Label | Description |
Configuration Click the edit icon to change the device name, description, tags and address. You can also move the device to another site. | |
Name | This shows the descriptive name of the gateway. |
MAC address | This shows the MAC address of the gateway. |
Serial number | This shows the serial number of the gateway. |
Description | This shows the user-specified description for the gateway. |
Address | This shows the user-specified address for the gateway. |
Tags | This shows the user-specified tag for the gateway. |
Port | This shows the ports on the gateway. The port is highlighted in green color when it is connected and the link is up. |
Map | This shows the location of the gateway on the Google map. |
Photo | This shows the photo of the gateway. |
Status | |
WAN1/WAN2 | This shows the IP address, gateway and DNS information for the active WAN connection. |
Public IP | This shows the global (WAN) IP address of the gateway. |
CPU usage | This shows what percentage of the gateway’s processing capability is currently being used. |
Memory usage | This shows what percentage of the gateway’s RAM is currently being used. |
Usage | This shows the amount of data that has been transmitted or received by the gateway’s clients. |
Topology | |
History | Click Event log to go to the Gateway > Monitor > Event log screen. |
Configuration status | This shows whether the configuration on the gateway is up-to-date. |
Firmware status | This shows whether the firmware installed on the gateway is up-to-date. |
Live tools | |
Internet traffic | This shows the WAN port statistics. The y-axis represents the transmission rate in Kbps (kilobits per second). The x-axis shows the time period over which the traffic flow occurred. |
DHCP leases | This shows the IP addresses currently assigned to DHCP clients. |
Ping | Enter the host name or IP address of a computer that you want to perform ping in order to test a connection and click Ping. |
Trace route | Enter the host name or IP address of a computer that you want to perform the traceroute function. This determines the path a packet takes to the specified computer. |
DNS | Enter a host name and click Run to resolve the IP address for the specified domain name. |
Reboot gateway | Click the Reboot button to restart the gateway. |
Network usage and connectivity Move the cursor over the chart to see the transmission rate at a specific time. | |
Zoom | Select to view the statistics in the past twelve hours, day, week, month, three months or six months. |
Pan | Click to move backward or forward by one day or week. |
Label | Description |
Security Gateway - Client | Select to view the device information and connection status in the past two hours, day, week or month. |
y-axis | The y-axis shows the transmission speed of data sent or received by the client in kilobits per second (Kbps). |
x-axis | The x-axis shows the time period over which the traffic flow occurred. |
Top 10 Ports | This shows top ten applications/services and the ports that identify a service. Click More to display port details. Click Less to hide them. |
Port Details | |
Name | This shows the service name and the associated port number(s). |
Usage | This shows the amount of data consumed by the service. |
% Usage | This shows the percentage of usage for the service. |
Policy | Select the client(s) from the table below, and then choose the security policy that you want to apply to the selected client(s). To allow the selected clients to bypass captive portal authentication, choose Whitelisted. Otherwise, choose Normal and click Apply policy. |
Search | Specify your desired filter criteria to filter the list of clients. |
client | This shows the number of clients connected to the site network. |
Add client | Click this button to open a window where you can specify a client’s name and IP address to apply a policy before it is connected to the switch’s network. |
Export | Click this button to save the client list as a CSV or XML file to your computer. |
Status | This shows whether the client is online (green), or goes off-line (red). |
Name | This shows the descriptive name of the client. Click the name to display the individual client statistics. See
Client Details. |
First seen | This shows the first date and time the client was discovered over the specified period of time. |
Last seen | This shows the last date and time the client was discovered over the specified period of time. |
Connected to | This shows the name of the Nebula device to which the client is connected in this site. Click the device name to display the screen where you can view detailed information about the Nebula device. |
IPv4 address | This shows the IP address of the client. |
MAC Address | This shows the MAC address of the client. Click the MAC address to display the individual client statistics. See
Client Details. |
OS | This shows the operating system running on the client device. |
Manufacturer | This shows the manufacturer of the client device. |
Note | This shows additional information for the client. |
Usage | This shows the amount of data transmitted by the client. |
User | This shows the number of users currently connected to the network through the client device. |
Interface | This shows the interface on the security gateway to which the client belongs. |
Policy | This shows the security policy applied to the client. |
![]() | Click this icon to display a greater or lesser number of configuration fields. |
Label | Description |
Client | Click the edit icon to change the client name. |
Status | This shows whether the client is online (green), or goes off-line (red). It also shows the last date and time the client was discovered. |
Device type | This shows the manufacturer of the client device. |
History | Click Event log to go to the Gateway > Monitor > Event log screen. |
Note | This shows additional information for the client. Click the edit icon to modify it. |
Select to view the client connection status in the past two hours, day, week or month. | |
y-axis | The y-axis shows the transmission speed of data sent or received by the client in kilobits per second (Kbps). |
x-axis | The x-axis shows the time period over which the traffic flow occurred. |
Network | |
IPv4 address | This shows the IP address of the client. |
