5Network menu

5.1Network >> Interfaces

The mGuard has the following interfaces with external access:

Device

Ethernet:

internal: LAN (Ports: XF2-4 or XF2-5)

external: WAN (Port: XF1)

DMZ: DMZ (Port: XF5)

FL MGUARD 2102

LAN: 1
WAN: 1

FL MGUARD 4302

LAN: 1
WAN: 1

FL MGUARD 2105

LAN: 4
WAN: 1

FL MGUARD 4305

LAN: 3
WAN: 1
DMZ: 1

FL MGUARD 4102 PCI(E)

LAN: 1
WAN: 1

The LAN port is connected to a stand-alone computer or the local network (internal). The WAN port is used to connect to the external network.

Network ports (Migration mGuard 8 --> mGuard 10)

Table 5-1: Mapping table (Network portsafter the migration)

mGuard 8

mGuard 10

mGuard 8

(Intern mit ein­gebautem Switch)

mGuard 10

(Intern mit ein­gebautem Switch)

FL MGUARD 2000/4000

WAN

XF1

(n/a)

(n/a)

LAN1

XF2

swp2

swp0

FL MGUARD 2105/4305

LAN2

XF3

swp0

swp1

LAN3

XF4

swp1

swp2

FL MGUARD 2105

LAN4

XF5

swp3

swp3

FL MGUARD 4305

DMZ

XF5

swp4

dmz0

Nicht bei FL MGUARD 2105/FL MGUARD 4305

LAN5

(n/a)

swp4

(n/a)

 

Connecting the network interface

The mGuard platforms have DTE interfaces. Connect the mGuards to the DTE interface using an Ethernet crossover cable. Here auto MDIX is permanently switched on, so it does not matter if the auto negotiation parameter is disabled.

MAC addresses

The MAC address of the WAN interface determined by the manufacturer is indicated on the type label of the device. The other MAC addresses (LAN/DMZ [optional]) can be calculated as follows:

WAN interface: see type label.

LAN interface: MAC address of the WAN interface incremented by 1 (WAN + 1).

Devices with integrated switch: all switch ports use the same MAC address.

DMZ interface: MAC address of the WAN interface incremented by 4 (WAN + 4).

Example:

WAN: 00:a0:45:eb:28:9d

LAN: 00:a0:45:eb:28:9e

DMZ: 00:a0:45:eb:28:a1

 

5.1.1Overview of "Router" network mode

 

 

inset_20.jpg 

Devices of the new device generation are configured with the following default settings: Network mode "Router", Router mode "DHCP".

 

 

If the mGuard is in Router mode, it acts as the gateway between various subnetworks and has both an external interface (WAN port) and an internal interface (LAN port) with at least one IP address.

WAN port

The mGuard is connected to the Internet or other “external” parts of the LAN via its WAN port.

LAN port

The mGuard is connected to a local network or a stand-alone computer via its LAN port.

As in the other modes, firewall and VPN security functions are available (depending on the device).

 

 

inset_23.jpg 

If the mGuard is operated in Router mode, it must be set as the default gateway on the locally connected computers.

This means that the IP address of the mGuard LAN port must be specified as the default gateway address on these computers.

 

 

inset_25.jpg 

NAT should be activated if the mGuard is operated in Router mode and establishes the connection to the Internet (see "Network >> NAT" on page 130).

Only then can the computers in the connected local network access the Internet via the mGuard. If NAT is not activated, it is possible that only VPN connections can be used.

  

There are two router modes:

Static

DHCP

Router Mode: Static

The external IP-settings are fixed.

Router Mode: DHCP

The external IP-settings are requested by the mGuard and assigned by an external DHCP server.

5.1.2Overview of "Stealth" network mode

Stealth mode (Plug-n-Protect) is used to protect a stand-alone computer or a local network with the mGuard. Important: if the mGuard is in Stealth network mode, it is inserted into the existing network (see figure) without changing the existing network configuration of the con­nected devices.

mguard-anschluss_NEU.png

 

The mGuard analyzes the network traffic and independently configures its network connec­tion accordingly. It works transparently and therefore cannot be detected in the network without configured management IP address. Connected computers keep their network con­figuration and must not be reconfigured.

As in the other modes, firewall and VPN security functions are available (depending on the device).

Externally supplied DHCP data is allowed through to the connected computer.

 

 

inset_26.jpg 

In Single-Stealth mode, a firewall installed on the computer must be configured to allow ICMP echo requests (ping), if the mGuard is to provide services such as VPN, DNS, NTP, etc.

 

 

 

inset_51.jpg 

In Stealth mode, the mGuard uses internal IP address 1.1.1.1. This can be accessed from the computer if the default gateway configured on the computer is accessible.

 

 

 

inset_53.jpg 

In the Stealth configurations "Autodetect" and "Static", it is not possible to establish a VPN-connection originating from the internal client through the mGuard.

Stealth configurations

Autodetect

The mGuard analyzes the outgoing network traffic and independently configures its network connection accordingly. It operates transparently.

 

 

inset_57.jpg 

For the use of certain functions (e.g. automatic updates or establishment of VPN-connec­tions), it is required that the mGuard makes its own requests of external servers, even in stealth mode.

These requests are only possible when the locally connected computer permits ping re­quests. Configure its security settings accordingly.

Static

If the mGuard cannot analyze the network traffic, e.g., because the locally connected com­puter only receives data and does not send it, then Stealth configuration must be set to Static. In this case, further input fields are available for Static Stealth Configuration.

Multiple clients

As with Autodetect, but it is possible to connect more than one computer to the LAN port (secure port) of the mGuard, meaning that multiple IP addresses can be used at the LAN port (secure port) of the mGuard.

For the further configuration of Stealth network mode, see "Stealth" on page 121.

5.1.3General

Netzwerk_Interfaces_Allgemein__Router_Statisch.png

Network >> Interfaces >> General

Network Status

External IP address

Display only: the addresses via which the mGuard can be ac­cessed by devices from the external network. They form the interface to other parts of the LAN or to the Internet. If the tran­sition to the Internet takes place here, the IP addresses are usually assigned by the Internet service provider (ISP). If an IP address is assigned dynamically to the mGuard, the currently valid IP address can be found here.

