa is a useful function in those
situations in which you can't access the console.
To access the Command Line Interface there are two types of profiles or roles with different
permissions.
Readonly role
This is a user with read-only permissions on a limited shell.
This user cannot edit the appliance status or settings. The prompt is >.
Admin role
This is an administrative user with access to all commands and who can edit information relative to all
of them.
After logging in, the user will have limited access to the shell, but with administer rights, using the
command enable.
The prompt in administrator mode is #
And to leave administrator mode: “exit”
Access
The CLI can be accessed through SSH as a serial port. In some appliances, access via VGA is also
allowed, which requires connecting a keyboard and monitor.
Click here to see the list of commands allowed in read-only mode.
Click here to see the list of commands allowed in administrator mode.
For more information about any of the commands, enter the name of the command and then
the character “?” (without quotation marks).
Commands allowed in read-only mode
date
Show current date
DNS
DNS configuration
enable
Enter admin mode
exit
Exit this CLI session
interception
Interception rules
meminfo
Report memory usage
information
netstat
Network statistics
network
Network configuration
ntp
NTP configuration
password
Change password
ping
Ping other machine
quit
Exit this CLI session
27
Panda GateDefender Performa-User Guide
snmp
SNMP configuration
stats
Statistics
status
Status
syslog
Syslog configuration
tcpdump
Show traffic
top
Show top processes
uptime
Show uptime
vmac
Virtual MAC configuration
vmstat
Report generic statistics
Commands allowed in administrator mode
date
Show current date
DNS
DNS configuration
hotfix
Hotfix utilities
exit
Exit this CLI session
interception
Interception rules
meminfo
Report memory usage
information
netstat
Network statistics
network
Network configuration
ntp
NTP configuration
password
Change password
ping
Ping other machine
quit
Exit this CLI session
reboot
Reboot system
reset
Reset services
restore
Restore factory settings
shutdown
Shutdown
snmp
SNMP configuration
stats
Statistics
status
Status
syslog
Syslog configuration
tcpdump
Show traffic
top
Show top processes
uptime
Show uptime
vmac
Virtual MAC configuration
vmstat
Report generic statistics
28
Panda GateDefender Performa-User Guide
Status screen
Introduction
The Status screen is the first screen that users access after logging in to the administration console
and it allows them not only to check that the appliance is operating correctly, but also Panda
GateDefender Performa protection statistics.
The screen header, which is common to all the console screens, shows the system clock, the
Disconnect option and the My license link. This takes you to the License management screen
where you can check or edit your registration or activation details and see the technical specifications
of the appliance. You will also see information about the products you have contracted and the
corresponding expiry dates.
You will find the following areas in the Status screen:
Warnings
The Warnings area will be displayed when there are certain problems and will offer recommendations
and advise you on the action to take.
Protection
Click the title of the section to display or hide the content. This section contains graphs with statistical
information about scanning and detections performed by the protection modules. It also includes data
about updates, licenses and quarantine. You can see details of the contents of the graphs through the
corresponding options and export content to .csv format.
To the left of the title of each protection (Anti-malware, Content Filter, Anti-spam, Web filter and
IM/P2P filter) there will be a red icon if the protection is disabled, green if it is enabled, and orange if it
is partially enabled.
If you pass the cursor over the protection title, and it is partially enabled, you will see the actual status.
System
Use the arrow at the end of the title bar of the section to display or hide the content. Here you will see
the system connections and network card traffic. You will also see a graph of the network load history,
uninterrupted runtime, and load-balancing (if enabled). You can enlarge the graphs using the
corresponding option, and export the content to .csv format.
Restart statistics
Use this button, at the bottom of the window, to restart the system graphic statistics. Obviously, on
restarting the statistics the data displayed in the Status window will change.
License management
The License management screen lets you check the status of your licenses for each of the modules
contracted. You can access the screen in two ways:
1.
2.
By clicking the My license link, in the console header, next to the system clock.
By clicking the date in Updates and licenses > Updates and services expire:, in the Status
screen.
29
Panda GateDefender Performa-User Guide
Products contracted
Bear the following in mind:
1.
•
•
The anti-malware license covers the following types of protection:
Anti-malware
Content Filter
2.
The anti-spam license covers the protection against junk mail (spam).
3.
The Web filter license covers the following types of protection:
Web filtering
Filtering of IM (instant messaging), P2P (file-sharing) and VoIP (Voice over IP).
•
•
When the license for a module has expired or is about to expire, Panda GateDefender Performa will
display the Renew license option, which will give you direct access to the renewals area on Panda
Security’s website.
If you do not have a license for a certain type of protection, Panda GateDefender Performa will indicate
the protection is Without a license and give you the option to Get a license.
Registration/activation details
After installing the Panda GateDefender Performa software and accessing the console, activate the
appliance. To do this, enter the activation details provided by Panda Security. Click the link to
activate the product or consult activation details..
If you want to check these details after activating the unit, you can use the link in this section.
Technical specifications
This shows the serial number and hardware platform of the connected unit.
Protection status
Preferences for viewing the protection status
You can configure viewing preferences in the Status window:
1.
Values viewed: Lets you select the type of data you want to see. Use the drop-down menu:
• Percentage: Shows percentage data in the status graphs.
• Absolute: Shows absolute data in the status graphics. Default mode.
2.
Period viewed: Use the drop-down menu to select a time period for the status graphics:
• Last 24 hours. Default mode.
• Last 7 days.
• Last month.
• Last year.
• Specify dates: If you select this option, text boxes will be enabled that will allow you to specify
the start and end dates.
30
Panda GateDefender Performa-User Guide
Click OK to save the changes. Otherwise, click Cancel.
Scan and detection statistics
Protection activity graphs display detailed statistics about the activity of the protection modules. They
also show the percentage occupation of quarantine and information about updates.
Use the Enlarge link to expand the graphs. This link is visible when you place the mouse cursor over
the graph.The Export option lets you export the content of the graph to .csv format. By clicking
Details you can see more in-depth data about the selected protection module.
Anti-malware
This displays real-time statistics on the anti-malware (viruses, jokes, dialers , spyware, hacking tools,
security risks and phishing).
It shows the following information:
•
•
•
•
•
•
•
•
•
Total files scanned.
Malware detected. Files in which some kind of malicious code has been detected, in both Mail
and News and for both HTTP and FTP. The number of files detected and their percentage of
the total items scanned is also displayed.
Evolution graph. This shows the evolution of the detections made by the protection. These are
divided into two categories: Detections in Mail and News (red line) and Detections in HTTP
and FTP (green line). Click Enlarge to expand the graph.
View details. Lets you consult the Anti-malware protection details screen in the console with
more detailed and complete information.
Content Filter. This allows you to access real-time statistics on the content filter.
Items scanned by Panda GateDefender Performa.
Items filtered: Files in which some kind of unwanted content has been detected, in both Mail
and News and for both HTTP and FTP. The number items filtered and their percentage of the
total items scanned is also displayed.
Evolution graph.This shows the evolution of the filtering applied by the protection. This is
divided into two categories: Detections in Mail and News (red line) and Detections in HTTP
and FTP (green line). Click Enlarge to expand the graph.
View details: Lets you consult the Content Filter protection details screen in the console with
more detailed and complete information.
Anti-spam
This displays real-time statistics on the anti--spam scan. It shows the following information:
• Messages scanned.
• Spam messages. Number of messages classified as spam and the percentage of the total
messages scanned.
• Evolution graph. This shows the evolution of the detections made by the protection. Click
Enlarge to expand it.
• View details. If you click on this link, the Details of the anti-spam protection will be
displayed with more detailed and complete information.
Web filtering
• Total pages scanned.
• Pages blocked: The number of access attempts blocked or monitored (access to URLs restricted
by the administrator, which have not been blocked by Panda GateDefender Performa but are
logged in the report). The number of events detected is displayed along with their percentage of
the total items scanned.
31
Panda GateDefender Performa-User Guide
•
•
Evolution graph. This shows the evolution of the pages blocked by the protection. Click
Enlarge to expand the graph.
View details. If you click on this link, the Details of the Web filtering protection will be
displayed with more detailed and complete information.
IM/P2P/VoIP access filter
This displays real-time data on the activity of the Web filter and IM/P2P filters.
• Total access scanned.
• Restricted access: The number of access attempt to IM/P2P protocols and the percentage of
the total is also displayed.
• Evolution graph. This shows the evolution of the accesses to Web pages and IM/P2P
applications blocked by the protection. Click Enlarge to expand the graph.
• View details. Click to consult the Web and IM/P2P application filter protection details
screen in the console with more detailed and complete information.
• Quarantine status. It displays the percentage occupation of quarantine. For more information
about the items in quarantine, click the percentage occupation figure.
Update and licenses
Information about the date of the last update and the date in which the updates and services expire.
This section allows you to check the system update status and the expiry date of the contracted
antivirus protection and services:
1.
2.
Last update: This shows the date that Panda GateDefender Performa last updated the signature
files.
Updates and services expire:This specifies the expiry date of the license contracted. If the
appliance has not been activated, the Updates and services expire: field displays the text
Not activated. and will not change until the contracted protection has been activated
( License management ) screen).
Click the dates to access the Version details and License management screens.
Details of the anti-malware protection
The details of the activity of the anti-malware protection can be displayed in a graph. These details can
be selected by protocol or by a specific date. The graphs will vary depending on the selection criteria.
View selection
You can select the details according to the following values:
•
•
•
Protocol in which malicious code was detected (HTTP/S, FTP, SMTP -default mode-, POP3,
IMAP4 or NNTP).
Values of the data you want to see. Use the drop-down menu:
• Percentage: Shows percentage data in the status graphs.
• Absolute: Shows absolute data in the status graphics (default mode).
Period. You can specify that the graphs must only show the malware detections during a certain
interval.
• Last 24 hours.
• Last 7 days.
• Last month.
32
Panda GateDefender Performa-User Guide
•
•
Last year.
Specify dates: If you select this option, text boxes will be enabled that will allow you to
specify the start and end dates.
The system uses cookies to remember youir preferences.
Graphs
Panda GateDefender Performa shows the results of the filter applied in the previous section as a graph.
•
Percentages and evolution.
This section shows two graphs. The pie chart shows the number and percentage of
detections for a specific type of malware. Each type of malware is assigned a color, which
corresponds to a section of the pie chart. The data displayed is classified into:
1. Malware type: Viruses, dialers, jokes, phishing (only in SMTP, POP3, IMAP4 and NNTP),
hacking tools, security risks or spyware.
2. Total number of detections of this type of malware.
3. Percentage of detections of this type of malware with respect to the total files scanned.
The evolution graph shows the evolution of each type of malware during a specific period of
time. The color of each line corresponds with the color of each type of malware.
•
Top 10 detections. A pie chart shows the top ten types of malware most frequently detected,
taking into account the filtering criteria. Each type of malware is assigned a color, which
corresponds to a section of the pie chart. The data displayed is classified into:
1. Malware name.
2. Malware type (viruses, dialers, jokes, phishing, hacking tools, security risks or
spyware).
3. Total number of detections of this type of malware.
4. Percentage of detections of this type of malware with respect to the total detections
included in the Top Ten.
•
Top 10 detections by user. A pie chart shows the ten IP addresses of the computers or the
email address of the recipients of the most malicious codes that have been detected, bearing in
mind the filtering criteria. Each computer is assigned a color, which corresponds to a section of
the pie chart. The data displayed is classified into:
1. IP address (for HTTP/S and FTP) of the affected computer or Email address (for mail
and new protocols) of the affected recipient.
2. Total number of detections.
3. Percentage of detections of this computer with respect to the total detections included
in the Top Ten.
Details of the Content Filter protection
The details of the activity of the Content Filter protection can be displayed in a graph.
View selection
You can select the details according to the following values:
•
•
Protocol in which malicious code was detected (HTTP/S, FTP, SMTP -default mode-, POP3,
IMAP4 or NNTP).
Values of the data you want to see. Use the drop-down menu:
• Percentage: Shows percentage data in the status graphs.
33
Panda GateDefender Performa-User Guide
•
• Absolute: Shows absolute data in the status graphics (default mode).
Period. You can specify that the graphs must only show the events that occurred on a certain
date.
• Last 24 hours.
• Last 7 days.
• Last month.
• Last year.
• Specify dates: If you select this option, text boxes will be enabled that will allow you to
specify the start and end dates.
Graphs
Panda GateDefender Performa shows the results of the filter applied in the previous section as a graph.
The information displayed is the following:
•
Percentages and evolution.
This section shows two graphs. The pie chart shows the amount and percentage of the items
filtered. Each item is assigned a color, which corresponds to a section of the pie chart. The
data displayed is classified into:
1. Event type. Items allowed and filtered.
2. Total number of times this type of event has been filtered.
3. Percentage with respect to the total files scanned.
The evolution graph shows the evolution of each item filtered during a specific period of time.
The color of each line corresponds with the color of each item.
•
Top 10 content filtered. A pie chart shows the top ten most frequent content filtering events,
taking into account the filtering criteria. Each item is assigned a color, which corresponds to a
section of the pie chart. The data displayed is classified into:
1. Item name.
2. Type of filter applied.
3. Total number of times the item has been filtered.
4. Percentage with respect to the total of the Top 10.
Details of the anti-spam protection
The details of the activity of the anti-spam protection can be displayed in a graph. These details can be
selected by protocol or by a specific date. The graphs will vary depending on the selection criteria.
View selection
You can select the details according to the following values:
•
•
•
Protocol (SMTP (default), POP3, IMAP4 or NNTP).
Values of the data you want to see. Use the drop-down menu:
• Percentage: Shows percentage data in the status graphs.
• Absolute: Shows absolute data in the status graphics (default mode).
Period. You can specify that the graphs must only show the messages detected in a certain
interval.
• Last 24 hours.
• Last 7 days.
• Last month.
• Last year.
34
Panda GateDefender Performa-User Guide
•
Specify dates: If you select this option, text boxes will be enabled that will allow you to
specify the start and end dates.
Graphs
Panda GateDefender Performa shows the results of the filter applied in the previous section as a graph.
The information displayed is the following:
•
Percentages and evolution.
This section shows two graphs. The pie chart shows the number and percentage of
detections for a specific type of message. Each type of message is assigned a color, which
corresponds to a section of the pie chart. The data displayed is classified into:
1. Classification of the message (mail allowed, spam and probably spam).
2. Total number of detections of this type of message.
3. Percentage of detections of this type of message with respect to messages scanned.
The evolution graph shows the evolution of each type of message during a specific period of
time. The color of each line corresponds with the color of each type of message.
•
Top 10 recipients of spam. A pie chart shows the top ten recipients of spam, taking into
account the filtering criteria. Each recipient is assigned a color, which corresponds to a section of
the pie chart. The data displayed is classified into:
1. Recipient’s email address.
2. Total number of messages classified as spam.
3. Percentage of detections of this spam for this recipient with respect to the total Top
Ten.
Messages classified as probable spam are not included in this graph.
•
Top 10 recipients of spam. A pie chart shows the top ten senders of spam, taking into account
the filtering criteria. Each sender is assigned a color, which corresponds to a section of the pie
chart. The data is classified into:
1. Sender’s email address.
2. Total number of messages classified as spam.
3. Percentage of detections of this spam for this sender with respect to the total Top Ten.
Messages classified as probable spam are not included in this graph.
Information on Web filtering
The details of the activity of the Web filtering can be displayed in a graph. These details can be
selected by a specific date. The graphs will vary depending on the selection criteria.
View selection
You can select the details according to the following values:
•
Values of the data you want to see. Use the drop-down menu:
• Percentage: Shows percentage data in the status graphs.
• Absolute: Shows absolute data in the status graphs (default mode).
•
Period. You can specify that the graphs must only show the access to restricted Web pages
detected in a certain period.
35
Panda GateDefender Performa-User Guide
•
•
•
•
•
Last 24 hours. Default mode.
Last 7 days.
Last month.
Last year.
Specify dates: If you select this option, text boxes will be enabled that will allow you to
specify the start and end dates.
Graphs
Panda GateDefender Performa shows the results of the filter applied in the previous section as a graph.
• Percentages and evolution of pages. This section shows two graphs. The pie chart shows
the number and percentage of detections for a specific type of page. Each type of page is
assigned a color, which corresponds to a section of the pie chart. The data is classified into:
1. Classification of the pages (pages allowed and restricted pages).
2. Total number of detections of this type of page.
3. Percentage of detections of this type of page with respect to the total pages scanned.
The evolution graph shows the evolution of each type of page during a specific period of time.
The color of each line corresponds with the color of each type of page.
•
Top 10 filtered pages visited. A pie chart shows the top ten restricted pages visited, taking
into account the filtering criteria. Each page is assigned a color, which corresponds to a section of
the pie chart. The data displayed is classified into:
1. Page URL.
2. Category by which it has been filtered.
3. Total number of visits.
4. Percentage of visits to this page with respect to the total in the Top 10.
•
Top 10 most visited domains. Shows the top ten most visited domains, taking into account
the filtering criteria. Each domain is assigned a color, which corresponds to a section of the pie
chart. It displays the data as follows:
1. Domain.
2. Category to which the domain corresponds.
3. Total number of visits.
4. Percentage visits with respect to the Top Ten.
•
Top 10 users that most browse the Web. Shows the top ten users that most use the
Internet, taking into account the filtering criteria. Each user is assigned a color, which
corresponds to a section of the pie chart. The data can be classified as follows:
1. User.
2. Total number of visits.
3. Percentage visits with respect to the Top Ten.
•
Top 10 user access to blocked pages. A pie chart shows the top ten users that have most
frequently visited blocked pages, taking into account the filtering criteria. Each user is assigned a
color, which corresponds to a section of the pie chart. The data is classified into:
1. IP address. IP address of the user that accesses the restricted pages.
2. Total number of blocked pages visited.
3. Percentage with respect to the total of the Top 10.
If Panda GateDefender Performa is installed between the Internet and a Web proxy, only
access of the proxy IP will be logged.
36
Panda GateDefender Performa-User Guide
IM/P2P/VoIP filter details
This offers a graphic display of the activity of the instant messaging, P2P and VoIP protocol filter.
These details can be selected by a specific date. The graphs will vary depending on the selection
criteria.
View selection
You can select the details according to the following values:
•
•
Values of the data you want to see. Use the drop-down menu:
• Percentage: Shows percentage data in the status graphs.
• Absolute: Shows absolute data in the status graphs (default mode).
Period. You can specify that the graphs must only show the access to restricted Web pages
detected in a certain period.
• Last 24 hours. Default mode.
• Last 7 days.
• Last month.
• Last year.
• Specify dates: If you select this option, text boxes will be enabled that will allow you to
specify the start and end dates.
The system uses cookies to remember youir preferences.
Graphs
Panda GateDefender Performa shows the results of the filter applied in the previous section as a graph.
•
Percentages and evolution. This section shows two graphs. The pie chart shows the number
and percentage of detections for each type of protocol. Each type is assigned a color, which
corresponds to a section of the pie chart. The data is classified into:
1. Protocol classification
2. Total number of detections for this type of protocol.
3. Percentage of detections for this type of protocol with respect to all traffic analyzed.
The evolution graph shows the evolution of each type of protocol during a specific period of time.
The color of each line corresponds with the color of each type.
•
Percentages and evolution of the applications. This section shows two graphs. The pie
chart shows the number and percentage of detections for a specific type of access. Each type of
access is assigned a color, which corresponds to a section of the pie chart. The data is classified
into:
• Classification of the applications (connections or access of protocols allowed and
restricted).
• Total number of detections of this type of access generated by the protocols specified.
• Percentage of detections of this type of access generated by the specified protocols, with
respect to all access.
The evolution graph shows the evolution of each type of protocol during a specific period of time.
The color of each line corresponds with the color of each type of protocol.
•
Top 10 restricted protocols . A pie chart shows the top ten restricted resources accessed,
taking into account the filtering criteria. Each application is assigned a color, which corresponds
to a section of the pie chart. The data displayed is classified into:
1. Protocol name
2. Category by which it has been filtered.
37
Panda GateDefender Performa-User Guide
3.
4.
•
Total number of visits.
Percentage of visits to this application with respect to the total in the Top 10.
Top 10 user access to restricted protocols . A pie chart shows the top ten users that have
most frequently visited restricted protocols, taking into account the filtering criteria. Each user is
assigned a color, which corresponds to a section of the pie chart. The data is classified into:
1. IP address. IP address of the user that accesses the restricted protocols.
2. Total number of restricted protocols visited.
3. Percentage with respect to the total of the Top 10.
If Panda GateDefender Performa is installed between the Internet and a Web proxy, only
access of the proxy IP will be logged.
Version details
In order to check the version of the different modules incorporated in Panda GateDefender Performa:
1. Select the Status menu in the console main window.
2.
Click the
icon next to Last update.
You can also access the screen by going to Status > Updates and licenses > Last updates.
A window appears with the following data:
•
•
•
•
•
•
Date of the signature files and version of the anti-malware engine.
Date of the signature files and version of the anti-spam engine.
Version of the Web filtering engine.
Date of the IM/P2P/VoIP protocol filter rules.
IM/P2P/VoIP protocol filter engine version.
System software version (firmware).
System status
This displays all information about system operation, through the following graphs:
• System connections
• System load
• Network interface cards
• System data
38
Panda GateDefender Performa-User Guide
System connections
Indicates the number of current connections, as well as the graphic with data on the number of
connections established and failed.
•
Connections established
Shows the number of connections successfully established through the appliance for the protocols that
the device is scanning.
•
Simultaneous connections.
This is the number of connections open at the same time. In this case, it will indicate the average
number of connections open at the same time for a given period. This information is particularly useful
in order to know the workload of Panda GateDefender Performa at any given moment.
System load
Graph showing the CPU load.
•
Load balancing
If you have more than one unit working in load balancing mode, this section will allow you to view
the rest of the units and access their Web administration consoles. You can also check the status
(master or slave) of all units.
To access the consoles of the other Panda GateDefender Performa units, you must:
1.
2.
Click the Open console link next to the name of the other unit.
Enter the user name and password for accessing the console of the device you want to access.
Network card zone
39
Panda GateDefender Performa-User Guide
This section shows the Megabytes (or Gigabytes) passed through each network interface card (NIC1
and NIC2), distinguishing inbound and outbound data, and with the corresponding graphic.
System data
A progress bar shows the percentage system load and uninterrupted run time.
Restart statistics
Use this button, at the bottom of the window, to restart the system graphic statistics. Obviously, on
restarting the statistics the data displayed in the Status window will change.
40
Panda GateDefender Performa-User Guide
Introduction to the settings
When you access the Settings menu of the Panda GateDefender Performa console, you will find the
options grouped into two main sections: protection settings and system settings.
From these sections you can configure specific features of each protection module, general system
features, IP addresses and domains, protection profiles, warnings, etc.
Protection settings
In addition to configuring the anti-malware and anti-spam protection, Panda GateDefender Performa
lets you decide which Web pages to allow users to access, email, Internet or News content to permit or
restrict, and to restrict access to instant messaging and P2P protocols.
You can also add additional ports to the ports that Panda GateDefender Performa uses by default. You
can also create specific profiles and assign them to the appliances you choose.
41
Panda GateDefender Performa-User Guide
System settings
In this section of the Settings menu you will find options that allow you to configure general system
features, internal networks, IP addresses and domains, warnings, etc.
42
Panda GateDefender Performa-User Guide
Protection settings
Anti-malware protection
Malware types
Panda GateDefender Performa protects against malware in general and viruses in particular, before
these malicious codes can enter or leave your organization.
Panda GateDefender Performa blocks attacks launched by:
1.
Viruses. Viruses are programs that can enter computers or IT systems in a number of ways,
causing effects that range from simply annoying to highly-destructive and irreparable.
2. Worms. Programs similar to viruses but differ in that all they do is make copies of
themselves (or parts of themselves).
3. Vulnerability exploits. Attempts to exploit vulnerabilities through both e-mail and HTTP.
4. Trojans. Strictly speaking, a Trojan is not a virus, although it is often thought of as such.
Really they are programs that install themselves on computers appearing to be harmless
programs and carry out actions compromising user confidentiality.
5. Dialers. These are programs that are often used to maliciously redirect Internet connections.
They are designed to disconnect the legitimate telephone connection used to hook up to the
Internet and re-connect via a premium rate number. Often, the first indication a user has of
this activity is an extremely expensive phone bill.
6. Jokes. These are not viruses, but tricks that aim to make users believe they have been
infected by a virus.
7. Spyware. Programs that are automatically installed with another, (usually without the user’s
permission and even without the user realizing), which collect personal data (data on
Internet access, action carried out while browsing, pages visited, programs installed on the
computer, etc.). This information could be published, compromising user confidentiality.
