CyberGuard SG565 User manual

FCC ID: SZD-990186 (IC: 5746A-990186) Report No. M050109_Cert_WMIR-103G
This document must not be copied or reproduced, except in full without the written permission of
the Manager, EMC Technologies Pty Ltd. The certificate on page 3 may be reproduced in full.
www.emctech.com.au
APPENDIX N
USER MANUAL - PART 1

User Manual
Quick Setup
Warranty
Contact Details
Product Registration
2
Quick Setup
This guide walks you through the installation of your CyberGuard SG
appliance. Installing the CyberGuard SG appliance into a well planned
network is quick and easy. However, network planning and design is
outside the scope of this guide. Please take some time to plan your
network prior to installing your CyberGuard SG appliance.
To add the CyberGuard SG appliance to your local area network (LAN),
the basic steps are:
Unpack your CyberGuard SG appliance
Set up a PC to connect to the Web Management Console
Set up your CyberGuard SG appliance’s password and LAN
connection settings
Set up your CyberGuard SG appliance’s Internet connection
settings
Set up the PCs on your LAN to access the Internet
Occasionally you will see a box like the following, which contains
important technical information:
Note: Example.
System Requirements
These steps assume that you have a PC running Microsoft Windows
(95/98/Me/2000/XP) with an Ethernet network interface card installed.
You may need to be logged in with administrator privileges.
For a more a thorough description of configuring the CyberGuard SG
appliance, please refer to the User Manual on your CyberGuard SG CD
(\doc\UserManual.pdf).
For troubleshooting and answers to frequently asked questions, contact
your network administrator or consult the Knowledge Base at:
http://www.cyberguard.com/snapgear/knowledgebase.html
For product compliance information, please refer to the CyberGuard SG
CD (\doc\Compliance.pdf).

3
STEP 1 Unpack the CyberGuard SG appliance
Check the following items were included with your CyberGuard SG
appliance:
Power adapter
CyberGuard SG CD
2 Ethernet cables (1 blue straight through cable and 1 gray or
red crossover cable or 2 blue straight through cables)
2 Antenna
Step 1a Assemble the antenna onto the SG565
Before powering on the SG565 the antenna must be fitted.
Screw the two antenna onto the terminals ANT A and ANT B at the rear
of the device
Warning: To comply with the FCC and ANSI C95.1 RF exposure limits, it is recommended for the
Cyberguard SG565 device be installed so as to provide a separation distance of at least 20 cm (8 inches)
from all persons and that the antenna must not be co-located or operating in conjunction with any other
antenna or radio transmitter. It is recommended that the user limit exposure time if the antenna is
positioned closer than 20 cm (8 inches).
Step 1b Power on the SG565
On the rear panel of the CyberGuard SG appliance you will see network
(LAN 4 ports), Internet (Internet/WAN) and serial ports, a Reset/Erase
button, antenna outlets and a power inlet.
The front panel of the CyberGuard SG appliance contains activity LEDs
(lights) that vary slightly between models. These provide information on
the operating status of your CyberGuard SG appliance.
Note: Power is ON when power is applied (use only the power adapter packaged with the
unit).
System/Heart Beat/TST flashes when the CyberGuard SG appliance is running.
The SG565 may also initially have all other front panel LEDs flashing.
If these LEDs do not behave in this manner before your CyberGuard SG appliance has been
attached to the network, you may need to perform a factory reset. Press the black
Reset/Erase button on rear panel twice within two seconds to restore factory default
settings. If the LEDs are still not flashing after 30 seconds, you may need to contact
customer support.
4
STEP 2 Set up a PC to connect to the Web
Management Console
The CyberGuard SG appliance ships with initial, static IP settings of:
LAN IP address: 192.168.0.1
LAN subnet mask: 255.255.255.0
Note: The Internet/WAN and DMZ interfaces are by default inactive,
i.e. there are no network services such as DHCP in operation, and no IP
address is configured.
If you attach the CyberGuard SG unit’s LAN port directly to a LAN with
an existing DHCP server, or a PC running a DHCP service, before
performing the initial setup steps described below, it will automatically
obtain an additional address. Your CyberGuard SG appliance will still
be reachable at 192.168.0.1.
However, it is strongly recommended that you perform the initial setup
steps 2, 3 and 4 before connecting your CyberGuard SG appliance to
your LAN.
Your CyberGuard SG appliance will need an IP address suitable for your
LAN before it is connected. You may choose to use the CyberGuard SG
appliance’s initial network settings as a basis for your LAN settings.
Connect the supplied power adapter to the CyberGuard SG appliance.
Connect the CyberGuard SG appliance’s LAN Ethernet port directly to
your PC’s network interface card using the crossover cable (red or gray).
Next, you must modify your PC’s network settings to enable it to
communicate with the CyberGuard SG appliance.