MAC address | This shows the MAC address of the client. |
Interface | This shows the interface on the security gateway to which the client belongs. |
Port forwarding | This shows the public IP address or DDNS host name and port mapping information if there is a virtual server rule configured for this client. |
1:1 NAT IPs | This shows the public IP address information if there is a 1:1 NAT rule configured for this client. |
Label | Description |
Connection Status | |
Configuration | This shows the number and address of the local network(s) behind the security gateway, on which the computers are allowed to use the VPN tunnel. |
NAT Type | This shows the public IP address or the domain name that is configured and mapped to the security gateway on the NAT router. |
Site Connectivity | |
Location | This shows the name of the site to which the peer gateway is assigned. Click the name to go to the Gateway > Configure > Site-to-Site VPN screen, where you can modify the VPN settings. |
Subnet(s) | This shows the address(es) of the local network behind the gateway. |
Status | This shows whether the VPN tunnel is connected or disconnected. |
Tunnel up time | This shows how many seconds the VPN tunnel has been active. |
Last heartbeat | This shows the last date and time a heartbeat packet is sent to determine if the VPN tunnel is up or down. |
L2TP Login Account | |
User Name | This shows the remote user’s login account name. |
Hostname | This shows the name of the computer that has this L2TP VPN connection with the gateway. |
Assigned IP | This shows the IP address that the gateway assigned for the remote user’s computer to use within the L2TP VPN tunnel. |
Public IP | This shows the public IP address that the remote user is using to connect to the Internet. |
Label | Description |
Security gateway - Summary report | Select to view the report for the past day, week or month. Alternatively, select Select range... to specify a time period the report will span. You can also select the number of results you want to view in a table. |
Email report | Click this button to send summary reports by email, change the logo and set email schedules. |
WAN1/WAN2 usage | |
y-axis | The y-axis shows the transmission speed of data sent or received through the WAN connection in kilobits per second (kbps). |
x-axis | The x-axis shows the time period over which the traffic flow occurred. |
Security gateway by usage | |
This shows the index number of the Nebula gateway. | |
Name | This shows the descriptive name of the Nebula gateway. |
Model | This shows the model number of the Nebula gateway. |
Usage | This shows the amount of data that has been transmitted through the gateway’s WAN port. |
Client | This shows the number of clients currently connected to the gateway. |
Location This shows the location of the Nebula gateways on the map. | |
Top applications by usage | |
This shows the index number of the application. | |
Application | This shows the application name. |
Usage | This shows the amount of data consumed by the application. |
% Usage | This shows the percentage of usage for the application. |
Clients | |
Total | This shows the total number of clients connected to the Nebula device within the specified time period. |
Daily Average | This shows the average daily number of clients within the specified time period. |
Clients per day | |
y-axis | The y-axis represents the number of clients. |
x-axis | The x-axis represents the date. |
Top operating systems by usage | |
This shows the index number of the operating system. | |
OS | This shows the operating system of the client device. |
# Client | This shows how many client devices use this operating system. |
% Client | This shows the percentage of top client devices which use this operating system. |
# Usage | This shows the amount of data consumed by the client device on which this operating system is running. |
% Usage | This shows the percentage of usage for top client devices which use this operating system. |
Top clients by usage | |
This shows the index number of the client. | |
Description | This shows the descriptive name or MAC address of the client. |
Usage | This shows the total amount of data transmitted and received by the client. |
% Usage | This shows the percentage of usage for the client. |
Top client device manufacturers by usage | |
This shows the index number of the client device. | |
Manufacturer | This shows the manufacturer name of the client device. |
Client | This shows how many client devices are made by the manufacturer. |
% Client | This shows the percentage of top client devices which are made by the manufacturer. |
Usage | This shows the total amount of data transmitted and received by the client device. |
% Usage | his shows the percentage of usage for the client device. |
Label | Description |
Network wide | |
Mode | Select Network address translation (NAT) to have the gateway automatically use SNAT for traffic it routes from internal interfaces to external interfaces. Select Router to have the gateway forward packets according to the routing policies. The gateway doesn’t automatically convert a packet’s source IP address. |
Port Group Setting | Port groups create a hardware connection between physical ports at the layer-2 (data link, MAC address) level. The physical Ethernet ports are shown at the top and the port groups are shown at the bottom of the screen. Use the radio buttons to select for which port group (network) you want to use each physical port. For example, select a port’s Port Group 1 radio button to use the port as part of the first port group. The port will use the first group’s IP address. |
Interface | By default, LAN1 is created on top of port group 1 and LAN2 is on top of port group 2. |
Name | This shows the name of the interface (network) on the gateway. |
IP address | This shows the IP address of the interface (network). |
Subnet mask | This shows the subnet mask of the interface (network). |
VLAN ID | This shows the ID number of the VLAN with which the interface (network) is associated. |
Port group | This shows the name of the port group to which the interface (network) belongs. |
Guest | Select On to configure the interface as a Guest interface. Devices connected to a Guest interface will have Internet access but cannot communicate with each other directly or access network sources behind the gateway, Otherwise, select Off to not use the interface as a Guest interface. |
