Allo.com UTM User manual

UTM User Manual
www.allo.com Version 2.0 1

UTM User Manual
www.allo.com Version 2.0 2
Copy Right
Copyright © 2014 Allo. All rights reserved.
No part of this publication may be copied, distributed, transmitted, transcribed, stored in a
retrieval system, or translated into any human or computer language without the prior written
permission of Allo.com. This document has been prepared for use by professional and properly
trained personnel, and the customer assumes full responsibility when using it.
Proprietary Rights
The information in this document is Confidential to Allo and is legally privileged. The information
and this document are intended solely for the addressee. Use of this document by anyone else
for any other purpose is unauthorized. If you are not the intended recipient, any disclosure,
copying, or distribution of this information is prohibited and unlawful.
Disclaimer
Information in this document is subject to change without notice and should not be construed as
a commitment on the part of allo.com. And does not assume any responsibility or make any
warranty against errors. It may appear in this document and disclaims any implied warranty of
merchantability or fitness for a particular purpose.

UTM User Manual
www.allo.com Version 2.0 3
About this manual
This manual describes the allo product application and explains how to work and use it major
features. It serves as a means to describe the user interface and how to use it to accomplish
common tasks. This manual also describes the underlying assumptions and users make the
underlying data model.
Document Conventions
In this manual, certain words are represented in different fonts, typefaces, sizes, and weights.
This highlighting is systematic; different words are represented in the same style to indicate
their inclusion in a specific category. Additionally, this document has different strategies to draw
User attention to certain pieces of information. In order of how critical the information is to your
system, these items are marked as a note, tip, important, caution, or warning.
Icon
Purpose
Note
Tip/Best Practice
Important
Caution
Warning
Bold indicates the name of the menu items, options, dialog boxes, windows and
functions.
The color blue with underline is used to indicate cross-references and hyperlinks.
Numbered Paragraphs - Numbered paragraphs are used to indicate tasks that need to be
carried out. Text in paragraphs without numbering represents ordinary information.
The Courier font indicates a command sequence, file type, URL, Folder/File name e.g.
www.allo.com
Support Information
Every effort has been made to ensure the accuracy of the document. If you have comments,
questions, or ideas regarding the document contact online support: http://support.allo.com

UTM User Manual
www.allo.com Version 2.0 4
Table of Contents
About this manual .........................................................................................................................3
Document Conventions.................................................................................................................3
Support Information......................................................................................................................3
1. Introduction ......................................................................................................................... 8
1.1 Overview .................................................................................................................................8
1.2 Technical Specifications ..........................................................................................................9
1.3 Equipment Structure.............................................................................................................10
1.3.1 UTM Rear View...............................................................................................................10
1.3.2 UTM Front View..............................................................................................................10
1.4 Initial Setup & Configuration.................................................................................................11
1.4.1 Connecting the Hardware ..................................................................................................11
1.4.2 Network Deployment.........................................................................................................12
1.4.3 Connect UTM Firewall........................................................................................................13
2. Dashboard.......................................................................................................................... 14
3. Device Settings ................................................................................................................... 15
3.1 Host Config ............................................................................................................................15
3.2 Admin User............................................................................................................................15
3.3 SSH.........................................................................................................................................16
3.4 Web User Interface ...............................................................................................................16
3.5 Time.......................................................................................................................................17
3.6SNMP......................................................................................................................................18
3.7 Certificates ............................................................................................................................19
3.7.1Built-in certificates...........................................................................................................19
3.7.2 Local Certificates ................................................................................................................20
3.8 Logging ..................................................................................................................................21
3.9 Maintenance .........................................................................................................................21
3.9.1 Administration................................................................................................................21
3.9.2 Firmware.........................................................................................................................22
4. Network Settings ................................................................................................................ 23
4.1 Interfaces...............................................................................................................................23

