“Configuration” tab 114
Enable e-mail notifications 114
SMTP server 114
E-mail sending frequency (in
minutes) 114
Intrusion prevention alarms 115
System events 115
“Recipients” tab 116
Creating a group 116
Deleting a group 116
Check use 116
“Templates” tab 117
Editing the template (HTML) 117
Vulnerability manager 117
Certificate request 117
User enrollment 117
List of variables 118
Example of a report received by e-
mail regarding alarms 118
ENROLMENT 119
The enrolment table 119
Possible operations 119
User enrolment and certificate
requests 119
Advanced properties 120
FILTERING AND NAT 121
Evaluation of filtering and the impact
of NAT 121
"Fast-Path" mode 121
Policies 121
Selecting the filter policy 122
Possible operations 123
Selecting multiple objects 123
Drag & drop 123
“Filtering” tab 123
Actions on filter policy rules 124
Filter table 126
“NAT" tab 138
Actions on NAT policy rules 138
NAT table 140
HIGH AVAILABILITY 147
Step 1: Creating or joining a high
availability cluster 147
Step 2: Configuring network
interfaces 148
If you have chosen to create a cluster148
If you have chosen to join a cluster 148
Step 3: Cluster’s pre-shared key and
data encryption 149
Page 4/448 sns-en-user_configuration_manual-v3 - Copyright © Stormshield 2016
SNS - USER CONFIGURATION MANUAL V.3
If a cluster is being created 149
If a cluster exists 150
Step 4: Summary and finalizing the
cluster 150
If a cluster is being created 150
If a cluster exists 150
High availability screen 151
Communication between firewalls in the
high availability cluster 151
Advanced properties 151
HOST REPUTATION 153
“Configuration” tab 153
General 153
Alarms 153
Antivirus 153
Sandboxing 153
"Hosts" tab 154
Included list 154
Advanced properties 154
IDENTIFICATION PORTAL 155
Connection 155
Presentation 155
Logging off 156
IMPLICIT RULES 158
Implicit filter rules 158
Rule table 158
Advanced properties 159
INSPECTION PROFILES 160
Security inspection 160
Global configuration for each profile 160
Configuring profiles 161
IPSEC VPN 162
“Encryption policy – Tunnels” tab 162
Site to site (Gateway-Gateway) 163
Anonymous – Mobile users 166
“Peers” tab 169
List of peers 170
Peer information 170
“Identification” tab 175
Approved certificate authorities 175
Mobile tunnels: pre-shared keys 176
“Encryption profiles” tab 176
Default encryption profiles 176
INTERFACES 180
Operating mode between interfaces 180
Advanced mode 180