Edit | Click this button to modify the network settings. See
Local LAN for detailed information. |
![]() | Click this icon to remove a VLAN entry. |
Add | Click this button to create a VLAN, which is then associated with one Ethernet interface (network). See
Local LAN for detailed information. |
Static Route | |
Name | This shows the name of the static route. |
Destination | This shows the destination IP address. |
Subnet mask | This shows the IP subnet mask. |
Next hop IP | This shows the IP address of the next-hop gateway or the interface through which the traffic is routed. The gateway is a router or switch on the same segment as your security gateway's interface(s). It helps forward packets to their destinations. |
![]() | Click this icon to remove a static route. |
Add | Click this button to create a new static route. See
Static Route for detailed information |
Dynamic DNS | |
Automatic registration | Click On to use dynamic DNS. Otherwise, select Off to disable it. |
General Settings | |
DDNS provider | Select your Dynamic DNS service provider from the drop-down list box. If you select User custom, create your own DDNS service |
DDNS type | Select the type of DDNS service you are using. Select User custom to create your own DDNS service and configure the DYNDNS Server, URL, and Additional DDNS Options fields below. |
DDNS account | |
Username | Enter the user name used when you registered your domain name. |
Password | Enter the password provided by the DDNS provider. |
Confirm password | Enter the password again to confirm it. |
DDNS settings | |
Domain name | Enter the domain name you registered. |
Primary binding address | Use these fields to set how the security gateway determines the IP address that is mapped to your domain name in the DDNS server. The security gateway uses the Backup binding address if the interface specified by these settings is not available. |
Interface | Select the interface to use for updating the IP address mapped to the domain name. |
IP address | Select Auto if the interface has a dynamic IP address. The DDNS server checks the source IP address of the packets from the gateway for the IP address to use for the domain name. You may want to use this if there are one or more NAT routers between the gateway and the DDNS server. ![]() Select Custom if you have a static IP address. Enter the IP address to use it for the domain name. Select Interface to have the security gateway use the IP address of the specified interface. |
Backup binding address | Use these fields to set an alternate interface to map the domain name to when the interface specified by the Primary binding address settings is not available. |
Interface | Select the interface to use for updating the IP address mapped to the domain name. |
IP address | Select Auto if the interface has a dynamic IP address. The DDNS server checks the source IP address of the packets from the gateway for the IP address to use for the domain name. You may want to use this if there are one or more NAT routers between the gateway and the DDNS server. ![]() Select Custom if you have a static IP address. Enter the IP address to use it for the domain name. Select Interface to have the security gateway use the IP address of the specified interface. |
Enable wildcard | This option is only available with a DynDNS account. Enable the wildcard feature to alias subdomains to be aliased to the same IP address as your (dynamic) domain name. This feature is useful if you want to be able to use, for example, www.yourhost.dyndns.org and still reach your hostname. |
Mail exchanger | This option is only available with a DynDNS account. DynDNS can route e-mail for your domain name to a mail server (called a mail exchanger). For example, DynDNS routes e-mail for john-doe@yourhost.dyndns.org to the host record specified as the mail exchanger. If you are using this service, type the host record of your mail server here. Otherwise, leave the field blank. |
Backup mail exchanger | This option is only available with a DynDNS account. Select this check box if you are using DynDNS’s backup service for e-mail. With this service, DynDNS holds onto your e-mail if your mail server is not available. Once your mail server is available again, the DynDNS server delivers the mail to you. See www.dyndns.org for more information about this service. |
DYNDNS Server | This field displays when you select User custom from the DDNS provider field above. Type the IP address of the server that will host the DDSN service. |
URL | This field displays when you select User custom from the DDNS provider field above. Type the URL that can be used to access the server that will host the DDSN service. |
Additional DDNS Options | This field displays when you select User custom from the DDNS provider field above. These are the options supported at the time of writing: • dyndns_system to specify the DYNDNS Server type - for example, dyndns@dyndns.org • ip_server_name which should be the URL to get the server’s public IP address - for example, http://myip.easylife.tw/ |
Label | Description |
Interface properties | |
Interface name | This field is read-only if you are editing an existing interface. Specify a name for the interface. The format of interface names is strict. Each name consists of 2-4 letters (interface type), followed by a number (x). For most interfaces, x is limited by the maximum number of the type of interface. For VLAN interfaces, x is defined by the number you enter in the VLAN name field. For example, VLAN interfaces are vlan0, vlan1, vlan2, ...; and so on. |
IP address assignment | |
IP address | Enter the IP address for this interface. |
Subnet mask | Enter the subnet mask of this interface in dot decimal notation. The subnet mask indicates what part of the IP address is the same for all computers in the network. |
VLAN ID | Enter the VLAN ID. This 12-bit number uniquely identifies each VLAN. Allowed values are 1 - 4094. (0 and 4095 are reserved.) |
Port group | Select the name of the port group to which you want the interface to (network) belong. |
DHCP setting | |