5
Click Start -> (Settings ->) Control Panel and double click Network
Connections (or in 95/98/Me, double click Network).
Right click on Local Area Connection and select Properties.
Note: If there is more than one existing network connection, select the
one corresponding to the network interface card to which the
CyberGuard SG appliance is attached.
Select Internet Protocol (TCP/IP) and click Properties (or in 95/98/Me,
TCP/IP -> your network card name if there are multiple entries) and
click Properties.
Select Use the following IP address and enter the following details:
IP address: 192.168.0.100
Subnet mask: 255.255.255.0
Default gateway: 192.168.0.1
Select Use the following DNS server addresses and enter:
Preferred DNS server: 192.168.0.1
Note: If you wish to retain your existing IP settings for this network
connection, click Advanced and Add the secondary IP address of
192.168.0.100, subnet mask 255.255.255.0.
6
STEP 3 Set up the CyberGuard SG appliance’s
password and LAN connection settings
Launch Internet Explorer (or your preferred web browser) and navigate
to 192.168.0.1.
The Web Management Console will display.
Select Quick Setup Wizard from the center of the page.
You will be prompted to log in. Enter the initial user name and password
for the CyberGuard SG appliance:
User name: root
Password: default
Note: If you are unable to connect to the Management Console at
192.168.0.1, or the initial username and password are not accepted,
press the black Reset button on the CyberGuard SG appliance’s rear
panel twice, wait 20 – 30 seconds, and try again. Pressing this button
twice within 2 seconds returns the CyberGuard SG appliance to its
factory default settings.
Enter and confirm a password for your CyberGuard SG appliance. This
is the password for the user root, the main administrative user account
on the CyberGuard SG appliance. It is therefore important that you
choose a password that is hard to guess, and keep it safe.
The new password will take effect immediately, and you will be prompted
to enter it when completing the next step.
The Quick Setup Wizard will display.

7
Hostname: You may change the name your CyberGuard SG appliance
knows itself by. This is not generally necessary.
Manual configuration: Select this to manually specify your CyberGuard
SG appliance’s LAN connection settings.
Skip: LAN already configured: Select this if you wish to use the
CyberGuard SG appliance’s initial network settings (IP address
192.168.0.1 and subnet mask 255.255.255.0) as a basis for your LAN
settings. You may skip to STEP 4.
Obtain LAN IP address from a DHCP server on LAN: It is
recommended that you statically configure your CyberGuard SG
appliance’s LAN connection settings rather than rely on an existing
DHCP server. However, you may select this if you have an existing
DHCP server that you wish to have automatically configure your
CyberGuard SG appliance’s LAN connection settings. You may skip to
STEP 4.
Click Next.
8
Note: This page will only display if you previously selected Manual
configuration. Otherwise skip to STEP 4.
Enter an IP address and Subnet mask for your CyberGuard SG
appliance’s LAN connection. You may choose to use the CyberGuard
SG appliance’s initial network settings if you are sure no other PC or
network device already has the address of 192.168.0.1.
The IP address will later be used as the gateway address for the PCs
on your LAN. To gain access through this gateway, the PCs on your
LAN must have an IP address within the bounds of the subnet described
by the CyberGuard SG appliance’s IP address and subnet mask (e.g.
using the CyberGuard SG appliance’s initial network settings,
192.168.0.2 – 192.168.0.254).
Take note of this IP address and subnet mask, as you will need them
later on.
Click Next.

9
STEP 4 Set up the CyberGuard SG appliance’s Internet
connection settings
First, attach your CyberGuard SG appliance to your modem device or
Internet connection medium. If necessary, give the modem device some
time to power up.
Select your Internet connection type and click Next.
If connecting using a cable modem, select the appropriate ISP. Choose
Generic cable modem provider if unsure.
If connecting using a regular analog modem, enter the details provided
by your ISP.
If connecting using an ADSL modem, select Auto detect ADSL
connection type and enter the details provided by your ISP. If auto
detection fails and you are unsure of your ADSL connection type,
contact your ISP.
If you have a direct connection to the Internet (e.g. a leased line), enter
the IP settings provided by your ISP.
Note: For detailed help for each of these options, please refer to the
User Manual.
Once the CyberGuard SG appliance’s Internet connection has been set
up, click Next, select Reboot and click Next again.
Note: If you changed the CyberGuard SG appliance’s LAN connection
settings in STEP 3, it may become uncontactable at this point. The next
step describes how to set up the PCs on your network to access the
CyberGuard SG appliance and the Internet.
10
STEP 5 Set up the PCs on your LAN to access the
Internet
If you haven’t already, connect your CyberGuard SG appliance’s LAN
port directly to your LAN hub using the straight through Ethernet cable
(blue).
Note: if you are setting up the SG565, you may also connect PCs
directly to its LAN switch.
To access the Internet, the PCs on your LAN must all be set up to use
the CyberGuard SG appliance as their default gateway. This can be
done a number of different ways depending on how your LAN is set up.
If your LAN has a DHCP server already, proceed to STEP 5A.
If your LAN does not have a DHCP server, proceed to STEP 5B.
If you are not sure, you probably want STEP 5B.
STEP 5A LAN with a DHCP server
Add a lease to your existing DHCP server to reserve an IP address for
the CyberGuard SG appliance’s LAN connection.
If you chose to set the CyberGuard SG appliance’s LAN connection
settings using Manual configuration, you may simply remove this
address from the pool of available addresses.
Enter this same IP address as the gateway IP address to be handed out
by the DHCP server.
Enter this same IP address as the DNS server IP address to be handed
out by the DHCP server.
Restart all the PCs on the network (this will reset their gateway and DNS
addresses).
Note: The purpose of restarting the PCs is to force them to gain a new
DHCP lease. Alternatively you can use a utility such as ipconfig to
release then renew a lease, or disable and re-enable the network
connection.