In Stealth mode, the mGuard adopts the address of the locally connected computer as its external IP.

 

Current default route

Display only: the IP address that the mGuard uses to try to reach unknown networks is displayed here. If a default route has not been specified, the field is left empty.

 

Used DNS servers

Display only: the names of the DNS servers used by the mGuard for name resolution are displayed here. This informa­tion can be useful, for example, if the mGuard is using the DNS servers assigned to it by the Internet service provider.

Network mode

Network mode

Router / Stealth

The mGuard must be set to the network mode that corre­sponds to its connection to the network

Section0600190.jpg

.

See also:

"Overview of "Router" network mode" on page 111 and "Over­view of "Stealth" network mode" on page 112.

 

Depending on the network mode selected and the mGuard device, different setting op­tions are available on the web interface:

 

 

Router Mode

(Only if "Router" network mode was selected)

Static / DHCP

For a detailed description, see:

"Router Mode: Static" on page 111

"Router Mode: DHCP" on page 111

 

Stealth configuration

(Only if "Stealth" network mode was selected)

Autodetect / Static / Multiple clients

Autodetect

The mGuard analyzes the network traffic and independently configures its network connection accordingly. It operates transparently.

Section0600192.jpg

Static

If the mGuard cannot analyze the network traffic, e.g., because the locally connected computer only receives data and does not send it, then Stealth configuration must be set to Static. In this case, further input fields are available for Static Stealth Configuration at the bottom of the page.

Multiple clients

(Default) As with Autodetect, but it is possible to connect more than one computer to the LAN port (secure port) of the mGuard, meaning that multiple IP addresses can be used at the LAN port (secure port) of the mGuard.

 

 

 

 

Autodetect: ignore NetBIOS over TCP traffic on TCP port 139

(Only with Autodetect Stealth configuration)

If a Windows computer has more than one network card in­stalled, it may alternate between the different IP addresses for the sender address in the data packets it sends. This applies to network packets that the computer sends to TCP port 139 (NetBIOS). As the mGuard determines the address of the computer from the sender address (and therefore the address via which the mGuard can be accessed), the mGuard would have to switch back and forth, and this would hinder operation considerably. To avoid this, activate the function if the mGuard has been connected to a computer that has these properties.

5.1.4External

Netzwerk_Interfaces_Extern.png

Network >> Interfaces >> External (network mode = "Router", router mode = "Static")

External Networks

The addresses via which the mGuard can be accessed by external devices that are lo­cated behind the WAN port. If the transition to the Internet takes place here, the external IP address of the mGuard is assigned by the Internet service provider (ISP).

 

IP address

IP address via which the mGuard can be accessed via its WAN port.

 

Netmask

The netmask of the network connected to the WAN port.

 

Use VLAN

If the IP address should be within a VLAN, activate the func­tion.

 

VLAN ID

A VLAN ID between 1 and 4095.

For an explanation of the term "VLAN", please refer to the glossary on page 324.

If you want to delete entries from the list, please note that the first entry cannot be deleted.

 

OSPF area

(Only if OSPF is activated)

Links the learned (DHCP) or configured (static) ad­dresses/routes of the external network interface to an OSPF area (see "Network >> Dynamic Routing" on page 151).

Additional External Routes

In addition to the default route via the default gateway specified below, additional external routes can be specified.

 

Network

Specify the network in CIDR format (see "CIDR (Classless Inter-Domain Routing)" on page 34).

 

Gateway

The gateway via which this network can be accessed.

See also "Network example diagram" on page 35.

Default gateway

IP of default gateway

The IP address of a device in the local network (connected to the LAN port) or the IP address of a device in the external net­work (connected to the WAN port) can be specified here.

If the mGuard is used within the LAN, the IP address of the de­fault gateway is assigned by the network administrator.

Section0600194.jpg

5.1.5Internal

Netzwerk_Interfaces_Intern.png

Network >> Interfaces >> Internal (Network mode = "Router")

Internal Networks

IP address

IP address under which the mGuard device shall be accessi­ble from the locally connected network via its LAN port.

The default settings in Router mode are as follows:

IP address:    192.168.1.1

Netmask:    255.255.255.0

You can also specify other addresses via which the mGuard can be accessed by devices in the locally connected network. For example, this can be useful if the locally connected net­work is divided into subnetworks. Multiple devices in different subnetworks can then access the mGuard via different ad­dresses.

 

Netmask

The netmask of the network connected to the LAN port.

 

Use VLAN

If the IP address should be within a VLAN, activate the func­tion.

 

VLAN ID

A VLAN ID between 1 and 4095.

For an explanation of the term "VLAN", please refer to the glossary on page 324.

If you want to delete entries from the list, please note that the first entry cannot be deleted.

 

OSPF area

(Only if OSPF is activated)

Links the static addresses/routes of the internal network inter­face to an OSPF area (see "Network >> Dynamic Routing" on page 151).

Additional Internal Routes

Additional routes can be defined if further subnetworks are connected to the locally con­nected network.

 

Network

Specify the network in CIDR format (see "CIDR (Classless Inter-Domain Routing)" on page 34).

 

Gateway

The gateway via which this network can be accessed.

See also "Network example diagram" on page 35.

5.1.6DMZ

Netzwerk_Interfaces_DMZ.png

Network >> Interfaces >> DMZ (Network mode = "Router")

DMZ Networks

(Only for FL MGUARD 4305)

IP addresses

IP address via which the mGuard can be accessed by devices in the network connected to the DMZ port.

Section0600196.jpg

In "Router" network mode, every newly added table line has default settings:

IP address:    192.168.3.1

Netmask:    255.255.255.0

You can also specify other addresses via which the mGuard can be accessed by devices in the networks connected to the DMZ port. For example, this can be useful if the network con­nected to the DMZ port is divided into subnetworks. Multiple devices in different subnetworks can then access the mGuard via different addresses.

 

IP address

IP address via which the mGuard can be accessed via its DMZ port.

Default: 192.168.3.1

 

Netmask

The netmask of the network connected to the DMZ port.