8. Hacking tools and potentially unwanted programs. Programs that can be used by a
hacker to carry out actions that cause problems for the user of the affected computer
(allowing the hacker to control the computer, steal confidential information, scan
communication ports, etc).
9. Security risks. Any program that can be used for malicious purposes to cause problems for
the user of the computer. For example, a program for creating viruses or Trojans.
10. Phishing. This is an attack that uses social engineering. It consist of a message that seems
to be sent from a reliable source and tries to trick the user into revealing private information
(passwords, credit card number, etc.), which will then be used for fraudulent purposes (for
example, identity theft).
Anti-malware protection settings
You can configure anti-malware protection (anti-dialers, anti-spyware, anti-jokes, anti-phishing,
heuristic protection and protection against hacking tools and security risks).
Bear in mind that the protocol settings defined for the antivirus protection will be
applied to the rest of the types of anti-malware protection
43
Panda GateDefender Performa-User Guide
You can configure the following types of protection:
• Antivirus protection: Viruses, worms and Trojans.
• Heuristic protection: Unknown viruses.
• Anti-phishing protection: Private data theft.
• Protection against other risks: Hacking tools and security risks.
• Trusted sites and domains: List of trusted domains and/or IP addresses whose traffic will
not be scanned for malware.
Antivirus protection settings
Protection against jokes, spyware and dialers
If you enable the antivirus protection, the protection against jokes, spyware and dialers will
also be enabled:
• Jokes: These are not viruses, but tricks that aim to make users believe their computers have
been infected by a virus.
•
•
Panda GateDefender Performa deletes jokes detected. As they are not files infected by a
virus, they cannot be disinfected.
Spyware: Programs that are automatically installed with another program, (usually without the
user’s permission and even without the user realizing), which collect personal data (data on
Internet access, action carried out while browsing, pages visited, programs installed on the
computer, etc.).
Panda GateDefender Performa deletes spyware detected. As they are not files infected by
a virus, they cannot be disinfected.
Dialer: These are programs that are often used to maliciously redirect Internet connections. They
normally redirect the connection to a premium-rate number.
Panda GateDefender Performa deletes dialers detected. As they are not files infected by a
virus, they cannot be disinfected.
In all three cases, Panda GateDefender Performa inserts a customizable warning as well as deleting
the threat. For instructions on how to configure the warning, click here.
Antivirus protection settings
To access the antivirus protection settings, click the Settings menu of the main
console window, and select Antivirus.
This window allows you to configure the protocols that Panda GateDefender Performa must scan for
viruses, the file extensions that must be scanned or excluded from the scan and the actions Panda
GateDefender Performa must take when malicious code is detected.
44
Panda GateDefender Performa-User Guide
Protocols to scan
Panda GateDefender Performa intercepts and scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP4 and
NNTP traffic for viruses, worms and/or Trojans.
If you use Exchange servers in native mode, encrypted traffic generated between them will be
let through without being scanned.
If you disable the checkbox next to any protocol in the antivirus protection settings window, Panda
GateDefender Performa will not scan that protocol for malware.
The protocols configured through the antivirus protection settings window will also be
automatically applied to the rest of the protection types.
Click here to check the configuration options for each protocol.
After configuring the protocols and port, you can configure the Extensions to scan.
If you click on this option, a new window appears in which you can specify if Panda GateDefender
Performa must scan all files (Scan files with any extension) or the files whose extension appears in
the Extensions to scan list (Scan files with the following extensions:).
In this case, select the corresponding checkbox if you want Panda GateDefender Performa to Scan
files without extensions.
Actions to take
In this section, you can specify the action Panda GateDefender Performa must take when malicious
code is detected.
45
Panda GateDefender Performa-User Guide
Depending on the settings of the events to report, different types of notifications could be available.
For more information, refer to Events to report settings.
The actions that can be taken with messages automatically generated by viruses are:
• Completely delete the message.
• Delete only the infected attachment.
For the rest of the detections, the options are:
•
Disinfect. Panda GateDefender Performa will disinfect the infected file. If disinfection is not
possible because the virus code has overwritten the original code, for example:
o
For the HTTP/S and FTP protocols the file transfer will be blocked or it will be
rendered unusable.
o
For the rest of the protocols the infected files will be deleted.
o
By default, a copy of files that can’t be disinfected will be sent to quarantine. If
you don’t want these files to be stored in quarantine, clear this option.
When messages are deleted, Panda GateDefender Performa will reply to the computer trying
to send the message carrying the malicious code so that it thinks that the message has been
correctly sent.
•
Delete the file. Panda GateDefender Performa will directly delete the infected file.
• For the HTTP/S and FTP protocols the file transfer will be blocked or it will be rendered
unusable.
• For the rest of the protocols: The infected files will be deleted.
• If you enable the checkbox For the SMTP protocol, completely delete the
message (not just the file), email messages that use this protocol will be prevented
from reaching the recipient.
It is advisable to select the option Disinfect, as almost all fake-from messages and messages sent
by mass-mailing worms are infected, and will be deleted when they are detected. Attachments with
useful content in other messages will be disinfected. The recipients of infected messages will be
informed that they have been disinfected and a warning can also be sent to the sender.
Optimization of HTTP/S traffic
In order to optimize HTTP/S traffic, the cache will store certain information about the addresses of
malware downloaded for certain period of time.
This means that during this period, when malware that has already been identified is accessed,
Panda GateDefender Performa will display a warning containing the address, name, type of malware
and action taken. This prevents downloading and scanning the malware again and optimizes HTTP/S
traffic.
If you want to use the cache that stores malware addresses, select the corresponding checkbox. You
can also configure the cache time limit, provided the time value is between 1 and 60 minutes.
46
Panda GateDefender Performa-User Guide
Protocol settings
Protocols are rules and procedures for communication between computers.
Be particularly careful when configuring the protocols to scan, as these settings will be applied
to the antivirus scan and the other types of anti-malware protection.
Panda GateDefender Performa protects the most widely used communication protocols:
• HTTP/HTTPS: Hyper-Text Transfer Protocol. Internet.
• SMTP: Simple Mail Transfer Protocol.
• POP 3: Post Office Protocol Version 3. Protocol for managing in the Internet.
• IMAP4: Internet Message Access Protocol.
• FTP: File Transfer Protocol. For transferring files between computers that run TCP/IP.
• NNTP: Network News Transfer Protocol. Protocol for accessing newsgroups.
If you use Exchange servers in native mode, encrypted traffic generated between them will be
let through without being scanned.
Antivirus protection for HTTP/HTTPS
When the HTTP scan is enabled, Panda GateDefender Performa:
• Scans the traffic in connections whose target port is 80, or any of the additional HTTP ports
specified (HTTP 1.0 and HTTP 1.1).
• Scans data transferred through download commands (for example: GET), as well as data
transferred through upload commands (for example: POST).
• Scans web mail traffic in both directions, regardless of which side of the appliance establishes the
connection. It scans all the web mail downloaded and sent.
• Scans any transfer that uses HTTP, even those that could prevent the information from being
correctly scanned (files downloaded in chunked HTTP transfer mode, partial files and in several
threads that are downloaded, etc.).
• Scans
FTP
on
HTTP.
Antivirus protection for FTP
When the FTP scan is enabled, Panda GateDefender Performa:
• Scans the traffic in connections whose target port is 21, or any of the additional FTP ports
specified.
• Scans FTP traffic in both directions, regardless of which side of the appliance establishes the
connection. It will scan files transferred through active FTP, passive FTP and extended passive
FTP.
Scans all files downloaded and uploaded.
Antivirus protection for SMTP
When the SMTP scan is enabled, Panda GateDefender Performa:
•
•
•
Scans the traffic in connections whose target port is 25, or any of the additional SMTP ports
specified.
Scans SMTP traffic in both directions, regardless of which side of the appliance establishes the
connection.
Scans any transfer that uses SMTP, even those that could prevent the information from being
correctly scanned (files downloaded in CHUNKING (BDAT) -rfc3030, BINARYMIME -rfc3030,
47
Panda GateDefender Performa-User Guide
PIPELING
-fr2920
mode,
etc.).
Antivirus protection for POP3
When the SMTP scan is enabled, Panda GateDefender Performa:
• Scans the traffic in connections whose target port is 110, or any of the additional POP3 ports
specified.
• Scans POP3 traffic in both directions, regardless of which side of the appliance establishes the
connection.
Antivirus protection for IMAP4
When the IMAP4 scan is enabled, Panda GateDefender Performa:
• Scans the traffic in connections whose target port is 143, or any of the additional IMAP4 ports
specified.
• Scans IMAP4 traffic in both directions, regardless of which side of the appliance establishes the
connection.
Antivirus protection for NNTP
When the NNTP scan is enabled, Panda GateDefender Performa:
• Scans the traffic in connections whose target port is 119, or any of the additional ports
specified for IMAP4.
• Scans NNTP traffic in both directions, regardless of which side of the appliance establishes the
connection.
Heuristic protection settings
To access the heuristic protection settings, click the Settings menu of the main console
window, and select Heuristic.
The Panda GateDefender Performa heuristic protection detects viruses that are not yet cataloged. The
same protocols as those configured for the antivirus protection will be scanned by the heuristic
protection.
Select Enable unknown threats protection to activate the heuristic protection. The heuristic scan
options are only available when this checkbox is enabled.
Sensitivity level
The sensitivity level of the heuristic scan specifies the tolerance level of the protection to suspicious
files. The higher the level of sensitivity, the higher the protection, but also the risks of a legitimate
message being classified as suspicious.
Action
The actions that can be taken are:
• Send the suspicious file to quarantine. If you choose this option, the rest of the actions will
be disabled.
48
Panda GateDefender Performa-User Guide
•
•
For HTTP and FTP: Panda GateDefender Performa blocks the transfer of those suspicious files or
renders them unusable if they cannot be blocked.
For the rest of the protocols:
• Delete the suspicious file: When files are deleted, Panda GateDefender Performa
deletes the suspicious file and includes a text in the message that reports the deletion.
• Redirect the message: Panda GateDefender Performa The suspicious message will be
redirected to the email address entered in the textbox corresponding to this option.
Messages will only be completely redirected for SMTP. For other mail and
news protocols, the suspicious content will be deleted and a substitue text can
be configured by clicking on the corresponding link
Click Mail server settings to specify the SMTP server that will be used to redirect mail. For more
information about how to configure the mail server, click here.
Anti-phishing protection settings
To access the anti-phishing protection settings, click the Settings menu of the main
console window, and select Anti-phishing.
The anti-phishing protection will safeguard computers from all types of attacks related to private data
theft such as passwords, banking details, etc. The same protocols as those configured for the antivirus
protection will be scanned by the anti-phishing protection.
The anti-phishing protection will be enabled whenever the protection for any of the email
protocols is enabled in the antivirus protection settings.
To enable this protection, select the Enable Anti-phishing protection checkbox.
In the SMTP traffic to scan checkbox, select the direction of the messages (inbound, outbound,
inbound and outbound) you want to scan, and click Save.
Remember that for this protection to operate correctly, it is important to define the internal networks
in your organization. To do this, click Internal networks.
Action
•
Delete: Panda GateDefender Performa deletes the message.
• For SMTP, Panda GateDefender Performa will completely delete it.
49
Panda GateDefender Performa-User Guide
•
For the rest of the mail and news protocols, a message can be inserted in the subject
and
body
of
the
original
message.
Enable the checkboxes for each option and enter the text that you want to insert in
either the subject or message body.
•
•
Flag message subject and body: The message will be flagged and a text will be added to the
subject and/or body of the message indicating that it is phishing. Enable the corresponding
checkboxes for each option and enter the text you want to insert in either the subject or message
body.
Redirect the message: The suspicious message will be redirected to the email address entered
in the textbox corresponding to this option.
• Enter the email address to which you want to redirect the message.
• Click Mail server settings to specify the SMTP server that will be used to redirect mail.
For more information about configuring the mail server, click here.
• Enable the corresponding checkboxes for each option and enter the text you want to
insert in either the subject or message body.
Messages will only be redirected for SMTP. For the rest of the mail and news protocols a copy
will the sent to the address specified in the associated textbox.
•
Let it through, just generate report: Lets the file through and generates a detection report.
Protection against other security risks settings
To access the protection against other security risks settings, click the Settings menu
of the main console window, and select Other risks.
The Panda GateDefender Performa protection against other risks keeps your organization safe from
hacking, security risks caused by certain applications and potentially unwanted programs.
The same protocols as those configured for the antivirus protection will be scanned by the
protection against security risks.
Protection against hacking tools and potentially unwanted programs
The Panda GateDefender Performa protection against hacking tools and potentially unwanted programs
safeguards your network from malicious hacking tools. Select Enable protection against hacking
tools and potentially unwanted programs.
If you select Automatically delete potentially unwanted programs, Panda GateDefender
Performa will automatically delete these potentially unwanted programs without prompting you to
confirm.
Depending on the settings of the events to report, different types of notifications could be available.
For more information, refer to Events to report settings.
50
Panda GateDefender Performa-User Guide
Protection against security risks
The Panda GateDefender Performa protection against security risks neutralizes the security risks caused
by certain applications installed on your system.
This protection is enabled whenever the antivirus protection is enabled, so that your organization will
always be protected against these kinds of threats.
Trusted sites and domains settings in the anti-malware
protection
To access the trusted sites and domains settings, click the Settings menu in the main
console, an in Protection > Anti-malware select Trusted sites and domains.
Sometimes, the traffic sent from certain servers, computers or domains is reliable enough to be
excluded from the scans.
By excluding this traffic from the anti-malware scans, the workload of Panda GateDefender Performa is
reduced and its performance is optimized.
You can create a list of servers, websites, domains, subdomains, IP addresses and ranges that will be
excluded from the list. This action will apply to all protocols. To do this:
1.
2.
3.
4.
Click the Settings menu in the main Console screen.
Go to Protection > Anti-malware and click Trusted sites and domains
This shows the trusted sites and domains configured to date. To add a new domain, subdomain,
range, etc, include it in the New box and click Add. In the case of IP addresses, you can use the
CIDR format, and for sub-domains, you can use wildcards.
The updated list will be displayed in the box. To delete any item, select it and click Delete.
After you have completed these steps, Panda GateDefender Performa will not scan traffic from those
domains, servers or computers for malware.
The correct format for entering a trusted site or domain
•
•
For websites: enter the full URL (for example, mail.pandasoftware.com), or the IP address (for
example, 192.168.1.200 ).
For domains or sub-domains: enter an asterisk (for example: *.subdomain.domain.com or
*.domain.com, etc). You can also enter an asterisk after the final dot of the domain (for example:
www.domain.*).
Bear in mind that it is not possible to use more than asterisk (for example: *.domain.*)
If you do not want to enter sub-domains, you do not need to use the asterisk (for example,
domain.com).
51
Panda GateDefender Performa-User Guide
Content Filter protection
Content Filter protection settings
Panda GateDefender Performa monitors and filters the content of email attachments, websites and
newsgroups. The Content Filter settings are divided into the following groups:
•
•
•
HTTP/S and FTP protection settings
Mail and news protection settings.
Trusted sites and domains
HTTP/S and FTP protection settings
HTTP/S and FTP protection settings
To access the HTTP/S and FTP protection settings, click the Settings menu of the main
console window, and select Content Filter > HTTPs and FTP.
The Content Filter HTTP/S andFTP protection allows you to control the files that can or cannot enter
your organization through HTTP/S and FTP.
Files to scan
Select Enable the content-filter HTTP/S and FTP protection to use this powerful content filter.
For more information about configuring the files to scan, click here.
52
Panda GateDefender Performa-User Guide
Traffic to scan
You can choose which traffic to scan. Enable the checkbox for the corresponding protocols: HTTP,
HTTPS and FTP.
Filters
Select Enable file filter. For more information about configuring the file filtering, click here.
Select Enable HTML page filter if you want to delete items that could be dangerous from HTML files.
If this filter is enabled, you can also configure it to Delete embedded scripts in the code of HTML
pages or Delete references to external scripts.
If you selected Delete embedded scripts, click Settings to configure this option.
Files to scan settings
Check Scan compressed files to enable the scan of compressed files.
Files excluded from the scan
Sometimes, certain files might need to be excluded from the file scan of the content-filter protection.
To add a file to the list of exclusions in Panda GateDefender Performa, follow the steps below:
1.
2.
Click on Add...
Select the file you want to exclude.
If you want to import a list of files for the same purpose, click on Import list and select the file to
import.
To delete a file from the list of exclusion, click on the file and then on Delete.
53
Panda GateDefender Performa-User Guide
To export your list of exclusions, click on Export list.
Click on Clear list to delete all the files from the list, leaving it blank.
File filter settings
The file filter settings section allows you to specify the file types to detect and the action to take of one
of these files is detected. Follow the steps below to configure the file filter:
1.
2.
Enable the checkbox next to the description of each file type to detect.
Select the action to take if one of these messages is detected. The drop-down menu offers the
following actions:
•
•
•
Delete: Eliminates the file detected.
Let it through, just generate report: Lets the file through and generates a detection report.
Send it to quarantine.
3.
You need to specify additional information for some options. In this case, the Settings button will
activate. Click on it and configure the parameters required:
Files with a multiple extension or truncated extension: Panda GateDefender Performa will
show a list with the title: Multiple extensions ending in the following will be filtered: To exclude
any of the multiple extensions in this filter, specify it in the Multiple extensions excluded list.
Attachments whose size exceeds the maximum: Define the maximum size. Panda
GateDefender Performa will block files that exceed this size.
Suspicious compressed files: Define if they are suspicious because they have an excessive
level of nesting, contain an excessive number of files or exceed a maximum size when
decompressed.
Files with dangerous extensions: Define the list of dangerous extensions.
Dangerous MIME type settings: Define the MIME types to detect.
ActiveX: Define the websites from which ActiveX controls and be downloaded or the websites
from which they cannot be downloaded.
Java Applets: Define the websites from which Java Applets controls and be downloaded or the
websites from which they cannot be downloaded.
•
•
•
•
•
•
•
4.
Click on Save.
Mail and news protection settings
Protection for mail and news settings
The content-filter mail and news protection lets you control the messages and attachments
that can enter your organization and those that cannot.
Messages and attachments to scan
Select Enable the content filter mail and news protection.
In the SMTP Traffic to scan checkbox select the direction of the messages (inbound, outbound,
inbound and outbound) you want to scan, and click Save.
54
Panda GateDefender Performa-User Guide
Remember that for this protection to operate correctly, it is important to define the internal networks
in your organization. To do this, click Internal networks.
For more information about configuring the filter of attachments, click here .
Filters
The message filter allows you to filter messages by their characteristics and delete potentially
dangerous content:
• Enable message filter. The attachment filter scans and filters potentially dangerous items that
could be included in email messages and allows actions to be taken on them or on the messages
carrying
them.
•
For more information about configuring it, click here.
Enable attachment filter. For more information about configuring it, click here.
Anomalies
Certain programs or computer systems have flaws that could be exploited. Panda GateDefender
Performa protects your network from these types of vulnerabilities through its content-filter protection.
Detect malformed messages to detect messages that do not meet messaging
1. Select
standards and could, therefore, pose a threat to your organization.
2. Select the action to take if one of these messages is detected. The drop-down menu offers the
following actions:
•
Delete message.
For SMTP, messages will be completely deleted. For the rest of the protocols, the texts in the
message that the original recipient will receive will be replaced. You can configure the
replacement text by clicking on the associated link.
• Redirect
the
message.
For SMTP, messages will be redirected to the Address configured. You can modify this
address by clicking on the link.
For the rest of the protocols, a copy will be sent to the previous address and the texts in
the message that the original recipient will receive will be replaced. You can configure the
replacement text by clicking on the associated link.
• Let it through, just generate report: Lets the file through and generates a detection
report.
• Send it to quarantine. You can configure automatic sending to quarantine.
3.
Enable
Block partial messages. Allows you to detect partially received messages received,
which can pose a threat due to a possible vulnerability in mail programs. If a partial message is
detected, the content will be replaced with a warning.
Message filter settings
Message content
Content-filter can scan messages by their content and delete potentially dangerous content. Follow the
steps below to configure these settings:
1.
2.
Check Enable text content filter and click on Settings to customize message filtering.
In the Action to take menu, select the action that the message filer must take with messages:
• Delete message.
• Redirect message.
55
Panda GateDefender Performa-User Guide
•
•
3.
4.
5.
Let it through, just generate report.
Send it to quarantine
Check Delete embedded scripts to delete potentially dangerous code inside messages. Click
on Settings...to customize the filter.
Check Delete only references to external scripts to delete only the references to scripts
outside the message.
Check Delete all external references to delete all the external references. Click on Settings..
to customize the filter.
Number of recipients
Many spam messages can be identified by the high number of recipients they are sent to.
Content-filter allows you to control the number of recipients of a message, deleting messages that
exceed the maximum established. To do this:
1.
2.
Check
Maximum number of recipients for inbound mail and enter the maximum number
you want.
Maximum number of recipients for outbound mail and enter the maximum
Check
number you want.
Mail and News attachment filter settings
The attachment filter settings section allows you to specify the files to detect and the action to take if
one of these file types is detected. Follow the steps below to configure the attachment filter:
1.
2.
Enable the checkbox next to the description of each file type to detect.
Select the action to take if one of these messages is detected. The drop-down menu offers the
following actions:
• Delete attachment.
• Delete message.
For SMTP, messages will be completely deleted. For the rest of the protocols, the texts
in the message that the original recipient will receive will be replaced. You can configure
the replacement text by clicking on the associated link.
• Redirect message.
For SMTP, messages will be redirected to the address configured. You can modify this
address by clicking on the link.
For the rest of the protocols, Panda GateDefender Performa will send a copy to the
previous address and the texts in the message that the original recipient will receive will
be replaced. You can configure the replacement text by clicking on the associated link.
• Let it through (just generate report).
•
3.
Lets the file through and generates a detection report.
Send it to quarantine.
Attachments will be deleted and a replacment text included in the message. You can
configure the replacement text here.
Additional settings can be configured for certain file types. If you have selected one of these
types, the Settings button will be activated. Click this button to define the settings for this file
type.
If the checkbox for a file type is disabled, the Settings button will not be available,
even if this type of file allows additional settings to be defined.
56
Panda GateDefender Performa-User Guide
Trusted sites and domains settings in the Content Filter
protection
To access the trusted sites and domains settings for the Content Filter, click the
Settings menu in the main console, and select Content Filter > Trusted sites and domains.
Sometimes, the traffic sent from certain servers, computers or domains offers enough guarantees to be
excluded form the Content Filter scans.
By excluding this traffic from the Content Filter, the workload of Panda GateDefender Performa is
reduced and its performance is optimized.
In order to exclude trusted sites and domains from the Content Filter, follow the steps below:
1.
2.
3.
4.
5.
6.
Click the Settings menu in the console.
Go to Protection > Content Filter and click Trusted sites and domains
HTTP/S and FTP protocols: use the New text box to enter domains and/or IP addresses (in
CIDR format) whose traffic will not be filtered. You can use wildcards for sub-domains. Click Add.
Mail and News: you can enter domains and IP ranges. You can use wildcards for sub-domains.
Use the New text box to enter IP addresses (in CIDR format) whose traffic will not be filtered.
Click Add.
Trusted sites and domains added will be displayed in a list in the large box. To delete any of
them, select them and click Delete.
If you want to import or export a list of domains or IPs, consult the section Import /Export files
or lists.
After you have completed these steps, the Panda GateDefender Performa Content Filter will not scan
traffic from those domains, servers or computers.
The correct format for entering a trusted site or domain
•
•
For websites: enter the full URL (for example, mail.pandasoftware.com), or the IP address (for
example, 192.168.1.200 ).
For domains or sub-domains: enter an asterisk (for example: *.subdomain.domain.com or
*.domain.com, etc).
If you do not want to enter sub-domains, you do not need to use the asterisk (for example,
domain.com).
Anti-spam protection
Anti-spam protection settings
To access the anti-spam protection settings screen, click on the Settings menu in the main
console screen, and then select Anti-spam > Anti-spam settings.
57
Panda GateDefender Performa-User Guide
Introduction
Spam is unsolicited email. Panda GateDefender Performa includes several technologies for detecting
spam:
o
o
o
o
Signature-based detection
Detection based on DNSBLs
Anti-backscatter protection
Open Relay Spam protection
To configure the detection based on DNSBL, the protection against unwanted notification
messages and the Open Relay Spam protection, go to the advanced settings screen. In the current
screen you can only configure the signature-based protection.