11
STEP 5B LAN with no DHCP server
A DHCP server allows PCs to automatically obtain network settings
when they start up. If your network does not have a DHCP server, you
may either manually set up each PC on your network, or set up the
CyberGuard SG appliance's DHCP server.
Note: If you only have several PCs, we suggest manually setting up
your network. If you have more PCs, enabling the CyberGuard SG
appliance’s DHCP server is more scalable.
To manually set up each Windows PC on your network:
Click Start -> (Settings ->) Control Panel and double click Network
Connections (or in 95/98/Me, double click Network).
If presented with multiple connections, right click on Local Area
Connection (or appropriate network connection) and select Properties.
Select Internet Protocol (TCP/IP) and click Properties (or in 95/98/Me,
TCP/IP -> [your network card name] if there are multiple entries).
Enter the following details:
IP address is an IP address that is part of the same subnet range
as the CyberGuard SG appliance’s LAN connection (e.g. if using
the default settings, 192.168.0.2 – 192.168.0.254).
Subnet mask is the subnet mask of the CyberGuard SG
appliance’s LAN connection.
Default gateway is the IP address of the CyberGuard SG
appliance’s LAN connection.
Preferred DNS server is the IP address of the CyberGuard SG
appliance’s LAN connection.
Click OK (or in 95/98/Me, Add then OK, reboot the PC if prompted to do
so).
Perform these steps for each PC on your network.
You are now finished.
12
Alternatively, to activate your CyberGuard SG appliance's DHCP server:
Launch Internet Explorer (or your preferred web browser) and navigate
to the IP address of the CyberGuard SG appliance’s LAN connection.
Note: If you changed your CyberGuard SG appliance’s LAN connection
settings from its default settings in STEP 3, it may be uncontactable at
this point. If so, manually set up a single PC as described at the
beginning of STEP 5B before continuing.
The Web Management Console will display.
Select DHCP Server from the Networking menu.
Click Add Server and configure the DHCP server with the following
details:
Gateway Address is the IP address of the CyberGuard SG
appliance’s LAN connection, or leave it blank.
DNS Address is the IP address of the CyberGuard SG
appliance’s LAN connection, or leave it blank.
WINS Address (optional) is the IP address of any existing WINS
server on your LAN.
Default Lease Time and Maximum Lease Time should generally
be left at their default values.
Initial Dynamic IP Address Range is a range of free IP
addresses on your LAN’s subnet for the CyberGuard SG
appliance to hand out to PCs on your LAN.
Note: For a detailed description of configuring DHCP Server Settings,
please refer to the User Manual.
Each PC on your LAN must now be set up to use DHCP. For each PC
on your LAN:
Click Start -> (Settings ->) Control Panel and double click Network
Connections (or in 95/98/Me, double click Network).
If presented with multiple connections, right click on Local Area
Connection (or appropriate network connection) and select Properties.

13
Select Internet Protocol (TCP/IP) and click Properties (or in 95/98/Me,
TCP/IP -> [your network card name] if there are multiple entries) and
click Properties (in 95/98/Me, you may also have to click the IP Address
tab).
Check Obtain an IP address automatically, check Obtain DNS server
address automatically and click OK (in 95/98/Me, reboot the PC if
prompted to do so).
You are now finished.
14
Common VPN Scenarios
Generally there are two common scenarios in which you will want to set
up your CyberGuard SG appliance(s):
•LAN-to-LAN: Linking two branch offices across the Internet. For this
case we recommend using IPSec. The VPN connection can operate
with both static and dynamic public (Internet) IP addresses.
For the example below we assume that CyberGuard SG appliances are
installed at either end, and that both have a static public IP address, or
one is static and one is dynamic. The example tunnel will be using pre-
shared keys for authentication, aggressive mode for keying, and be
established going out through the default gateway interface. Proceed to
CyberGuard SG to CyberGuard SG VPN (IPSec).
Please refer to the IPSec section of the User Manual if you are
trying to set up something more complex, and for a detailed
description of all available options.
•Roaming: Connecting to your CyberGuard SG appliance, installed at
your home or office, from a single PC at a remote location. For this
case we recommend using PPTP because the client is standard in
Windows and other operating systems, and it is quite simple to set up.
Proceed to Remote Workstation to CyberGuard SG VPN (PPTP).
CyberGuard SG to CyberGuard SG VPN (IPSec)
Perform these steps for either end of the connection. Unless instructed
otherwise, leave all options at their default settings.
STEP 1 Enable IPSec
Select IPSec from the VPN menu.
Underneath IPSec General Settings select This end has a static IP
address IPSec endpoint, or This end has a dynamic IP address
IPSec endpoint as appropriate. This is referring to the public (Internet)
IP address of this CyberGuard SG appliance. Check with your ISP if
unsure.
Check Enable IPSec, and click Apply.