DHCP | Select what type of DHCP service the security gateway provides to the network. Choices are: None - the security gateway does not provide any DHCP services. There is already a DHCP server on the network. DHCP Relay - the security gateway routes DHCP requests to one or more DHCP servers you specify. The DHCP server(s) may be on another network. DHCP Server - the security gateway assigns IP addresses and provides subnet mask, gateway, and DNS server information to the network. The security gateway is the DHCP server for the network. |
These fields appear if the security gateway is a DHCP Relay. | |
Relay server 1 | Enter the IP address of a DHCP server for the network. |
Relay server 2 | This field is optional. Enter the IP address of another DHCP server for the network. |
These fields appear if the security gateway is a DHCP Server. | |
IP pool start address | Enter the IP address from which the security gateway begins allocating IP addresses. If you want to assign a static IP address to a specific computer, click Add new under Static DHCP Table. |
Pool size | Enter the number of IP addresses to allocate. This number must be at least one and is limited by the interface’s Subnet mask. For example, if the Subnet mask is 255.255.255.0 and IP pool start address is 10.10.10.10, the security gateway can allocate 10.10.10.10 to 10.10.10.254, or 245 IP addresses. |
First DNS server Second DNS server Third DNS server | Specify the IP addresses up to three DNS servers for the DHCP clients to use. Use one of the following ways to specify these IP addresses. Custom Defined - enter a static IP address. From ISP - select the DNS server that another interface received from its DHCP server. NSG - the DHCP clients use the IP address of this interface and the security gateway works as a DNS relay. |
First WINS server Second WINS server | Type the IP address of the WINS (Windows Internet Naming Service) server that you want to send to the DHCP clients. The WINS server keeps a mapping table of the computer names on your network and the IP addresses that they are currently using. |
Lease time | Specify how long each computer can use the information (especially the IP address) before it has to request the information again. Choices are: infinite - select this if IP addresses never expire days, hours, minutes - select this to enter how long IP addresses are valid. |
Extended options | This table is available if you selected DHCP server. Configure this table if you want to send more information to DHCP clients through DHCP packets. Click Add new to create an entry in this table. See
DHCP Option for detailed information |
Name | This is the option’s name. |
Code | This is the option’s code number. |
Type | This is the option’s type. |
Value | This is the option’s value. |
Click the edit icon to modify it. Click the remove icon to delete it. | |
Static DHCP Table | Configure a list of static IP addresses the security gateway assigns to computers connected to the interface. Otherwise, the security gateway assigns an IP address dynamically using the interface’s IP pool start address and Pool size. Click Add new to create an entry in this table. |
IP address | Enter the IP address to assign to a device with this entry’s MAC address. |
MAC | Enter the MAC address to which to assign this entry’s IP address. |
Description | Enter a description to help identify this static DHCP entry. |
Close | Click Close to exit this screen without saving. |
OK | Click OK to save your changes. |
Label | Description |
Option | Select which DHCP option that you want to add in the DHCP packets sent through the interface. |
Name | This field displays the name of the selected DHCP option. If you selected User_Defined in the Option field, enter a descriptive name to identify the DHCP option. |
Code | This field displays the code number of the selected DHCP option. If you selected User_Defined in the Option field, enter a number for the option. This field is mandatory. |
Type | This is the type of the selected DHCP option. If you selected User_Defined in the Option field, select an appropriate type for the value that you will enter in the next field. Misconfiguration could result in interface lockout. |
Value | Enter the value for the selected DHCP option. For example, if you selected TFTP Server Name (66) and the type is TEXT, enter the DNS domain name of a TFTP server here. This field is mandatory. |
First IP address Second IP address Third IP address | If you selected Time Server (4), NTP Server (41), SIP Server (120), CAPWAP AC (138), or TFTP Server (150), you have to enter at least one IP address of the corresponding servers in these fields. The servers should be listed in order of your preference. |
First enterprise ID Second enterprise ID | If you selected VIVC (124) or VIVS (125), you have to enter at least one vendor’s 32-bit enterprise number in these fields. An enterprise number is a unique number that identifies a company. |
First class Second class | If you selected VIVC (124), enter the details of the hardware configuration of the host on which the client is running, or of industry consortium compliance. |
First information Second information | If you selected VIVS (125), enter additional information for the corresponding enterprise number in these fields. |
First FQDN Second FQDN Third FQDN | If the Type is FQDN, you have to enter at least one domain name of the corresponding servers in these fields. The servers should be listed in order of your preference. |
Close | Click Close to exit this screen without saving. |
OK | Click OK to save your changes. |
Label | Description |
Name | Enter a descriptive name for this route. |
Destination | Specifies the IP network address of the final destination. Routing is always based on network number. |
Subnet mask | Enter the IP subnet mask. |
Next hop IP address | Enter the IP address of the next-hop gateway. |
Close | Click Close to exit this screen without saving. |
OK | Click OK to save your changes. |
Label | Description |
Security Policy | |
Outbound rules | |
![]() | Click the icon of a rule and drag the rule up or down to change the order. |
Policy | Select what the firewall is to do with packets that match this rule. Select Deny to silently discard the packets without sending a TCP reset packet or an ICMP destination-unreachable message to the sender. Select Allow to permit the passage of the packets. Select a pre-defined application patrol profile to have the firewall takes the action set in the profile when traffic matches the application patrol signature(s). See