Anti-spam protection settings
In order to configure the general anti-spam protection, you must specify:
o Which protocols Panda GateDefender Performa must scan for spam (SMTP, POP3 and IMAP4). In
order to enable the scan of each protocol, enable the corresponding checkbox.
o The internal networks. To do this, click the internal networks link and include the IP ranges
of your organization in CIDR format.
o The traffic to be scanned (inbound, outbound or both) depending on the internal networks
defined.
If the internal networks are not defined, all traffic will be considered inbound. This information is
also used by Panda GateDefender Performa when generating reports, indicating the address of mail
cataloged as spam (SMTP in or SMTP out).
o
o
o
Sensitivity of the scan to balance false positives against false positivies.
The action Panda GateDefender Performa must take when it detects spam.
Configure the white lists and blacklists if necessary.
Not all detection technologies are available for all possible scans and protocols. Detection
based on DNSBL, protection against unwanted notification messages and Open Relay Spam
protection are only available for inbound SMTP traffic.
SMTP protocol
To enable anti-spam protection for SMTP:
1. Select the SMTP checkbox.
2. Then, select the option you want from the Traffic to scan menu:
o Inbound: enables detection of spam messages coming from the Internet.
o Outbound: enables detection of spam messages coming from the internal network.
o Inbound and outbound: enables detection of spam messages coming from the internal
network and the Internet.
Click Save to store the traffic to scan settings.
To go to the advanced SMTP anti-spam protection options, click here.
If any of the protection enabled in the SMTP anti-spam protection advanced settings is
incompatible with the selected traffic direction to scan, Panda GateDefender Performa will display a
warning.
58
Panda GateDefender Performa-User Guide
Sensitivity level
The sensitivity level of the anti-spam protection specifies the tolerance level of the protection to
suspicious files. The higher the level of sensitivity, the higher the protection, but the risks of a
legitimate message being classified as suspicious.
Set the sensitivity level of the anti-spam protection by enabling the corresponding option (high,
medium or low).
Action to take with messages classified as spam or probable spam.
Specify what action Panda GateDefender Performa must take when it classifies an email message as
spam or probable spam:
•
•
•
•
Delete: The suspicious file will be deleted.
o For SMTP: Panda GateDefender Performa will delete it completely.
o For the rest of the mail and news protocols: A text will be inserted in the subject of the
original message.
o You can write the text that you want to appear in the message subject.
Redirect the message: The suspicious message will be redirected to the email address entered
in the textbox associated to this option.
o Click Mail server settings to specify the SMTP server that will be used to redirect mail.
For more information about how to configure the mail server, click here.
o For SMTP: Messages will be redirected to the address specified in the textbox.
o For the rest of the mail and news protocols: A copy of the message will be sent to the
specified address and the text entered in the textbox will be inserted in the subject of
the original message.
Let it through, just generate report: Allows you to let the message through, generating a
detection report.
Send it to quarantine. You can configure automatic sending to Quarantine.
You can write the text that you want to appear in the message subject.
These actions are applicable in the case of signature-based detection and Open Relay Spam
protection. For the other detection technologies, Panda GateDefender Performa offers specific
actions in the SMTP anti-spam protection advanced settings.
Spam white list and blacklist
If a domain or a certain server offers enough guarantees, the messages it sends can be excluded from
the anti-spam scan (white list), lightening the workload of Panda GateDefender Performa and thereby
optimizing performance.
Similarly, you can specify that Panda GateDefender Performa must treat all messages sent from certain
domains or servers as spam (blacklist).
You can also enable the option to Delete messages from the names and addresses included in
the spam blacklist.
Click here for instructions on how to configure the white list and blacklist.
59
Panda GateDefender Performa-User Guide
Spam white list and blacklist
The spam white list lets you specify trusted senders. Messages from these senders will not be analyzed
by any of the anti-spam measures.
The spam blacklist lets you specify senders you consider to be dangerous. Messages from these
senders will always be classified as spam.
If the Delete messages from the names and addresses included in the spam blacklist
checkbox is enabled, the messages will be deleted; if it is disabled, the action defined in the Action to
take with messages classified as spam section will be applied.
You can specify senders using their IP address, domain name or email address.
Depending on the mail protocol, the data used to determine whether a sender belongs to a list is as
follows:
• SMTP: the IP address from which the message has been sent and the email address of the
sender.
• POP3/IMAP: the IP of the server and the email address of the sender.
• To include an IP address, a domain name or an email address in one of the lists, follow the
steps below:
1.
2.
3.
4.
Select the Protection settings option in the menu on the left of the Web
administration console.
Click Anti-spam protection. At the bottom of the console, you can configure the
white list and the blacklist.
In the box below the option New for each of the lists, enter the IP address, domain
name or email address that you want to include and click Add.
Repeat these steps for every IP, domain or email address you want to add.
In order to remove a domain, IP address or address from one of the lists (white or black), select it and
click the corresponding Delete button. Repeat these steps for all the items you want to remove.
If you want to import the content of the list, click Import list and then select the file to import.
To export a list, click Export.
Click Save to save any changes.
Advanced SMTP anti-spam protection settings
General considerations
You can access the SMTP anti-spam protection advanced settings through the Anti-spam protection
settings link in the main screen.
These settings are only valid for inbound SMTP traffic, and before using them, it is important to define
the internal networks to be able to differentiate between inbound and outbound messages.
Once you have defined the internal networks, you can configure:
-
Open Relay Spam protection
-
Response to the sender in the event of blocked SMTP messages
-
Protection against unwanted notification messages (anti-backscatter)
60
Panda GateDefender Performa-User Guide
-
Detection based on DNBLs.
Response to the sender in the event of blocked SMTP messages
When a detection is made in SMTP by any of the anti-spam protections (blacklist, Open Relay Spam
protection, protection against unwanted notification messages, detection based on DNSBLs or the antispam engine protection) and the action involves blocking the message, you can establish an error code
that the sender will receive. This way, on receiving the error, the sender will understand that they
cannot send spam to the recipient in question.
The actions that involve complete blocking of the SMTP message are eliminate, redirecting of the
message and sending to quarantine.
To enable this option, select Reject message during connection in the SMTP Anti-spam
protection advanced settings, and select a Reply code.
The possible error codes are:
• 554 Spam detected (default)
• 552 Exceeded storage allocation
• 452 Requested action not taken: insufficient system storage
• 451 Requested action aborted: local error in processing.
Detection based on DNSBLs
Detection based on DNSBLs
A DNS blacklist is a list of IP addresses of spammers recognized by the community. On
receiving an email, Panda GateDefender Performa checks the IP address from which the message has
been sent against the external DNSBL to determine if the message has been sent by a spammer or not,
without having to analyze the content of the message itself. That's why classification is much faster
that with other methods implemented in Panda GateDefender Performa.
DNSBL is a complementary technology, that works in conjunction with the other anti-spam modules.
The DNSBL lists are accessed through DNS requests. Check that your firewall allows Panda
GateDefender Performa to communicate with external DNS servers.
Detection based on DNSBLs only works with inbound SMTP mail, so it is essential to indicate the
internal networks of your organization so that Panda GateDefender Performa can distinguish between
inbound and outbound traffic. If the internal networks in your organization are not defined, the DNSBL
protection cannot operate.
To enable the DNSBL protection, select Enable detection by DNBLs and choose the action you
want to take on this type of message from the drop-down menu.
If you select Redirect or Let it through, just generate report, you can insert a text in the Subject
field to help you identify the message. In the case of the Redirect option, specify the recipients email
address, and configure the mail server to be used. To do this, click Mail server settings.
61
Panda GateDefender Performa-User Guide
Enabling DNSBLs
Enable use of DNSBLs recommended by Panda Security
This option lets you enable detection using DNSBLs recommended by Panda Security, and which
have been selected on the grounds of reliability and response time. Bear in mind that Panda Security
can modify the recommended DNSBLs without prior notice.
Enable use of additional DNSBLs
This option lets you add a maximum of three DNSBLs which will be included in the Panda GateDefender
Performa detection process.
You must bear in mind:
1.
2.
3.
4.
5.
That these DNSBLs are not maintained by Panda Security, and therefore it does not guarantee
their content. That the use of additional DNSBLs is outside the responsibility of Panda Security.
That DNSBLs which are poorly maintained will take an indeterminate time to change the status of
any entries, and so IPs which once belonged to spammers will probably continue to figure as
spam. The opposite is also possible: there may be IP's that belong to spammers but do not figure
as such in additional DNSBLs.
You may have to pay for some of these lists. You can find subscription or free black lists on the
Internet, searching for example for “DNSBL” or “RBL”. Make sure you are aware of the terms and
conditions of use when using such third-party lists.
Not all DNSBLs guarantee a 24x7 service. If during communication with any additional server you
have defined there are frequent timeouts or service failures, it is your responsibility to select an
alternative server.
If there is a discrepancy between the DNSBLs recommended by Panda Security and those
configured by the user when it comes to cataloging spam, the former shall have priority.
If your IP or domain has been included in one of these lists, consult the following URL:
/www.blacklistalert.org/?q=IP to find out why. You may have to contact those responsible for
the blacklist to remove your IP or domain from it.
The maximum response time of DNSBLs can be configured in Tools: advanced settings in the
section SMTP settings – Maximum time to reply to DNSBL queries.
To remove a DNSBL, select it in the list and click Delete.
If you want to prevent an IP address from being checked in the DNSBL servers, add the IP to the spam
white list in the Anti-spam protection settings.
Message header analysis
There are two procedures for determining the IP address of the sender of an email:
•
•
Determining the source IP address of the SMTP connection established between the sender MTA
(which could be that of a spammer) and the recipient in your organization. If the IP address of
the sender MTA belongs to a DNSBL it will be classified as a spammer and the mail received will
be marked as spam.
Determining the IP addresses of the MTAs through which the message has passed before
reaching the recipient server, as stored in the Received headers of each mail message.
62
Panda GateDefender Performa-User Guide
With this option, Panda GateDefender Performa will not analyze the SMTP connection IP address, but
will analyze the IP included in the Received header indicated in the console, determining if it coincides
with any in the DNSBLs configured.
If Panda GateDefender Performa is installed behind the organization's MTA, check that it is
correctly configured to include information about the IP address of the sender MTA in each email.
Some badly-configured mail servers will only include the domain name without indicating the IP
address; in this case Panda GateDefender Performa will display a warning indicating the reason for
the failure in the DNSBL module.
Analysis of the Received header of the message is necessary when Panda GateDefender Performa is
situated in the organization's network in such a way that there is no SMTP communication with the
MTA from which the message has been sent. Given that all MTAs include this information in each
message, it is not possible to determine which of the available headers carries the useful MTA
information, as the number of MTAs through which an email may pass until reaching the client is
variable and depends on the network.
There are therefore several general scenarios possible that will influence which Received header is
considered:
Scenario 1: Panda GateDefender Performa in front of the first MTA
In this scenario it is not necessary to analyze message headers as there is a direct SMTP connection
between the MTA sending the email and the MTA of the organization that receives it. Panda
GateDefender Performa will extract the source IP address of the SMTP connection and check it against
the configured DNSBLs.
63
Panda GateDefender Performa-User Guide
Scenario 2: Panda GateDefender Performa behind the first MTA
In this scenario, Panda GateDefender Performa has to analyze the message headers, as the connection
that it analyzes will correspond to the download of the mail by the client and not to the connection
between the remote MTA and the internal MTA. The relevant header is the one introduced by the first
MTA of the organization, as it is the only one that can determine the source IP address of the MTA
which has sent the email. The first Received header will be considered.
64
Panda GateDefender Performa-User Guide
Scenario 3: Panda GateDefender Performa behind the last MTA of 3 MTAs in
relay
In this scenario, Panda GateDefender Performa has to analyze the message headers. The relevant
header is the one introduced by the first MTA of the organization, as it is the only one that can
determine the source IP address of the MTA which has sent the email. The third header is the one to
consider, as each MTA enters its own header on top of the previous one. See image.
The blocking of messages through this detection system will be reflected in the spam report, including
whether the detection has been through recommended or additional DNSBLs.
65
Panda GateDefender Performa-User Guide
Protection against unwanted notification messages (backscatter)
Protection against unwanted notification messages
(backscatter)
What is a bounce message (NDR)?
In the context of SMTP, a bounce message is a notification in email format, generated automatically by
the MTA when there is a problem in delivering mail. It generally occurs when the recipient does not
exist or there are connection problems with the recipients MTA. There are several different terms for
bounce messages:
• NDR: Non Delivery Report, used in Panda GateDefender Performa.
• DSN: Delivery Status Notification.
• NDN: Non Delivery Notification.
In all cases, the NDR is sent to the sender of the original mail indicating the reasons for which a
message could not be delivered.
NDR messages are generated automatically by the MTA which receives the original email. The origin of
the bounce message is therefore the MTA and the recipient is the sender of the original mail.
NDR message format
The general format of an NDR message, with respect to being identified by Panda GateDefender
Performa, is as follows:
•
•
•
FROM <> (empty) or MAILER-DAEMON or POSTMASTER.
MIME header Content-type=message/Delivery-status; report-type=Delivery-status;
Return-Path field: <MAILER-DAEMON> or <POSTMASTER> or empty
Backscatter
Backscatter is a technique which involves the receipt of an NDR (Non Delivery Report) for a message
which has not really been sent. It is caused by a virus which has infected computers outside of the
user's network. These viruses spoof the sender field ("From:") all of an email message, selecting
addresses at random from the infected computer's contact list.
Spammers also use backscatter techniques. They use legitimate users' addresses as the reply
addresses of the spam messages they send. This way they can send hundreds or even thousands of
email messages to the legitimate user's mail server.
To enable the anti-backscatter protection, select Enable anti-backscatter protection, and select the
action you want to take on these types of messages.
If you select Redirect or Let it through, just generate report, you can insert a text in the Subject
field to help you identify the message. In the case of the Redirect option, specify the recipients email
address, and configure the mail server to be used. To do this, click Mail server settings.
If you select Delete, the option Reject message during connection will not be possible.
Blocking of unwanted notification messages will be reflected in the spam report.
66
Panda GateDefender Performa-User Guide
Then, select the method you want to use for this type of protection: BATV, or NDR restriction. Bear
in mind that these methods are exclusive of each other.
Backscatter diagram
In this diagram, destinatario@spam.com is the spam recipient and fake@caido.com is an existing but
inaccessible domain.
BATV (Bounce Address Tag Validation)
What is BATV?
This is an anti-backscatter technique involving validating the source of the message through a tag that
authenticates the sender. It is an acronym of Bounce Address Tag Validation. This technique can be
used in MTAs and perimeter security appliances. In our case it is Panda GateDefender Performa that
handles all the BATV information.
How it works:
1.
2.
3.
When sending a message, Panda GateDefender Performa transparently adds a tag in the MAIL
FROM command of the SMTP session. This tag has the following format:
• prsv=KDDDSSSSSS=user@dominio.com
• K is the key number. It is a number from 0 to 9. This means several keys can be
generated with the same information.
• DDD is the number of days elapsed since 1970, (applying MOD 1000).
• SSSSSS is the value of the three first bytes of the SHA-1 HMAC encryption of the
KDDD string. As K is a number between 0 and 9 there are 9 different keys although
only one of them is in the email.
If the MTA cannot deliver an email, it will generate an NDR for the source of the original
message along with the tag.
Panda GateDefender Performa receives all messages that reach the MTA of the protected
organization. The sequence of steps involved to check the authenticity is as follows:
67
Panda GateDefender Performa-User Guide
•
•
•
•
•
First it determines whether the message is an NDR or not (with the conditions
described in the point above).
If it is not an NDR, BATV is not applied and the message is delivered to the other
modules: Anti-spam, Content-filter, Anti-malware, etc.
If it is an NDR, the system checks for a tag.
If there is no tag, it is marked as spam.
If there is a tag, the following additional checks are made:
• The DDD value is extracted and compared with the current date. If the
difference is greater than seven days it is rejected (a maximum of seven
days difference with the original message is permitted).
• If the difference is less than seven days, the SSSSSS string is decrypted.
The decrypted SSSSS string must coincide with KDDD.
• If the decrypted SSSSS string does coincide with KDDD, the message is
taken as valid. If not, it is considered spam.
BATV diagram with a legitimate NDR
68
Panda GateDefender Performa-User Guide
BATV diagram with a malicious NDR
Conflict detection
If the MTA protected by Panda GateDefender Performa supports BATV (i.e. if the mail server already
includes control tags and checks the validity of inbound NDRs), it is important not to overwrite these
tags, as if Panda GateDefender Performa overwrites the control tag included by the MTA the message
will be rejected by the MTA.
Panda GateDefender Performa does not apply BATV if it verifies that outbound messages already have
a tag. It also generates a system event and a warning in the Status page of the Web console.
Before enabling BATV
Remember that:
1.
2.
3.
You must have configured internal networks to be able to differentiate between inbound and
outbound mail.
The traffic to analyze must be inbound or outbound.
It is incompatible to enable BATV in Panda GateDefender Performa and another internal mail
server at the same time.
To enable BATV, select Enable BATV.
White list of domains and addresses excluded from BATV
You can use this list to exclude domains from BATV. To do this, click White list of domains
excluded from BATV.
Restricting the entry of NDR messages
69
Panda GateDefender Performa-User Guide
To restrict receipt of NDR messages by any of the IP addresses defined in your internal networks,
select Restrict NDR reception to the following IP addresses. Us the buttons Add and Remove to
configure the list of addresses, or Import and Export to import or export lists of addresses.
This option is disabled while traffic direction is outbound and the list of internal networks
defined is empty.
Factors to bear in mind when restricting NDR messages
Normally, NDR messages sent by the company's first relay or MTA, and not by relays or mail servers in
other companies. Nevertheless, this is not always the case, as a remote server may have accepted mail
due to traffic saturation, and when processing it later, realize that the recipient does not exist,
consequently generating a notification message.
If administrators realize they are not receiving NDRs generated by a certain relay or mail server, they
should increase the list. In the spam events report, you can filter the reasons for having blocked
backscatter and thereby check if any of the events blocked are actually correct. In this case you can
include the source IP address of this NDR in the list of servers from which NDR messages are permitted.
Another option is to select Send to quarantine and check the messages in that situation, to see if
there are any legitimate NDR notifications.
Open Relay Spam protection
This offers additional protection against spam.
Under normal circumstances, all inbound mail must have a local user as a recipient (on internal
domains). This prevents the use of internal SMTP servers as Open Relay servers.
Any inbound SMTP traffic directed to non-local domains is considered Open Relay Spam. Inbound
SMTP is any mail coming from an external network (if no internal networks are defined, all SMTP
traffic is considered inbound). Similarly, non-local domains are those that are not defined in the
Internal domains in the Internal domain management form.
Web and IM/P2P/VoIP filter
Web filtering
Configuring the Web filter
To access the Web filter settings click the Settings menu in the main console window,
and select IM/P2P/VoIP and Web filter > Web filter.
70
Panda GateDefender Performa-User Guide
Through this filter, Panda GateDefender Performa lets you restrict access to certain content (URLs or
Web pages) on the Internet. To do this, all URLs accessed through HTTP and/or HTTPS are scanned
and blocjed if they are restricted.
Unlike other anti-malware protection, Web filtering can be enabled even though the antivirus
scan is not enabled.
Through the Web filtering settings the administrator can:
•
•
•
•
•
Select the content to which access must be blocked.
Define a timetable for the restrictions. This can be done through the chart displaying the days of
the week and the time. Click the cell corresponding to the day and time to allow/restrict.
Specify the URLs or websites that cannot be accessed under any circumstances (blacklist).
Specify the URLs or websites that can be accessed regardless of their content (white list).
Include a list of users exempt from the Web filter to which no access restrictions will be
applied.
Content with restricted access
Select the categories to which you want to restrict access. Bear in mind that there is a category called
Uncategorized pages, which restricts access to all pages for which the Web filter could not find a
category.
Use the options All and None to select or unselect groups of contents.
The first access to Web pages figure as uncategorized until they are included in the
Commtouch URL cache.
Possible actions
You can perform different actions on the restricted URLs or domains accessed by users:
• Block access to the restricted page
71
Panda GateDefender Performa-User Guide
If this checkbox is enabled, Panda GateDefender Performa will block access to the restricted
URLs.
If this checkbox is not enabled, Panda GateDefender Performa will allow access to the
restricted URLs, whether they appear in the blacklist or not. It will log the access in the Web
filtering report if configured to do so.
• Show a warning page instead
(If the option Block access to the restricted page is not selected, this option is disabled).
Panda GateDefender Performa prevents access to restricted URLs and displays a screen that
indicates the URL (variable %URL%) and the category (variable %URLCATEGORY%) under
which the URL has been blocked.
This warning page can be configured. To do this click Edit warning page .
Editing substitute texts for the warning page
In the Edit the Web filtering warning page window, enter the title and text of the message you
want to display. Then click Save.
Click Restore to apply the default settings.
The design of the page can be configured in Settings > System > Substitute page for
HTTP/S, where you can choose from three types of design and add the company logo.
Users can automatically report false categorization to Commtouch through a simple link on the warning
page. The report reaches the Web filter database and statistics are monitored from Panda Security to
control the number of false positivies generated by the Web filter.
White list
The Web filtering white list contains domains, sites or specific addresses which, even though they don’t
belong to a restricted category, must be accessible for the network users.
To enable this Web filtering feature:
1. Enable the Enable use of the white list checkbox.
2. Configure the list by clicking on To configure this list, click here.
A window will then open that allows you to define what domains or Web pages should be added to the
white list.
To add a URL to the white list, follow the steps below
1.
2.
3.
4.
5.
6.
Enter the URL that you want to add to the white list in the New field.
Click Add.
Repeat steps 1 and 2 for each URL that you want to add to the list.
To import or export from the list, refer to the section Import / Export files or lists.
If you make a mistake or want to remove a URL from the white list, select the relevant URL in
the list and click Remove.
Click Save.
How to configure the white list
72
Panda GateDefender Performa-User Guide
To configure the Web filtering white list, you can add:
• Full URL (www.domain.com/address): Only this address will be excluded from the filter (page, file
or directory).
• Website (www.domain.com): All of the addresses belonging to the site will be excluded from the
filter: (www.domain.com, www.domain.com/address_1, www.domain.com/address_2, etc.).
• Domain or sub-domain (domain.com or subdomain.domain.com): All of the addresses belonging
to all the websites in the domain or subdomain will be excluded from the filter (www.domain.com,
www3.domain.com, XXX.domain.com/address). You can use wildcards to define subdomains.
When configuring the white list, you can use a wildcard provided that it is at the beginning of
the string preceeded by the dot. For example: *.panda.com . Or at the end after the dot. E.g.
www.panda.*
Blacklist
The Web filtering blacklist contains domains, sites or specific addresses which, even though they don’t
belong to a restricted category, must not be accessible for the network users. These will always be
filtered, regardless of their category.
To enable this Web filtering feature:
1. Enable the Enable use of the blacklist checkbox.
2. Configure the list. Configure the list by clicking on To configure this list, click here.
When you do this, a window will open that allows you to define what domains or web pages should be
added to the blacklist.
To add a URL to the blacklist, follow the steps below:
1.
2.
3.
4.
5.
6.
Enter the URL that you want to add to the blacklist in the New field.
Click Add.
Repeat steps 3 and 4 for each URL that you want to add to the list.
To import or export from the list, refer to the section Import / Export files or lists.
If you make a mistake or want to remove a URL from the blacklist, select the relevant URL in the
list and click Remove.
When you have finished, click Save.
How to configure the blacklist
To configure the Web filtering blacklist, you can add:
• Full URL (www.domain.com/address): Only this address will be filtered (page, file or
directory).
• Website (www.domain.com): All of the addresses belonging to the site will be filtered:
(www.domain.com, www.domain.com/address_1, www.domain.com/address_2, etc.).
• Domain or sub-domain (domain.com or subdomain.domain.com): All of the addresses belonging
to all the websites in the domain or subdomain will be filtered www.domain.com,
www3.domain.com, XXX.domain.com/address). You can use wildcards to define subdomains.
When configuring the black list you can use wildcards, provided that:
They are at the beginning of the string before the dot. For example: *.panda.com .
Or at the end after the dot. E.g. www.panda.*
73
Panda GateDefender Performa-User Guide
IM/P2P/VoIP application filter
IM/P2P/VoIP protocol filter settings
To access the IM/P2P/VoIP protocol filter settings, click the Settings menu in the main
console window, and select IM/P2P/VoIP and Web filter > IM/P2P/VoIP filter.