15
STEP 2 Add a New IPSec Connection
Select the Add New Tunnel tab at the top of the window.
Enter a descriptive name for the connection in Tunnel name.
Select This tunnel will be using Aggressive mode Automatic Keying
(IKE).
Select The remote party has a static IP address or The remote party
has a dynamic IP address as appropriate. This is referring to the
public (Internet) IP address of the other CyberGuard SG appliance.
Check with your ISP if unsure.
Click Continue.
STEP 3 Local Endpoint Settings
If you selected This end has a dynamic IP address IPSec endpoint,
enter snap@branch as the Required Endpoint ID.
Click Continue.
16
STEP 4 Remote Endpoint Settings
If you selected The remote party has a static IP address, enter the
other CyberGuard SG appliance's public (Internet) IP address in The
remote party's IP address.
If you selected The remote party has a dynamic IP address, enter
snap@branch as the Required Endpoint ID.
Note: Please note again that this example is not suitable for setting up a
connection where both ends have dynamic IP address, for this scenario
please refer to the IPSec section of the User Manual.
Click Continue.
STEP 5 Phase 1 Settings
You must choose a Preshared Secret to authenticate the connection.
This passphrase can be any character string you like (recommended at
least 24 characters), it may contain spaces, and must be entered
identically on both CyberGuard SG appliances.
Note: It is important that you keep this information secret, much like a
password. The preshared secret is fundamental to IPSec encryption.
Click Continue.

17
STEP 6a Phase 2 Settings
Enter the network address and network mask for the Local Network
(this CyberGuard SG appliance) and the Remote Network (the other
CyberGuard SG appliance). You can check this by opening
Diagnostics in a new browser window and looking under LAN
Interface, e.g. if the IP Address is 192.168.1.1 and Netmask is
255.255.255.0, enter 192.168.1.0/255.255.255.0.
Note: The two LANs being connected by the IPSec connection must
have network addresses that are different to each other, e.g.
192.168.1.0/255.255.255.0 and 192.168.2.0/255.255.255.0.
Click Apply and you're done.
STEP 6b Repeat
Your CyberGuard SG appliance is now activated for IPSec VPN. Once
you have completed the steps at each end you will be up and running.
STEP 7 Verify
Under Tunnel List in the General Settings tab, check Status to see
whether the connection is Down or Running. Status will display
Negotiating Phase 1 then Negotiating Phase 2 as the connection is
being established.
18
Remote Workstation to CyberGuard SG VPN (PPTP)
STEP 1 Enable PPTP Server
Select PPTP VPN Server from the Networking menu. The table below
describes the fields in the PPTP VPN Server Setup page and the
options in enabling and configuring VPN access.
Enable PPTP Check this box to enable the establishment of
PPTP connections to your CyberGuard SG
appliance.
IP Address(es) to
Assign VPN Clients
Enter a range of free IP addresses on your
LAN to assign to the remote connections.
Authentication
Scheme
MSCHAPv2 is the most secure and
recommended. It uses encrypted passwords.
CHAP is less secure, and similarly PAP is
even less secure, but more common. In some
cases you may have to choose them if the
default does not work.
Authentication
Database
Leave this as Local unless you wish to use
another server to authenticate PPTP VPN
clients. Refer to the User Manual if this is the
case.

19
STEP 2 Add User Account(s)
Once you have set up the VPN server, select Continue.
Before remote users can set up a VPN tunnel to the CyberGuard SG
appliance’s PPTP server, they must have user accounts set up. The
field options in the Add New Account are detailed below.
Username This User Name is required for VPN authentication
only. The name selected is case sensitive (for example
Jimsmith is not the same as jimsmith).
Windows
Domain
Optional. Most Windows clients expect you to specify a
domain name in upper case.
Password Enter the password for the remote VPN user.
Confirm Re-enter the password to confirm.
20
As new VPN user accounts are added, they are displayed on the
updated Account List.
To modify the password of an existing account, Select the account in the
Account List then enter New Password and Confirm in the Delete or
Change Password for the Selected Account field.
Similarly to delete an existing account, Select the account in the
Account List then check Delete in the Delete or Change Password for
the Selected Account field.
If you request a change to a User Account and it is successful, the PPTP
VPN Server Setup page will be displayed with the change noted. If the
change was unsuccessful, an error will be reported.
STEP 3 Configure Remote Client
At the remote sites there is generally no need for any special client
software. Your CyberGuard SG appliance’s PPTP server supports the
standard PPTP client software included with Windows. The virtual
private network connection is simple to configure using the standard
Dial-Up Networking software. PPTP is also compatible with Linux/Unix
PPTP client software.
These instructions will cover a Windows 2000 client. Please refer to the
User Manual if you have a different operating system.
Click Start, Settings, Network and Dialup Connections. Choose
Make New Connection.
Choose Connect to a private network through the Internet. Click
Next.

