You are on page 1of 12

Shield UTM Installation Guide

www.shield.com Version 2.0 1


Shield UTM Installation Guide

Copy Right
Copyright 2015 www.shield.com All rights reserved.
No part of this publication may be copied, distributed, transmitted, transcribed, stored in a
retrieval system, or translated into any human or computer language without the prior written
permission of www.shield.com. This document has been prepared for professionals and properly
trained personnel, and the customer assumes full responsibility when using it.
Proprietary Rights
The information in this document is Confidential to www.shield.com and is legally privileged. The
information and this document are intended solely for the addressee. Use of this document by
anyone else for any other purpose is unauthorized. If you are not the intended recipient, any
disclosure, copying, or distribution of this information is prohibited and unlawful.
Disclaimer
Information in this document is subject to change without notice and should not be construed as
a commitment on the part of www.shield.com. We do not assume any responsibility or make any
warranty against errors. It may appear in this document and disclaims any implied warranty of
merchantability or fitness for a particular purpose.

www.shield.com Version 2.0 2


Shield UTM Installation Guide

About this manual


This manual describes the Shield UTM product application and explains how to work and use it major
features. It serves as a means to describe the user interface and how to use it to accomplish common
tasks.
Document Conventions
In this manual, certain words are represented in different fonts, typefaces, sizes, and weights. This
highlighting is systematic; different words are represented in the same style to indicate their inclusion
in a specific category. Additionally, this document has different strategies to draw User attention to
certain pieces of information. In order of how critical the information is to your system, these items are
marked as a note, tip, important, caution, or warning.

Icon Purpose

Note

Tip/Best Practice

Important

Caution

Warning

Bold indicates the name of the menu items, options, dialog boxes, windows and functions.
The color blue with underline is used to indicate cross-references and hyperlinks.
Numbered Paragraphs - Numbered paragraphs are used to indicate tasks that need to be
carried out. Text in paragraphs without numbering represents ordinary information.
The Courier font indicates a command sequence, file type, URL, Folder/File name e.g.
Support Information: Every effort has been made to ensure the accuracy of the document. If you have
comments, questions, or ideas regarding the document contact online support via Skype:
shield.support@skype.

www.shield.com Version 2.0 3


Shield UTM Installation Guide

Table of Contents
About this manual ....................................................................................................................... 3

Document Conventions ............................................................................................................... 3

1. Overview ..................................................................................................................................... 5

2. Deployment Considerations ....................................................................................................... 6

3. Minimum Hardware Requirements ............................................................................................ 6

4. Installation Procedure:................................................................................................................ 7

5. Default configuration ................................................................................................................ 10

www.shield.com Version 2.0 4


Shield UTM Installation Guide

1. Overview
Shield UTM Appliances is the Unified Threat Management solution that target the security
needs for Home/SOHO users. The appliance provides the integrated Firewall, Intrusion
Prevention, SSLVPN functionalities.

Unified threat management (UTM) is an emerging trend in the network security market. UTM
appliances have evolved from traditional firewall/VPN products into a solution with many
additional capabilities. UTM solutions also provide integrated management, monitoring, and
logging capabilities to streamline deployment and maintenance. UTM appliances combine
firewall, gateway anti-virus, and intrusion detection and prevention capabilities into a single
Platform. UTM is designed protect users from blended threats while reducing complexity.

www.shield.com Version 2.0 5


Shield UTM Installation Guide

2. Deployment Considerations

3. Minimum Hardware Requirements

Intel/AMD x86_64 Host


1GB RAM
2 Ethernet ports

www.shield.com Version 2.0 6


Shield UTM Installation Guide

4. Installation Procedure:
1. Burn the Shield UTM ISO image into a writable CD/DVD
2. Insert the CD/DVD into the drive on the target host and reboot the system. The first
screen will show the Install option as given below.

3. To start the installation process, choose the first option Install. Installation kick start
program will begin and show options to configure the Installation.

Installation kick start program will take few minutes to complete the initialization
before showing the install options. Please wait patiently.

www.shield.com Version 2.0 7


Shield UTM Installation Guide

4. Time zone Settings: Choose the first option (Time zone settings) & Select the suitable time
zone in your region, would you like to continue to use during the installation process. Press
c to continue.
5. Installation Source: Choose an installation source type as CD/DVD.
6. Software selection: select default minimal install, Press c to continue.
7. Installation Destination: Installation requires the selection of hard drive & partitioning of
your hard drive. Select the hard drive listed by the install program and Press c to continue.
Next step will prompt for the partitioning options. Select Use All Space to use as the
install target and Press c to continue.
8. Partition Scheme Options: Select the partition scheme option and default is LVM. After
select the partitioning type and Press c to continue.

www.shield.com Version 2.0 8


Shield UTM Installation Guide

9. Network Settings: Leave the Network Settings to default as UTM will configure the Network
configuration as per the initial deployment settings.

Please make to press b to begin installation

Installation will begin and take a while to complete. Please wait patiently. Check if there are any
errors reported during the installation.

Post installation, the system will prompt to reboot the system. When instructed, remove the
CD/DVD used for the installation & Press Enter to reboot the system.
By default, the first interface available on the system is treated as WAN and will be assigned with IP
address 10.1.0.1/255.255.255.0.

www.shield.com Version 2.0 9


Shield UTM Installation Guide

The second interface available on the system is treated as Primary LAN and would be assigned with
the IP address 10.0.0.1/255.255.255.0. DHCP Server Instance will be running on the interface with
UTM default configuration.

In case if there more than two interfaces on the system, and then those interfaces will added to
Primary LAN zone. User can reconfigure network zone/interfaces as per his/her need.

To configure the UTM, connect a PC to the LAN interface and assign the IP
10.0.0.100/255.255.255.0 to the PC.

The UTM WebGUI can be accessed from the PC browser using the URL http://10.0.0.1/
Login to the WebGUI using the credentials admin/admin.

5. Default configuration
Ethernet Port IP Ares

LAN 10.0.0.1/255.255.255.0

WAN 10.1.0.1/255.255.255.0
Management VLAN(Accessible 192.168.1.1/255.255.255.0
via LAN Ports)

www.shield.com Version 2.0 10


Shield UTM Installation Guide

Web UI admin/admin

Command Line Console/SSH admin/admin


Default Firewall Mode Router

Any Technical assistance required, Kindly contact the support at shield.support@skype.

THANK YOU!

www.shield.com Version 2.0 11


Shield UTM Installation Guide

www.shield.com Version 2.0 12

You might also like