Default: 255.255.255.0

 

OSPF area

(Only if OSPF is activated)

Links the static addresses/routes of the DMZ network inter­face to an OSPF area (see "Network >> Dynamic Routing" on page 151).

Additional DMZ Routes

Additional routes can be defined if further subnetworks are connected to the DMZ.

 

Network

Specify the network in CIDR format (see "CIDR (Classless Inter-Domain Routing)" on page 34).

Default: 192.168.3.0/24

 

Gateway

The gateway via which this network can be accessed.

See also "Network example diagram" on page 35.

Default: 192.168.3.254

5.1.7Stealth

Netzwerk_Interfaces_Stealth.png

Network >> Interfaces >> Stealth (“Stealth” network mode)

Stealth Management

Additional Management IP addresses for the administration of the mGuard can be spec­ified here.

If:

The Multiple clients option is selected under Stealth configuration 

The client does not answer ARP requests

No client is available

Remote access via HTTPS, SNMP, and SSH is only possible using this address.

Section0600198.jpg

 

IP address

Management IP address via which the mGuard can be ac­cessed and administered.

Section0600200.jpg

 

The IP address "0.0.0.0" deactivates the management IP ad­dress.

Change the management IP address first before specifying any additional addresses.

 

Netmask

The netmask of the IP address above.

 

Use VLAN

This option is valid only if you have set the „Stealth configura­tion“ option to „Multiple clients“.

IP address and netmask of the VLAN port.

If the IP address should be within a VLAN, activate the func­tion.

 

VLAN ID

This option only applies if you set the "Stealth configuration"  option to "Multiple clients".

A VLAN ID between 1 and 4095.

An explanation can be found under "VLAN" on page 324.

If you want to delete entries from the list, please note that the first entry cannot be deleted.

Section0600202.jpg

 

Default gateway

The default gateway of the network where the mGuard is lo­cated.

Section0600204.jpg

Networks to be routed over alternative gateways

Static routes

In Stealth modes "Autodetect" and "Static", the mGuard adopts the default gateway of the computer connected to its LAN port. This does not apply if a management IP address is configured with the default gateway.

Alternative routes can be specified for data packets destined for the WAN that have been created by the mGuard. These include for instance the packets from the following types of data traffic:

Download of certificate revocation lists (CRLs)

Download of a new configuration

Communication with an NTP server (for time synchronization)

Sending and receiving encrypted data packets from VPN connections

Requests to DNS servers

Log messages

Download of firmware updates

Download of configuration profiles from a central server (if configured)

SNMP traps

 

If this option is used, make the relevant entries afterwards. If it is not used, the affected data packets are routed via the default gateway specified for the client.

Netzwerk_Interfaces_Allgemein__Stealth_Automatisch_Alternative_GW.png

 

Network

Specify the network in CIDR format (see "CIDR (Classless Inter-Domain Routing)" on page 34).

 

Gateway

The gateway via which this network can be accessed.

The routes specified here are mandatory routes for data pack­ets created by the mGuard. This setting has priority over other settings (see also "Network example diagram" on page 35).

Settings for Stealth mode (static)

(Only when "static" stealth configura­tion is selected)

Client IP address

The IP address of the computer connected to the LAN port.

 

Client MAC address

The physical address of the network card of the local com­puter to which the mGuard is connected.

The MAC address can be determined as follows:

In DOS (Start, All Programs, Accessories, Command Prompt), enter the following command: ipconfig /all

 

 

The MAC address does not necessarily have to be specified. The mGuard can automatically obtain the MAC address from the client. The MAC address 0:0:0:0:0:0 must be set in order to do this. Please note that the mGuard can only forward net­work packets to the client once the MAC address of the client has been determined.

If no Stealth Management IP Address or Client MAC address is configured in static Stealth mode, then DAD ARP requests are sent via the internal interface (see RFC 2131, "Dynamic Host Configuration Protocol", Section 4.4.1).

 

5.2Network >> Ethernet  

5.2.1MAU Settings

Netzwerk_Ethernet_MAU-Einstellungen.png

Network >> Ethernet >> MAU Settings

Port Mirroring

(Only for FL MGUARD 4305)

Port mirroring receiver

The integrated switch controls port mirroring in order to moni­tor the network traffic. Here, you can decide which ports you want to monitor. The switch then sends copies of data frames from the monitored ports to a selected port.

The port mirroring function enables any frames to be for­warded to a specific recipient. You can select the receiver port or the mirroring of the incoming and outgoing frames from each switch port.

MAU Configuration

Configuration and status indication of the Ethernet connections:

 

Port

Name of the Ethernet connection to which the row refers.

 

Media type

Media type of the Ethernet connection.

 

Automatic configura­tion

Activated: tries to determine the required operating mode au­tomatically.

Deactivated: uses the operating mode specified in the “Man­ual configuration” column.

 

Manual configuration

The desired operating mode when Automatic configuration is deactivated.

 

Current mode

The current operating mode of the network connection.

 

Port on

 

Switches the Ethernet connection on or off.

 

Link supervision

Only visible when the "Management >> Service I/O >> Alarm output" menu item „Link supervision“ is set to “Supervise”.

If link supervision is active, the alarm output is opened if one link does not indicate connectivity.

 

Port mirroring

(Only for FL MGUARD 4305)

The port mirroring function enables any frames to be for­warded to a specific recipient. You can select the receiver port or the mirroring of the incoming and outgoing frames from each switch port.

Address Resolution Table

(Only for FL MGUARD 4305)

 

Port

Name of the Ethernet connection to which the row refers.

MAC addresses

Lists the MAC addresses of the connected Ethernet-capable devices.

The switch can learn MAC addresses which belong to the ports of its connected Ethernet-capable devices. The contents of the list can be deleted by clicking on the “Purge” button.

Port Statistics

(Only for FL MGUARD 4305)

 

A statistic is displayed for each physically accessible port of the integrated Managed Switch. The counter can be reset via the web interface or the following command:

/Packages/mguard-api_0/mbin/action switch/reset-phy-counters

 

Port

Name of the Ethernet connection to which the row refers.

 

TX collisions

Number of errors while sending the data

 

TX octets

Data volume sent

 

RX FCS errors

Number of received frames with invalid checksum

 

RX good octets

Volume of the valid data received

5.2.2Multicast

 

 

inset_55.jpg 

Only available with FL MGUARD 4305.