21
Enter the CyberGuard SG appliance’s public (Internet) IP address in the
Destination Address and click Next. Select the Connection
Availability that you require on the next window and click Next, which
will display the final window in this wizard.
Choose a name for your new VPN connection, e.g. My Office VPN.
Your client machine should be connected to the Internet in the normal
way (dialout, ADSL, cable modem etc.).
Enter the Username and Password set up earlier and click the
Connect button.
After you have been authenticated to the network, you can check your e-
mail, use the office printer, access shared files and browse the network –
as if you were physically connected to the LAN.
To disconnect the VPN tunnel connection to the remote CyberGuard SG
appliance double click on the Dial-Up Networking icon in the Windows
task bar and close the connection.
STEP 4 Verify
Your VPN connection is easily verified by attempting a connection as
above. Once the connection has succeeded your client’s Windows task
bar will contain a Dial-Up Networking icon and will flash to indicate
activity. You may also double click this icon to see further statistics.
22
Terms and Conditions SnapGear Warranty
Standard Warranty
SnapGear, Inc., its parent, affiliates and subsidiaries, (collectively, "SnapGear")
warrant your SnapGear product to be in good working order and to be free from
defects in workmanship and material (except in those cases where the
materials are supplied by the Purchaser) under normal and proper use and
service for the period of one (1) year from the date of original purchase from an
Authorized SnapGear reseller. In the event that this product fails to meet this
warranty within the applicable warranty period, and provided that SnapGear
confirms the specified defects, Purchaser's sole remedy is to have SnapGear, in
SnapGear's sole discretion, repair or replace such product at the place of
manufacture, at no additional charge other than the cost of freight of the
defective product to and from the Purchaser. Repair parts and replacement
products will be provided on an exchange basis and will be either new or
reconditioned. SnapGear will retain, as its property, all replaced parts and
products. Notwithstanding the foregoing, this hardware warranty does not
include service to replace or repair damage to the product resulting from
accident, disaster, abuse, misuse, electrical stress, negligence, any non-
SnapGear modification of the product except as provided or explicitly
recommended by SnapGear, or other cause not arising out of defects in
material or workmanship. This hardware warranty also does not include service
to replace or repair damage to the product if the serial number or seal or any
part thereof has been altered, defaced or removed. If SnapGear does not find
the product to be defective, the Purchaser will be invoiced for said inspection
and testing at SnapGear's then current rates, regardless of whether the product
is under warranty.

23
Limitation of Liability
No action, regardless of form, arising from this warranty may be brought by
either party more than two (2) years after the cause of action has occurred.
Purchaser expressly agrees that SnapGear's liability, if any, shall be limited
solely to the replacement or repair of the product in accordance with the
warranties specifically and expressly set forth herein. The remedies of the
Purchaser are the exclusive and sole remedies available, and, in the event of a
breach or repudiation of any provision of this agreement by SnapGear, the
Purchaser shall not be entitled to receive any incidental damages as that term is
defined in Section 2-715 of the Uniform Commercial Code. SnapGear waives
the benefit of any rule that disclaimer of warranty shall be construed against
SnapGear and agrees that such disclaimers herein shall be construed liberally
in favor of SnapGear. THE FOREGOING WARRANTIES ARE THE SOLE AND
EXCLUSIVE WARRANTIES GIVEN IN CONNECTION WITH THE PRODUCT
AND THE HARDWARE. SNAPGEAR DISCLAIMS ALL OTHER WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, ANY
WARRANTIES AS TO THE SUITABILITY OR MERCHANTABILITY OR
FITNESS FOR ANY PARTICULAR PURPOSE AND NONINFRINGEMENT OF
THIRD PARTY RIGHTS. SNAPGEAR DOES NOT PROMISE THAT THE
PRODUCT IS ERROR-FREE OR WILL OPERATE WITHOUT INTERRUPTION.
IN NO EVENT SHALL SNAPGEAR BE LIABLE FOR ANY LOST OR
ANTICIPATED PROFITS, OR ANY INCIDENTAL, EXEMPLARY, SPECIAL OR
CONSEQUENTIAL DAMAGES, REGARDLESS OF WHETHER SNAPGEAR
WAS ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
24
Extended Four Year Warranty
If Purchaser buys Extended Warranty at time of purchase of the product
or within thirty (30) days from date of original purchase, the period of
warranty will be extended by three (3) additional years to a total of four
(4) years.
Return Procedure
If this product requires service during the applicable warranty period, a
Return Materials Authorization (RMA) number must first be obtained
from SnapGear. Product that is returned to SnapGear for service or
repair without an RMA number will be returned to the sender
unexamined. Product should be returned, freight prepaid, in its original
or equivalent packaging, to an authorized SnapGear Service Center.
Proof of purchase date must accompany the returned product and the
Purchaser shall agree to insure the product or assume the risk of loss of
damage in transit. Contact SnapGear for further information.
Technical Support
Purchaser is entitled to thirty (30) days free telephone support (USA
ONLY) and thirty (30) days free e-mail support (world wide) from date of
purchase provided that the Purchaser first register their product(s) with
SnapGear either via filling in and posting or faxing the form found in the
Quick Install Guide, or filling in the on-line form
http://www.snapgear.com/registration.html. Telephone and e-mail
support is available from 9:00 AM to 5:00 PM, Mountain Time.
SnapGear's standard warranty includes free access to SnapGear's
Knowledge Base as well as any application notes, white papers and
other on-line resources that may become available from time to time.
SnapGear reserves the right to discontinue all support for products that
are no longer covered by warranty.