Panda GateDefender Performa monitors and blocks access to instant messaging and file exchange
protocols. Firstly, select Enable the P2P and messaging protocol filter.
Schedule for applying the restrictions
Use the matrix displaying the days of the week and the hours. Click the cell corresponding to the day
and time to allow/restrict.
Retsricted P2P protocols
Select protocols to restricted. Use the corresponding checkbox.
• BitTorrent
• eDonkey
• FastTrack
• Gnutella
• OpenNap
• Ares
• DirectConnect
• Manolito
• Spotify
• Applejuice
Use the link "....." to see the rest of the protocols that can be filtered.
Restricted messaging protocols
Select protocols to restricted. Use the corresponding checkbox.
74
Panda GateDefender Performa-User Guide
•
•
•
•
•
•
ICQ/AOL
IRC
MSN Messenger
Yahoo! Messenger
Skype
Jabber
Protection level
You can select different security levels in the filtering of protocols you want to restrict:
• If you choose maximum level security, all traffic will be scanned in-depth to restrict the
protocols that you have specified, regardless of the port used. This is the safest option, but it
may reduce the performance of the appliance.
• You can choose a mixed level. This analyzes the traffic in all ports, except those specified. For
example, you can specify that traffic entering protocol ports http (80) or ftp (20) is not analyzed,
so that traffic through these ports is not affected. If several ports are specified, they must be
separated by commas.
• To obtain maximum performance from the appliance, you can choose to scan traffic only in
ports used frequently by the applications you want to restrict. Also, you can specify as many
additional TCP or UDP ports as you like. If several ports are specified, they must be separated by
commas.
If the port that uses the restricted protocols is different from the normal or specified ports, the
protocols cannot be effectively restricted.
Protocols that can be filtered
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
MSN - Version 2009 (Build 14.0.8117.416)
Yahoo Messenger - v10.0.0.1267
Skype - v4.2.0.166
BitTorrent - Oficial Client v6.4 (build 18095). Protocol v11031
Ares - v2.1.5 (Ares Protocol y BitTorrent Protocol)
AppleJuice - v0.70.5/F-1.15
Direct Connect/Advanced Direct Connect (DC++) - v0.761 (r2102)
Emule (Edonkey) - v0.50a
FastTrack / Kazaa
Gnutella/Gnutella2 (Shareaza) - v2.5.2.0
ICQ - v7.1
LimeWire - v5.5.8
Jabber (XMPP)
MP2P - Manolito/Piolet/Blubster v3.1.1
Spotify
Users exempt from filtering
Panda GateDefender Performa lets you create lists of users (computers or subnets) that will be
excluded from the Web and IM/P2P/VoIP filters.
Users excluded from web filtering
In the
1.
2.
3.
Web filter settings screen, follow these steps:
Enable the Enable use of the excluded users list checkbox.
If you want to add a computer to the list of exempt computers or subnets, click New.
Enter the IP address and Net mask details.
75
Panda GateDefender Performa-User Guide
4.
5.
6.
Click Save.
The computer will appear in the list of computers excluded from filtering.
Repeat steps 2, 3 and 4 for each computer and subnet that you want to exclude from Web
filtering.
Use the corresponding buttons to modify the list or remove any computers from it.
If when you enter an IP address you do not include the corresponding subnet details, the value
255.255.255.255 will ultimately be included, referring solely to this specific IP address.
Users exempt from P2P/IM filtering
In the
1.
2.
3.
4.
5.
6.
IM and P2P settings screen, follow these steps:
Enable the Enable use of the excluded users list checkbox.
If you want to add a computer to the list of exempt computers or subnets, click New.
Enter the IP address and Net mask details.
Click Save.
The computer will appear in the list of computers excluded from filtering.
Repeat steps 2, 3 and 4 for each computer and subnet that you want to exclude from filtering.
Use the corresponding buttons to modify the list or remove any computers from it.
76
Panda GateDefender Performa-User Guide
Export/Import a list of computers.
Once you have defined a list of computers that are exempt from filtering, you can export it. This also
means you will be able to recover it whenever you want using the Import option, and therefore avoid
having to reenter all the data of all the computers. Refer to the section Import/Export files or lists.
Profiles
Configuration by profiles
Panda GateDefender Performa enables various profiles to be managed easily, by creating
configurations as desired and personalized profiles. To do so, you can use:
• Settings management: This enables settings to be created as required, and which can be used
for the various profiles.
• Protection profile settings: This enables personalized profiles to be created to which the
settings can be applied.
Managing settings
Panda GateDefender Performa lets you set up various configurations which can
subsequently be applied to a protection profile. This lets you configure the protection you can apply
to specific users, addresses or IP ranges, domains, email addresses and specific Web pages.
This is an easier method of managing configuration by profiles. Simply define the configuration
required and apply it to the protection profiles that you have already created.
Follow
1.
2.
3.
4.
5.
these steps to set up a configuration:
In the main screen of the Web console, click Settings.
In Profiles, click List of settings. You will see the Settings manager window.
Click Add.
In the Edit settings window, specify the name with which you want to identify these settings.
Indicate the protection, to configure (Anti-malware, Content Filter, Anti-spam and/or
IM/P2P/VoIP and Web filter). You can use the Comments field to specify the details you create
which will help you identify the configuration in the future.
6. Click Edit settings.
7. Set up the configuration you require for each of the protections specified.
8. Click Accept settings.
Once the required configuration has been set up, it can be modified or deleted by clicking Modify or
Delete.
Edit Settings
Click the following links to find out more about the various protection settings:
•
•
•
•
•
Anti-malware protection
Content Filter protection
Anti-spam protection
Web filtering
IM/P2P/VoIP filter
77
Panda GateDefender Performa-User Guide
Creating and modifying protection profiles
You can use Panda GateDefender Performa to specify profiles for the protection you
want to apply to users or user groups, IP addresses, domains, email addresses, specific websites, etc.
Before a protection profile can be created, you must first have created a configuration in the Settings
manager.
Follow these steps to create a protection profile.
1.
In the main screen of the Web console, click Settings. Then select Assign settings to local
profiles
Click Add (if you want to create a new profile) or Modify (if you want to modify an existing
profile).
2.
This will take you to the Protection profile manager screen with the following options:
• Name:Descriptive name of the profile.
• Apply to: This specifies the items to which the settings will be applied. Enable the
checkboxes that you want to include in the settings.
The options available are:
o
Users: Select one of the two options offered by Panda GateDefender Performa:
o User groups: This lets you apply a specific protection profile to the user groups or
LDAP groups specified in the User management section.
o Sub-tree/individual users: If you have already specified an LDAP server, you can
specify the branch of the hierarchy to which you want to apply the protection profile. In
the BaseDN field, specify the DN of a container, or else the DN of a specific user.
o IP/IP address group: Enable the checkboxes corresponding to the options you want to
include in the configuration: IP/Source group and IP/target group.
•
•
•
Each of these consists of a list from which you can select the IP address group to which to
apply the protection profile. You must have created it in the IP address management
screen
Domains: Enable the checkboxes corresponding to the options you want to include in the
configuration: Source Domain and Target Domain.
Each of these consists of a list from which you can select the domains to which to apply
the protection profile. You must have created it in the Domain management screen.
Email addresses: Enable the checkboxes corresponding to the options you want to include in
the configuration: Email sender addresses, Email recipient addresses, Domain lists.
Specify a list of addresses for each, separated by commas.
Settings: Select one of the configurations from the drop-down menu. Remember that you
must first have set up a configuration in the settings manager.
Once you have configured the user, click OK to save the changes.
Centralized protection settings
Introduction and access to the centralized settings
78
Panda GateDefender Performa-User Guide
On occasions, the complexity and extension of the corporate networks Panda
GateDefender Performa must protect in corporate environments require more than one appliance to be
deployed and running. Panda GateDefender Performa’s Web console allows you to manage the
protection provided by the different appliances on the corporate network in a centralized way.
In short, the centralized protection management in Panda GateDefender Performa lets you:
• Select the appliances or groups of appliances to which you want to remotely and automatically
establish and apply protection settings.
• Select protection settings applicable to the different appliances.
• Select different configuration profiles applicable to the appliances.
• Monitor which settings and profiles have or haven't been applied to each appliance.
It is essential that all appliances whose protection settings will be managed centrally, have the
same system version installed.
By using this feature, you will not have to connect individually to each of the appliances every time you
want to apply a protection configuration. You only have to enter the login details when you configure
the appliances.
Below you will find a summarized description of the screens you'll have to use to remotely and centrally
manage the appliances deployed on your network. As you can see, the configuration is simple and
intuitive:
Basic process for centrally configuring the protection
1.
Determine the appliances or groups of appliances to which you want to centrally
apply the settings.
To do this, click the Settings menu in the main Console screen. Then, select Profiles > List
of appliances.
2.
In the List of appliances screen you can indicate which appliances or groups you want to
manage. You can add new appliances or groups, modify them or delete them. You can change
the structure of any group, adding or removing appliances.
Protection management.
From the Assign settings to other appliances screen, you can establish, if you want to
manage individual appliances or the groups defined in the previous step. Once you have
selected the configuration, you can apply it directly to all appliances. This configuration will
be the main or default settings on the target appliances.
3.
If you want to create or edit protection settings to apply to managed appliances, use the
Settings management screen.
Additional Profile selection
You may want to apply certain configuration profiles to appliances or groups of appliances.
In this case, the Profile selection screen lets you select new profiles and assign them, along
with the corresponding configuration, to appliances or groups of appliances.
You can create or edit configuration profiles from the Create and modify profile settings
screen. As you can see in this screen, a profile specifies the user group, domains, IP/address
79
Panda GateDefender Performa-User Guide
group, etc., to which a certain configuration is applied (Example: blocking access to certain
Web content to the group of IP addresses: 172.16.*.*).
List of appliances
These screens let you indicate which appliances or groups you want to manage. You
can add new appliances or groups, modify them or delete them. You can change the structure of any
group, adding or removing appliances.
To access the List of appliances screen, click the Settings menu in the main console screen, and
select Profiles > List of appliances.
Manageable appliances
In the Manageable appliances section you will see the appliances with their name and the console
IP.
To add a new appliance, click Add. In the Appliance detailsscreen enter the data needed in order to
manage an appliance remotely:
• Name: a name to identify the appliance.
• IP: IP address used to access the console.
• User: name of a user with full administration permissions.
• Password: user password.
• Group: group to which the appliance belongs. This parameter is optional.
• Comment: here you can add additional information. This field is optional.
Then click Save.
Manageable groups
In the Groups of manageable appliances section you will see groups of appliances, the names of
each appliance in the group and the IP address of the console of each appliance.
To add a new group click Add. In the Group details screen, enter the data needed in order to
manage a group remotely:
• Name: name identifying the group.
• Appliances in the group: the table shows appliances that are not assigned to any group. Use
the checkboxes to select the appliances that will make up the group. Then click Save.
Assigning settings to other appliances
Once you have defined in the List of appliances screen, the appliances and groups of
appliances you want to configure remotely, you can assign and apply protection settings. If you want
to create or edit protection settings to apply to managed appliances, use the Settings
management screen.
You may want to apply certain configuration profiles to appliances or groups of appliances. In this case,
the Profile selection screen lets you select new profiles and assign them to appliances or groups of
80
Panda GateDefender Performa-User Guide
appliances. You can create or edit configuration profiles from the Create and modify profile settings
screen.
Assigning settings to other appliances
1.
2.
3.
Click the Settings menu in the main Console screen.
Select Profiles > Assigning settings to other appliances.
In the Appliances section, select the appliance to which you want to assign and apply the
settings.
When you click on the name of an appliance, you will access the corresponding Web
console.
4.
5.
6.
Click Modify to access the Centralized management screen.
In the Settings menu, select the settings to assign to the appliance.
Click Set.
The Apply button will only be visible when you select settings from the drop-down menu.
If you want to send an associated settings profile instead, click Edit list to access the
Profile selection screen.
Click Save. Assigning settings to groups of appliances
1.
2.
3.
Click the Settings menu in the main Console screen.
Select Profiles > Assigning settings to other appliances.
In the Groups of Appliances section, select the group to which you want to assign and apply
the settings.
When you click the triangle next to the group name, you will see the appliances in the group.
4.
5.
Click Modify to access the Centralized management screen.
In the Settings menu, select the settings to assign to the group.
6.
Click Apply.
The Apply button will only be visible when you select settings from the drop-down menu.
If you want to send an associated settings profile instead, click Edit list to access the
Profile selection screen.
Profile selection
When you use the option in Panda GateDefender Performa, you may need a settings profile other than
the one assigned to the appliance in the Assign settings to other appliances screen.
You can use Profile selection to resolve this situation. To do this:
81
Panda GateDefender Performa-User Guide
1.
2.
3.
In the list of Profiles available, select the profile you want to add to the list of assigned profiles
and click >>. It will be removed from the list of profiles available and added to the list of profiles
assigned.
In the list of Profiles assigned, select the profile you want to remove from the list and click <<.
It will be removed from the list of profiles assigned and added to the list of profiles available.
Click Save.
The new profile will appear in the list of profiles in the Assign settings to other appliances screen.
You can create or edit configuration profiles from the Create and modify profile settings screen. As
you can see in this screen, a profile specifies the user group, domains, IP/address group, etc., to which
a certain configuration is applied (Example: blocking access to certain Web content to the group of IP
addresses: 172.16.*.*).
82
Panda GateDefender Performa-User Guide
System settings
General settings
Introduction
Click the Settings menu in the main Console screen. In the System section, you will find the Panda
GateDefender Performa general settings options:
•
Access the console: This lets you define the configuration IP address, the time when the
•
Load balancing/high availability: Lets you configure Panda GateDefender Performa to
•
System clock: Lets you set the system date and time.
•
Explicit proxy: If Panda GateDefender Performa is not operating on the network infrastructure
•
configuration console should disconnect automatically and management of permissions and
passwords for using the console.
work in parallel with other units, sharing the workload and increasing the capacity and stability of
the protection. The type of load balancing can be configured: automatic or manual.
along with a proxy, you will have to enable the internal (explicit) proxy for the various
HTTP/HTTPs protection profiles depending on the user.
HTTPS connections and certificates: To manage HTTPS traffic and scan it for malware,
Panda GateDefender Performa
authentication and certificates.
has
to
establish
connections
that
require
•
Advanced settings
•
Quality of Service (QoS) settings: Panda GateDefender Performa has a Quality of Service
feature aimed at ensuring that traffic flow reaches its destination with certain levels of
performance and minimum delays.
Console access settings
Console access
In this screen you can configure different general aspects of the console, such as:
Users
You can configure the users that can access the Web console, their passwords and permissions. You
can add new users and edit existing ones, selecting them and then clicking the corresponding buttons.
This will take you to the Edit user screen.
The default user cannot be deleted and its permissions cannot be changed.
83
Panda GateDefender Performa-User Guide
Configuration IP
•
•
Configuration IP address. This IP address is vital for accessing the console (not remote). This
address must be unique within the organization. The default IP is 172.16.1.1 and the default net
mask is 255.255.255.0.
The subnets or IP addresses from which users can access. Select Access is only available
from the following IPs or subnets. Use the corresponding buttons to add, modify or remove
IP's and subnets.
Automatic disconnection of the Web console
•
Automatically disconnect the Web console after a certain period of inactivity. By default, the
console will disconnect after thirty minutes of inactivity.
In order to view the factory settings of the appliance, click here.
Editing users
Panda GateDefender Performa lets you change the user name and password for logging into the Web
administration console. It also lets you assign different permissions to each user, depending on the
specific needs of your organization.
Users will be able to access functions in accordance with the specific permissions they have.
Panda GateDefender Performa will ask for a user name and password whenever anyone
accesses the Web administration console. The default user is defaultuser and the default password
is defaultpass. It is advisable to change these details, at least the first time you access the Web
administration console.
For security reasons, the default user cannot be deleted and its Complete Administration
permissions cannot be changed.
Enter the following data:
1.
2.
•
•
•
User name.
Password (twice). Remember that:
The password must be 6 to 12 characters long (numbers and/or letters).
Panda GateDefender Performa does not allow you to copy and paste.
The feature in some browsers that allows you to save previously entered data is disabled.
If you lose or forget these details, you can recover the factory settings.
3.
Permissions
In corporate environments there may be several users that need to access the console, and
each of them may need different permissions depending on the tasks they have to carry out.
Panda GateDefender Performa includes four types of permissions:
•
•
Monitoring: Users have permission to access the Status, Reports and Services
screens.
Protection settings: Users have permission to access the Protection settings,
Definitions, Profiles, Quarantine and Warnings screens.
84
Panda GateDefender Performa-User Guide
•
Complete administration: Users can access all console functions, including
Updates, License management and Tools. If all three checkboxes are selected, the
user will have Complete administration permissions.
Console access through the configuration IP address
Panda GateDefender Performa has a configuration IP address, which is used to access the web console.
This IP address must be unique and different from the network IP address.
•
•
Configuration IP address. This is the IP address that must be used to access the settings web
console.
Network IP address. This is the IP address that Panda GateDefender Performa uses to
establish connections (to update, send warnings, etc.). It is configured through the System
settings - Network environment window.
All Panda GateDefender Performa units are configured with the same configuration IP address by
default. You can change it but bear in mind that if you forget it, you won’t be able to access the
settings web console unless you restore the factory settings of the appliance.
For information about the factory settings, click here.
What’s more, this configuration IP address must not be in use by any other device in the network.
If several Panda GateDefender Performa units are connected in parallel, set a different a unique
configuration IP address for each of them.
After setting the configuration IP address, you can access the appliance from both sides of Panda
GateDefender Performa, as you can access the console through this IP address or through any of the
network interface cards of Panda GateDefender Performa.
Automatic disconnection of the Web console
You can configure the Web console to automatically disconnect after a certain period of inactivity. To
do this:
•
•
Enable the Automatically disconnect the Web console after XX minutes of inactivity
checkbox in the System settings screen.
In the textbox, enter the number of minutes before the Web console will disconnect.
After completing these steps, the console will stop functioning if no operations are carried out for the
specified period of time. If this happens, in order to use the console again, you will have to log on
again.
85
Panda GateDefender Performa-User Guide
Load balancing/high availability
Introduction
1.
2.
3.
Panda GateDefender Performa offers three operational modes:
Normal or isolated
High availability
Load balancing
Normal
In normal mode, a single appliance protects the internal network
Both outbound traffic (originating from the internal network) and inbound traffic (originating from the
external network) pass through it and are filtered.
Load balancing
Load balancing allows the workload to be shared between several Panda GateDefender Performa
units. This provides better performance and fault tolerance.
By using this system, if one of the units fails, the rest will take care of the workload automatically. The
time that passes between one unit failing and the rest taking over its workload is no longer than fifteen
seconds.
So that load-balancing appliances can communicate between each other, an IP multicast is required,
meaning that all appliances must have their configuration interfaces on the same subnet. When a new
appliance is installed and configured on a load-balancing cluster, Panda GateDefender Performa detects
it automatically and re-organizes load-balancing depending on the new total number of appliances in
the cluster.
High availability
If load-balancing is disabled, Panda GateDefender Performa allows appliances to operate in high
availability mode when connected in parallel. In this case it will not be necessary to use the IP
multicast, as the appliances do not communicate between each other.
Both load balancing and high availability require the bypass mechanism to be disabled in those
appliances with these types of cards.
86
Panda GateDefender Performa-User Guide
Bypass
The appliance network cards offer bypass functions, so that:
- Without bypass or with bypass disabled:
If the appliance is switched off (e.g. if the power supply is interrupted) or restarted (system or service
restart), traffic cannot continue to pass through it. The connection with the external network will be cut
off.
- With bypass enabled:
If the appliance is switched off or restarted, bypass will be activated with the advantage that traffic will
continue to pass through, but without being filtered.
On activating high-availability or load balancing, the bypass function will be
disabled. This avoids loops on the network. STP (Spanning Tree Protocol)
Spanning Tree Protocol is a data link level protocol (OSI level 2) that avoids creation of network loops.
Panda GateDefender Performa supports this protocol, as it could be necessary to install appliances in
parallel (high availability and load balancing):
- If there are already devices on the network that support STP, it will not be necessary to enable STP
on the appliances.
- Otherwise (if there is no device with STP on the network on which the appliances are installed), you
will have to enable STP.
To enable STP
Settings > System > General > Advanced settings
In the General settings section, select the checkbox Enable support for STP (Spanning Tree
Protocol)
Support for STP is enabled by default.
It is always advisable to check with the support service before changing any feature in the
Advanced settings screen.
Enable load-balancing/high availabilty
1.
2.
3.
4.
5.
Click the Settings menu in the console.
In the System section, select High availability/Load balancing.
Enable the high availability or load balancing features in the screen as required.
If you want to enable load-balancing, enter the multicast IP in the text box.
Click Save.
At the bottom of the screen there is a list of load-balancing cluster units. A change to the operational
mode of an appliance (slave or master) generates the corresponding system event.
87
Panda GateDefender Performa-User Guide
To access the console of any appliances in the cluster, click on the name of the appliance.
For load-balancing to take effect, the Enable load-balancing checkbox must be selected in all
appliances.
Load balancing
Load balancing operation
Load balancing enables Panda GateDefender Performa to increase the availability and capacity of the
protection.
By spreading the load, more connections can be scanned
Of all the traffic intercepted by the appliance/master node, a certain amount will be 'balanced' among
the slaves, which will perform the scans. The load is balanced equally, and distributed so that all nodes
have an equal level of occupation.
If the master node should crash, one of the slaves will take over its functions, continuing to scan and
protect the network.
Network diagram with three nodes
88
Panda GateDefender Performa-User Guide
Multicast
To perform load balancing and maintain communication between the notes, multicast is required.
Multicast addressing allows information to be sent across a network efficiently to a group of recipients
(without broadcasts). For this a group multicast address is needed, through which the nodes send and
receive data.
Multicast diagram (a network node sends data to other nodes):
In Panda GateDefender Performa it is possible to configure this IP address in group or cluster. The IP
address range is (RFC 3171): 224.0.0.0 - 239.255.255.255
By default the IP address of the cluster configured in the appliances is 239.0.0.1
89
Panda GateDefender Performa-User Guide
Load-balancing deployment
Deployment of load-balancing involves the following steps:
1.
2.
3.
4.
5.
6.
7.
Install/configure the necessary switches on the network
Install the first node
Configure the system in the node (name, IP addresses, etc)
Connect to the network
License
Configure the protection (anti-malware, anti-spam, Content Filter,… )
Enable load balancing
To complete the deployment:
1. Go to the Settings menu.
2. In the System section, in the General sub-section, click High availability/Load-balancing.
3. Enable the Enable high availability checkbox.
4. Enable the Enable load-balancing checkbox.
5. Configure the cluster multicast IP address.
6. Click Save.
7. Install the second node
8. Configure the system
9. Connect to the network
10. License
11. Configure the protection settings identically as for the first node (if you use QoS, enable it and
configure it exactly the same as in the first node).
After having configured the first node, you can send the settings information to the other nodes.
1.
2.
3.
4.
5.
6.
7.
Enable load-balancing (so that the appliances can communicate, the multicast IP address of the
cluster must be the same in all nodes).
Master node name: node-A
Network IP address of the master node: 192.168.1.1/24
Configuration IP address of the master node: 172.16.1.1/24
Default gateway: 192.168.1.100
Multicast IP of the cluster: 239.0.0.1
Slave node name: node-B
90
Panda GateDefender Performa-User Guide
8.
9.
10.
11.
12.
13.
Network IP address of the slave node: 192.168.1.2/24
Configuration IP address of the slave node: 172.16.1.2/24
Default gateway: 192.168.1.100
Multicast IP of the cluster: 239.0.0.1
The protection settings must be exactly the same in all nodes.
Load-balancing must be enabled in all nodes.
The Status screen will indicate that the appliance is in load-balancing mode. The list of cluster nodes
will also appear.
In the High availability/Load-balancing settings screen there is a table with the cluster nodes
(indicating the IP of each node and whether it is a master/slave).
High availability
High availability mode
This operational mode improves the availability of the protection offered by Panda GateDefender
Performa.
High availability mode operates with an active node (through which traffic passes) and one or more
passive nodes (through which traffic will pass if the active node fails).
Under normal circumstances -with the active node operating- traffic will be filtered by this node and the
passive node will not take any action. If the system or services are restarted in the active node, or if
the appliance is switched off, the passive node will take care of the filtering.
Deployment in High Availability mode
Deployment of high availability involves the following steps:
1.
2.
3.
4.
5.
6.
7.
