Title: Sygate Enterprise Firewall
1Sygate Enterprise Firewall
- Presented by
- ITS Enterprise Information Security
- S.A.T.E. Program
2SygateCourse Outline
- Introduction to the Sygate Enterprise Firewall
- How Sygate works within UCSF
- Installing Sygate
- Overview of the Security Agent Software
- Navigating the Security Agent
- Testing Your Systems Vulnerability
- Monitoring Your System Logs on a Security Agent
- Summary and Questions
3Introduction to the Sygate Enterprise Firewall
- What is Sygate?
- Why is Sygate important to UCSF?
4How Sygate works within UCSF
- How UCSF Deploys Sygate
- The UCSF License for Sygate
- Support for Sygate
5Installing Sygate
- Obtaining the Security Agent Software
- Installing the Security Agent Software
- Uninstalling the Security Agent Software
- Repairing a Security Agent Installation
6Overview of the Security Agent Software
- Capabilities When Combined with the Management
Server - Some Options May Not Show on a Security Agent
- How Firewalls Work
- What Does the Security Agent Software Do?
- Key Features of the Security Agent
- What is the Management Server?
- Who is in Charge of the Security Agent?
7Capabilities When Combined with the Management
Server
- Receives rules/policies from the Management
Server that govern the way the computer can
access the network - Reports status and attack history to the
Management Server for review by the administrator
8Some Options May Not Show on a Security Agent
9How Firewalls Work
10What Does the Security Agent Software Do?
11Key Features of the Security Agent
- Customized security policy
- Heartbeat synchronization
- Auto-Location Switching
- Multiple types
- Windows servers and Workstations
- Laptops
- Macintosh
12What is the Management Server?
- Centralized point of control
- Deploys security policies to the Agents
- Sends out updated intrusion detection signatures
- Receives uploaded logs from Agents for review by
the administrator
13Who is in Charge of the Security Agent?
- Different Modes Mean Different Things
- Client Control
- Server Control
- Power User
- Your Mode Can Change at Any Time
14Navigating the Security Agent
15The System Tray Icon on a Security Agent
16System Tray Icon
- If the color of the arrow is... ...then...
- RED ...traffic is being blocked by the Agent.
17System Tray Icon
- If the color of the arrow is... ...then...
- BLUE ...traffic is flowing uninterrupted by the
Agent.
18System Tray Icon
- If the color of the arrow is... ...then...
- GRAY ...no traffic is flowing in that direction
19Alert ModeFlashing System Tray Icon
20To use the system tray icon, right click on it
and make choices from there.
21Using the System Tray Icon in Client Control
22Using the System Tray Icon in Power User Mode
23What the System Tray Icon Tells You
24Main Console
25Traffic History Graphs
26Running Applications Field
27Running Applications Field Detail View
28Running Applications Field Connection Detail
View
29Testing Your Systems Vulnerability
- Quick Scan
- Stealth Scan
- Trojan Scan
- TCP Scan
- UDP Scan
- ICMP Scan
30Monitoring Your System Logs on a Security Agent
- There are three logs enabled in the Security
Agent that provide the ability to monitor traffic
and attack history - Security Log
- Traffic Log
- System Log
- Note There is a Packet Log that is only used for
troubleshooting
31Security Log
32Traffic Log
33System Log
34V4.1 vs V5.1 Comparison of Supported Features
and Platforms
- Some 4.1 features and platforms are not supported
in 5.1, and vice versa the 5.1 product offers
new functionality not available in 4.1. - 5.1 Agents are not supported on earlier versions
of Windows Windows 95, 98, ME,and NT 4.0, nor on
the Macintosh or Windows XPe operating systems.
35V4.1 vs V5.1 Comparison of Supported Features
and Platforms
- Comparison of Software Components
36V4.1 vs V5.1 Comparison of Supported Features
and Platforms
37V4.1 vs V5.1 Comparison of Supported Features
and Platforms