25
SNAPGEAR END USER LICENSE AGREEMENT
IMPORTANT
READ BEFORE USING THE ACCOMPANYING SOFTWARE
YOU SHOULD CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS BEFORE
USING THE ACCOMPANYING SOFTWARE, THE USE OF WHICH IS LICENSED FOR USE
ONLY AS SET FORTH BELOW. IF YOU DO NOT AGREE TO THE TERMS AND CONDITIONS
OF THIS AGREEMENT, DO NOT USE THE SOFTWARE. IF YOU USE ANY PART OF THE
SOFTWARE, SUCH USE WILL INDICATE THAT YOU ACCEPT THESE TERMS.
You have acquired a product that includes SnapGear (“SnapGear”) proprietary software and/or
proprietary software licensed to SnapGear. This SnapGear End User License Agreement
(“EULA”) is a legal agreement between you (either an individual or a single entity) and SnapGear
for the installed software product of SnapGear origin, as well as associated media, printed
materials, and “online” or electronic documentation (“Software”). By installing, copying,
downloading, accessing, or otherwise using the Software, you agree to be bound by the terms of
this EULA. If you do not agree to the terms of this EULA, SnapGear is not willing to license the
Software to you. In such event, do not use or install the Software. If you have purchased the
Software, promptly return the Software and all accompanying materials with proof of purchase for
a refund.
Products with separate end user license agreements that may be provided along with the
Software are licensed to you under the terms of those separate end user license agreements.
LICENSE GRANT. Subject to the terms and conditions of this EULA, SnapGear grants you a
nonexclusive right and license to install and use the Software on a single CPU, provided that, (1)
you may not rent, lease, sell, sublicense or lend the Software; (2) you may not reverse engineer,
decompile, disassemble or modify the Software, except and only to the extent that such activity is
expressly permitted by applicable law notwithstanding this limitation; and (3) you may not transfer
rights under this EULA unless such transfer is part of a permanent sale or transfer of the Product,
you transfer at the same time all copies of the Software to the same party or destroy such
materials not transferred, and the recipient agrees to this EULA.
No license is granted in any of the Software’s proprietary source code. This license does not
grant you any rights to patents, copyright, trade secrets, trademarks or any other rights with
respect to the Software.
You may make a reasonable number of copies of the electronic documentation accompanying
the Software for each Software license you acquire, provided that, you must reproduce and
include all copyright notices and any other proprietary rights notices appearing on the electronic
documentation.
SnapGear reserves all rights not expressly granted herein.
26
INTELLECTUAL PROPERTY RIGHTS. The Software is protected by copyright laws,
international copyright treaties, and other intellectual property laws and treaties. SnapGear and
its suppliers retain all ownership of, and intellectual property rights in (including copyright), the
Software components and all copies thereof, provided however, that certain components of the
Software are components licensed under the GNU General Public License (version 2), which
SnapGear supports. You may obtain a copy of the GNU General Public License at
http:/www.fsf.org/copyleft/gpl.html. SnapGear will provide source code for any of the components
of the Software licensed under the GNU General Public License upon request.
EXPORT RESTRICTIONS. You agree that you will not export or re-export the Software, any part
thereof, or any process or service that is the direct product of the Software in violation of any
applicable laws or regulations of the United States or the country in which you obtained them.
U.S. GOVERNMENT RESTRICTED RIGHTS. The Software and related documentation are
provided with Restricted Rights. Use, duplication, or disclosure by the Government is subject to
restrictions set forth in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS 252.227-7013 or subparagraphs (c) (1) and (2) of the Commercial
Computer Software – Restricted Rights at 48 C.F.R. 52.227-19, as applicable, or any successor
regulations.
TERM AND TERMINATION. This EULA is effective until terminated. The EULA terminates
immediately if you fail to comply with any term or condition. In such an event, you must destroy
all copies of the Software. You may also terminate this EULA at any time by destroying the
Software.
GOVERNING LAW AND ATTORNEY’S FEES. This EULA is governed by the laws of the State
of Utah, USA, excluding its conflict of law rules. You agree that the United Nations Convention
on Contracts for the International Sale of Goods is hereby excluded in its entirety and does not
apply to this EULA. If you acquired this Software in a country outside of the United States, that
country’s laws may apply. In any action or suit to enforce any right or remedy under this EULA or
to interpret any provision of this EULA, the prevailing party will be entitled to recover its costs,
including reasonable attorneys’ fees.
ENTIRE AGREEMENT. This EULA constitutes the entire agreement between you and
SnapGear with respect to the Software, and supersedes all other agreements or representations,
whether written or oral. The terms of this EULA can only be modified by express written consent
of both parties. If any part of this EULA is held to be unenforceable as written, it will be enforced
to the maximum extent allowed by applicable law, and will not affect the enforceability of any
other part.
Should you have any questions concerning this EULA, or if you desire to contact SnapGear for
any reason, please contact the SnapGear representative serving your company.