Install/configure the necessary switches on the network
Install the first node
Configure the system in the node (name, IP addresses, etc)
Connect to the network
License
Configure the protection (anti-malware, anti-spam, Content Filter,… )
Enable high availability
91
Panda GateDefender Performa-User Guide
To complete the deployment:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Go to the Settings menu.
In the System section, in the General sub-section, click High availability/Load-balancing.
Enable the Enable high availability checkbox.
Click Save.
Install the second node
Configure the system
Connect to the network
License
Configure the protection settings identically as for the first node (if you use QoS, enable it and
configure it exactly the same as in the first node).
After having configured the first node, you can send the settings information to the other nodes.
System clock
In this window, apart from showing the date and time of the appliance, you can also
set it (in 24-hour format).
First of all, the screen shows the system date and time:
Then, Panda GateDefender Performa allows you to set the date and time of the appliance. To do this,
specify:
•
•
•
•
The Date format: either day/month/year or month/day/year.
The Time zone.
Manual setting. You can manually edit the date and time.
Automatic setting using NTP. Enter the address/URL of the NTP server.
Explicit proxy
If Panda GateDefender Performa is not operating on the network infrastructure along
with a proxy, you will have to enable the internal (explicit) proxy for the various HTTP/HTTPs
protection profiles depending on the user.
As with a normal proxy, the user must be included in one of the local or remote groups (LDAP servers)
defined in Panda GateDefender Performa. The protection profile will be defined by the group to which
the user belongs.
The user must be able to authenticate in the Panda GateDefender Performa internal proxy. Although
this authentication is optional, it is required in order to apply the profile. To access the internal proxy,
the IP of the user must belong to one of the internal networks configured in Panda GateDefender
Performa.
92
Panda GateDefender Performa-User Guide
Restricted access attempts generate a system event which can be seen in the Security reports
screen. In the Warnings settings screen you can configure this event to be notified to a remote
Syslog server.
Explicit proxy settings screen
The proxy can be configured from System » General » Explicit proxy
To enable the explicit proxy you must have previously configured the internal networks.
Firstly, select Enable operation as proxy for HTTP/HTTPS. Then configure the proxy IP the
entwork mask, and the HTTP and HTTPs ports on which the proxy will listen.
If you configure the proxy with an IP that already exists on the network, a duplicate IP event is
generated, which you will see in the System Report screen, and a warning that will appear in the
Status screen.
Select the Use authentication checkbox and click Select users to configure the groups that can use
the internal proxy.
It is also possible to enable a page cache to increase browsing speed (the cache size is 1024 MB). Use
the Clear button to empty the cache.
HTTPS connections and certificates
Introducción
93
Panda GateDefender Performa-User Guide
Panda GateDefender Performa can scan encrypted HTTPS traffic for malware, in the same ways as for
HTTP. This HTTPS traffic is basically HTTP traffic across a secure, TLS channel (Transport Layer
Security, previously SSL).
On of the phases for establishing the TLS channel is the authentication of the server's identity. This
authentication is based on digital certificates signed by a certification authority.
In order for the encrypted traffic to be scanned in Panda GateDefender Performa, two encrypted
connections must be established: one between the client and Panda GateDefender Performa, and the
other between the appliance and the server. Without the interception by the appliance, there is only an
encrypted connection between the client and the server.
This type of connection means that not only does Panda GateDefender Performa have to authenticate
the server, but the client will also authenticate Panda GateDefender Performa. Actually, Panda
GateDefender Performa authenticates as if it were the server delivering the page in question.
All of this requires management of digital certificates and certification authorities, which can be done in
the Panda GateDefender Performa Web console, through Systems > General > HTTPS
connections and certificates.
Normally, servers are authenticated by the client browser, although in some rare cases, a
server may require authentication of the client. This represents a limitation for Panda GateDefender
Performa, because client authentication cannot be handled by the transparent interception. However,
it is possible to use IP white lists, so that traffic is not intercepted.
SSL connection policies
To access the screen for configuring SSL connections and certificates, click System » General » HTTPS
connections and certificates.
By enabling the corresponding checkboxes, you can prevent connections for either of these two
situations:
• Don't allow connections with servers with invalid certificates for Panda GateDefender Performa:
The certificate presented by the server must be signed by one of the certificate authorities configured
in GateDefender. If this condition is not met, the corresponding system event will be generated, and
will be visible in the System events screen.
• Don't allow expired certificates:
Do not allow connections if the certificate is expired. If this condition is not met, the corresponding
system event will be generated, and will be visible in the System events screen.
HTTPS URL white list
94
Panda GateDefender Performa-User Guide
Panda GateDefender Performa lets you define a list of domains, sites or specific pages for which the
validity of the certificate will not be checked. To apply this white list click Enable use of the white
list, and you will go to the HTTPS URL white list screen where you can define the list.
Certification authorities
Internal certification authorities for signing certificates
This certification authority will be used by Panda GateDefender Performa for generating certificates that
will be sent to end users. You can download the corresponding certificate for users to install in their
browsers to prevent them from getting SSL security warnings. The file extension is .crt to ensure
compatibility with Internet Explorer.
You can import a certification authority certificate to use to generate certificates. In this case you will
have to import the private key (RSA or DSA) used to sign them.
You can either download a new internal certification authority or edit an existing one. Either option, in
the case of appliances operating in load-balancing mode, mean that this change will have to be
exported to other units, to avoid having to install different certificates on clients for each appliance.
95
Panda GateDefender Performa-User Guide
The Export private key button will only be enabled when modifications have been made
to the default certification authority. If you click Restore, the default settings will be restored.
You will then have to import the private key, (previously exported from another Panda GateDefender
Performa) and the certification authority certificate in each of the appliances.
Use the Modify button to change the internal certification authority, editing the corresponding data.
Certification authorities for verifying certificates
Panda GateDefender Performa offers a list of certification authorities for validating certificates received
from HTTPS sites. You can import/export new certificate authorities or delete some existing ones. Use
the corresponding buttons.
If you want to see the details of any of the authorities in the list, select it and click View details.
Restoring HTTPS certificate settings
Use the Restore button if you want to restore the Panda GateDefender Performa factory settings for
the internal certification authority certificates and certification authorities.
Advanced settings
The parameters on this page must not be modified unless specifically requested by
our technical staff. If this is necessary, they will explain the steps to follow.
Quality of Service (QoS) settings
Quality of Service settings
Panda GateDefender Performa has a Quality of Service feature aimed at ensuring that
traffic flow reaches its destination with certain levels of performance and minimum delays.
Panda GateDefender Performa bases this function on the assigning of bandwidth to interface outputs.
For the correct operation of QoS in Panda GateDefender Performa, the external interface or
NIC1 must be connected to the external network (the Internet, for example), while the internal
interface or NIC2 must be connected to the internal network (the corporate network for example).
96
Panda GateDefender Performa-User Guide
Appliance connection
The most basic way of administering QoS in Panda GateDefender Performa is the configuration of
bandwidth for each interface.
Existing traffic flow
Downstream traffic goes from the external network to the internal network, passing through NIC1 as
inbound traffic, and then through NIC2 as outbound traffic.
Upstream traffic goes from the internal network to the external network, as inbound traffic in NIC2 and
outbound traffic in NIC1.
Panda GateDefender Performa lets you set the outbound bandwidth for NIC1 and NIC2 (marked in
orange):
97
Panda GateDefender Performa-User Guide
- When you set the maximum outbound traffic in NIC1 this restricts the amount of traffic going to the
external network.
- When you set the maximum outbound traffic in NIC2 this restricts the amount of traffic going to the
internal network.
Example of a network with QoS based on global bandwidth
Existing network
- LAN at 100 Mbps
- ADSL with download speed of 6 Mbps and upload of 1 Mbps
Settings:
- Period in which QoS is applied: by default.
Global bandwidth settings:
or external interface (NIC1):
♣ Maximum outbound traffic: 1 Mbps
or Internal interface (NIC2):
Maximum outbound traffic: 100 Mbps♣
IP and protocol settings:
none Result:
- Maximum upload traffic speed will be 1 Mbps. This will prevent saturating the connection by sending
data at more than 1 Mbps.
- Maximum download traffic speed will be 100 Mbps.
98
Panda GateDefender Performa-User Guide
To achieve greater control over QoS, you can also use these settings, through which you can define the
rules for managing outbound traffic in the external interface or NIC1:
Using these settings has the advantage that you can add rules, favoring certain types of outbound
network traffic. Protocols and the source IP of data packets (which circulate from the internal network
to the external network) are used to classify traffic flows. These flows can be assigned guaranteed
bandwidth. Even if all outbound bandwidth is occupied, if there is guaranteed bandwidth for an IP
address/protocol, this will be reserved for the IP/protocol.
It is also possible to define maximum bandwidth, thereby controlling the amount of bandwidth for a
certain protocol or group of IPs, leaving bandwidth free for other traffic. Finally, traffic priority is a
factor to bear in mind for unused bandwidth.
QoS sample settings
Concepts used in the examples:
Downstream traffic
Traffic that enters via the Internet or external network and enters the internal network or LAN
Upstream traffic
Traffic that leaves the LAN or corporate network towards the Internet or external network.
Inbound traffic (to an interface)
Traffic that enters through the port of a network card (enters the appliance)
Outbound traffic (to an interface)
Traffic that leaves through the port of a network card (leaves the appliance)
Interface identification
The interfaces are identified as follows:
- NIC1: external interface ( connected to the Internet or an external network )
- NIC2: internal interface ( connected to the corporate network or the internal network to protect )
Internal or inherent appliance traffic
Generated by the network card or the appliance settings (depending on the development)
Interceptable traffic
Traffic that is filtered through the various protection units.
99
Panda GateDefender Performa-User Guide
Scenario 1: mail and Web
There is an internal network in which outbound Web (HTTP) and email (SMTP, POP3) traffic flows are
generated, both with a similar traffic volume:
HTTP traffic is considered of low importance and to restrict, except for a computer with the IP address:
192.168.1.112, in which case it has high importance.
Existing network:
Upload BW of the external link: 1024 Kbps
Download BW of the external link: 100 Mbps
QoS settings:
(must be adjusted to the previous BW)
Maximum outbound traffic for the external interface (NIC1): 1024 Kbps
Maximum outbound traffic for the internal interface (NIC2): 100 Mbps
Reserved bandwidth: 5 %
The following rules are created:
Rule
Source IP
Protocol
Guaranteed
BW
BW
limit
Priority
1
192.168.1.112/32
HTTP
300 Kbps
Not
limit
ed
High
2
192.168.1.0/24
HTTP
0 Kbps
200
Kbps
Low
3
192.168.2.0/24
HTTP
0 Kbps
200
Kbps
Low
4
Any
SMTP
400 Kbps
Not
limit
ed
medium
5
Any
POP3
100 Kbps
Not
limit
ed
medium
•
Rule 1
Provides guaranteed BW of 300 Kbps to HTTP traffic originating from IP 192.168.1.112. It will also
have high priority in order to get any free BW –if required-.
100
Panda GateDefender Performa-User Guide
•
Rule 2
For the rest of the subnet 192.168.1.0/24, the HTTP traffic has no guaranteed BW and will be limited
to 200 Kbps. The priority will be low so that it does not compete for free BW.
• Rule 3
For the whole 192.168.2.0/24 subnet, the procedure is the same as the previous rule, limiting HTTP
traffic to 200 Kbps and assigning low priority.
• Rule 4
SMTP traffic, whatever the origen, is guaranteed 400 Kbps (outbound) and will have medium priority.
• Rule 5
POP3 traffic, whatever the origen, is guaranteed 100 Kbps (outbound) and will also have medium
priority.
The buttons to the side of the box let you move the selected rule up and down. The rules are
applied in accordance with the order in which they are listed.
In this scenario, rule 1 should be listed before rule 2, so that it discriminates traffic originating
from the computer or host 192.168.1.112.
Scenario 2: Web
There is an internal network from which outbound Web (HTTP, HTTPS) traffic originates and traffic that
does not conform to the rules.
HTTP and HTTPS traffic is considered important and there is a lesser volume of traffic from other
protocols which is given less importance.
Existing network
QoS settings
Upload BW of the external link: 512 Kbps
(must be adjusted to the previous BW)
Download BW of the external link: 100 Mbps
Maximum outbound traffic for the external
interface (NIC1): 512 Kbps
Maximum outbound traffic for the internal
interface (NIC2): 100 Mbps
Reserved bandwidth: 5 %
The following rules are created:
101
Panda GateDefender Performa-User Guide
Rule
Source
IP
Protocol
Guaranteed
BW
BW limit
Priority
1
any
HTTP
200 Kbps
Not
limited
High
2
any
HTTPS
200 Kbps
Not
limited
High
•
Rule 1
Guaranteed BW of 200 Kbps to HTTP traffic. It will also have high priority in order to get any free BW –
if required-.
• Rule 2
Guaranteed BW of 200 Kbps to HTTPS traffic. It will also have high priority in order to get any free BW
–if required-. The rest of the traffic will have medium priority, and so will not compete for free BW.
Network settings
Network environment
Configure the Panda GateDefender Performa network environment (IP address, net
mask, default gateway, proxy server IP address and the DNS servers) to access the Internet in the
same way as Internet access for any other computer in the same subnet is configured.
To check the factory settings of Panda GateDefender Performa, click here.
After configuring these parameters, Panda GateDefender Performa will be able to:
• Connect to the Internet to look for updates.
• Send warnings to any computer.
• Download the license file, etc.
Check that the data entered is valid and coherent; otherwise Panda GateDefender Performa will not be
able to establish the connections it needs to operate correctly.
Enter the following data:
• Panda GateDefender Performa name:
• Network data:
• Additional routing table:
• DNS Servers:
• Internet access via HTTP proxy:
• Virtual MAC addresses:
Panda GateDefender Performa name
Name that identifies the Panda GateDefender Performa unit within the organization. This name will be
used in the warnings in order to specify which appliance has sent them. This is not a NetBIOS name.
Network data
Data (network IP address, net mask and default gateway) used by Panda GateDefender Performa to
connect to the Internet.
As it works like a bridge, the appliance only needs one network IP address, which it uses to establish
102
Panda GateDefender Performa-User Guide
connections through any of its network interface cards. The appliances use the network interface card
that is connected to the network in which the target of the connection is located.
Additional routes table
This allows static routes to be defined. The appliances use these routes when they need to connect to
subnets that cannot be reached through the default gateway. For example, when the server the
appliance must connect to in order to send warning messages is in a different subnet.
You can add new routes by clicking on the New button. Then enter the following data:
• Target: IP address of the host or IP address of the target subnet that will use the route.
• Net mask: The net mask is used with the target in order to determine when the route will be
used.
• Gateway: IP address of the router to which the data for recipients will be sent. These are
determined
by
the
Target
and
Net
mask.
DNS servers
IP addresses of the primary and secondary DNS servers that Panda GateDefender Performa must use
to resolve domain names and IP addresses. You can specify the preferred DNS servers and up to two
alternative DNS servers, which will be used if it is not possible to connect to the preferred server
because it cannot be found or because it returns an error.
The appliances are configured with a default DNS server that you can change to include
the IP addresses or DNS serves that you want to use.
Internet access via HTTP proxy
If Panda GateDefender Performa will access the Internet via a proxy server, enable the checkbox and
enter the following data:
• IP address of the proxy and the port it uses.
• If the proxy server requires authentication, enable the Requires authentication checkbox
and
indicate
a
valid
user
name
and
password
for
the
proxy.
Virtual MAC addresses
Some devices used in complex networks use virtual MAC addresses (usually devices working in load
balancing mode).
In this case, the unit needs to know which of the two network interface cards is connected to each
virtual MAC address being used n the organization.
Click on the Specify virtual MAC addresses link to associate the virtual MAC addresses with the
corresponding network interface card in the appliance.
Network interfaces
Panda GateDefender Performa, by default, has the network cards in Autonegotiation mode and Auto-negotiation speed. It is not advisable to force them to function in a
specific mode ((half-duplex or full-duplex) or at a specific speed (10 Mbps, 100 Mbps, 1 Gbps).
103
Panda GateDefender Performa-User Guide
However, if really necessary, you can configure the network interface card operational mode and speed.
The options are:
• AutoSensing/Autonegotiation. This is the recommended, default mode. If you select this
option, Panda GateDefender Performa assigns the autonegotiation value to the operational mode
and the speed at which the network interface works.
• Full-duplex. Communication mode in which nodes can simultaneously send and receive data
between one another. Full-duplex communication usually requires you to control the traffic flow
in order to ensure that none of the devices send out data faster than the other can receive it.
• Half-duplex. Communication mode for transmitting data between two points in just one
direction at a time (either of the two). This means that data cannot be sent and received at the
same time, which is possible with full-duplex communications.
When using a hub to interconnect several devices, all should be functioning in the same mode
(half-duplex or full-duplex). If they work in different modes, communication between them will not be
effective. In these circumstances, forcing cards to work in full-duplex or half-duplex mode could
cause problems, considerably reducing network and appliance performance. However, when
switches are used to connect devices, each device can work in a different mode.
You also have the option to configure a set speed at which the network interface card should work.
This can be done provided that the Autonegotiation option is not selected in Mode. The following
speeds are available:
• 10 Mbps.
• 100 Mbps.
• 1 Gbps.
In most cases the default mode (AutoSensing / Autonegotiation) is the most appropriate.
If you select Auto negotiation mode, you will not be able to configure the fixed speed
of the network cards, as this option affects both cases.
Additional port settings
The system uses the standard port for intercepting and filtering the traffic for each
protocol. However, you can also enter additional ports for each protocol.
To access the Port settings screen, click the Settings menu in the console, and in the Network
section, select Additional ports.
The communication that uses the standard ports and the additional ports entered will be scanned by
Panda GateDefender Performa.
Protocol
Default port
HTTP
80
HTTPS
443
FTP
21
SMTP
25
104
Panda GateDefender Performa-User Guide
POP3
110
IMAP4
143
NNTP
119
Panda GateDefender Performa does not allow you to enter the following ports:
• Invalid ports (higher than 65535, for example).
• Standard ports, as the traffic that passes through these ports will always be scanned (as they are
defined in the factory settings and used by default).
• Ports already entered for other protocols.
Panda GateDefender Performa does not scan traffic in non-standard ports not included in
the additional ports configured here.
Managing internal networks
By defining internal networks you can classify SMTP messages as inbound or outbound.
This configuration is necessary for the anti-spam, anti-phishing and content-filter protections to operate
correctly.
SMTP messages will be classified as inbound in the following cases:
•
•
•
No internal networks have been defined. In this case, all SMTP mail will be considered inbound.
The source IP address does not belong to any of the networks specified in the list of internal
networks.
The source IP address coincides with any of the IP's defined in the list of excluded IP's.
SMTP mail will be classified as outbound provided that the source IP address belongs to one of the
internal networks defined.
Adding internal networks
To access the Internal network management screen, click the Settings menu in the console, and
in the Network section, select Internal networks.
To add an internal network, enter the network address in the Subnet box and click Add. The network
address must be specified in CIDR format (e.g. 192.168.0.0/16). Individual IP addresses can be
specified using 32 as a mask (e.g. 192.168.5.205/32). Repeat these steps for each network defined in
your organization.
To remove an internal network, select it in the list and click Delete. Then accept the confirmation
message.
To import or export content from the list, refer to the section Import / Export files or lists.
The IP addresses defined in the list of internal networks will also have access to the
HTTP/HTTPS explicit proxy.
Excluded IPs
105
Panda GateDefender Performa-User Guide
1.
2.
3.
4.
To add an IP to the list, enter the IP in the IP address box and click Add. Repeat this step for
all the IPs you want to add to the list.
To remove an IP, select it in the list and click Delete. Then accept the confirmation message.
Click Export to export the content on the list to text file. Each line in the file will be an entry in
the list.
Click Import to display the screen for importing files. Use the Browse button to locate a file
containing a list to import.
Click Save for the settings to take effect.
The IP addresses included in the list of internal networks will not have access to the
HTTP/HTTPS explicit proxy.
Managing internal domains
You have to define internal domains for the protection of SMTP relay servers to operate
correctly (configuration of advanced anti-spam protection options for SMTP). This protection classifies
all inbound SMTP messages to unknown recipients as spam.
The recipient of a message will be considered unknown in the following cases:
• No internal domains have been defined. In this case, all SMTP messages will be understood to be
addressed to unknown recipients.
• The domain of the recipient's address does not coincide with any of the internal domains defined.
The recipient of an SMTP message will be considered as known provided that the address domain
belongs to the list of internal domains.
Adding internal domains
To access the Internal domain management screen, click the Settings menu in the console, and in
the Network section, select Internal domains.
1. To add a domain to the list, enter the domain name in the New section and click Add. Repeat
these steps for each domain defined in your organization.
2. To delete a domain from the list, select it and click Delete.
3. To import or export content from the list, refer to the section Import / Export files or lists.
Configuring the updates
Introduction to updates
Panda GateDefender Performa periodically carries out updates that will not interfere
with the functioning of the unit or allow traffic to enter or leave the corporate network without being
scanned.
There are three types of updates:
•
Update definition files for malware, spam rules and web filtering categories. Panda
•
System software upgrade: for example, the operating system, the hardware drivers, the web
•
GateDefender Performa will attempt to perform this type of update every fifteen minutes.
server used to view the administration console, etc. or the malware and spam scan and detection
engines.
Install hotfixes: Lets you view the hotfixes installed and install new hotfixes.
106
Panda GateDefender Performa-User Guide
The appliance is updated via the Internet. Panda GateDefender Performa checks if new updates are
available at regular intervals.
•
•
The definition files are automatically updated every 15 minutes and a system event with the
result is generated. An email message is also sent if the corresponding option is enabled and the
SMTP server for sending the warnings has been defined.
When it updates the system software, Panda GateDefender Performa reports if an update is
available and the administrator must decide when the update should be installed (by clicking on
the corresponding option in the Update - System software upgrade window).
Panda GateDefender Performa will only update the definition files of the protection modules that have
an active license.
Updating the protection software
Panda GateDefender Performa periodically looks for updates of the malware signature file, spam rules
and web filter categories, provided the license is active.
Even though the update process is automatic, it is possible to perform an on-demand update of
malware signatures and Web filtering categories at any time.
To do this, click the Update now button in the Automatic update of the protection software
section.
Enable sending of notifications
You can also configure a message to be sent with the results of the updates. To do this, click here,
and in Warnings: Events to report, select the events for which warnings will be sent to the
administrator and the sender.
The warnings will be sent using the email accounts, SMTP, Syslog and SNMP configured previously.
Update settings
Panda GateDefender Performa allows you to select the way in which you want to update malware
signatures.
1. If you want to continue updating them through the Internet, select the From the Internet
option.
2. To update locally, select From a local server and enter the URL to access the pavsig.zip file in
the Update URL text box.
3. Click Save.
4. Confirm if you want to perform updates locally.
5. Once the Panda GateDefender Performa Services have restarted, click OK. This will take you to
the Status screen.
If you select From a local server, the protection modules that require an Internet connection
(anti-spam, IM/P2P protocol and Web filtering, spam quarantine, spam detected report, Web and
IM/P2P protocol filtering report) will be disabled for the time Panda GateDefender Performa works in
local mode.
107
Panda GateDefender Performa-User Guide
Updating the system software
System software (firmware) includes any software used by the appliances except the definition files, for
example, the operating system, the hardware drivers, the Web server used to view the administration
console, etc. or the malware and spam scan and detection engines.
The appliances look for software updates every 12 hours. When an update is available:
• A warning is displayed in the Update page under Update system software.
• A system event is generated.
Before updating the system software, you can find out about the characteristics of the new version. To
do this, click For more information about the new features in this version, click here.
If the update is 1MB or less, you will access a Web page, where in addition to information
about the new version, you will find the steps to follow in order to download and install it.
In order to perform the update click Update. First of all, the compressed file is downloaded. Through
the progress bar, Panda GateDefender Performa informs you of the status of the download, specifying
the kilobytes downloaded and the total size of the download.
The console indicates if a system software update is available. The appliance can also send you an
email. If you want to receive an email notification when an update is available, click the link and
configure the target email account(s).
If the console and the appliance web server have problems establishing a connection,
after accepting the warning in the browser, Panda GateDefender Performa will open the
access page. In this case, access again and go to the System software update page. The
console will show the current status of the download and application of the update.
Hotfix management
Hotfixes are updates containing improvements and solutions to problems. Every month, a new hotfix
pack is published on our Web page. Follow these steps to open the published hotfxes:
1.
2.
3.
4.
5.
6.
7.
Go to the following page: http://www.pandasecurity.com/enterprise/support/
In the section Other corporate solutions select your version of Panda GateDefender Performa
from the drop-down menu and click Find.