  

Netzwerk_Ethernet_Multicast.png

 

Network >> Ethernet >> Multicast

Static Multicast Groups

Static Multicast Groups

Note: For data to be correctly forwarded to the configured ports in Static Multicast Groups, "IGMP snooping" must be en­abled (see below).

Multicast is a technology which enables data to be sent to a group of recipients, without the transmitter having to send it multiple times. The data replication takes place through the distributor within the network.

You can create a list of multicast group addresses. The data is forwarded to the configured ports (XF2 ... XF4).

General Multicast Configu­ration

IGMP snooping

(Not active in network mode „Stealth“)

The switch uses IGMP snooping to guarantee that multicast data is only forwarded via ports which are intended for this use.

 

IGMP snoop aging

Period, after which membership to the multicast group ex­pires, in seconds.

 

IGMP query

IGMP is used to join and leave a multicast group. Here, the IGMP version can be selected.

IGMP version v1 (IGMPv1) is no longer supported. All devices of the new device generation exclusively support IGMP ver­sion v2 (IGMPv2).

 

IGMP query interval

Interval in which IGMP queries are generated in seconds.

If the interval is changed, new IGMP requests are generated only after the previously configured interval has expired.

Multicast Groups

Displays the multicast groups. The display contains all static entries and the dynamic en­tries which are discovered by IGMP snooping.

5.2.3Ethernet  

Netzwerk_Ethernet_Ethernet.png

 

Network >> Ethernet >> Ethernet

ARP Timeout

ARP Timeout

Service life of entries in the ARP table.

The entry can be in seconds [ss], minutes and seconds [mm:ss] or hours, minutes, and seconds [hh:mm:ss].

MAC and IP addresses are assigned to each other in the ARP table.

The MTU settings

MTU of the ... interface

The maximum transfer unit (MTU) defines the maximum IP packet length that may be used for the relevant interface.

Allowed values: 68 - 1500

The following applies for a VLAN interface:

Section0600206.jpg

 

5.3Network >> NAT

5.3.1Masquerading

Netzwerk_NAT_Maskierung.png

Network >> NAT >> Masquerading

Network Address Transla­tion/IP Masquerading

Lists the rules established for NAT (Network Address Translation).

For outgoing data packets, the device can rewrite the specified sender IP addresses from its internal network to its own external address, a technique referred to as NAT (Network Address Translation), see also NAT (Network Address Translation) in the glossary.

This method is used if the internal addresses cannot or should not be routed externally, e.g., because a private address area such as 192.168.x.x or the internal network structure should be hidden.

The method can also be used to hide external network structures from the internal de­vices. To do so, set the Internal option under  Outgoing on interface  . The Internal set­ting allows for communication between two separate IP networks where the IP devices have not configured a (useful) default route or differentiated routing settings (e.g., PLCs without the corresponding settings). The corresponding settings must be made under   1:1 NAT  .

This method is also referred to as IP masquerading.

 

Default setting: IP Masquerading is active for packets routed from the internal network (LAN) to the external network (WAN) (LAN --> WAN).

Section0600208.jpg
Section0600210.jpg

 

Outgoing on interface

Internal / External / DMZ / All external

Specifies via which interface the data packets are sent so that the rule applies to them.

„All external“ refers to "External" for FL MGUARD 2000/4000 devices.

 

 

Masquerading is defined, which applies for network data flows in Router mode. These data flows are initiated so that they lead to a destination device which can be accessed over the selected network interface on the mGuard.

 

 

To do this, the mGuard replaces the IP address of the initiator with a suitable IP address of the selected network interface in all associated data packets. The effect is the same as for the other values of the same variables. The IP address of the initi­ator is hidden from the destination of the data flow. In particu­lar, the destination does not require any routes in order to re­spond in a data flow of this type (not even a default route (default gateway)).

 

Section0600212.jpg 

 

From IP

0.0.0.0/0 means that all internal IP addresses are subject to the NAT procedure. To specify an address area, use CIDR for­mat (see "CIDR (Classless Inter-Domain Routing)" on page 34).

Name of IP groups, if defined. When a name is specified for an IP group, the host names, IP addresses, IP areas or net­works saved under this name are taken into consideration (see "IP/Port Groups" on page 198).

Section0600214.jpg

 

Comment

Can be filled with appropriate comments.

1:1 NAT

 

 

 

Lists the rules established for 1:1 NAT (Network Address Translation).

With 1:1 NAT, the sender IP addresses are exchanged so that each individual address is exchanged with another specific address, and is not exchanged with the same address for all data packets, as in IP masquerading. This enables the mGuard to mirror addresses from the real network to the virtual network.

Example:

The mGuard is connected to network 192.168.0.0/24 via its LAN port and to network 10.0.0.0/24 via its WAN port. By using 1:1 NAT, the LAN computer with IP address 192.168.0.8 can be accessed via IP address 10.0.0.8 in the virtual network.

sym-mguard.gif

 

The mGuard claims the IP addresses entered for the “Virtual network” for the devices in its “Real network”. The mGuard returns ARP answers for all addresses from the specified “Virtual network” on behalf of the devices in the “Real network”. The IP addresses entered under “Virtual network” must not be used. They must not be assigned to other devices or used in any way, as an IP address conflict would otherwise occur in the virtual network. This even applies when no device exists in the “Real network” for one or more IP ad­dresses from the specified “Virtual network”.

 

Default setting: 1:1 NAT is not active.

Section0600217.jpg

 

Real network

The real IP address of the client that should be reachable from another network via the virtual IP address (depending on the scenario at LAN, WAN, or DMZ port).

One or more clients can be reachable depending on the net­work mask.

1:1-NAT is possible between all interfaces (LAN <–> WAN, LAN <–> DMZ, DMZ <–> WAN).

 

Virtual network

The virtual IP address with which the clients are reachable from the other network (depending on the scenario at LAN, WAN, or DMZ port).

Section0600219.jpg

1:1-NAT is possible between all interfaces (LAN <–> WAN, LAN <–> DMZ, DMZ <–> WAN).