27
THE FOLLOWING DISCLAIMER OF WARRANTY AND LIMITATION OF LIABILITY IS
INCORPORATED INTO THIS EULA BY REFERENCE.
NOT FAULT TOLERANT. THE SOFTWARE IS NOT FAULT TOLERANT. YOU HAVE
INDEPENDENTLY DETERMINED HOW TO USE THE SOFTWARE IN THE DEVICE, AND
SNAPGEAR HAS RELIED UPON YOU TO CONDUCT SUFFICIENT TESTING TO DETERMINE
THAT THE SOFTWARE IS SUITABLE FOR SUCH USE.
LIMITED WARRANTY. SnapGear warrants the media containing the Software for a period of
ninety (90) days from the date of original purchase from SnapGear or its authorized retailer.
Proof of date of purchase will be required. Any updates to the Software provided by SnapGear
(which may be provided by SnapGear at its sole discretion) shall be governed by the terms of this
EULA. In the event the product fails to perform as warranted, SnapGear’s sole obligation shall
be, at SnapGear’s discretion, to refund the purchase price paid by you for the Software on the
defective media, or to replace the Software on new media. SnapGear makes no warranty or
representation that its Software will meet your requirements, will work in combination with any
hardware or application software products provided by third parties, that the operation of the
software products will be uninterrupted or error free, or that all defects in the Software will be
corrected.
SNAPGEAR DISCLAIMS ANY AND ALL OTHER WARRANTIES, WHETHER EXPRESS OR
IMPLIED, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. OTHER THAN AS
STATED HEREIN, THE ENTIRE RISK AS TO SATISFACTORY QUALITY, PERFORMANCE,
ACCURACY, AND EFFORT IS WITH YOU. ALSO, THERE IS NO WARRANTY AGAINST
INTERFERENCE WITH YOUR ENJOYMENT OF THE SOFTWARE OR AGAINST
INFRINGEMENT. IF YOU HAVE RECEIVED ANY WARRANTIES REGARDING THE DEVICE
OR THE SOFTWARE, THOSE WARRANTIES DO NOT ORIGINATE FROM, AND ARE NOT
BINDING ON, SNAPGEAR.
NO LIABILITY FOR CERTAIN DAMAGES. EXCEPT AS PROHIBITED BY LAW, SNAPGEAR
SHALL HAVE NO LIABILITY FOR COSTS, LOSS, DAMAGES OR LOST OPPORTUNITY OF
ANY TYPE WHATSOEVER, INCLUDING BUT NOT LIMITED TO, LOST OR ANTICIPATED
PROFITS, LOSS OF USE, LOSS OF DATA, OR ANY INCIDENTAL, EXEMPLARY SPECIAL OR
CONSEQUENTIAL DAMAGES, WHETHER UNDER CONTRACT, TORT, WARRANTY OR
OTHERWISE ARISING FROM OR IN CONNECTION WITH THIS EULA OR THE USE OR
PERFORMANCE OF THE SOFTWARE. IN NO EVENT SHALL SNAPGEAR BE LIABLE FOR
ANY AMOUNT IN EXCESS OF THE LICENSE FEE PAID TO SNAPGEAR UNDER THIS EULA.
SOME STATES AND COUNTRIES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF
LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION MAY
NOT APPLY TO YOU.
28
Contact Details
USA Australia
7984 South Welby Park Drive
Suite #101
West Jordan, UT 84088
USA
Phone +1 801 282 8492
Fax +1 801 282 8496
825 Stanley St
Woolloongabba QLD 4102
Australia
Phone +61 7 3435 2888
Fax +61 7 3891 3630
Product Registration
For prompt product registration please go to the CyberGuard website at:
http://www.cyberguard.com/snapgear/registration.html
You will require a current email address to register your product.
Part Number: 520093-00 February 7th, 2005

520055-07-SPC 1
Product
Compliance
Information

520055-07-SPC 2
Contents of Kits
Part Descriptions Quantities
Products SG300
(was LITE300)
990126
SG630
(was PCI630)
990071
SG635
(was PCI635)
990135
SG530
(was SME530)
990064
SG550
(was SME550)
990065
SG570
(was SME570)
990107
SG575
(was SME575)
990108
SG710
990136
SG710+
990183
Telephone extension cable,
6ft (1.8m)
Ethernet cross-over cable,
6ft (1.8m) grey
1 1 1 1 1 1
Ethernet cross-over cable,
6ft (1.8m) red
Ethernet patch cable, 6ft
(1.8m) blue
2 1 1 1 1 1 1
5VDC switching power
supply unit
1 1 1 1
6VDC switching power
supply unit
6VDC wall mount plug
pack
12VDC wall mount plug
pack
1
IEC mains power supply
cable
1 1 1 1 1 1
Quick Installation Guide 1 1 1 1 1 1 1 1 1
CDrom 1 1 1 1 1 1 1 1 1

520055-07-SPC 3
Relevant Certifications
Compliance Certifications Relevant to
Products SG300
(was LITE300)
990126
SG630
(was PCI630)
990071
SG635
(was PCI635)
990135
SG530
(was SME530)
990064
SG550
(was SME550)
990065
SG570
(was SME570)
990107
SG575
(was SME575)
990108
SG710
990136
SG710+
990183
FCCClassA
FCC Class B •••••••••
CE •••••••••
C-Tick •••••••••
TUV •••
Industry Canada •••••••••