UTM User Manual
www.allo.com Version 2.0 5
4.2 Virtual IPS ..............................................................................................................................23
4.3 VLAN Config...........................................................................................................................24
4.4 Zones .....................................................................................................................................25
4.5 WAN Load Balancing .............................................................................................................26
4.6 Routing ..................................................................................................................................27
4.6.1 Static Routes...................................................................................................................27
4.7 DNS........................................................................................................................................28
4.8 DHCP Server ..........................................................................................................................28
4.9 Dynamic DNS.........................................................................................................................30
4.10 PPPoE Profiles .....................................................................................................................31
5. Policy Objects ..................................................................................................................... 32
5.1 Address Groups .....................................................................................................................32
5.2 Address objects .....................................................................................................................33
5.3 Service Groups.......................................................................................................................35
5.4 Service objects.......................................................................................................................36
5.5 Web Filter objects .................................................................................................................37
6. Policies............................................................................................................................... 39
6.1 Firewall ..................................................................................................................................39
6.1.1 Firewall Settings..............................................................................................................39
6.1.2 Firewall Policies ..............................................................................................................40
6.1.3 User Policies....................................................................................................................45
6.1.4 Management Access.......................................................................................................46
6.1.5 Bandwidth control..........................................................................................................47
6.1.6 Port Forwarding/Destination NAT..................................................................................50
6.1.7 Source NAT .....................................................................................................................51
6.1.8 Static NAT .......................................................................................................................52
6.1.9 QOS Settings ...................................................................................................................53
6.2 IPS..........................................................................................................................................53
6.2.1 IPS Settings .....................................................................................................................54
6.2.2 Signature Settings...........................................................................................................55
6.2.3 Custom Signatures..........................................................................................................56

UTM User Manual
www.allo.com Version 2.0 6
6.3 VPN........................................................................................................................................57
6.3.1 SSLVPN Server Settings...................................................................................................58
6.3.2 SSLVPN Client Profiles.....................................................................................................60
6.3.3 SSLVPN P2P Policies........................................................................................................61
6.3.4 Client Certificates ...........................................................................................................63
6.3.5 IPSec Settings..................................................................................................................64
6.3.6 IPSec Policies...................................................................................................................65
6.4 Web Proxy .............................................................................................................................70
6.4.1 Proxy Configuration........................................................................................................71
6.4.2 Web filter blocking page.................................................................................................73
6.4.3 User Authentication .......................................................................................................73
6.4.4 Web Cache Management ...............................................................................................74
6.4.5 External Proxy.................................................................................................................75
6.5 Anti Virus ...............................................................................................................................75
6.5.1 Anti Virus Settings ..........................................................................................................76
6.6 Users......................................................................................................................................76
6.6.1 User Groups....................................................................................................................77
7. Status Information.............................................................................................................. 78
7.1 Interfaces...............................................................................................................................78
7.2 DHCP leases...........................................................................................................................78
7.3 Firewall ..................................................................................................................................79
7.3.1 Connection Statistics ......................................................................................................79
7.3.2 Connection info ..............................................................................................................80
7.3.3 Bandwidth Usage per IP .................................................................................................80
7.4 System Log.............................................................................................................................81
7.5 IPS Alerts................................................................................................................................82
7.6 SSLVPN Client Status .............................................................................................................82
7.7 SSLVPN P2P Status.................................................................................................................83
7.8 IPSec Status ...........................................................................................................................83
7.9 Service Status ........................................................................................................................84
8. Diagnostics ......................................................................................................................... 86

UTM User Manual
www.allo.com Version 2.0 7
8.1 Diagnostics Report ................................................................................................................86
8.2 Ping........................................................................................................................................87
8.3 Trace Route ...........................................................................................................................87
8.4 DNS Lookup ...........................................................................................................................88
8.5 Packet Trace ..........................................................................................................................89
9. Reports............................................................................................................................... 90
9.1 System ...................................................................................................................................90
9.1.1System usage...................................................................................................................90
9.2 Firewall ..................................................................................................................................90
9.2.1 Internet Usage ................................................................................................................90
9.2.2 Bandwidth Usage............................................................................................................91
9.3 Web filter...............................................................................................................................92
9.4 IPS Alert Reports....................................................................................................................92
Frequently Asked Questions (FAQs) ........................................................................................ 93
Glossary ................................................................................................................................. 95

