Professional Documents
Culture Documents
Copy Right
Copyright 2015 www.shield.com All rights reserved.
No part of this publication may be copied, distributed, transmitted, transcribed, stored in a
retrieval system, or translated into any human or computer language without the prior written
permission of www.shield.com. This document has been prepared for professionals and properly
trained personnel, and the customer assumes full responsibility when using it.
Proprietary Rights
The information in this document is Confidential to www.shield.com and is legally privileged. The
information and this document are intended solely for the addressee. Use of this document by
anyone else for any other purpose is unauthorized. If you are not the intended recipient, any
disclosure, copying, or distribution of this information is prohibited and unlawful.
Disclaimer
Information in this document is subject to change without notice and should not be construed as
a commitment on the part of www.shield.com. We do not assume any responsibility or make any
warranty against errors. It may appear in this document and disclaims any implied warranty of
merchantability or fitness for a particular purpose.
Icon Purpose
Note
Tip/Best Practice
Important
Caution
Warning
Bold indicates the name of the menu items, options, dialog boxes, windows and functions.
The color blue with underline is used to indicate cross-references and hyperlinks.
Numbered Paragraphs - Numbered paragraphs are used to indicate tasks that need to be
carried out. Text in paragraphs without numbering represents ordinary information.
The Courier font indicates a command sequence, file type, URL, Folder/File name e.g.
Support Information: Every effort has been made to ensure the accuracy of the document. If you have
comments, questions, or ideas regarding the document contact online support via Skype:
shield.support@skype.
Table of Contents
About this manual ....................................................................................................................... 3
1. Overview ..................................................................................................................................... 5
4. Installation Procedure:................................................................................................................ 7
1. Overview
Shield UTM Appliances is the Unified Threat Management solution that target the security
needs for Home/SOHO users. The appliance provides the integrated Firewall, Intrusion
Prevention, SSLVPN functionalities.
Unified threat management (UTM) is an emerging trend in the network security market. UTM
appliances have evolved from traditional firewall/VPN products into a solution with many
additional capabilities. UTM solutions also provide integrated management, monitoring, and
logging capabilities to streamline deployment and maintenance. UTM appliances combine
firewall, gateway anti-virus, and intrusion detection and prevention capabilities into a single
Platform. UTM is designed protect users from blended threats while reducing complexity.
2. Deployment Considerations
4. Installation Procedure:
1. Burn the Shield UTM ISO image into a writable CD/DVD
2. Insert the CD/DVD into the drive on the target host and reboot the system. The first
screen will show the Install option as given below.
3. To start the installation process, choose the first option Install. Installation kick start
program will begin and show options to configure the Installation.
Installation kick start program will take few minutes to complete the initialization
before showing the install options. Please wait patiently.
4. Time zone Settings: Choose the first option (Time zone settings) & Select the suitable time
zone in your region, would you like to continue to use during the installation process. Press
c to continue.
5. Installation Source: Choose an installation source type as CD/DVD.
6. Software selection: select default minimal install, Press c to continue.
7. Installation Destination: Installation requires the selection of hard drive & partitioning of
your hard drive. Select the hard drive listed by the install program and Press c to continue.
Next step will prompt for the partitioning options. Select Use All Space to use as the
install target and Press c to continue.
8. Partition Scheme Options: Select the partition scheme option and default is LVM. After
select the partitioning type and Press c to continue.
9. Network Settings: Leave the Network Settings to default as UTM will configure the Network
configuration as per the initial deployment settings.
Installation will begin and take a while to complete. Please wait patiently. Check if there are any
errors reported during the installation.
Post installation, the system will prompt to reboot the system. When instructed, remove the
CD/DVD used for the installation & Press Enter to reboot the system.
By default, the first interface available on the system is treated as WAN and will be assigned with IP
address 10.1.0.1/255.255.255.0.
The second interface available on the system is treated as Primary LAN and would be assigned with
the IP address 10.0.0.1/255.255.255.0. DHCP Server Instance will be running on the interface with
UTM default configuration.
In case if there more than two interfaces on the system, and then those interfaces will added to
Primary LAN zone. User can reconfigure network zone/interfaces as per his/her need.
To configure the UTM, connect a PC to the LAN interface and assign the IP
10.0.0.100/255.255.255.0 to the PC.
The UTM WebGUI can be accessed from the PC browser using the URL http://10.0.0.1/
Login to the WebGUI using the credentials admin/admin.
5. Default configuration
Ethernet Port IP Ares
LAN 10.0.0.1/255.255.255.0
WAN 10.1.0.1/255.255.255.0
Management VLAN(Accessible 192.168.1.1/255.255.255.0
via LAN Ports)
Web UI admin/admin
THANK YOU!