520055-07-SPC 4
Hereby, CyberGuard Corporation., declares that this ITE is in compliance with the essential requirements and other relevant provisions
of Directive 1999/5/EC.
CyberGuard Corporation. vakuuttaa täten että ITE tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien
direktiivin muiden ehtojen mukainen.
Hierbij verklaart CyberGuard Corporation. dat het toestel ITE in overeenstemming is met de essentiële eisen en de andere relevante
bepalingen van richtlijn 1999/5/EG
Bij deze verklaart CyberGuard Corporation. dat deze ITE voldoet aan de essentiële eisen en aan de overige relevante bepalingen van
Richtlijn 1999/5/EC.
Par la présente CyberGuard Corporation. déclare que l'appareil ITE est conforme aux exigences essentielles et aux autres dispositions
pertinentes de la directive 1999/5/CE
Par la présente, [nom du constructeur] déclare que ce [type d'équipement] est conforme aux exigences essentielles et aux autres
dispositions de la directive 1999/5/CE qui lui sont applicables
Härmed intygar CyberGuard Corporation. att denna ITE står I överensstämmelse med de väsentliga egenskapskrav och övriga
relevanta bestämmelser som framgår av direktiv 1999/5/EG.
Undertegnede CyberGuard Corporation. erklærer herved, at følgende udstyr ITE overholder de væsentlige krav og øvrige relevante
krav i direktiv 1999/5/EF
Hiermit erklärt CyberGuard Corporation., dass sich dieser/diese/dieses ITE in Übereinstimmung mit den grundlegenden Anforderungen
und den anderen relevanten Vorschriften der Richtlinie 1999/5/EG befindet". (BMWi)
Hiermit erklärt CyberGuard Corporation. die Übereinstimmung des Gerätes ITE mit den grundlegenden Anforderungen und den
anderen relevanten Festlegungen der Richtlinie 1999/5/EG. (Wien)
ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ CyberGuard Corporation. ∆ΗΛΩΝΕΙ ΟΤΙ ITE ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩ∆ΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ
ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ∆ΙΑΤΑΞΕΙΣ ΤΗΣ Ο∆ΗΓΙΑΣ 1999/5/ΕΚ
Con la presente CyberGuard Corporation. dichiara che questo ITE è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti
stabilite dalla direttiva 1999/5/CE.
Por medio de la presente CyberGuard Corporation. declara que el ITE cumple con los requisitos esenciales y cualesquiera otras
disposiciones aplicables o exigibles de la Directiva 1999/5/CE
CyberGuard Corporation. declara que este ITE está conforme com os requisitos essenciais e outras disposições da Directiva
1999/5/CE.

520055-07-SPC 5
Compliance Information
EMC, Safety and R&TTE Directive Compliance
The CE mark, if applicable, is affixed to this product to confirm compliance with the following European Community Directives:
oCouncil Directive 89/336/EEC of 3 May 1989 on the approximation of the laws of Member States relating to electromagnetic
compatibility; and
oCouncil Directive 73/23/EEC of 19 February 1973 on the harmonization of the laws of Member States relating to electrical
equipment designed for use within certain voltage limits; and
oCouncil Directive 1999/5/EC of 9 March on radio equipment and telecommunications terminal equipment and the mutual
recognition of their conformity.
FCC Part 15 Regulations
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC rules.
These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment
generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause
harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.
If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the following measures:
oReorient or relocate the receiving antenna.
oIncrease the separation between the equipment and receiver.
oPlug the equipment into an outlet on a circuit different from that to which the receiver is connected.
oConsult the dealer or an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC rules. Operation of this device is subject to the following conditions: (1) This device may
not cause harmful interference, and (2) this device must accept any interference that may cause undesired operation.
WARNING – Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user’s
authority to operate the equipment.
RF Exposure Statement
IMPORTANT NOTE: To comply with FCC RF exposure compliance requirements, the antenna used for this transmitter must be
installed to provide a separation distance of at least 20cm from all persons and must not be co-located or operating in conjunction with
any other antenna or transmitter.
Industry Canada
This Class B digital apparatus complies with Canadian ICES-003.
Cet appariel numérique de la classe B est conforme à la norme NMB-003 du Canada.
Operation is subject to the following two conditions:
¾This device may not cause harmful interference, and
¾This device must accept any interference, including interference that may cause undesired operation of the device.
Antenna Statements
This device has been designed to operate with an antenna having a maximum gain of 1.46dBi. Antenna having a higher gain is strictly
prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms.
To reduce potential radio interference to others, the antenna type and its gain should be so chosen that the equivalent isotropic radiated
power (EIRP) is not more than that required for successful communication.
RF Exposure Statement
The installer of this radio equipment must ensure that the antenna is located or pointed such that it does not emit RF fields in excess of
Health Canada limits for the general population; consult safety code 6, obtainable from Health Canada’s website www.hc-sc.gc.ca/rpb.
Table of contents
Other CyberGuard Firewall manuals
Popular Firewall manuals by other brands

SonicWALL
SonicWALL TZ 170 SP Getting started guide

Fortinet
Fortinet Fortigate-5000 series Administration guide

NETGEAR
NETGEAR FVS336Gv1 - ProSafe Dual WAN Gigabit... Setup guide

Fortinet
Fortinet FortiMail-2000A quick start guide

Fortinet
Fortinet FortiGate-200A quick start guide

Draytek
Draytek Vigor 2862 Series quick start guide

Fortinet
Fortinet FortiGate 3000 installation guide

Cisco
Cisco ASA 5506-X Configuration guide

Fortinet
Fortinet FortiGate 60M installation guide

Fortinet
Fortinet FortiManager 400C quick start guide

D-Link
D-Link NetDefend SOHO DFL-160 Quick installation guide

Ruijie Networks
Ruijie Networks RG-WALL1600-S3100 Hardware installation and reference guide