Add application patrol profile for how to create an application patrol profile. |
Protocol | Select the IP protocol to which this rule applies. Choices are: TCP, UDP, and Any. |
Source | Specify the source IP address(es) to which this rule applies. You can specify multiple IP addresses or subnets in the field separated by a comma (","). Enter any to apply the rule to all IP addresses. |
Destination | Specify the destination IP address(es) or subnet to which this rule applies. You can specify multiple IP addresses or subnets in the field separated by a comma (","). Enter any to apply the rule to all IP addresses. |
Dst Port | Specify the destination port(s) to which this rule applies. You can specify multiple ports separated by a comma (","). Enter any to apply the rule to all ports. |
Schedule | Select the name of the schedule profile that the rule uses. Always means the rule is active at all times if enabled. |
Description | Enter a descriptive name of up to 60 printable ASCII characters for the rule. |
![]() | Click this icon to remove the rule. |
Add | Click this button to create a new rule. |
Security gateway services | |
Service | This shows the name of the service. |
Allowed remote IPs | Specify the IP address with which the computer is allowed to access the security gateway using the service. You can specify a range of IP addresses. any means any IP address. |
Application Patrol | |
Application monitor | Click On to enable traffic analysis for all applications and display information about top 10 applications in the SITE-WIDE > Monitor > Dashboard: Traffic Summary screen. Otherwise, select Off to disable traffic analysis for applications. |
Application profiles | |
Name | This shows the name of the application patrol profile. |
Description | This shows the description of the application patrol profile. |
![]() | Click this icon to change the profile settings. |
![]() | Click this icon to remove the profile. |
Add | Click this button to create a new application patrol profile. See
Add application patrol profile for more information. |
Schedule profiles | |
This shows the name of the schedule profile and the number of the outbound rules that are using this schedule profile. | |
![]() | Click this icon to change the profile settings. |
![]() | Click this icon to remove the profile. |
Add | Click this button to create a new schedule profile. See
Create new schedule for more information. |
NAT | |
1:1 NAT | |
![]() | Click the icon of a rule and drag the rule up or down to change the order. |
Uplink | Select the interface of the security gateway on which packets for the NAT rule must be received. |
Public IP | Specify to which translated destination IP address this NAT rule forwards packets. |
LAN IP | Specify the destination IP address of the packets received by this NAT rule’s specified interface. |
Allowed remote IP | Specify the remote IP address with which the computer is allowed to use the public IP address to access the private network server. You can specify a range of IP addresses. any means any IP address. |
Description | Enter a description for the rule. |
![]() | Click this icon to remove the rule. |
Add | Click this button to create a new 1:1 NAT mapping rule. |
Virtual server | |
![]() | Click the icon of a rule and drag the rule up or down to change the order. |
Uplink | Select the interface of the security gateway on which packets for the NAT rule must be received. |
Public IP | Specify to which translated destination IP address this NAT rule forwards packets. |
Public port | Enter the translated destination port if this NAT rule forwards the packet. |
LAN IP | Specify the destination IP address of the packets received by this NAT rule’s specified interface. |
Local port | Enter the original destination port this NAT rule supports. |
Allowed remote IP | Specify the remote IP address with which the computer is allowed to use the public IP address to access the private network server. You can specify a range of IP addresses. any means any IP address. |
Description | Enter a description for the rule. |
![]() | Click this icon to remove the rule. |
Add | Click this button to create a new virtual server mapping rule. |
Label | Description |
General settings | |
Name | Enter a name for this profile for identifying purposes. |
Description | Enter a description for this profile. |
Application management | |
Application | This field displays the application name of the policy. |
Action | This shows the default action for all signatures in this category. Forward - the security gateway routes packets that matches these signatures. Drop - the security gateway silently drops packets that matches these signatures without notification. Reject - the security gateway drops packets that matches these signatures and sends notification. |
Log | This shows whether the security gateway generates a log (Log), log and alert (Log Alert) or neither (No) by default when traffic matches a signature in this category. |
![]() | Click this icon to remove the entry. |
Add | Click this button to create a new application category. |
Close | Click this button to exit this screen without saving. |
Create | Click this button to save your changes and close the screen. |
Label | Description |
General settings | |
Category | Select an application category. |
Application | Select an application to apply the policy. |
Action | Select the default action for all signatures in this category. Forward - the security gateway routes packets that matches these signatures. Drop - the security gateway silently drops packets that matches these signatures without notification. Reject - the security gateway drops packets that matches these signatures and sends notification. |
Log | Select whether to have the security gateway generate a log (Log), log and alert (Log Alert) or neither (No) by default when traffic matches a signature in this category. |
Close | Click this button to exit this screen without saving. |
Create | Click this button to save your changes and close the screen. |
Label | Description |
Name | Enter a descriptive name for this schedule for identifying purposes. |
