The eth0 interface is automatically allocated an IP address (via DHCP) and then added to the Management zone. To perform initial configuration, network administrator should connect to the web console via eth0.
If the system fails to allocate an IP address to the Management interface automatically via DHCP, network administrator can assign it manually using CLI (Command-Line Interface). For more details on CLI, please refer to Command-Line Interface (CLI).
All other interfaces are disabled by default and should be configured individually.
Perform the following steps for initial configuration:
Name |
Description |
||||||||||||||
Step 1. Connect to the management interface |
If DHCP server is available Static IP address Connect to the web console of UserGate using the specified address which should look like this: httpS://UserGate_IP_address:8001 |
||||||||||||||
Step 2. Select a language |
Select a language which you want to use during the initial configuration process. |
||||||||||||||
Step 3. Enter a password |
Specify the username and password for the web administration interface. |
||||||||||||||
Step 4. Register the system |
Enter PIN to activate the product and fill in the registration form. UserGate will require the Internet access for proper activation. If you cannot activate the system on this step, you can perform it later on step 10 after setting up the network interfaces. |
||||||||||||||
Step 5. Set up the zones and IP addresses of interfaces and then connect UserGate to your corporate network |
In the Interfaces section, enable the interfaces you need, allocate valid IP address from your local networks and then group these interfaces by zone. For details on how to manage interfaces, please refer to Configuring interfaces. By default, the system provides several predefined zones: * Management (administration network), eth0 interface * Trusted (LAN); * Untrusted (Internet); * DMZ (DMZ); * Cluster * VPN for remote access * VPN for Site-to-Site |
||||||||||||||
Step 6. Set up the Internet gateway |
In the Gateways section, specify the IP address of your Internet gateway (for the Internet access interface) in the Untrusted zone.
UTM is preconfigured with 3 VPN interfaces: * tunnel1 is preconfigured for use for Remote access VPN. * tunnel2 is preconfigured for use for server side of Site-to-Site VPN. * tunnel3 is preconfigured for use for client side of Site-to-Site VPN. Configuring gateways. |
||||||||||||||
Step 7. Specify DNS servers of the system |
In the DNS section, specify the IP addresses of DNS used in your corporate network. |
||||||||||||||
Step 8. Create the NAT rules |
In the NAT & routing section, create the necessary NAT rules. The system is predefined with the NAT rule required for Internet access from the Trusted network ("Trusted-->Untrusted"). NAT and routing. |
||||||||||||||
Step 9. Create the firewall rules |
In the Firewall section, create the necessary firewall rules. The system is predefined with the firewall rule required for unlimited Internet access from the Trusted network ("Internet for Trusted"), so you can simply enable it. |
||||||||||||||
Step 10. Register the product (if haven't registered it on step 4) |
In the General settings section, enter your PIN to register the product. For successful registration, make sure that the Internet connection is active and all the above steps are completed. |
||||||||||||||
Step 11. Create additional administrators (optional) |
In the Device management section, create additional system administrators and grant them necessary rights (via roles). |
||||||||||||||
Step 12. Set up user authentication (optional) |
In the Users and devices section, define the necessary methods of user authentication. The simplest way to do this is to create local UserGate users with fixed IP addresses or disable user identification completely (i.e. apply the "Any" user to all rules). |
||||||||||||||
Step 13. Create the content filtering rules (optional) |
In the Content filtering section, create the HTTP(S) filtering rules. |
||||||||||||||
Step 14. Create the safe browsing rules (optional) |
In the Safe browsing section, create the additional safe browsing rules. |
||||||||||||||
Step 15. Create the HTTPS inspection rules (optional) |
In the SSL inspection section, create the capturing and decryption rules for HTTPS traffic. For more details on HTTPS decryption, please refer to SSL inspection. |
Once all the above steps are complete, UserGate will be ready for work. For more details on the configuration process, please refer to the corresponding sections of this Guide.