From the first drop-down menu, select Solve incidents with the product, and from the
second, select Solve other incidents with the product. Click Find.
A list of incidents and hotfix packs available appears. You can use the drop-down menu to order
the list by date or number of visits.
Select the hotfix pack you require. Next, a page appears with detailed information on the
features of the hotfix pack and a download link. There are two options:
If the hotfix pack is in a compressed file (zip, or tgz), you can install it from the Panda
GateDefender Performa console, following the instructions given below.
If the hotfix pack is in an ISO image, follow the instructions given on the Web page.
If you have downloaded a hotfix pack in a zip or tgz file, follow these steps to install it from the Panda
GateDefender Performa console:
1.
In the Panda GateDefender Performa console, click Settings.
108
Panda GateDefender Performa-User Guide
2.
3.
4.
5.
6.
In the Update section, click Update settings.
In Hotfix management, click in the link here. Go the Hotfix management screen to see a
chronological list of hotfixes installed.
Click Browse and find the ZIP or TGZ file you have just downloaded.
Click Install hotfix.
Click Install now to start the process.
Once you have downloaded the hotfix, this will appear in the list which its details (Name, Description,
and Installation date).
The list of hotfixes installed is ordered in reverse chronlogical order.
Hotfix management
To uninstall the latest hotfixes installed, use the button Uninstall. Confirm the uninstallation, and
when you finish the hotfix will disappear from the list, which will now display the most recently installed
hotfix.
If the uninstallation process requires a restart, this will be indicated in the uninstallation confirmation
screen.
Error in the installation/uninstallation
If an error occurs when installing/uninstalling the hotfix, you can consult Panda Security's technical
services directly, as indicated in the error message, or try to install/uninstall the hotfix again from the
Hotfix management screen.
In the event that after uninstalling the hotfix you have to restart the computer, a message will be
displayed in the Hotfix uninstallation confirmation screen.
Domain users
Managing LDAP servers
If you are using LDAP, you can obtain a list of users or user groups to which you can apply a specific
security protocol in the configuration of protection profiles.
To do this, in the Settinings menu of the main window, select Domain users > LDAP sources.
LDAP servers
Follow these steps to add or modify LDAP servers:
Click on the Add button (if you want to enter an LDAP server) or Modify (if you want to modify one
that already exists). This takes you to theDefinitions: LDAP servers screen with the following
options:
•
Name: Descriptive name of the server.
109
Panda GateDefender Performa-User Guide
•
Server/IP: Server IP address.
You can enter the required data, or if you have specified it previously, select the server from
the list after clicking the icon
•
•
•
•
•
•
•
•
. Select the value you want from the drop-down menu.
BaseDN: Specify the base from which to look up information on the LDAP server.
Type of server: When you select one of the default types, the User and User groups fields are
automatically completed. If your server has a special characteristic, these data can also be
specified manually.
o Active Directory
o LDAP v3
Names of the attributes defined in the LDAP server: Complete or modify these fields to
establish a link between the names of the LDAP server attributes and those used by Panda
GateDefender Performa. The fields are the following:
o For the user: ObjectClass, User ID, Name, Email, Description.
o For the user group: Object, Class, Group ID, Member, Description.
Port: Port used to connect to the server. The default port is 389.
SSL connections.
Bind DN (optional): Specify the DN that enables the appliance to be identified to the LDAP
server. Only if the server requires authentication.
Password and Repeat password (optional): These fields enable you to enter the password
given for Bind DN.
Description (optional).
Management of servers with validation
Panda GateDefender Performa enables you to specify servers whose validation of users is made
through LDAP. In this way, you can obtain LDAP groups to which you can apply a specific security
protocol in the configuration of protection profiles.
To do this, in the Settings menu of the main window, select Domain users > User authentication.
Servers with validation
In the Servers with validation section, click on the Add button (if you want to enter a new address)
or Modify (if you want to modify one that already exists). This takes you to theDefinitions: Servers
with validation screen that displays the following options:
•
•
Name: Specify a name for the server.
Server IP address.
You can enter the required data, or if you have specified it previously, select the server from
the list after clicking the icon
•
•
•
. Select the value you want from the drop-down menu.
Protocol: Protocol operated by the server: HTTP, FTP, SMTP, POP3 or IMAP4.
LDAP servers: LDAP server to be validated. The drop-down menu contains the option localusers
for users specified internally in the appliance, plus the LDAP servers defined previously in the
Definitions: LDAP source management screen.
Description (optional).
110
Panda GateDefender Performa-User Guide
Agent to identify domain users
You can identify users in environments with Kerberos authentication using agents installed in the
domain controllers. You can also apply protection profiles to P2P/IM/VoIP protocol users in any type of
authenticated environment.
To enable the use of agents for identifying users in domain controllers, select the corresponding
checkbox. Then click Add and go to the Configuration of agent data screen, where you can enter
the following information:
•
•
•
Name
IP address of the domain controller
LDAP servers
The IP address of the domain controller may be among the IP addresses previously defined in the
Definitions: IP addresses screen. If so, click Address settings and select from the list of IP
addresses displayed.
Click Save and check that the agent configured appears correctly in the list in the section Agent for
identifying domain users.
Then enter the port, the time period during which the agent will be consulted (in seconds), and the
password.
Use the button Test connection with agents to check the connection with the agents configured.
The Verification of the connection with the agents screen displays a list of the agents configured
and the progress of the connection with each of them.
User management
This option of Panda GateDefender Performa enables you to create users and groups of
users to which you can apply a specific security protocol through configuration of protection profiles.
To do this, click the Settings menu in the main Console screen. Then select Domain users > Local
groups and users. Go to Definitions: User management.
Users
Follow these steps to add users:
1. In the Users section, click Add.
2. Give a descriptive name for the user, an email address to help identify the user, and the name of
the user you wish to add.
3. Enter a password and confirm it (optional).
4. If you have already created a group of users, this will appear in the Group box. You can add
users to these groups by ticking the relative boxes. This makes it easier to manage users.
5. You can also add a comment, if you want.
6. Click Add.
111
Panda GateDefender Performa-User Guide
You can modify the data entered, or delete a user whenever you want by clicking the corresponding
buttons.
If you want, you can use the Export option to save this data in a file.
You can import these files again later.
User groups
Follow these steps to add a user group:
1.
2.
3.
4.
5.
In the Panda GateDefender Performa console, click the Definitions > User management
menu.
In the Groups section, click Add.
Specify the name of the user group you wish to add. You can also add a descriptive comment, if
you wish.
If you have already added users, these will appear in the Local users frame. You can add them
to the group by ticking the relative boxes.
Click Add.
You can modify the data entered, or delete a user group whenever you want by clicking the
corresponding buttons.
If you want, you can use the Export option to save this data in a file. You can import these files again
later.
Definitions
Introduction
Panda GateDefender Performa makes it easy for you to access the definition of those elements most
relevant to the operation of the appliance. The options available are:
•
•
•
IP addresses
This enables you to specify IP addresses or ranges of IP addresses to which a specific security
protocol is to be applied through the configuration of protection profiles.
LDAP sources and server management.
This enables you to manage the list of LDAP servers that will later be used to obtain a list of
users, also other servers requiring validation. Next, you can apply the security policy as
required to these users through the configuration of protection profiles.
User management
This enables you to create and modify profiles for users and groups which can be used when
configuring various protections.
•
Domain management
This enables you to create and modify profiles for domains and groups which can be used
when configuring various protections.
112
Panda GateDefender Performa-User Guide
Managing IP addresses
This option of Panda GateDefender Performa enables you to specify the IP addresses
to which you can apply a specific security protocol through configuration of protection profiles.
To access theIP address management screen click in the Settings menu of the main console
window. Then select Definitions > IP address.
IP addresses
Follow these steps to add IP addresses:
1.
2.
3.
In the Addresses section, click Add.
Add a descriptive name and an IP address in the relative boxes. If you have already created a
group of IP addresses, you can add this IP address to the group by ticking the box next to it.
Click Add.
Groups of IP addresses
Follow these steps to add groups of IP addresses:
1.
2.
3.
4.
In the Panda GateDefender Performa console, click the Definitions > IP Addresses menu.
In the Groups section, click Add.
Specify a name for the group.
Add the IP addresses as required. You can add:
• Previously specified IP addresses.
• Other previously defined groups.
• Specific IP addresses and subnet masks in short format and short CIDR format
(xxx.xxx.xxx.xxx/yy).
yy is the number of bits in binary, starting from the left. For example: 24 = (11111111.
11111111. 11111111.00000000) = 255.255.255.0.
5.
6.
Click Add.
If you wish, you can add a descriptive comment in the field.
Click Add at the bottom of the page to save the changes.
You can modify or delete IP addresses and groups added whenever you want. All you have to do is
highlight the address or group from the list and click Modify or Delete.
If you want, you can use the Export option to save this data in a file. You can import these files again
later.
113
Panda GateDefender Performa-User Guide
Domain management
This option in Panda GateDefender Performa enables you to create domains, groups of domains or subdomains to which you can apply a specific security protocol through configuration of protection
profiles.
To go to this screen, click the Settings menu in the main Console screen. Then select Definitions >
Domains.
Domains
Follow these steps to add specific domains or groups of domains:
1.
2.
In the corresponding section (Domains or Groups) use the Add button.
Specify the domain or the group to be added.
•
•
3.
If it is a domain, specify which domain group you wish to add it to by marking the
relative box. A domain group must have been added previously before you can do this.
If it is a domain group, you can also specify additional domains that belong to the group,
separated by commas. In the case of sub-domains, you can use wildcards to define
them.In both cases you add a descriptive text.
Click Add.
You can modify the data entered, or delete a user whenever you want by clicking the corresponding
buttons.
If you want, you can use the Export option to save this data in a file. You can import these files again
later.
Warnings
Introduction
Panda GateDefender Performa will keep you informed about all the incidents detected. To do this, you
must configure the parameters of the warnings that must be sent via email to syslog servers or to
SNMP managers whenever an incident is logged and select the types of events you want to be
informed about.
•
•
•
Events to report settings. Lets you select which events will be reported via email, Syslog
and SNMP. It allows you to specify the language in which warnings will be received, the events to
report to the administrator or recipient of the message and the events for which replacement
texts will be available for the attached files deleted.
Email warnings settings. Lets you configure parameters related to warnings sent via email.
Allows you to Configure the periodic activity notification and Recipient mail account
details.
Syslog warnings settings. Lets you configure parameters related to warnings sent to a remote
Syslog server. Allows you to configure the name or IP address of the server, the port to which
the events will be sent and other options.
114
Panda GateDefender Performa-User Guide
•
•
SNMP warning settings. Lets you configure parameters related to warnings sent to
SNMP servers: the general SNMP v1/v2c settings and the communities.
Customize texts. You can choose to keep the default warning texts or to customize them.
Events to report settings
This feature lets you select the events that will be reported via email, SNMP and syslog.
Language
Use the drop-down menu to select the language in which all notifications will be received (to the
administrator, to the sender of the message and the replacement text for attached files deleted from
messages).
Notification to administrators
This allows you to customize the events to report and how notification will be sent (via SMTP, SNMP or
syslog):
•
SMTP, SNMP, syslog:
Various checkboxes can be enabled for each event.
Each checkbox enables an event with a type of notification (SMTP, SNMP, syslog). If the checkbox is
for a main group, click on it to select or clear all of the check boxes for the events in the group.
If the group checkbox is selected, and you clear a check box for one of the events in the group, it will
not be disabled unless all events are disabled.
If groups are partially selected, when opening the page, the groups will be expanded to show the
content and the group will be selected.
If the checkbox for all events is cleared, the check box for the group will also be cleared.
• Event:
Shows the name of the group or event. If it is a group, the name will be preceded by one of two
symbols.
This appears when the group branch is collapsed. If you click , the rows belonging to the group
1.
are expanded.
This appears when the group branch is expanded. If you click , the rows belonging to the group
2.
are collapsed.
To find out how to configure the syslog or SNMP notifications, refer to syslog warnings settings or
SNMP warnings settings.
Notification to sender
Panda GateDefender Performa allows you to send an email message to the sender with notification of
the event. As with the administrator notifications, there are events and main groups; groups made up
of events:
• SMTP:
115
Panda GateDefender Performa-User Guide
Notifications are sent to the sender’s email address. If the checkbox is for a main group, click on it to
select or clear all of the checkboxes for the events in the group.
If the group checkbox is selected, and you clear a checkbox for one of the events in the group, it will
not be disabled unless all events are disabled.
If groups are partially selected, when opening the page, the groups will be expanded to show the
content and the group will be selected.
If the checkbox for all events is cleared, the checkbox for the group will also be cleared.
• Event:
Shows the name of the group or event. If it is a group, the name will be preceded by one of two
symbols.
1.
This appears when the group branch is collapsed. If you click , the group is expanded.
This appears when the group branch is expanded. If you click , the rows belonging to the group
2.
are collapsed.
Text to replace deleted files
When Panda GateDefender Performa detects certain types of malware, it will delete them and replace
them with a text. Panda GateDefender Performa let you customize events:
• Email, HTTP/FTP:
Several checkboxes can be enabled for each event.
If the checkbox is for a main group, click on it to select or clear all of the check boxes for the events in
the group.
If the group checkbox is selected, and you clear a checkbox for one of the events in the group, it will
not be disabled unless all events are disabled.
If groups are partially selected, when opening the page, the groups will be expanded to show the
content and the group will be selected.
If the checkbox for all events is cleared, the checkbox for the group will also be cleared.
• Event:
Shows the name of the group or event. If it is a group, the name will be preceded by one of two
symbols.
This appears when the group branch is collapsed. If you click on it, the group is expanded.
1.
This appears when the group branch is expanded. If you click on it, the rows belonging to the
2.
group are collapsed.
Syslog warnings settings
The syslog utility allows you to export all errors that occur in the application, as well as
information about its status.
Network administrators can monitor different devices through the information sent by each one
through syslog.
To access the Warnings: Syslog warnings settings screen, click the Settings menu in the main
console window and select Warnings > Syslog warnings.
116
Panda GateDefender Performa-User Guide
Panda GateDefender Performa includes the option to report the log files to a remote server. To do this:
1.
2.
3.
4.
5.
6.
Select the Syslog Registry checkbox. If you clear the Syslog registry checkbox, Panda
GateDefender Performa will not send any type of message to the remote syslog.
Server: This informs the syslog server that it will receive notifications, using its IP address or
name.
Port to which events will be sent (port 514 by default). Panda GateDefender Performa uses UDP.
Facility (local0 to local7). The messages are sent to the remote server through one of the eight
facilities available. The facility must be the same in the Panda GateDefender Performa syslog and
in the remote syslog. The default value is local0.
Select the CSV format checkbox to use this format. Otherwise, the warning will be sent in plain
text.
Click OK to save the current settings.
If you clear the Syslog registry check box, Panda GateDefender Performa will not send
any type of message to the remote Syslog.
SNMP warnings settings
Panda GateDefender Performa lets you manage warnings through an SNMP manager. If
you use this type of tool on your network, you can conduct queries on the warnings generated by the
appliance, or receive this information directly in the SNMP manager (trap).
To access the Warnings: SNMP warnings settings screen, click the Settings menu in the main
console window and select Warnings > SNMP warnings.
Follow these steps to enable and configure SNMP warnings:
1. Select the SNMP agent checkbox.
2. Complete the fields Description, Location and Contact. The data entered here is not relevant
for the settings.
3. Click Add. You will see the Warnings: SNMP community screen.
4. In the Name field, enter the name of the SNMP manager community to use. This must be a
word (you can use alphanumeric characters) that matches the one entered in the SNMP manager.
Otherwise it won’t be possible to establish a communication between the appliance and the SNMP
manager.
5. Specify the IP address of the SNMP manager. If you are using multiple managers, enter their IP
addresses, separating them with commas.
6. To be able to conduct queries regarding the warnings sent, you must configure the ports the
appliance will receive the queries at. In the Query section, select the checkboxes of the two
available protocols (v1 and v2c) and enter the appropriate ports. These ports will remain open in
the appliance to receive the queries made from the SNMP manager.
7. For the appliance to send warnings to the SNMP manager (trap), indicate the SNMP manager
ports that warnings must be sent to. These ports must be open in the SNMP manager for
warnings to be sent correctly.
Email warnings
Email warnings settings
Allows you to configure preferences and the details of the destination email account.
117
Panda GateDefender Performa-User Guide
•
Recipient mail account details. Allows you to configure the address or addresses to which the
•
Periodic activity notification settings. Allows you to customize the intervals at which the
warning will be sent and the mail server to use.
notification summary will be received.
Recipient mail account details
•
•
•
•
•
Enter the details of the email account that warnings must be sent to:
Email address(es). Enter the email address of the person that you want to send the message
to. If the warning must be sent to more than one recipient enter the addresses separated by
commas. For example: administrator@organization.com, admin@organization.com,
systems@organization.com.
SMTP server Panda GateDefender Performa must use to send warnings.
Port through which communication must be established.
Requires authentication: If the SMTP server requires authentication, enable the
Requires
authentication checkbox and indicate the user name and password that are valid for the mail
server.
Use the following sender. Email address that will appear as the sender of the message.
Periodic activity notification
The periodic activity notification shows a summary of the scan, detection incidents and
system activity for the different types of protection. Each message includes all the detections since the
last time the periodic activity notification was sent.
For information on how to configure the notifications, click here.
The subject of the periodic activity notification is: Periodic activity notification.
The message body is divided into three parts: Header, security protection and system activity.
Header
The header of the warning summary message appears in the following format:
. Panda GateDefender Performa
Start: <Start date> End date: <End date>.
Panda GateDefender Performa identification
System version
Name: <name>
IP address: <IP address>.
Security protection
118
Panda GateDefender Performa-User Guide
It shows the following fields:
Anti-malware protection:
Files scanned
Detections in mail and news.
Detections in HTTP and FTP.
Evolution graph.
Content Filter protection:
Items scanned.
Filtering in mail and news.
Detections in HTTP and FTP.
Evolution graph.
For the anti-spam protection:
Files scanned
Spam messages.
Evolution graph.
For the Web filtering:
Pages scanned:
Restricted pages
Evolution graph.
IM/P2P/VoIP filter:
Restricted P2P protocols
Restricted IM protocols:
Evolution graph
All protection includes the View details link. Click it to access the details screen, with more detailed
information.
If a protection is not enabled or does not have a license, the content will be displayed in
gray to indicate that it is not available.
System activity
It shows the following fields:
o
System:
Active connections
Connections established
Failed connections
Evolution graph.
119
Panda GateDefender Performa-User Guide
o
Network cards (NIC1 and NIC2)
Inbound traffic.
Outbound traffic.
Evolution graph.
Periodic activity notification settings
The Periodic activity notification settings option allows you to customize the notification summary
interval.
For more information about the content of the periodic activity notification, click here.
Notification summary interval
Panda GateDefender Performa allows you to configure how often the notification summary will be sent.
The frequency can be daily, weekly or monthly.
1.
2.
Select
Send periodic notification summary to configure the frequency.
Select the frequency (daily, weekly or monthly) with which you want to receive the notification
summary.
• Daily. Will be sent at 00:00 h each day.
• Weekly Will be sent at 00:00 h every Monday.
• Monthly Will be sent at 00:00 h on the first of the month.
3.
Select the format of the numeric values of the warnings from the drop-down menu. The options
available are Percentage and Absolute:
Customizing the texts/pages
Customizing the texts
Panda GateDefender Performa allows you to customize the warnings and substitute
texts for the following events:
•
•
•
•
Detection of malware.
Detection of potentially dangerous file.
Items filtered by the Content Filter protection.
Item deleted because it could not be scanned.
To customize the texts click the Settings menu in the main console window, and select
Customization > Texts for substitute pages and warnings.
For each of the event above, you can edit the following texts:
120
Panda GateDefender Performa-User Guide
•
•
•
Sender: This option allows you to customize the message to send to the sender of the infected
email message. This field cannot be edited for the warnings sent for events related to files
downloaded from the Internet (HTTP) or to file transfers through FTP.
When you click this link you will see the Customize warning to the sender screen, where
you can define the text of the warning.
Substitute text: When Panda GateDefender Performa detects a malicious code, it will delete it
and replace it with a text. If you click this option, you can edit the text that will be inserted in the
email message, web page or file transferred through FTP.
When you click this link, you will see the Customize replacement text screen, where you
can enter the text to replace the infected item.
Administrator: This option allows you to customize the message to send to the administrator.
When you click this link you will see the Customize warning to the administrator screen,
where you can enter the text to be sent to the administrator.
Customization of the substitute HTTP/S page
Panda GateDefender Performa lets you customize the HTTP/S substitute page, that is,
the page displayed when the anti-malware, Content Filter or Web filter block suspicious content. You
can choose between several screens, adding the logo you want and customizing the text.
Click Settings in the main console window and select Customization > Substitute page for
HTTP/S.
Customizing the substitute page
1.
2.
Select the template you want from those offered by Panda GateDefender Performa.
Logo. Use the Import button to select the logo you want to use. If you use the Default image
button, the page will display the Panda Security logo.
Logo parameters:
jpg or png format
Maximum size: 250 x 100 pixels
3. Descriptive text. Enter the text you want in the dialog box. You can use text and html code.
To see an example of the substitute page, with a sample descriptive text, use the link
Substitute page preview.
4.
User profile information. Enable the checkbox if you want the page to display the protection
profile applied when the suspicious content was blocked.
Click Save.
121
Panda GateDefender Performa-User Guide
Quarantine
Introduction to quarantine
Panda GateDefender Performa has three quarantine areas:
•
Malware quarantine: This is a place for isolating suspicious files and malware that cannot be
disinfected at the time of detection. Panda GateDefender Performa will attempt to disinfect these
files after each update (if so indicated in the settings), although it is also possible to do this at
any other time using the Analyse quarantine button.
You can also send us these files to be analysed by our experts.
•
Content-filter quarantine: This is the place where all filtered items are sent (as long as this is
•
Spam Quarantine: Contains email messages that have been classified as, or are suspected to
indicated in the settings). It is advisable to review it periodically in order decide on the best way
of dealing with the items stored there. You can restore them, send them to another location,
delete them, etc.
be, spam. It is advisable to review the spam quarantine from time to time in order to take
pertinent decisions about these messages. You can restore them, redirect them to another
location, delete them, etc. You can also add the domains of senders you choose to the blacklist
and white list of the Anti-Spam module.
Malware quarantine
As long as it has been indicated in the anti-malware settings, Panda GateDefender
Performa will isolate all suspicious files and threats that cannot be disinfected at a given moment to
quarantine. Once stored, you can take a series of actions on the items.
Follow these steps to access malware quarantine:
1.
2.
Click the Quarantine menu in the main Console screen.
Select Malware quarantine.
Information about items in quarantine
Panda GateDefender Performa displays a table of items in quarantine, describing the following aspects:
• Entry date: Indicates when the item was included in quarantine for the first time.
• Last entry: Indicates when was the last time the item was included in quarantine.
• Item: Shows the name of the threat.
• Instances: Shows the number of times a threat has been detected.
• Only once: Item details.
• More than once: instance details.
• Reason: Gives details of why the file was included in quarantine. For example, because the file is
suspicious or cannot be disinfected.
• If the item has been sent for scanning, this will be indicated in the corresponding column along
with the date it was sent.
Click on the heading of each column to arrange the information they contain as you want.
122
Panda GateDefender Performa-User Guide
For much more detailed information, click on the + symbol appearing to the left of each item. You can
see the name and location of the detected file, the source and destination IP, etc.
Instance details
Malware quarantine shows the number of times each threat has been detected. If you want more
information about any of the items, select it and click on the number corresponding to it in the
Instances column.
A screen will appear with information about each detection:
•
•
•
•
The date when it was sent to quarantine.
The item included in quarantine.
The reason why it was included in quarantine.
The source (protocol) in which it was detected.
Exclusions, filter and options
•
•
•
Exclusions: Shows files that have been excluded from quarantine. For more information, consult
the Items excluded from quarantine section.
Filter: with the quarantine filter you can specify which information should be displayed in the list:
date entered, subject, source or target IP, etc.) For more information refer to the section
Malware quarantine filter.
Options: Lets you adjust the quarantine size using various settings. It also permits you to
indicate the number of lines in the list, how to behave towards restored messages, to send
suspicious files to be analyzed, etc. For more information, consult the section on Malware
quarantine settings .
Other options
•
•
•
If any of the items arrived via the SMTP protocol, you can return it to its original location. To do
this, select the item and click Restore.