Templates | Select a pre-defined schedule template or select Custom schedule and manually configure the day and time at which the associated firewall outbound rule is enabled. |
Day | This shows the day of the week. |
Availability | Click On to enable the associated rule on this day. Otherwise, select Off to turn the associated rule off. |
From - To | Specify the hour and minute when the schedule begins and ends each day |
Time display | Select the time format in which the time is displayed. |
Close | Click this button to exit this screen without saving. |
Add | Click this button to save your changes and close the screen. |
Label | Description |
Topology | This shows the VPN mode supported by the security gateway. Select a VPN topology. Select Disable to not set a VPN connection. In the Site-to-Site VPN topology, the remote IPSec device has a static IP address or a domain name. This security gateway can initiate the VPN tunnel. In the Hub-and-Spoke VPN topology, there is a VPN connection between each spoke router and the hub router, which uses the VPN concentrator. The VPN concentrator routes VPN traffic between the spoke routers and itself. |
Outgoing Interface | Select the WAN interface to which the VPN connection is going. |
Hubs (peers to connect to) | This field is available when you set Topology to Hub-and-Spoke. The field is configurable only when the security gateway of the selected site is the hub router. You can select another site’s name to have the gateway of that site act as the hub router in the Hub-and-Spoke VPN topology. |
NAT traversal | If the security gateway is behind a NAT router, enter the public IP address or the domain name that is configured and mapped to the security gateway on the NAT router. |
Local networks | This shows the local networks behind the security gateway. |
Name | This shows the network name. |
Subnet | This shows the IP address and subnet mask of the computer on the network. |
Use VPN | Select ON to allow the computers on the network to use the VPN tunnel. Otherwise, select OFF. |
Remote VPN participants | This shows the remote (peer) Nebula gateway’s network name and address. |
Non-Nebula VPN peers | If the remote VPN gateway is not a Nebula device, use this section to set up a VPN connection between it and the Nebula security gateway. |
Name | Enter the name of the peer gateway. |
Public IP | Enter the public IP address of the peer gateway. |
Private Subnet | Enter the local network address or subnet behind the peer gateway. |
IPSec policy | Click to select a pre-defined policy or have a custom one. See
Custom IPSec Policy for detailed information. |
Preshared secret | Enter a pre-shared key (password). The Nebula security gateway and peer gateway use the key to identify each other when they negotiate the IKE SA. |
Availability | Select All Network to allow the peer gateway to connect to any Nebula security gateway in the organization via a VPN tunnel. Select This site and the peer gateway can only connect to the Nebula security gateway in this site via a VPN tunnel. |
Action | Click the remove icon to delete the entry. |
Add | Click this button to add a peer VPN gateway to the list. |
Label | Description |
Preset | Select a pre-defined IPSec policy, or select Custom to configure the policy settings yourself. |
Phase 1 | IPSec VPN consists of two phases: Phase 1 (Authentication) and Phase 2 (Key Exchange). A phase 1 exchange establishes an IKE SA (Security Association). |
Encryption | Select which key size and encryption algorithm to use in the IKE SA. Choices are: DES - a 56-bit key with the DES encryption algorithm 3DES - a 168-bit key with the DES encryption algorithm AES128 - a 128-bit key with the AES encryption algorithm AES192 - a 192-bit key with the AES encryption algorithm AES256 - a 256-bit key with the AES encryption algorithm The security gateway and the remote IPSec router must use the same key size and encryption algorithm. Longer keys require more processing power, resulting in increased latency and decreased throughput. |
Authentication | Select which hash algorithm to use to authenticate packet data in the IKE SA. Choices are SHA128, SHA256, SHA512 and MD5. SHA is generally considered stronger than MD5, but it is also slower. The remote IPSec router must use the same authentication algorithm. |
Diffie-Hellman group | Select which Diffie-Hellman key group (DHx) you want to use for encryption keys. Choices are: 1 - use a 768-bit random number 2 - use a 1024-bit random number 5 - use a 1536-bit random number 14 - use a 2048-bit random number The longer the key, the more secure the encryption, but also the longer it takes to encrypt and decrypt information. Both routers must use the same DH key group. |
Lifetime (seconds) | Type the maximum number of seconds the IKE SA can last. When this time has passed, the security gateway and remote IPSec router have to update the encryption and authentication keys and re-negotiate the IKE SA. This does not affect any existing IPSec SAs, however. |
Phase 2 | Phase 2 uses the SA that was established in phase 1 to negotiate SAs for IPSec. |
Encryption | Select which key size and encryption algorithm to use in the IPSec SA. Choices are: (none) - no encryption key or algorithm DES - a 56-bit key with the DES encryption algorithm 3DES - a 168-bit key with the DES encryption algorithm AES128 - a 128-bit key with the AES encryption algorithm AES192 - a 192-bit key with the AES encryption algorithm AES256 - a 256-bit key with the AES encryption algorithm The security gateway and the remote IPSec router must both have at least one proposal that uses use the same encryption and the same key. Longer keys are more secure, but require more processing power, resulting in increased latency and decreased throughput. |
Authentication | Select which hash algorithm to use to authenticate packet data in the IPSec SA. Choices are (none), MD5, SHA128, SHA256, and SHA512. SHA is generally considered stronger than MD5, but it is also slower. The security gateway and the remote IPSec router must both have a proposal that uses the same authentication algorithm. |