 

Netmask

The netmask as a value between 1 and 32 for the local and ex­ternal network address (see also "CIDR (Classless Inter-Do­main Routing)" on page 34).

 

Enable ARP

When the function is activated, ARP requests sent to the vir­tual network are answered on behalf of the mGuard. This means that hosts located in the real network can be accessed via their virtual address.

When the function is deactivated, ARP requests sent to the vir­tual network remain unanswered. This means that hosts in the real network cannot be accessed.

 

Comment

Can be filled with appropriate comments.

5.3.2IP and Port Forwarding

Netzwerk_NAT_IP-und-Port-Weiterleitung.png

Network >> NAT >> IP and Port Forwarding

IP and Port Forwarding

Lists the rules defined for port forwarding (DNAT = Destination NAT).

IP and port forwarding performs the following: the headers of incoming data packets from the external network, which are addressed to the external IP address (or one of the exter­nal IP addresses) of the mGuard and to a specific port of the mGuard, are rewritten in order to forward them to a specific computer in the internal network and to a specific port on this computer. In other words, the IP address and port number in the header of incom­ing data packets are changed.

IP and port forwarding from the internal network behaves as described above.

Section0600221.jpg
Section0600223.jpg

 

Protocol: TCP / UDP / GRE

Specify the protocol to which the rule should apply.

GRE

GRE protocol IP packets can be forwarded. However, only one GRE connection is supported at any given time. If more than one device sends GRE packets to the same external IP address, the mGuard may not be able to feed back reply pack­ets correctly. We recommend only forwarding GRE packets from specific transmitters. These could be ones that have had a forwarding rule set up for their source address by entering the transmitter address in the “From IP” field, e.g., 193.194.195.196/32.

 

From IP

The sender address for forwarding.

0.0.0.0/0 means all addresses. To specify an address area, use CIDR format (see "CIDR (Classless Inter-Domain Rout­ing)" on page 34).

Name of IP groups, if defined. When a name is specified for an IP group, the host names, IP addresses, IP areas or networks saved under this name are taken into consider­ation (see "IP/Port Groups" on page 198).

Section0600225.jpg

 

 

From port

The sender port for forwarding.

any refers to any port.

Either the port number or the corresponding service name can be specified here, e.g., pop3 for port 110 or http for port 80.

Name of port groups, if defined. When a name is specified for a port group, the ports or port ranges saved under this name are taken into consideration (see "IP/Port Groups" on page 198).

 

Incoming on IP

Specify the external IP address (or one of the external IP addresses) of the mGuard here, or

Specify the internal IP address (or one of the internal IP addresses) of the mGuard here, or

Use the variable %extern (if the external IP address of the mGuard is changed dynamically so that the external IP address cannot be specified).

If multiple static IP addresses are used for the WAN port, the %extern variable always refers to the first IP address in the list.

 

Incoming on port

The original destination port specified in the incoming data packets.

Either the port number or the corresponding service name can be specified here, e.g., pop3 for port 110 or http for port 80.

This information is not relevant for the “GRE” protocol. It is ig­nored by the mGuard.

 

Redirect to IP

The internal IP address to which the data packets should be forwarded and into which the original destination addresses are translated.

 

Redirect to port

The port to which the data packets should be forwarded and into which the original port data is translated.

Either the port number or the corresponding service name can be specified here, e.g., pop3 for port 110 or http for port 80.

This information is not relevant for the “GRE” protocol. It is ig­nored by the mGuard.

 

Comment

Freely selectable comment for this rule.

 

Log

For each individual port forwarding rule, you can specify whether the use of the rule:

Should be logged – activate Log function

Should not be logged – deactivate Log function (default)

5.4Network >> DNS

5.4.1DNS server

Netzwerk_DNS_DNS-Server.png

Network >> DNS >> DNS server

DNS

If the mGuard is to initiate a connection to a peer on its own (e.g., to a VPN gateway or NTP server) and it is specified in the form of a host name (i.e., www.example.com), the mGuard must determine which IP address belongs to the host name. To do this, it con­nects to a domain name server (DNS) to query the corresponding IP address there. The IP address determined for the host name is stored in the cache so that it can be found di­rectly (i.e., more quickly) for other host name resolutions.

With the Local resolving of hostnames function, the mGuard can also be configured to re­spond to DNS requests for locally used host names itself by accessing an internal, previ­ously configured directory.

The locally connected clients can be configured (manually or via DHCP) so that the local address of the mGuard is used as the address of the DNS server to be used.

If the mGuard is operated in Stealth mode, the management IP address of the mGuard (if this is configured) must be used for the clients, or the IP address 1.1.1.1 must be entered as the local address of the mGuard.

 

State of the DNS resolver

Status of the host name resolution

 

Used DNS servers

DNS servers for which the associated IP address was queried.

 

Servers to query

DNS root servers

Requests are sent to the root name servers on the Internet whose IP addresses are stored on the mGuard. These ad­dresses rarely change.

Provider defined (i.e., via DHCP)

The DNS servers of the Internet service provider (ISP) that provide access to the Internet are used. Only select this set­ting if the mGuard operates in Router mode with DHCP.

The setting can also be used if the mGuard is located in Stealth mode (automatic). In this case, the DNS server that the client uses can be recognized and taken on.

User defined (servers listed below)

If this setting is selected, the mGuard will connect to the DNS servers listed under User defined DNS servers.

User Defined DNS Servers

(Only when User-defined is selected as root server)

The IP addresses of DNS servers can be entered in this list. If this should be used by the mGuard, select the "User defined (servers listed below)"  option under Servers to query.

Section0600227.jpg

 

Local Resolving of Host­names

You can configure multiple entries with assignment pairs of host names and IP addresses for various domain names.

You have the option to define, change (edit), and delete assignment pairs of host names and IP addresses. You can also activate or deactivate the resolution of host names for a domain. In addition, you can delete a domain with all its assignment pairs.

 

Creating a table with assignment pairs for a domain:

Open a new row and click on the ic_mode_edit_black_48dp_2x.png Edit Row icon in this row.

Changing or deleting assignment pairs belonging to a domain:

Click on the ic_mode_edit_black_48dp_2x00229.png Edit Row icon in the relevant table row.