UTM User Manual
www.allo.com Version 2.0 8
1. Introduction
1.1 Overview
Shield UTM Appliances is the Unified Threat Management solution that target the security needs
for Home/SOHO users. The appliance provides the integrated Firewall, Intrusion Prevention,
SSLVPN functionalities.
Unified threat management (UTM) is an emerging trend in the network security market. UTM
appliances have evolved from traditional firewall/VPN products into a solution with many
additional capabilities. UTM solutions also provide integrated management, monitoring, and
logging capabilities to streamline deployment and maintenance. UTM appliances combine
firewall, gateway anti-virus, and intrusion detection and prevention capabilities into a single
Platform. UTM is designed protect users from blended threats while reducing complexity.
The Unified Threat Management (UTM) Appliance connects your local area network (LAN) to the
Internet through one or two external broadband access devices such as cable mode ms or DSL
modems. Dual wide area network (WAN) ports allow you to increase the effective data rate to
the Internet by utilizing both WAN ports to carry session traffic, or to maintain a backup
connection in case of failure of your primary Internet connection. As a complete security
solution, the UTM combines a powerful, flexible firewall with a content scan engine that protect
your network from denial of service (DoS) attacks, unwanted traffic, traffic with objectionable
content, spam, phishing, and Web-borne threats such as spyware, viruses, and other malware
threats. The UTM provides advanced IPSec and SSL VPN technologies for secure and simple
remote connections. The use of Gigabit Ethernet LAN and WAN ports ensures extremely high
data transfer speeds. The UTM is a plug-and-play device that can be installed and configured
within minutes

UTM User Manual
www.allo.com Version 2.0 9
1.2 Technical Specifications
No of Interfaces
Two 1Gbps WAN port & four 1Gbps LAN ports, 1 console
interface, 1 USB port
Status Firewall Inspection
Yes
Deep Packet Inspection
Yes
Signatures Support
~4000 active signatures from snort VRT/emerging threats
Application Protocols Detection
70+
Maximum No of Connections
20000
Maximum No of New Connections
Per Second
1800
Maximum No of SSLVPN Clients
100
Authentication
X509 certificates, internal user DB
Logging
Local log viewer, Syslog
Device Management
HTTPS GUI, SNMP
Hardware
Cavium Octeon II 63xx, 2cores 800MHz
RAM
1 GB

UTM User Manual
www.allo.com Version 2.0 10
Notification LEDs (On the front panel of the UTM)
1.3 Equipment Structure
1.3.1 UTM Rear View
Figure 1: UTM Rear View
1.3.2 UTM Front View
Figure 2: UTM Front View

UTM User Manual
www.allo.com Version 2.0 11
1.4 Initial Setup & Configuration
1.4.1 Connecting the Hardware
Figure 3: Connecting the Hardware

UTM User Manual
www.allo.com Version 2.0 12
1.4.2 Network Deployment
Figure 4: Network Deployment
Default Configuration Port IP Ares
Ethernet Port
IP Address
LAN 0-3 > eth1
10.0.0.1/255.255.255.0
WAN > eth0
10.1.0.1/255.255.255.0
Management VLAN
(Accessible via LAN
Ports)
192.168.1.1/255.255.255.0
Default Firewall Mode
Router

UTM User Manual
www.allo.com Version 2.0 13
Management Service
Default Credentials
Web UI
admin/admin
SSHCLI
admin/admin123
1.4.3 Connect UTM Firewall
Connect the appliance to the power socket using the power cable.
Connect the PC to one of the LAN ports of the Appliance.
Your PC will get an IP address from 10.0.0.0/24 subnet.
You can access the Configuration management WebUI from the browser on the PC with
the URL http://10.0.0.1/ or http://192.168.1.1
The recommended browsers for accessing UTM 1.0 WebUI is Mozilla Firefox / Internet
Explorer 8 and above.
Accept the Self signed SSL Certificate and Login to the UTM appliance using default Web
UI credentials.
Figure 5: UTM Login page
WebUI is running on the secure http server. Accessing http://10.0.0.1 or
http://192.168.1.1 will redirect to https://10.0.0.1/ or https://192.168.1.1/

UTM User Manual
www.allo.com Version 2.0 14
2. Dashboard
On logging into the UTM WebUI, the dashboard will be shown. The user can visit the dashboard
page from the any configuration page in the UTM WebUI, by clicking the UTM Product Icon that
appears in the left corner of the Top panel.
The Dashboard shows memory usage, CPU usage, uptime of the device, a list of all interfaces
with their IP address and status, etc..,
Figure 6: Dashboard