If the items have arrived via the SMTP protocol, you can resend them to an email address using
the Redirect button. This permits you to review the content of the messages.
You can also delete the items you wish by clicking the corresponding button.
Possible actions in malware quarantine
You can take the following actions on items in quarantine:
• Download file: Permits downloading of a file, as long as it has been detected in the http-ftp
protocols.
• Scan quarantine: Only appears activated if automatic disinfection of quarantine is disabled. In
this case, if you wish you can scan all of the items in quarantine with the latest available file of
virus identifiers, by using the button available for the purpose.
• Sending of suspicious files: You can send suspicious files to be analyzed by experts, by
clicking the corresponding button. If any item selected exceeds the maximum permitted size, it
will not be sent.
• Exclude: With this button you can obtain better quarantine management, avoiding storage there
of already recognized malware, for example. For more information, consult the Items excluded
from quarantine section.
• Delete: Permits removal of items selected from the list. A pop-up window will ask for
confirmation.
• Empty quarantine: Deletes all items without having to select them previously.
123
Panda GateDefender Performa-User Guide
Malware quarantine settings
Malware quarantine settings allow you to:
•
•
•
•
•
Adjust its size.
Enable the sending of suspicious files for analysis by experts.
Specify the number of lines to display in the list.
Activate automatic analysis of items after each update.
Specify quarantine’s behavior on restoring items to their original location.
Follow these steps to go to the malware quarantine settings:
1.
2.
Click Quarantine in the console and then select Malware quarantine.
Click Settings in the quarantine window.
Let us now look at the settings options in more detail:
Size and time in quarantine
You can specify how quarantine behaves when its maximum capacity is exceeded. There are two
options:
1.
2.
Delete the oldest items: If you select this option, the oldest items will be deleted to free up
space and allow more recent items to be stored.
Reject new items: When it reaches its maximum size no more files will be included in
quarantine.
You can also set the maximum size of files to be sent to quarantine. In this way you will avoid
excessively large files being stored that may saturate quarantine. The maximum size of a file will not be
able to exceed 100 MB.
If a message is received with an attached file that cannot be included in quarantine because it exceeds
the maximum size setting, you can specify a warning message for such a circumstance.
Sending items for analysis
You can set quarantine so that it automatically sends files suspected of being infected, or those that
cannot be disinfected, to the laboratory, as long as their size is less than 10 MB.
General preferences
This section allows you to:
•
•
•
Limit the amount of information that will be shown in each quarantine page. To do this, enable
the Lines to display on each page box, and indicate the number of lines.
Activate automatic analysis of quarantine after each update.
Indicate if you want a copy of items that are restored to their original location to be stored in
quarantine. If you wish, you can include a text in the subject of the messages restored.
Once you have set the configuration you want, click Save.
Items excluded from quarantine
Quarantine exclusions allow it to be better managed, avoiding already recognized malware being stored
there, for example.
124
Panda GateDefender Performa-User Guide
In order to withdraw malware from quarantine you just have to check the checkboxes that correspond
to the items you want and click on the Exclude button.
You can see the items withdrawn from quarantine by clicking on the Exclusions link. If you want any
excluded item to return to quarantine if it is detected again in the future, click on Consider
dangerous.
Content Filter quarantine
As long as it has been indicated in the anti-malware settings, Panda GateDefender
Performa will isolate all suspicious files and threats that cannot be disinfected at a given moment to
quarantine. Once stored, you can take a series of actions on the items.
Follow these steps to access malware quarantine:
1.
Click the Quarantine menu in the main Console screen.
2.
Select Malware quarantine.
The window displayed shows a list of the items isolated in the Content Filter quarantine.
Information about items in quarantine
Panda GateDefender Performa displays a table of items in quarantine. The information is separated in
the following columns:
-
Date: Indicates when the item was included in quarantine.
-
Item: Shows the file name or the email subject.
-
Reason: Shows a short text indicating why it was included in quarantine (for example, because
it is a suspicious compressed file, etc.).
-
Source: Indicates in which protocol the item was detected: HTTP / FTP / SMTP / POP3 / IMAP4
/ NNTP.
Click on the heading of each column to arrange the information they contain as you want.
By clicking on the + symbol, appearing to the left of each of the items in quarantine, you will obtain
detailed information about them.
Filter and options
You can configure the listing using the following options:
Filter:You can specify the information to be shown in the listing, using various parameters (date of entry to
quarantine, subject, source or target IP address, etc.). For more information, consult the section on Content Filter
quarantine filter .
125
Panda GateDefender Performa-User Guide
Options:Lets you adjust the quarantine size using various settings. You will also be able to indicate the number of
lines in the list and how to behave towards restored messages. For more information, consult the section on Content
Filter quarantine settings.
Possible actions in content-filter quarantine
You can take the following actions on items in quarantine:
•
•
•
•
•
Download file: If the file has arrived via protocols http or ftp, you can use this button to
download it.
Restore: Allows you to return the selected items to their original location. This option is available
if the items arrived via the SMTP protocol.
Redirect. Allows the selected items to be sent to the email address indicated. For more
information, consult the section Resend Address.
Delete: Permits deletion of items selected from the list. A pop-up window will ask for
confirmation.
Clear quarantine: Deletes all items without having to select them previously.
Content Filter quarantine settings
Content Filter quarantine settings allow you to:
•
•
•
Adjust the size of the quarantine.
Specify the number of lines to display in the list.
Specify how quarantine operates on restoring items.
Follow these steps to go to Content Filter quarantine settings:
1.
2.
Click Quarantine in the Panda GateDefender Performa console and then select Content Filter
quarantine.
Click Settings in the quarantine window.
Let us now look at the settings options in more detail:
Size and time in quarantine
You can specify how quarantine behaves when its maximum capacity is exceeded. There are two
options:
•
•
Delete the oldest items: If you select this option, the oldest items will be deleted to free up
space and allow more recent items to be stored.
Reject new items: When it reaches its maximum size no more files will be included in
quarantine.
You can also set the maximum size of an item to be sent to quarantine. In this way you will avoid
excessively large items being stored that may saturate quarantine. The maximum size of an item will
not be able to exceed 20 MB. If you want, you can indicate an email address to which to redirect
messages that exceed this size.
Finally, if you wish, you can indicate the maximum number of days that items will remain in quarantine.
Once this period is reached, the items will be deleted.
126
Panda GateDefender Performa-User Guide
General preferences
This section allows you to:
• Limit the amount of information that will be shown in each quarantine page. To do this, enable
the Lines to display on each page box, and indicate the number of lines.
• Indicate if you want a copy of items that are restored to their original location to be stored in
quarantine. If you want, you can include a text in the subject of the messages restored.
Once you have set the configuration you want, click Save.
Spam quarantine
As long as it has been indicated in the anti-spam protection settings, Panda
GateDefender Performa will isolate all email messages classified as spam, or suspected of being so, to
quarantine. Once stored you can take a series of actions on quarantined messages.
Follow these steps to access spam quarantine:
1.
2.
Click the Quarantine menu in the main Console screen.
Select Spam quarantine.
The window displayed shows a list of the items isolated in spam quarantine.
Information about items in quarantine
Panda GateDefender Performa displays a table of items in quarantine. As well as showing the subjects,
senders and destinations of the messages, you can obtain information about the following aspects:
•
•
•
•
•
•
Date: Indicates when the item was included in quarantine.
Sender: The person that has sent the email message.
Recipient:: the recipient of the message.
Reason: Gives details of why the message was included in quarantine. This allows you to know
if the message was classified as spam, or as probable spam.
Subject: The subject of the message.
Source: Indicates the protocol in which the unwanted message was detected: SMTP / POP3 /
IMAP4.
Information about items in quarantine
•
•
•
•
•
•
•
Quarantine name: Indicates the name with which the item appears in the quarantine (it can be
the message subject, etc.).
Original name: Shows the name of the original file.
Reason: Gives details of why the item was included in quarantine. For example, because
disinfection was not possible, because it was possible spam, etc.
Probability of Spam: If it is an unwanted mail message, the information in thus column shows
the percentage of probability of being spam.
Spam engine: Shows the version of the anti-spam engine used.
Status: Shows the status of the item in question. For example, you can see if the item has been
sent to quarantine, if it is possible spam, etc.
Date: Indicates when the item was sent to quarantine.
127
Panda GateDefender Performa-User Guide
•
•
•
•
If the item has been sent to to be analyzed, it will show you the date when sent. Otherwise, you
will be able see its current status. For example, if it is pending being sent or it is not possible to
send it.
Source: Indicates the protocol in which the item was detected:
Source IP: Specifies the IP address from which the item was sent.
Target IP: Specifies the IP address to which the item was being sent.
In the case of an email, you can see the subject, sender and recipients of the message, as well as a
link to download the message. Click on the heading of each column to arrange the information they
contain as you want.
Filter and options
You can configure the listing using the following options:
•
•
Filter:This allows you to specify the information to be shown in the listing, using a range of
parameters. For example, you can indicate that you only want items shown that were included in
quarantine between two dates, messages with a certain subject, sender or destination, etc. For
more information, consult the section on Spam quarantine filter .
Options: Allows you to adjust the quarantine size using various settings. It also lets you indicate
the number of lines per page in the list and what to do with restored messages. For more
information, consult the section on Spam quarantine settings.
Possible actions in spam quarantine
You can perform the following actions from spam quarantine:
•
•
•
•
•
Add domain to:
o Blacklist: With this button you can add the domains of the messages selected to the
spam blacklist. In this way other messages coming from these domains will always be
treated as spam.
o White list: With this button you can add the domains of the messages selected to the
spam white list. In this way, messages coming from these domains will not be analyzed
for spam.
Restore: This allows you to return the selected messages to their original location, as long as
they have arrived by SMTP.
Redirect. Allows you to redirect the messages selected to a specific email address. For more
information, refer to the Resend address section.
Delete: Allows you to delete messages selected from the list.
Empty quarantine: Deletes all items without having to select them previously.
Spam quarantine settings
The spam quarantine settings allow you, among other things, to:
•
•
•
Adjust the size of the quarantine.
Limit the number of lines to display per page.
Specify its behavior on restoring files to their original location.
Follow these steps to go to spam quarantine settings:
128
Panda GateDefender Performa-User Guide
1.
2.
Click Quarantine in the Panda GateDefender Performa console and then select Content Filter
quarantine.
Click Settings in the quarantine window.
Let us now look at the settings options in more detail:
Size and time in quarantine
You can specify how quarantine behaves when its maximum capacity is exceeded. There are two
options:
•
•
Delete the oldest items: If you select this option, the oldest items will be deleted to free up
space and allow more recent items to be stored.
Reject new items: When it reaches its maximum size no more messages will be included in
quarantine.
You can also set the maximum size of a message to be sent to quarantine. In this way you will avoid
excessively large messages being stored that may saturate quarantine. The maximum size of a file will
not be able to exceed 20 MB. If you want, you can indicate an email address to which you want to
redirect the messages that exceed this size.
Finally, if you want, you can indicate the maximum number of days that messages will remain in
quarantine. Once this period is reached, the messages will be deleted.
General preferences
This section allows you to:
•
•
Limit the amount of information that will be shown in each quarantine page. To do this, enable
the Lines to display on each page box, and indicate the number of lines.
Indicate if you want a copy of messages that are restored to their original location to be stored in
quarantine. If you want, you can include a text in the subject of the messages restored.
Once you have set the configuration you want, click Save.
Quarantine filters
Introduction
Over time, the quarantine may come to show too much information, making it complicated to manage.
To make this task easier, Panda GateDefender Performa includes a filter with which you can specify
exactly what information you want to see.
To enable a filter
You can apply a filter to the information shown by quarantine, by following these steps:
1.
2.
3.
4.
5.
Select the Quarantine option from the menu on the left of the Web administration console.
Click on the quarantine for which you want to filter information (malware quarantine, Content
Filter quarantine or spam quarantine).
Click on the Filter link. Another window appears with the filtering options. For example, you can
indicate that you only want items shown that were included in quarantine between certain dates,
messages from a certain sender, etc.
Once you have indicated the options you want, click on Apply filter.
Click OK for quarantine start to show the information you have just specified.
129
Panda GateDefender Performa-User Guide
To disable a filter
1.
2.
3.
4.
5.
Select the Quarantine option from the menu on the left of the Web administration console.
Click on the quarantine for which you want to filter information (malware quarantine, spam
quarantine or Content Filter quarantine).
In the new window, click on the Filter link. Another window appears with the filtering options.
Click Disable filter.
Click OK for quarantine start to apply the new filtering settings.
Filtering settings
The filtering options are different for each type of quarantine. To obtain more information on the
available filtering options for each type of quarantine, refer to the following sections:
•
•
•
Malware quarantine filtering
Content Filter quarantine filtering
Spam quarantine filtering
Malware quarantine filtering
Panda GateDefender Performa permits filtering of the malware quarantine so that it only shows events
that meet the characteristics you specify. For example, you can indicate that you only want items
shown that were included in quarantine between certain dates, messages from a certain subject,
sender or recipient, etc.
You can perform filtering by one of the data items available or by a combination of a number of them.
Once you have configured the filter, click on Apply filter and then on OK.
< BACK
Content-filter quarantine filtering
Panda GateDefender Performa permits filtering of the content-filter quarantine so that it only shows
events that meet the characteristics you specify. For example, you can indicate that you only want
items shown that were included in quarantine between certain dates, messages from a certain subject,
sender or recipient, etc.
You can perform filtering by one of the data items available or by a combination of a number of them.
Once you have configured the filter as you wish, click on Apply filter and then on OK.
< BACK
Span quarantine filtering
Panda GateDefender Performa permits filtering of the spam quarantine so that it only shows events
that meet the characteristics you specify. For example, you can indicate that you only want items
shown that were included in quarantine between certain dates, messages from a certain subject,
sender or recipient, etc.
130
Panda GateDefender Performa-User Guide
You can also filter information on the basis of percentages of probability of spam in the messages in
quarantine. You can indicate the percentages interval desired in the fields for this purpose.
You can perform filtering by one of the data items available or by a combination of a number of them.
Once you have configured the filter as you wish, click on Apply filter and then on OK.
131
Panda GateDefender Performa-User Guide
Reports
Introduction
Panda GateDefender Performa generates a series of reports that contain the events related to the
scans and the activity of the appliance. These are:
Protection reports:
•
•
•
HTTP/HTTPS/FTP
Mail/News
IM/P2P/VoIP filter
Security reports:
•
•
Report on access restricted by the explicit proxy
Report on invalid SSL certificates
System report:
•
System events report
To view this report at any time, click the Reports menu and select the report.
As a general rule, these reports contain different options and can be exported to a text file. You can
also use filters to select the information displayed.
•
•
Access to the report settings options
Filtering the information logged in the reports.
To remove the content of the reports, use the Clear report button. If you want to arrange the data in
the columns, click on the column header. The columns that can be rearranged have an arrow icon to
the left of the column name.
Configuring and filtering reports
Report settings
The reports generated by Panda GateDefender Performa include a large amount of significant
information. However, you can filter the information that appears in the reports.
1.
2.
3.
Click the Reports menu in the main Console screen.
Select the report you want to consult.
In the following window, click Options.
132
Panda GateDefender Performa-User Guide
The options you can configure in the report are:
• Continue generating this report
If you don't want Panda GateDefender Performa to generate the report, unselect the corresponding
checkbox.
• Automatically delete events after XX days
Specify the period for which events should remain in the reports (90 days by default). Panda
GateDefender Performa will automatically delete events after this period.
Exporting the reports
You can save the information displayed in the report to a txt file. To do this, click on
the Export: csv link. The content of the report will be exported to .csv format
Filtering information in the reports
The information displayed in the report can be filtered. This means that Panda GateDefender Performa
allows you to configure the report to display only certain types of events, to display the incidents by
protocol, IP address, etc
Enabling the report filter
1.
2.
3.
Click the Reports menu and select the type of report you want to filter.
In the new window, select the corresponding option from the Filter period drop-down menu.
Set the filter you want. Use the Filtering conditions menu. Use the Add condition button to
add conditions, and click Filter.
When adding conditions, you can use wildcard characters to refine the search ("*", "?", etc)
133
Panda GateDefender Performa-User Guide
Filtering conditions according to the type of report
Protection report
Security report
System report
If you want to save the filter, use the Save button and enter the name of the filter in the textbox in
Filters stored. Then click Enter. To remove the data from the latest filter click Clean. In addition to
clearing the filter, a report will be generated without filters, corresponding to the filter period All.
Stored filters
Once certain filters have been stored, or you are using certain parameters to filter (even though they
have not been stored), Panda GateDefender Performa lets you take the following actions:
Delete the stored filter:
Once a filter has been stored you can delete it by clicking the 'x' to the right of the name of the filter.
Run the stored filter
If you want to run a stored filter, just click on the name in Filters stored.
Set a filter as default
134
Panda GateDefender Performa-User Guide
If you want to set one of the stored filters as default, i.e. you want a filter to be applied by default
when a report is opened, just click on the link “Preset”, which appears to the right of the filter name
when you pass the mouse pointer over it.
Bookmark a filter:
Another useful feature in Panda GateDefender Performa is the option to bookmark a filter. To do this
you must first have run a stored filter. This gives you quick access to the filter once it is stored. If the
filter is deleted however, when you try to access via the bookmark, you will open the reports without
applying the filter (or with the default filter if one has been set).
Considerations for the filters.
User and email address: users must be defined in LDAP or Kerberos.
Additional features in the report views
•
•
•
•
•
•
•
•
•
When viewing the reports you can, if you want just display the information that interests you. For
example, if in the protection report you only want to see the mail and news report, just click in
the title area of each report table.
To access the details of each report, just move the mouse pointer over it to see all the
information available for each event.
To highlight the type of protection that has generated the event, the rows are shaded according
to type (e.g. green - anti-malware, blue - Content Filter, red - anti-spam, brown - Web
filter). Above each table there are checkboxes for each of the protection types, by
selecting/clearing these boxes you can display the information for the protection you want. All
aree selected by default.
To highlight the lack of licenses for any type of protection, the corresponding checkbox will be
grayed out.
Use the drop-down menu to select the number of results to display per page, and the Back /
Next arrows to move from page to page.
The columns can be redimensioned and reordered.
You can select the columns you want to view, through a list of all the columns available with
checkboxes.
The information in the reports is not refreshed automatically. Users can refresh all the tables by
clicking F5 or the Refresh button.
The most recent status of the items viewed will always be saved: tables hidden or visible, number
of items displayed, protection displayed and columns displayed. For convenience, these
temporary settings are stored as cookies. This means different users can save their own
preferences.
Protection reports
Introduction
The protection reports offer data on malware and spam, the Content Filter events, and access to Web
pages and P2P, VoIP and IM protocols.
The reports include settings options and can also be exported to .csv format. Also, if you place the
cursor on a selected item, you will get specific information about the event in question.
135
Panda GateDefender Performa-User Guide
If you want, you can filter the information in the report. You can do this with a simple and easy-to-use
filter tool.
The protection reports are structured into four areas: the filtering tool and another three,
corresponding to HTTP/HTTPS/FTP, Mail/ News and IM/P2P/VoIP protocol filtering.
Protection report
This report offers data on malware and spam, the Content Filter events, and access to Web pages and
P2P, VoIP and IM protocols.
Viewing the malware detected
The information displayed in the report is structured into three areas:
• HTTP/HTTPS/FTP
• Mail/News
• IM/P2P/VoIP filter
HTTP/HTTPS/FTP
Use the
protection data you want displayed in the report.
boxes to select the
The report then displays the data organized into columns. You can select the columns to be displayed
in the report, using the drop-down menu
•
Detection source.
When malware has been detected in HTTP or FTP, the report specifies if it was uploaded or
downloaded.
136
Panda GateDefender Performa-User Guide
Mail/News
Use the
boxes to select the
protection data you want displayed in the report. If you select Highlight outbound mail, the lines
marked as SMTP Out will be highlighted in bold.
The report then displays the data organized into columns. You can select the columns to be displayed
in the report, using the drop-down menu Columns
-
Protocol
Protocol in which the malware was detected.
IM/P2P/VoIP filter
In this case, select the Columns to be displayed in the report.
Details of the detection
Place the cursor on the
icon to the left of each row to see the Details dialog box with extended
information about each event, which will be different depending on the type of detection.
You can use the report settings options through the Options drop-down menu. For more details about
these options, refer to the section Report settings.
If you want to delete the content of the report, use the option Clear report.
Security reports
Introduction
To access these reports, click the Reports menu in the main console menu, and then
select Security report.
137
Panda GateDefender Performa-User Guide
The reports include settings options and can also be exported to .csv format. Also, if you place the
cursor on a selected item, you will get specific information about the event in question.
If you want, you can filter the information in the report. You can do this with a simple and easy-to-use
filter tool.
In addition to the system and protection reports, Panda GateDefender Performa offers other reports on
access restricted by the explicit proxy and the use of invalid certification authorities and certificates for
HTTPS.
•
•
Report on access restricted by the explicit proxy
This shows authentication attempts restricted by the explicit proxy, because the user does not have
permission to access the proxy, authentication errors, etc.
Report on invalid SSL certificates
This shows access to HTTPS sites that have received invalid SSL certificates (expired, unknown
certification authority, invalid certificate name or certificates that don't coincide with the site).
Report on access restricted by the explicit proxy
This shows authentication attempts restricted by the explicit proxy, because the user does not have
permission to access the proxy, authentication errors, etc.
Viewing restricted access attempts
Once the filtering conditions have been established, click Filter. The report shows the data, grouped
into columns, that you have selected in the Columns menu:
Details of the detection
Place the cursor on the
icon to the left of each row to see the Details dialog box with extended
information about each event, which will be different depending on the type of detection.
You can use the report settings options through the Options drop-down menu. For more details about
these options, refer to the section Report settings.
If you want to delete the content of the report, use the option Clear report.
138
Panda GateDefender Performa-User Guide
Report on invalid SSL certificates
This shows access to HTTPS sites that have received invalid SSL certificates (expired, unknown
certification authority, invalid certificate name or certificates that don't coincide with the site).
Viewing HTTPS sites with invalid SSL certificates
Once the filtering conditions have been established, click Filter. The report shows the data, grouped
into columns, that you have selected in the Columns menu:
Details of the detection
Place the cursor on the
icon to the left of each row to see the Details dialog box with extended
information about each event, which will be different depending on the type of detection.
You can use the report settings options through the Options drop-down menu. For more details about
these options, refer to the section Report settings.
If you want to delete the content of the report, use the option Clear report.
System report
System report
Panda GateDefender Performa shows a detailed report on system events (updates,
restarts, etc.). In order to view this report, click the Reports – System report menu.
Viewing the events logged
Once the filtering conditions have been established, click Filter. The report shows the data, grouped
into columns, that you have selected in the Columns menu:
139
Panda GateDefender Performa-User Guide
Some of the events logged in this report are:
• Result of every update process.
• Update performed.
• Update errors, clearly specifying the cause of the error (for example: Could not connect to the
•
•
•
•
•
•
•
•
•
updates server; The updates server has returned an error; An error occurred during the
download process; An error occurred during the update process, etc.).
Error sending email warnings.
Appliance start up.
Problems starting the appliance (the problems and the actions taken to resolve them will be
specified).
Could not connect to the DNS server.
Problems connecting to the proxy server configured (for example, due to a validation error).
Could not connect to the license server.
The license server has returned an error.
Quarantine space about to be used up.
Quarantine space exceeded.
Details of the detection
Place the cursor on the [+] icon to the left of each row to see the Details dialog box with extended
information about each event, which will be different depending on the type of detection.
You can use the report settings options through the Options drop-down menu. For more details about
these options, refer to the section Report settings.
If you want to delete the content of the report, use the option Clear report.
140
Panda GateDefender Performa-User Guide
Tools
Introduction
Panda GateDefender Performa includes a series of useful tools to deal with situations in which the
appliance performance is less than optimum. Use the links below to find out more about them:
•
•
•
•
•
•
•
•
Diagnosis tools
Internal log files
Links to services
Export / Import settings
Sending statistics
Restarting the system services
Complete system restart
Shutting down the system
Diagnosis tools
Panda GateDefender Performa has a series of tools for diagnosing problems on the
appliance.
The options available are:
•
•
•
•
•
•
Ping
Traceroute
DNS resolution
Connectivity with Panda Security
Show network status
Packet capture
Ping
The tools screen has two parts: Tool and Result.
Tools
Settings options:
• Tool: Select Ping.
• Parameters
• Target addresses: Specify the target host.
• Number of pings to be sent. Specify the number of pings.
• TTL: Specify the TTL value.
• Types: Select the type of ping required, TCP, UDP or ICMP.