After clicking on Edit row, the DNS Records tab page is displayed:

Netzwerk_DNS_EDIT_DNS_Einträge.png

 

Domain name 

The name can be freely assigned, but it must adhere to the rules for assigning domain names. It is assigned to every host name.

 

Enabled

Activates or deactivates the Local Resolving of Hostnames function for the domain specified in the “Domain name” field.

 

Resolve IP addresses also

Deactivated: the mGuard only resolves host names, i.e., it supplies the assigned IP address for host names.

Activated: as with “Deactivated”. It is also possible to deter­mine the host names assigned to an IP address.

 

Hostnames

The table can have any number of entries.

Section0600230.jpg

 

Host

Host name

 

TTL (hh:mm:ss)

Abbreviation for Time To Live. Default: 3600 seconds (1:00:00)

Specifies how long called assignment pairs may be stored in the cache of the calling computer.

 

IP

The IP address assigned to the host name in this table row.

Example: Local Resolving of Hostnames

The “Local Resolving of Hostnames” function is used in the following scenario, for example:

A plant operates a number of identically structured machines, each one as a cell. The local networks of cells A, B, and C are each connected to the plant network via the Internet using the mGuard. Each cell contains multiple control elements, which can be addressed via their IP addresses. Different address areas are used for each cell.

A service technician should be able to use her/his notebook on site to connect to the local network for machine A, B or C and to communicate with the individual controllers. So that the technician does not have to know and enter the IP address for every single controller in machine A, B or C, host names are assigned to the IP addresses of the controllers in accor­dance with a standardized diagram that the service technician uses. The host names used for machines A, B, and C are identical, i.e., the controller for the packing machine in all three machines has the host name “pack”, for example. However, each machine is assigned an individual domain name, e.g., cell-a.example.com.

Section0600232.jpg

Figure 5-1: Local Resolving of Hostnames

5.4.2DynDNS

Netzwerk_DNS_DynDNS.png

Network >> DNS >> DynDNS

DynDNS

In order for a VPN connection to be established, at least one partner IP address must be known so that the partners can contact each other. This condition is not met if both partic­ipants are assigned IP addresses dynamically by their respective Internet service provid­ers. In this case, a DynDNS service such as DynDNS.org or DNS4BIZ.com can be of as­sistance. With a DynDNS service, the currently valid IP address is registered under a fixed name.

If you have registered with one of the DynDNS services supported by the mGuard, you can enter the corresponding information in this dialog box.

 

 

Register the mGuard at a DynDNS service

Activate the function if you have registered with a DynDNS provider and if the mGuard is to use this service. The mGuard then reports its current IP address to the DynDNS service (i.e., the one assigned for its Internet connection by the Internet ser­vice provider).

 

State of the DynDNS registration

State of the DynDNS registration

 

Status message

Status message

 

Refresh Interval

Default: 420 (seconds).

The mGuard informs the DynDNS service of its new IP ad­dress whenever the IP address of its Internet connection is changed. In addition, the device can also report its IP address at the interval specified here. This setting has no effect for some DynDNS providers, such as DynDNS.org, as too many updates can cause the account to be closed.

 

DynDNS provider

The providers in this list support the same protocol as the mGuard. Select the name of the provider with whom you are registered, e.g., DynDNS.org, TinyDynDNS, DNS4BIZ.

If your provider is not in the list, select DynDNS-compatible and enter the server and port for this provider.

 

DynDNS server

Only visible when DynDNS provider is set to DynDNS-com­patible.

Name of the server for the DynDNS provider.

 

DynDNS port

Only visible when DynDNS provider is set to DynDNS-com­patible.

Number of the port for the DynDNS provider.

 

DynDNS
login

Enter the user identifier assigned by the DynDNS provider here.

 

DynDNS password

Enter the password assigned by the DynDNS provider here.

 

DynDNS hostname

The host name selected for this mGuard at the DynDNS ser­vice, providing you use a DynDNS service and have entered the corresponding data above.

The mGuard can then be accessed via this host name.

5.5Network >> DHCP

The dynamic host configuration protocol (DHCP) can be used to automatically assign the network configuration set here to the computers connected directly to the mGuard.

You can specify the DHCP settings for the internal interface (LAN port) under Internal DHCP and the DHCP settings for the external interface (WAN port) under External DHCP. DHCP settings for the DMZ interface (DMZ port) can be made under DMZ DHCP.

 

 

inset_31.jpg 

In the default settings, the DHCP server of the mGuard device is activated by default for the LAN interface (port XF2-4 or XF2-5) (Internal DHCP).

This means that network clients connected via the LAN interface automatically receive their network configuration from the mGuard device if they have also activated DHCP.

 

 

 

inset_32.jpg 

The menu items External DHCP and DMZ DHCP are not part of the FL MGUARD 2000 series functionality.

 

 

 

inset_33.jpg 

The DHCP server also operates in Stealth mode.

In multi-stealth mode, the external DHCP server of the mGuard cannot be used if a VLAN ID is assigned as the management IP.

 

 

inset_34.jpg 

IP configuration for Windows computers: when you start the DHCP server of the mGuard, you can configure the locally connected computers so that they obtain their IP configura­tion automatically from the mGuard via DHCP.

Please also refer to the chapter „Obtaining the IP setting per DHCP (Windows)“, in the user manual UM EN HW FL MGUARD 2000/4000, available at phoenixcontact.net/prod­uct/1357828).

5.5.1Internal/External DHCP

 

 

inset_77.jpg 

The menu item External DHCP is not part of the FL MGUARD 2000 series functionality.

 

Netzwerk_DHCP_Internes_DHCP__Server.png

Network >> DHCP >> Internal DHCP

 

The settings for Internal DHCP and External DHCP are essentially identical and are not described separately in this section.

Mode

DHCP mode

Disabled / Server / Relay

Set this option to Server if the mGuard is to operate as an in­dependent DHCP server (default setting: Internal DHCP). The corresponding setting options are then displayed below on the tab page (see "DHCP mode: Server" ).

Set this option to Relay if the mGuard is to forward DHCP re­quests to another DHCP server. The corresponding setting options are then displayed below on the tab page (see "DHCP mode: Relay" ).