UTM User Manual
www.allo.com Version 2.0 15
3. Device Settings
3.1 Host Config
Navigate through Device Settings > Host Config
Configuring hostname and domain name of the device.
Figure 7: Host Config
3.2 Admin User
Navigate through Device Settings > Admin User
The user allows for configuring web UI administrator username and password. User can change
the web UI username and password.
Figure 8: Admin user

UTM User Manual
www.allo.com Version 2.0 16
3.3 SSH
Navigate through Device Settings > SSH
Secure SHell (SSH) is a network protocol for secure data communication, remote command line
login, remote command execution, and other secure network services between two networked
computers. It connects, via a secure channel over an insecure network, a server and a client
running SSH server and SSH Client programs, respectively.
SSH works on top of TCP protocol and its default port number is 22.
It is used to login into the device securely using public and private host keys. This section includes
port and session timeout. Session timeout specifies how long the user session show is valid.
Figure 9: SSH
3.4 Web User Interface
Navigate through Device Settings> Web User Interface
It helps configuring web UI port and session time out. Session timeout specifies how long the
web UI session should be valid.

UTM User Manual
www.allo.com Version 2.0 17
Figure 10: Web User Interface
3.5 Time
Navigate through Device Settings > Time
The user allows for configuring time settings to the device using NTP server or using manual
settings. Using sync with NTP, the user has to provide the NTP servers to sync with the time along
with the zone specified in the zone list. In manual settings, user has to set the hour/minute and
select hour format (AM/PM), date/month/year. The Time zone list provides a list of all time
zones. NTP synchronizes for every specified update interval.
Figure 11: Time

UTM User Manual
www.allo.com Version 2.0 18
3.6SNMP
Navigate through Device Settings > SNMP
Simple Network Management Protocol (SNMP) is an application layer protocol for managing
devices on IP networks. It runs on port 161 and 162(trap) and mostly used in network
management systems to monitor network-attached devices.
In UTM's SNMP can be Enabled/Disable by clicking on the respective buttons. User can configure
any appropriate System Name, System Contact, and System Location into those fields.
Access Control List: SNMP Access controls Lists (ACL) are configured in order to allow the SNMP
traffic through the UTM Device.
Figure 12: Add Access Control List
Trap Servers List: A trap is an SNMP agent's way of notifying the manager that "something is
wrong". UTM SNMP traps will capable of sending SNMP traps on their own to alert an SNMP
manager when they experience a problem.

UTM User Manual
www.allo.com Version 2.0 19
Figure 13: Create Trap Servers List
Figure 14: SNMP
3.7 Certificates
Navigate through Device Settings > Certificates
In this section includes two sections:
3.7.1Built-in certificates
#Built-In which includes default root certificates about 200+.

UTM User Manual
www.allo.com Version 2.0 20
Figure 15: Built-in Certificates
3.7.2 Local Certificates
# Local which user uploaded certificates in PKCS12 format contains root certificate, server
certificate and server key. Challenge password is the password for extracting uploaded PKCS12
file and New Certificate Name is the name for uploaded certificate.
Figure 16: Local Certificates
Table of contents
Other Allo.com Firewall manuals
Popular Firewall manuals by other brands

ZyXEL Communications
ZyXEL Communications ZyWALL 110 Series user guide

NETASQ
NETASQ NA-F25 installation guide

SonicWALL
SonicWALL TZ 100 Series quick start guide

Cisco
Cisco 881W - Integrated Services Router Wireless Installing and activating

Juniper
Juniper NS-5400-P00A-S00 manual

ZyXEL Communications
ZyXEL Communications ZyXEL ZyWALL 5 Support notes

SonicWALL
SonicWALL 2100 CF Getting started guide

Fortinet
Fortinet FortiGate FortiGate-60M quick start guide

Checkpoint
Checkpoint SMB 1500 Series reference guide

Watchguard
Watchguard WatchGuard XCS 170 quick start guide

Watchguard
Watchguard Firebox T40 quick start guide

Alpha Shield
Alpha Shield 202-5731 user guide