PFS group | Select whether or not you want to enable Perfect Forward Secrecy (PFS) and, if you do, which Diffie-Hellman key group to use for encryption. Choices are: Off - disable PFS 1 - enable PFS and use a 768-bit random number 2 - enable PFS and use a 1024-bit random number 5 - enable PFS and use a 1536-bit random number 14 - enable PFS and use a 2048-bit random number PFS changes the root key that is used to generate encryption keys for each IPSec SA. The longer the key, the more secure the encryption, but also the longer it takes to encrypt and decrypt information. Both routers must use the same DH key group. PFS is ignored in initial IKEv2 authentication but is used when reauthenticating. |
Lifetime (seconds) | Type the maximum number of seconds the IPSec SA can last. Shorter life times provide better security. The security gateway automatically negotiates a new IPSec SA before the current one expires, if there are users who are accessing remote resources. |
Close | Click this button to exit this screen without saving. |
OK | Click this button to save your changes and close the screen. |
Label | Description |
Client VPN server | Click ON to enable the L2TP/IPSec VPN server feature on the security gateway. Otherwise, click OFF to disable it. |
Client VPN subnet | Specify the IP addresses that the security gateway uses to assign to the L2TP VPN clients. |
DNS name servers | Specify the IP addresses of DNS servers to assign to the remote users. Select Use Google Public DNS to use the DNS service offered by Google. Otherwise, select Specify nameserver to enter a static IP address. |
Custom nameservers | If you select Specify nameserver in the DNS name servers field, manually enter the DNS server IP address(es). |
WINS | The WINS (Windows Internet Naming Service) server keeps a mapping table of the computer names on your network and the IP addresses that they are currently using. Select No WINS Servers to not send WINS server addresses to the users. Otherwise, select Specify nameserver to type the IP addresses of WINS servers to assign to the remote users. |
Custom nameservers | If you select Specify nameserver in the WINS field, manually enter the WINS server IP address(es). |
Secret | Enter the pre-shared key (password) which is used to set up the IPSec VPN tunnel. |
Authentication | Select how the security gateway authenticates a remote user before allowing access to the L2TP VPN tunnel. |
Label | Description |
Interfaces | Select the gateway’s interface (network) to which the settings you configure here is applied. |
Network Access | Select Direct access to turn off web authentication. Select Click-to-continue to block network traffic until a client agrees to the policy of user agreement. Select Sign-on with to block network traffic until a client authenticates with an external RADIUS or AD server through the specifically designated web portal page. Select an authentication server that you have configured in the Gateway > Configure > My authentication server screen (see
My Authentication Server). |
Walled garden | Select to turn on or off the walled garden feature. This field is not configurable if you set Network Access to Direct access. With a walled garden, you can define one or more web site addresses that all users can access without logging in. These can be used for advertisements for example. |
Walled garden ranges | Specify walled garden web site links, which use a domain name or an IP address for web sites that all users are allowed to access without logging in. |
Captive portal access attribute | |
Self-registration | This field is available only when you select Sign-on with Nebula Cloud authentication in the Network Access field. Select Allow users to create accounts with auto authorized or Allow users to create accounts with manual authorized to display a link in the captive portal login page. The link directs users to a page where they can create an account before they authenticate with the NCC. For Allow users to create accounts with manual authorized, users cannot log in with the account until the account is authorized and granted access. For Allow users to create accounts with auto authorized, users can just use the registered account to log in without administrator approval. Select Don’t allow users to create accounts to not display a link for account creation in the captive portal login page. |
Login on multiple client devices | This field is available only when you select Sign-on with in the Network Access field. Select Multiple devices access simultaneously if you allow users to log in as many times as they want as long as they use different IP addresses. Select One device at a time if you don’t allow users to have simultaneous logins. |
NCAS disconnection behavior | This field is available only when you select Sign-on with Nebula Cloud Authentication in the Network Access field. Select Allowed to allow any users to access the network without authentication when the NCAS (Nebula Cloud Authentication Server) is not reachable. Select Limited to allow only the currently connected users or the users in the white list to access the network. |
Label | Description |
Walled garden | With a walled garden, you can define one or more web site addresses that all users can access without logging in. These can be used for advertisements for example. |
Walled garden ranges | Specify walled garden web site links, which use a domain name or an IP address for web sites that all users are allowed to access without logging in. |
Label | Description |
Interface | Select the gateway’s interface (network) to which the settings you configure here is applied. |
Themes | Click the Copy icon at the upper right corner of the default theme image to create a new custom theme (portal page). Click the Edit icon of a custom theme to go to a screen, where you can view and configure the details of the custom portal page(s). See
Custom Theme Edit. Click the Remove icon to delete a custom theme. |
Click-to-continue/Sign-on page | |
Logo | This shows the logo image that you uploaded for the customized login page. Click Upload a logo and specify the location and file name of the logo graphic or click Browse to locate it. You can use the following image file formats: GIF, PNG, or JPG. |
Message | Enter a note to display below the title. Use up to 1024 printable ASCII characters. Spaces are allowed. |
Success page | |
Message | Enter a note to display on the page that displays when a user logs in successfully. Use up to 1024 printable ASCII characters. Spaces are allowed. |