Section0600234.jpg

If this option is set to Disabled, the mGuard does not answer any DHCP requests.

DHCP mode: Server

 

If DHCP mode is set to Server, the corresponding setting options are displayed below as follows.

Netzwerk_DHCP_Internes_DHCP__Server00236.png

DHCP Server Options

Enable dynamic IP address pool:

When the function is activated, the IP address pool specified under DHCP range start and DHCP range end is used (see below).

Deactivate the function if only static assignments should be made using the MAC addresses (see below).

 

DHCP lease time

Time in seconds for which the network configuration assigned to the computer is valid. The client should renew its assigned configuration shortly before this time expires. Otherwise it may be assigned to other computers.

 

DHCP range start

(With enabled dynamic IP address pool)

The start of the address area from which the DHCP server of the mGuard should assign IP addresses to locally connected computers.

 

DHCP range end

(With enabled dynamic IP address pool)

The end of the address area from which the DHCP server of the mGuard should assign IP addresses to locally connected computers.

 

Local netmask

Specifies the netmask of the computers. Default: 255.255.255.0

 

Broadcast address

Specifies the broadcast address of the computers.

 

Default gateway

Specifies which IP address should be used by the computer as the default gateway. Usually this is the internal IP address of the mGuard.

 

DNS server

Address of the server used by the computer to resolve host names in IP addresses via the Domain Name Service (DNS).

If the DNS service of the mGuard is to be used, enter the inter­nal IP address of the mGuard here.

 

WINS server

Address of the server used by the computer to resolve host names in addresses via the Windows Internet Naming Service (WINS).

Static Mapping

Client MAC address

To find out the MAC address of your computer, proceed as follows:

Windows:

Start ipconfig /all in a command prompt. The MAC ad­dress is displayed as the “Physical Address”.

Linux:

Call /sbin/ifconfig or ip link show in a shell.

 

 

The following options are available:

Client/computer MAC address (without spaces or hy­phens)

Client IP address

 

Client IP address

The static IP address of the computer to be assigned to the MAC address.

Section0600237.jpg
Section0600239.jpg
Section0600241.jpg
Section0600243.jpg

Current Leases

The current leases assigned by the DHCP server are displayed with MAC address, IP ad­dress, and expiration date (timeout).

DHCP mode: Relay

 

If DHCP mode is set to Relay, the corresponding setting options are displayed below as follows.

Netzwerk_DHCP_Internes_DHCP__Relay.png

DHCP Relay Options

Section0600245.jpg

 

 

DHCP servers to relay to

A list of one or more DHCP servers to which DHCP requests should be forwarded.

 

Append relay agent information (option 82)

When forwarding, additional information for the DHCP servers to which information is being forwarded can be appended ac­cording to RFC 3046.

5.5.2DMZ DHCP

 

 

inset_47.jpg 

The menu item DMZ DHCP is not part of the FL MGUARD 2000 series functionality.

 

Netzwerk_DHCP_DMZ.png

 

The DHCP server functionality of the mGuard is expanded on its DMZ interface (DMZ port). The mGuard can automatically assign a network configuration to clients connected to the DMZ port via the DHCP protocol.

Network >> DHCP >> DMZ DHCP

Mode

Enable DHCP server on the DMZ port

Enables the DHCP server on the DMZ interface.

If the function is disabled, the mGuard does not answer any DHCP queries on the DMZ interface.

DHCP Server Options

Enable dynamic IP address pool:

When the function is activated, the IP address pool specified under DHCP range start and DHCP range end is used (see below).

Deactivate the function if only static assignments should be made using the MAC addresses (see below).

 

DHCP lease time

Time in seconds for which the network configuration assigned to the computer is valid. The client should renew its assigned configuration shortly before this time expires. Otherwise it may be assigned to other computers.

 

DHCP range start

(With enabled dynamic IP ad­dress pool)

The start of the address area from which the DHCP server of the mGuard should assign IP addresses to locally connected computers.

 

DHCP range end

(With enabled dynamic IP ad­dress pool)

The end of the address area from which the DHCP server of the mGuard should assign IP addresses to locally connected computers.

 

Local netmask

Specifies the netmask of the computers. Default: 255.255.255.0

 

Broadcast address

Specifies the broadcast address of the computers.

 

Default gateway

Specifies which IP address should be used by the computer as the default gateway. Usually this is the internal IP address of the mGuard.

 

DNS server

Address of the server used by the computer to resolve host names in IP addresses via the Domain Name Service (DNS).

If the DNS service of the mGuard is to be used, enter the inter­nal IP address of the mGuard here.

 

WINS server

Address of the server used by the computer to resolve host names in addresses via the Windows Internet Naming Service (WINS).

Static Mapping

Client MAC address

To find out the MAC address of your computer, proceed as follows:

Windows:

Start ipconfig /all in a command prompt. The MAC ad­dress is displayed as the “Physical Address”.

Linux:

Call /sbin/ifconfig or ip link show in a shell.

 

 

The following options are available:

Client/computer MAC address (without spaces or hy­phens)

Client IP address

 

Client IP address

The static IP address of the computer to be assigned to the MAC address.

Section0600247.jpg
Section0600249.jpg
Section0600251.jpg
Section0600253.jpg

Current Leases

The current leases assigned by the DHCP server are displayed with MAC address, IP ad­dress, and expiration date (timeout).

 

5.6Network >> Proxy Settings

5.6.1HTTP(S) Proxy Settings

Netzwerk_Proxy-Einstellungen_HTTPS-Proxy-Einstelllungen.png

A proxy server can be specified here for the following activities performed by the mGuard itself:

CRL download

Firmware update

Regular configuration profile retrieval from a central location

Restoring of licenses

Network >> Proxy Settings >> HTTP(S) Proxy Settings

The http(s) proxy settings

Use proxy for HTTP and HTTPS

When the function is activated, connections that use the HTTP or HTTPS protocol are transmitted via a proxy server whose address and port should also be specified.

Connections that are transmitted in encapsulated form using the VPN in TCP encapsulation function are also routed via the proxy server (see "TCP encapsulation" on page 217).