• If you want to launch the tool, click on Run.
Result
Displays the result obtained from running the tool. If you want to save the result in a file, click on
Export to file.
141
Panda GateDefender Performa-User Guide
Click on OK to return to the Support tools screen.
Traceroute
The tools screen has two parts: Tool and Result.
Tools
Settings options:
• Tool: Select Traceroute.
• Parameters
o Target addresses: Specify the target host.
o Number of pings to be sent. Specify the number of pings.
o TTL: Specify the TTL value.
o Types: Select the type of ping required, TCP, UDP or ICMP.
• If you want to launch the tool, click on Run.
Result
Displays the result obtained from running the tool. If you want to save the result in a file, click on
Export to file.
Click on OK to return to the Support tools screen.
DNS resolution
The tools screen has two parts: Tool and Result.
Tools
Settings options:
• Tool: Select DNS resolution.
• Parameters
• Address: Specify the address to be resolved. If an IP is entered, an inverse resolution will
be carried out.
• Request type: Select a value from the list: A, ANY, CNAME, NS, MX, PTR, SOA, TXT, LOC,
RP and SIG.
• Protocols: Select the type of connection required, TCP or UDP.
• Port: Specify the port. The default port is 53.
• Server: Specify the server.
• If you want to launch the tool, click on Run.
Result
Displays the result obtained from running the tool. If you want to save the result in a file, click on
Export to file.
Click on OK to return to the Support tools screen.
142
Panda GateDefender Performa-User Guide
Connectivity with Panda Security
Panda GateDefender Performa has to communicate with the following servers to operate correctly.
• System software update server
• License server
• Anti-malware update server
• Malware quarantine server
• Panda cloud scanning server
• Panda cloud data server
• Anti-spam update server
• Web filter data server
You can check that connectivity to these servers is running correctly through the Tools menu in the
console. To do this, follow these steps:
1.
2.
3.
4.
Go to Tools in the Panda GateDefender Performa console.
Click Diagnostic tools.
Select Connectivity with Panda Security from the drop-down menu.
Click Run.
In the Result field, check the connectivity for each of the servers.
You can save the results in a TXT file in your chosen route by clicking Export results.
Display system network status
You can check the status of the network by following these steps:
1. Go to the Tools menu in the Panda GateDefender Performa console.
2. Click on Diagnostic tools.
3. Select Display system network status from the drop-down menu.
4. Click on Run.
If you want to save the result in a text file, click on Export to file.
Packet capture
The Tools screen has two parts: Tool and Result.
Using this tool can negatively affect the performance of your appliance.
Tool
Settings:
1.
2.
Tool: Select Packet capture.
Parameters
- Type of capture: Select the type of capture: Maximum capture time, Maximum
capture size, Maximum packets for capture or Circular capture.
Circular capture consists of a buffer that allows the capture of the last megabytes transferred.
This can be specified in the Value field.
143
Panda GateDefender Performa-User Guide
Capture size is limited to 300 MB
- Value: Set the capture limit. This can be specified in seconds, megabytes or packets,
depending on the type of capture selected.
- Capture interface: Select the network interface on the appliance.
- Maximum packet size: Select one of these two options: Capture headings or
Complete traffic.
- Filter: Select filtering:
- Capture protocol traffic.
- Capture port traffic.
- Capture special traffic.
- Capture all traffic.
3.
4.
5.
6.
7.
8.
Protocols: This option appears after selecting the Capture protocol traffic filter. It establishes
the protocol to be used in the filter.
Ports: This option is displayed when the Capture port traffic filter is selected. Establish the
ports to be used in filtering. A range can be chosen by specifying two ports separated by a
hyphen.
Source IP: Specify the source IP.
Target IP: Specify the target IP.
If you want to launch the tool, click Run.
If you want to stop the capture, click Stop capture.
Result
Displays the result obtained from running the tool. If you want to save the result in a file, click Export
to file.
Click OK to return to the Support tools screen.
Internal log files
The internal log files allow you to carry out an advanced diagnosis in order to resolve
problems.
These files may be requested by tech support services when resolving an incident. It is
not advisable to generate these files, unless you are asked to do so by Panda Security
technicians.
To generate log files, select the level of detail that the technicians have specified:
1. In the Tools menu of the console, select Internal log files.
2. Select the log generation mode:
144
Panda GateDefender Performa-User Guide
•
•
Basic mode. Select this option if you want to record basic level information in
the log files.
Debug mode. Select this option if you want to a greater level of detail in the
information in the log files.
4.
Select the level of debugging:
• Standard. Level of detail necessary for most cases.
• Advanced. Lets you control the type of information you want to collect.
Enable the checkboxes according to the options you want.
5.
Select the level of detail you want.
To download the log files onto your computer, click Download logs.
6.
Click Save to save the changes. Otherwise, click Cancel.
Online services
The services provide help and benefits in addition to those offered by the unit.
Thanks to these services, you will always have a team of experts on hand that will help you to resolve
any queries and problems you might have with viruses and other threats.
The services offered by Panda GateDefender Performa are:
•
•
•
•
•
•
Online Support Center: A fast, simple way to find answers to your queries.
Virus encyclopaedia: Detailed and accurate information about the characteristics of each virus
and how to eliminate it.
Virus news: The latest virus news.
Virus Infection Map: Live graphic coverage of the percentage of computers infected by viruses
worldwide.
Suggestion box: Allows you to inform Panda Security of the improvements you would make to
Panda GateDefender Performa. Your suggestions will be thoroughly studied by the Panda
Security technicians.
Global ThreatWatch: Check out the current virus situation, and find out if there are alerts
anywhere in the world or in your country.
In order to use these services, you need an open connection to the Internet.
Exporting/importing the settings
Once the appliance has been correctly configured and is working properly, you can save
the settings parameters.
It is useful to do this as:
• You can recover them (import them) later.
145
Panda GateDefender Performa-User Guide
•
You can apply the same settings to another unit without needing to do so manually.
Exporting the current settings
In order to export the settings, follow the steps below:
1. Click on the Export button.
2. In the window that opens, click on the Settings link.
3. Select the folder where you want save the settings file.
4. Click on the Export button.
When this process is complete, the system will generate a file with the current settings, except for the
user name and password for accessing the console.
Importing settings
When importing a settings file from another unit, remember that the name and network
settings of the appliance must be unique. Therefore, these details must be modified if
another unit is using them.
To import or restore settings that you have previously saved, follow the steps below:
1.
2.
3.
4.
Click on Browse...
Find the settings file that you want to install and click on OK.
Then click on Import.
If no warning messages are returned, the appliance will have applied the new settings. If a
warning appears, you will be informed of the problem and the steps for resolving it.
Sending statistics
Select:
1.
2.
Allow information about malware and other threats to be sent if you want to authorize
sending of information about malware and other threats detected by your appliance.
Send information about spam detected if you want to authorize sending of information
about detected by your appliance.
In this way you will be helping improve the detection capacity of Panda GateDefender Performa. The
information is sent anonymously, with no data identifying your company.
3.
Click Save.
Statistics are sent via https, and so all data will be encrypted.
146
Panda GateDefender Performa-User Guide
Restarting the system services
Restarting the system services can be useful as an initial means for resolving
functionality issues in Panda GateDefender Performa.
The system services can be restarted in two ways:
• Click Restart services in the Tools menu.
• If the appliance has an LCD screen use the Reset Services option.
Panda GateDefender Performa will perform a clean restart of all services without completely restarting
the appliance.
This process is much quicker than completely restarting the system. However, while it is in progress,
the network traffic will be blocked in order to guarantee that no traffic goes through Panda
GateDefender Performa without being scanned.
While Panda GateDefender Performa is restarting the services and the network traffic is blocked, the
console informs you of the status of the appliance.
When the restart is complete, you will see the screen for logging in to the console. If this
doesn't happen after a few minutes, open another window in the browser, and connect again to
Panda GateDefender Performa.
Complete system restart
Restarting the system ensures, in the vast majority of cases, that any possible problems
detected while the unit is running are resolved.
The system can be restarted in two ways:
•
•
Click Restart System in the Tools menu.
If the appliance has an LCD screen use the Reset System option. More information
When the system is restarted:
•
•
•
Panda GateDefender Performa will run a clean restart: It closes all operating system processes
and services in order to avoid problems like corrupting the file system.
If the appliance has a bypass card, network traffic will not be blocked, but will pass through
without being scanned. If the appliance does not have a bypass card, the network traffic will be
blocked to guarantee that no traffic passes through without being scanned. Under no
circumstances will traffic be allowed through until the system has restarted and the appliance is
fully operative. This takes approximately 90 seconds.
The system restart and its result are logged in the system events report.
In order to check if the system has completely restarted, the administrator can check the following:
147
Panda GateDefender Performa-User Guide
•
•
•
•
The Web console displays a warning while the computer is restarting. If the console access
window does not appear within a few minutes, you must open another browser window and
connect to the appliance again.
Ping the appliance network IP address. When restart has been completed successfully, the IP
address must respond to the ping commands.
Ping a computer connected to the other side of the appliance. Panda GateDefender Performa will
not allow traffic through until it has been started completely. Then, if you get a reply to the ping,
the system has restarted successfully.
Check that the LED display in the appliance is on. This means that restart is complete.
Shutting down the system
Panda GateDefender Performa lets you shut the system down correctly, blocking all
network traffic. If the appliance has a bypass card, the traffic won't be blocked,
The system can be correctly shut down in two ways:
•
Click the Shut down system button in the Tools menu.
A pop-up window will ask for confirmation.
• If the appliance has an LCD screen use the Shutdown option.
Panda GateDefender Performa 9100: It is advisable to completely shut down
the appliance. To do this, press the switch. It will completely shut down after a few
seconds. To restart the appliance, press the switch and wait a few seconds.
Panda GateDefender Performa 9500: It is advisable to completely shut down the
appliance. To do this, disconnect the network cables. To restart the appliance,
reconnect the network cables.
Note: Network traffic through Panda GateDefender Performa will be blocked once the system
has shutdown.
148
Panda GateDefender Performa-User Guide
How do I...
Activating Panda GateDefender Performa
1.
2.
Click My license, next to the system clock.
In the window that appears, click
Registration/activation details.
on
the
link
(here)
that
appears
under
3.
3.
4.
A new window appears: Enter theuser name and password provided by Panda Security.
Click Save. Panda GateDefender Performa will contact the Panda Security server to get license
information (wait 10 seconds before consulting the information). If an error occurs, a message
will be displayed.
More information.
How do I know when my license expires?
In order to check the status of licenses:
1. Select the Status option in the menu on the left of the administration console.
In the System status section, click on License management that appears with the option Updates
and services expire.
2. A new window opens that shows the status of the licenses you have contracted (expiry date and
days left).
149
Panda GateDefender Performa-User Guide
How do I update the product?
There are three types of updates:
•
•
•
Update the signature files, malware, spam and web filtering files.
System software upgrade (firmware): for example, the operating system, the hardware
drivers, the web server used to view the administration console, etc. or the malware and spam
scan and detection engines.
Hotfix update. Hotfix updates allow users to include performance improvements and solve
specific problems.
How do I modify the warning messages?
In order to modify the warning messages sent by Panda GateDefender Performa:
1. Select the Warnings option in the menu on the left of the administration console.
2. Configure the events to report.
3. Configure the recipient's mail account.
4. Configure the customizing texts.
Enabling and disabling report generation
Panda GateDefender Performa generates detailed reports on malware , Content Filter, spam , web
filtering and system events.
However, for Panda GateDefender Performa to generate these reports, they must be enabled. To
enable and disable reports follow the steps below:
1. Click the Reports menu in the console.
2. Click on the report you want to enable or disable.
3. Click on Settings in the pop-up window displayed.
4. Enable or disable the Continue generating this report checkbox.
Installing several units in load balancing mode
1.
2.
3.
4.
Assign a unique configuration IP address to each unit.
Assign a unique network IP address to each unit.
Place the units between two switches. An appliance network interface card must be connected to
each switch.
Now connect the switches to the rest of the network.
150
Panda GateDefender Performa-User Guide
For information about the factory settings, click here.
To install these units in load balancing mode, it is advisable to:
• Use switches instead of hubs. This reduces the number of collisions and increases performance.
• Use Ethernet Gigabit connections only if the unit supports them.
• Check that the appliance network interface cards are working in full-duplex mode .
All of the different types of protection must have the same settings in all the units working in
load balancing mode. The network settings (name, IP address, etc.) must be different.
In order to guarantee the correct operation of several units working in load balancing, all
of the different types of protection must have the same settings in all of them. The network
settings (name, IP address, etc.) must be different.
Exporting/importing the settings
Once the appliance has been correctly configured and is working properly, you can save
the settings parameters.
It is useful to do this as:
• You can recover them (import them) later.
• You can apply the same settings to another unit without needing to do so manually.
Exporting the current settings
In order to export the settings, follow the steps below:
1. Click on the Export button.
2. In the window that opens, click on the Settings link.
3. Select the folder where you want save the settings file.
4. Click on the Export button.
When this process is complete, the system will generate a file with the current settings, except for the
user name and password for accessing the console.
151
Panda GateDefender Performa-User Guide
Importing settings
When importing a settings file from another unit, remember that the name and network
settings of the appliance must be unique. Therefore, these details must be modified if
another unit is using them.
To import or restore settings that you have previously saved, follow the steps below:
1. Click on Browse...
2. Find the settings file that you want to install and click on OK.
3. Then click on Import.
4. If no warning messages are returned, the appliance will have applied the new settings. If a
warning appears, you will be informed of the problem and the steps for resolving it.
Trusted sites and domains settings in the anti-malware
protection
To access the trusted sites and domains settings, click the Settings menu in the main
console, an in Protection > Anti-malware select Trusted sites and domains.
Sometimes, the traffic sent from certain servers, computers or domains is reliable enough to be
excluded from the scans.
By excluding this traffic from the anti-malware scans, the workload of Panda GateDefender Performa is
reduced and its performance is optimized.
You can create a list of servers, websites, domains, subdomains, IP addresses and ranges that will be
excluded from the list. This action will apply to all protocols. To do this:
1. Click the Settings menu in the main Console screen.
2. Go to Protection > Anti-malware and click Trusted sites and domains
3. This shows the trusted sites and domains configured to date. To add a new domain, subdomain,
range, etc, include it in the New box and click Add. In the case of IP addresses, you can use the
CIDR format, and for sub-domains, you can use wildcards.
4. The updated list will be displayed in the box. To delete any item, select it and click Delete.
After you have completed these steps, Panda GateDefender Performa will not scan traffic from those
domains, servers or computers for malware.
The correct format for entering a trusted site or domain
•
•
For websites: enter the full URL (for example, mail.pandasoftware.com), or the IP address (for
example, 192.168.1.200 ).
For domains or sub-domains: enter an asterisk (for example: *.subdomain.domain.com or
*.domain.com, etc). You can also enter an asterisk after the final dot of the domain (for example:
www.domain.*).
Bear in mind that it is not possible to use more than asterisk (for example: *.domain.*)
152
Panda GateDefender Performa-User Guide
If you do not want to enter sub-domains, you do not need to use the asterisk (for example,
domain.com).
Restoring the initial values for signing in to the Web
console.
The option for restoring the initial values for signing in to the Web console allow the user to restore the
factory settings of the configuration IP address, the user name and password for the console.
Follow the steps below for the appliance model you have:
•
1.
2.
Panda GateDefender Performa SB:
Find the F/D button at the back of the appliance.
Hold this button down for a few seconds. The unit restores the factory settings for accessing the
Web console.
Don’t confuse the F/D button with the Reset (system) button, which resets the whole
system.
•
1.
2.
Panda GateDefender Performa 9100 and 9500:
SB, 9100 and 9500 models have a CD drive.
Find the Reset button at the back of the appliance.
Hold this button down for a few seconds. The unit restores the factory settings for accessing the
Web console.
In order to view the factory settings of Panda GateDefender Performa click here .
Restoring the appliance
In the event of serious system errors, you may have to restore the appliance.
There are three methods for restoring the appliance which should be used in the following cases:
1.
Rescovery via CD
This can be used to restore any appliances with CD or DVD drives.
2.
Recovery with a USB device
This can be used to restore any appliances with USB ports and without CD or DVD drives.
3.
Restoring via Live DVD
This can be used to restore any appliances without USB ports and without CD or DVD drives.
Rescovery via CD
The restore CD included with the Panda GateDefender Performa appliance allows you to restore the
system if errors occur.
153
Panda GateDefender Performa-User Guide
It is important to bear in mind that this method for restoring Panda GateDefender
Performa must only be used as a last resort to solve possible errors. Never use the self-restore
CD if you have not been advised to do so by Panda Security’s technical support team.
To restore the system, follow the steps below:
1.
2.
3.
4.
5.
6.
7.
8.
Export the current settings of the appliance to a file. Click here for instructions on how to do this.
Connect to http://www.pandasecurity.com/enterprise/downloads/tree/
Enter the user name and password of your license.
Go to the section “Downloads available…”
In the section “Software available para Panda GateDefender Performa” > Restore CD, download
the ISO for recovery via CD of the latest version available for the SUN platform.
Insert the CD in the CD drive.
Switch off the Panda GateDefender Performa appliance.
Start the appliance The restore process will automatically start and the appliance software will be
reinstalled.
Do not shut down the system while the appliance is working, other the entire system will be
corrupted. The recovery process must not be interrupted once it has started.
Panda GateDefender Performa will display the factory settings. Import the settings file that you have
just exported to apply the settings defined before restoring the appliance. Click here for instructions
on how to do this.
Restoring using the Live DVD
The LiveDVD recovery system is based on a self-executable DVD, which from a computer in the same
network as the appliance, working as an update server, will send the software needed to establish
restore. Having received the necessary software, users can start restoring the system from the
computer.
Restoring Panda GateDefender Performa should always be considered as a last resort. Never
use the self-restore DVD if you have not been advised to do so by Panda Security’s technical
support team.
Requirements for running Live DVD
• Intel Pentium IV Processor, or similar.
• 256 MB RAM.
• DVD drive.
Before starting the process, connect the server and the appliance in a local network using an Ethernet
cable (in the appliance, the cable should be connected to the interface to labeled RES).
Using the Live DVD
In order to use Live DVD, follow the steps below:
154
Panda GateDefender Performa-User Guide
1.
2.
3.
4.
5.
6.
7.
8.
9.
Connect to http://www.pandasecurity.com/enterprise/downloads/tree/
Enter the user name and password of your license.
Go to the section “Downloads available…”
In the section “Software available for Panda GateDefender Performa” > Restore DVD, download
the ISO for recovery via LiveDVD of the latest version available for the 8000 series and SB.
Export the current settings of Panda GateDefender Performa to a file.
Insert the LiveDVD in the computer and restart it. Live DVD will start, showing the restore
interface.
Restart the Panda GateDefender Performa appliance.
The computer will send and install the software needed for recovery. When this has been done,
the Start restore button is activated, which you must press to start the process.
The appliance will send the information about this process to the computer.
When this process is complete, the following text is displayed in the computer:
Remote host restoration completed
Click OK to restart the appliance from the hard disk.
Do not shut down the system while the appliance is working, other the entire system will be
corrupted. The recovery process must not be interrupted once it has started.
Panda GateDefender Performa will display the factory settings. Import the settings file that you have
just exported to apply the settings defined before restoring the appliance.
For more information about the restore process, for example, the minimum
requirements for the restore server, refer to the restore guide available in the downloads
area of the website www.pandasecurity.com/enterprise/downloads/.
Recovery with a USB device
To restore the appliance using a USB device, you must first have created a USB installer. Then, follow
the steps below:
1. Export the current settings of the appliance to a file. Click here for instructions on how to do this.
2. Insert the USB device in one of the appliance ports.
3. To continue with the process, connect a screen to the VGA socket in the appliance.
4. Also, connect a keyboard.
5. Restart the appliance (click here for information about the process of restarting the system).
Once the restart is complete, the restore process will start. When it has finished, you will see the
following notice:
155
Panda GateDefender Performa-User Guide
6.
7.
To complete the restore process, press ENTER and remove the USB device.
The system will restart and the restored software will start. All of the settings will be lost and the
factory settings will be displayed. Import the settings file that you have just exported to apply the
settings defined before restoring the appliance. Click here for instructions on how to do this.
The LCD screen: definition and use
This section explains the LCD screen and how to use it.
The Panda GateDefender Performa SB and Panda GateDefender Performa 9100 and 9500
models do not have an LCD screen.
Specifications of the interface behavior
The following characters appear at the start of each line in a menu:
To access a submenu, press Enter.
Specifies that you are in a submenu and that you can exit to the main menu. To do this, press ESC.
When in a submenu, the last character of the first line shows one of the following characters:
Press the downward arrow to move to a lower option.
You can press any of the arrows to go up to the previous option or go on to the next option.
Press the upward arrow to move to a higher option.
The appliance LCD screen shows the following:
156
Panda GateDefender Performa-User Guide
•
•
•
•
•
•
•
•
•
Status. Possible values are:
Running - OK: The appliance is functioning correctly.
Starting: The appliance is starting.
Closing: The appliance is closing.
Restarting: The appliance is re-starting.
You may shutdown: The system has closed but the power source is still on.
CPU use: Shows the load of the appliance.
Configuration. Shows information about the appliance settings.
• Config IP: IP address used to access the console.
• Network IP: Shows the network IP of the appliance.
• Cluster mode Master / Slave: Shows the role of the appliance (Master or Slave).
Version info: Shows the version of the appliance system software.
Serial number: Shows the serial number of the appliance.
Reset access: Allows you to reset the appliance access details (user name, password and IP
address). To confirm, press ENTER. To cancel, press ESC.
Reset Services: Lets you completely restart the services. To confirm, press ENTER. To cancel,
press ESC.
Reset System: Allows you to restart the appliance. To confirm, press ENTER. To cancel, press
ESC.
Shutdown: Allows you to shut down the appliance hardware. To confirm, press ENTER. To
cancel, press ESC.
•
•
•
•
•
Configuring internal networks
1.
In the Settings menu, select Internal networks.
You will see the following screen.
157
Panda GateDefender Performa-User Guide
2.
Add the IP address ranges of your internal network (protected by Panda GateDefender Performa).
Example 1: If you have just one internal network with IP addresses in the range
192.168.1.0/24, enter this on the page.
Example 2: If you want to protect two internal networks, such as 172.16.1.0/24 and
3.
172.16.2.0/24, include both ranges.
Click Save.
Configuring internal domains
1.
In the Settings menu, select Internal domains.
You will see the following screen.
2.
Add the domains used on your internal network (protected by Panda GateDefender Performa).
Example 1: If you have a single domain 'company.com' include it on this page. Users of the
protected internal network will have email addresses with the format user@company.com.
Example 2: If you have several domains (company.com, company.net, company.biz), add
3.
them all.
Click Save.
Using the basic anti-spam settings
1.
2.
In the Settings menu, select Anti-spam protection settings
Select the Enable anti-spam protection checkbox for the following protocols
•
Protocol:
•
Select the SMTP checkbox
158
Panda GateDefender Performa-User Guide
•
•
•
•
Sensitivity level:
•
•
3.
Select High
Action to take on spam messages:
•
•
•
•
Select traffic to scan: Inbound, Outbound, or Inbound and Outbound
Select the POP3 checkbox
Select the IMAP4 checkbox
Select Delete
Select Insert the following text in the subject
Leave the default text or enter your own text
Action to take on messages classified as probable spam :
•
•
•
Select Send to quarantine
Select Insert the following text in the subject
Leave the default text or enter your own text
Click Save.
Using the advanced anti-spam settings
1.
2.
In the Settings menu, select Anti-spam protection settings
Click To configure the advanced settings, click here.
You will see the advanced settings page.
Response to the sender in the event of blocked SMTP messages:
- Select the Reject message during connection checkbox
- Select the response code 554 Spam detected
Detection based on DNSBLs
- Select the Activar la detección basada en DNSBLs checkbox
- Select Delete
- Select the Enable use of DNSBLs recommended by Panda Security checkbox
- Select the Enable use of additional DNSBLs checkbox
159
Panda GateDefender Performa-User Guide
Click the existing link. You will see the screen for configuring additional DNSBL servers.
- Select the checkbox that enables zen.spamhaus.org
- Click Save.
Anti-backscatter protection:
- Select the Enable anti-backscatter protection checkbox
- Select the action Delete
- Select Enable BATV
SMTP relay server protection
- Select the Enable SMTP Relay server protection checkbox
- Click Save (in Advanced settings)
- Click Save (in the anti-spam settings page)
160
Panda GateDefender Performa-User Guide