External captive portal URL | |
Use URL | Select On to use a custom login page from an external web portal instead of the one built into the NCC. You can configure the look and feel of the web portal page. Specify the login page’s URL; for example, http://IIS server IP Address/login.asp. The Internet Information Server (IIS) is the web server on which the web portal files are installed. |
Captive portal behavior | |
After the captive portal page where the user should go? | Select To promotion URL and specify the URL of the web site/page to which the user is redirected after a successful login. Otherwise, select Stay on Captive portal authenticated successfully page. |
Label | Description |
Back to config | Click this button to return to the Captive portal screen. |
Copy of Modern | This shows the name of the theme. Click the edit icon the change it. |
Custom themes color | Customize the colors on the selected custom portal page (HTML file), such as the color of the button, text, window’s background, links, borders, and etc. Select a color that you want to use and click the Choose button. |
HTML | This shows the name and when the HTML file of the portal page is created for the selected custom theme. Click a HTML file to display the portal page on the right side of the screen. You can also change colors and modify the CSS values of the selected HTML file. |
Stylesheets | This shows the name and when the main CSS file is created for the selected custom theme. |
Edit/Preview | Click Edit to view and modify the CSS values of the selected HTML file. Click Preview to display the corresponding portal page. |
Save | Click this button to save your color settings for the selected HTML file. |
Apply | Click this button to apply your color settings to the selected HTML file. |
Popout | Click this button to display the corresponding portal page in a popup window. |
Label | Description |
Uplink configuration | |
WAN 1 WAN 2 | Set the amount of upstream/downstream bandwidth for the WAN interface. Click a lock icon to change the lock state. If the lock icon for a WAN interface is locked, the bandwidth limit you set applies to both inbound and outbound traffic. If the lock is unlocked, you can set inbound and outbound traffic to have different transmission speeds. |
Wan load balancing algorithm | Select a load balancing method to use from the drop-down list box. Select Least Load First to send new session traffic through the least utilized WAN interface. Select Weighted Round Robin to balance the traffic load between interfaces based on their respective weights (bandwidth). An interface with a larger weight gets more chances to transmit traffic than an interface with a smaller weight. For example, if the weight ratio of WAN 1 and WAN 2 interfaces is 2:1, the security gateway chooses WAN 1 for 2 sessions’ traffic and WAN 2 for 1 session’s traffic in each round of 3 new sessions. |
Global bandwidth limits | |
Per-client limit | You can limit a client’s outbound or inbound bandwidth. |
First IP | Enter the first IP address in a range of IP addresses for which the security gateway applies the rule. |
Last IP | Enter the last IP address in a range of IP addresses for which the security gateway applies the rule. |
Down/Up | Set the maximum upstream/downstream bandwidth for traffic from an individual source IP address. Click a lock icon to change the lock state. If the lock icon is locked, the bandwidth limit you set applies to both inbound and outbound traffic. If the lock is unlocked, you can set inbound and outbound traffic to have different transmission speeds. |
![]() | Click this icon to remove the rule. |
Add | Click this button to create a new rule. |
Label | Description |
My AD Server | |
Name | Enter a descriptive name for the server. |
Server address | Enter the address of the AD server. |
Backup server address | If the AD server has a backup server, enter its address here. |
Port | Specify the port number on the AD server to which the security gateway sends authentication requests. Enter a number between 1 and 65535. |
AD domain | Specify the Active Directory forest root domain name. |
Domain admin | Enter the name of the user that is located in the container for Active Directory Users, who is a member of the Domain Admin group. |
Password | Enter the password of the Domain Admin user account. |
Advanced | Click to open a screen where you can select to use Default or Custom advanced settings. See
Advanced Settings. |
![]() | Click this icon to remove the server. |
Add | Click this button to create a new server. |
My RADIUS server | |
Name | Enter a descriptive name for the server. |
Server address | Enter the address of the RADIUS server. |
Backup server address | If the RADIUS server has a backup server, enter its address here. |
Port | Specify the port number on the RADIUS server to which the security gateway sends authentication requests. Enter a number between 1 and 65535. |
Secret | Enter a password (up to 15 alphanumeric characters) as the key to be shared between the external authentication server and the security gateway. The key is not sent over the network. This key must be the same on the external authentication server and the security gateway. |
Advanced | Click to open a screen where you can select to use Default or Custom advanced settings. See
Advanced Settings. |
![]() | Click this icon to remove the server. |
Add | Click this button to create a new server. |
Label | Description |
Preset | Select Default to use the pre-defined settings, or select Custom to configure your own settings. |
Timeout | Specify the timeout period (between 1 and 300 seconds) before the security gateway disconnects from the server. In this case, user authentication fails. Search timeout occurs when either the user information is not in the server(s) or the AD or server(s) is down. |
Case-Sensitive User Name | Click ON if the server checks the case of the user name. Otherwise, click OFF to not configure your user name as case-sensitive. |
NAS IP Address | This field is only for RADIUS. Type the IP address of the NAS (Network Access Server). |
Close | Click this button to exit this screen without saving. |
OK | Click this button to save your changes and close the screen. |