Section0600255.jpg

 

HTTP(S) proxy server

Host name or IP address of the proxy server.

 

Port

Number of the port to be used, e.g., 3128.

Proxy Authentication

Login

User identifier (login) for proxy server login.

 

Password

Password for proxy server login.

 

 

5.7Network >> Dynamic Routing

In larger company networks, the use of dynamic routing protocols can make it easier for the network administrator to create and manage routes or even eliminate the need for this.

The OSPF (Open Shortest Path First) routing protocol allows participating routers to ex­change and adapt the routes for transmitting IP packets in their autonomous network in real time (dynamically). The best route to each subnetwork is determined for all participating routers and entered in routing tables for the devices. Changes in the network topology are automatically sent to neighboring OSPF routers and eventually distributed by them to all participating OSPF routers.

 

 

inset_67.jpg 

This menu is only available when the mGuard is in “Router” network mode.

5.7.1OSPF

Netzwerk_Dynamisches-Routing_OSPF__FEHLER.png

OSPF can be configured for internal, external, and DMZ interfaces. The support of OSPF via IPsec and GRE is currently not available.

Multiple OSPF areas can be configured in order to distribute local routes and learn external routes. The status of all learned routes is displayed in a table.

 

Network >> Dynamic Routing >> OSPF

Activation

Enable OSPF

When the function is deactivated (default): OSPF is disabled on the device.

When the function is activated: dynamic routing using the OSPF protocol is enabled on the device. New routes can be learned and distributed by neighboring OSPF routers.

 

OSPF hostname

If an OSPF hostname is assigned here, this is communicated to the participating OSPF routers instead of the global host name.

 

Router ID

The Router ID in the form of an IP address must be unique within the autonomous system. It can otherwise be freely se­lected and typically corresponds to the IP address of the WAN or LAN interface of the mGuard.

OSPF Areas

The autonomous system is segmented using OSPF Areas. The routes between OSPF routers are exchanged within an area. The mGuard can belong to one or more OSPF ar­eas. Distribution between neighboring areas is also possible using the “Transition Area” (see below).

 

Name

The Name can be freely selected (default: ID). An OSPF router is clearly identified by its ID.

 

ID

In general, the ID can be freely selected. If an OSPF area is as­signed the ID 0, it becomes the “Transition Area”. This area is used to exchange routing information between two neigh­boring areas and then distribute it.

 

Stub area

If the OSPF area is a stub area, activate the function.

 

Authentication

None / Simple / Digest

Authentication of the mGuard within the OSPF area can be performed using the “Simple” or “Digest” method. The corre­sponding passwords and digest keys are assigned for the al­located interfaces (see "Additional Interface Settings" ).

Additional Interface Set­tings

Interface

Internal / External / DMZ

Selects the interface for which the settings apply. If no settings are made here, the default settings apply (i.e., OSPF is en­abled for the interface and the passwords are not assigned).

 

Passive interface

Default: deactivated

When the function is deactivated, OSPF routes are learned and distributed by the interface.

When the function is activated, no routes are learned or dis­tributed.

 

Authentication 

None / Digest

If Digest is selected, “Digest” is always used for authentica­tion at the selected interface – regardless of the authentication method already assigned to an OSPF area.

The authentication method (None / Simple / Digest) that has already been assigned to an OSPF area is therefore ignored and not used.

 

Simple authentication password

Password for authentication of the OSPF router (for “Simple” authentication method)

 

Digest key

Digest key for authentication of the OSPF router (for “Digest” authentication method)

 

Digest key ID 

Digest key ID for authentication of the OSPF router (for “Di­gest” authentication method)

(1–255)

Route Redistribution

Statically entered routes in the kernel routing table can also be distributed using OSPF. Rules can be created for locally connected networks and networks that are reachable via a gateway.

The networks whose routes are to be distributed using OSPF can be specified in “access lists” via the "Distribution Settings" .

Section0600257.jpg

 

 

Type

Locally connected routes / Remotely connected routes

Locally connected routes: all local networks are distributed using OSPF, if OSPF is enabled. Distribution can be restricted by using access lists.

Remotely connected routes: all external networks are dis­tributed using OSPF. External networks include, for example, static as well as IPsec and OpenVPN remote networks. Distri­bution can be restricted by using access lists.

 

Metric

Metric used to distribute the routes. Unit representing the quality of a connection when a specific route is used (depends on the bandwidth, hop count, costs, and MTU).

 

Access list

Distributes the routes according to the selected access list (see "Distribution Settings" ). If None is selected, all routes of the selected type are distributed.

Dynamic Routes (learned by OSPF)

The status of all routes learned using OSPF is displayed.

 

Remote network

Dynamically learned remote network.

 

Gateway 

Gateway to reach the remote network.

 

Metric

Metric for the learned route.

5.7.2Distribution Settings

Netzwerk_Dynamisches-Routing_Distributions-Einstellungen_01.png
Netzwerk_Dynamisches-Routing_Distributions-Einstellungen__EDIT.png

 

Dynamic routes are automatically distributed using the OSPF protocol. For statically en­tered routes in the kernel routing table, it must be specified whether they should also be dis­tributed using OSPF.

 

 

inset_69.jpg 

If a rule is selected for either the “Locally connected routes” or “Remotely connected routes” type, by default (Access List = None) all corresponding routes are distributed us­ing OSPF if OSPF is enabled.

Rules can be created via Distribution Settings which determine the routes that are not learned dynamically that should be distributed using OSPF. These include:

Locally configured networks (see "Network >> Interfaces" on page 109)

Static routes entered as external, internal or DMZ networks (see "Network >> Interfac­es" on page 109)

Routes entered in the kernel routing table via OpenVPN (see "OpenVPN Client >> Con­nections" on page 265)

Network >> Dynamic Routing >> Distribution Settings >> Edit >> Access List Settings

Settings

Name

The Name must be unique and must not be assigned more than once.

Rules

Permit/Deny

Lists the access list rules. These apply for routes that are not distributed dynamically using OSPF.

Permit (standard)means that the route to the entered network is distributed using OSPF.

Deny means that the route to the entered network is not dis­tributed using OSPF.

 

Network

Network whose distribution is permitted or denied by rules.