You’re offline. This is a read only version of the page.
Online Help Center
Search
Support
For Home
For Business
English (US)
Bahasa Indonesia (Indonesian)
Dansk (Danish)
Deutsch (German)
English (Australia)
English (US)
Español (Spanish)
Français (French)
Français Canadien
(Canadian French)
Italiano (Italian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português - Brasil
(Portuguese - Brazil)
Português - Portugal
(Portuguese - Portugal)
Svenska (Swedish)
ภาษาไทย (Thai)
Tiếng Việt (Vietnamese)
Türkçe (Turkish)
Čeština (Czech)
Ελληνικά (Greek)
Български (Bulgarian)
Русский (Russian)
עברית (Hebrew)
اللغة العربية (Arabic)
日本語 (Japanese)
简体中文
(Simplified Chinese)
繁體中文
(Traditional Chinese)
繁體中文 HK
(Traditional Chinese)
한국어 (Korean)
Cancel
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More
Yes, I agree
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
Privacy and Personal Data Collection Disclosure
Introduction to SydneyCloud Edge
Cloud Edge Overview
How Cloud Edge Works
Main Features
Hybrid Security
On–Premises Capabilities
In–the–Cloud Capabilities
New Features and Enhancements
Support for IPv6
Getting Started Screen
Cloud Edge Console Supported Browsers
Dashboard
Dashboard Overview
Using the Dashboard
Tabs
Adding a New Tab
Modifying Tab Settings
Deleting a Tab
Widgets
Security Status Widgets
Traffic Status Widgets
High Availability Widgets
Device Map and Security Widgets
Widget Options
Adding New Widgets
Customizing Widgets
Deleting Widgets
Gateways
Managing Gateways
Registration
Gateway Actions
Registering Gateways
Importing Multiple Gateways
Verifying the Registration
Viewing Information for All Gateways
Creating an HA Group
HA Groups
HA Group - WAN Topologies
HA Group – Failover Conditions
HA Group – Heartbeat Interfaces
HA Group – VRRP Groups
HA Group - Endpoint Network Access
HA Group – Monitor Interfaces and Takeover Triggers
HA Groups - Configuration Settings Matrix
HA Groups – Policy Settings Matrix
HA Group Limitations
HA Group - Actions
Replacing a Gateway
Gateway Information
Viewing General Gateway Information
Viewing Gateway System Status
Viewing Gateway Logs and Events
Event Categories and Sub-Categories
Using Tools to Troubleshoot Network Connectivity
Performing a Ping Test
Performing a Traceroute Test
Retrieving ARP Results
Enabling/Disabling Conservative Mode
Network
Interfaces
Managing Network Interfaces
Editing Network Interfaces
Routing Mode: Editing Network Interfaces
Routing Mode: Editing Wireless Network Interfaces
Bridge Mode: Editing Network Interfaces
Enabling or Disabling Interfaces
Configuring Switch Interface (sw0) Settings
List of Switch Interface (sw0) Settings
Security Protections Provided by Each Intranet Security Mode
How VLANs Work
How to Deploy Cloud Edge With VLANs
Bridge Mode VLANs
Routing Mode VLANs
Adding/Editing VLAN Interfaces
Administrative Access
Enabling Administrative Access
DHCP
Viewing DHCP Services
Editing DHCP Settings
Deployment Mode Information for DHCP
Default DHCP IP Address Pools
Dynamic DNS
Supported DDNS Service Providers
Configuring Dynamic DNS Settings
Viewing DDNS Status
DDNS Status Messages
Routing Table
Viewing the Routing Table
Routing Table Indicators
Static Routes
Adding a Static Route
Enabling/Disabling Static Routes
Modifying a Static Route
Deleting a Static Route
Network Address Translation (NAT)
NAT Rules
Adding a Destination NAT Rule
Modifying NAT Rules
Changing NAT Rule Priorities
Adding a Source NAT Rule
Deleting NAT Rules
Adding NAT Rules to Support Hairpin NAT
SD-WAN
Enabling SD-WAN and Bandwidth Settings
Overview Widgets
SD-WAN Rules
Managing SD-WAN Rules
Adding/Editing SD-WAN Rules
Editing the Default SD-WAN Rule
Duplicating SD-WAN Rules
Moving SD-WAN Rules
Enabling/Disabling SD-WAN Rules
Deleting SD-WAN Rules
SLAs
Managing SLAs
Adding/Editing Health Check SLAs
Deleting SLAs
Wireless
Viewing Wireless Network Information
Viewing Wireless Network General Settings
Viewing Wireless Guest Network Settings
Viewing Wireless Troubleshooting Information
Wireless Network Access Control
How Wireless Network Access Control Rules Work
Configuring Access Control for the Wireless Networks
Viewing Wireless Connected Clients
Adding Connected Clients to Access Control Rules
Adding Wireless Network Access Control Rules
Deleting Wireless Network Access Control Rules
Bandwidth Control
Managing Bandwidth Control
Adding/Editing Bandwidth Control Rules
Duplicating Bandwidth Control Rules
Enabling/Disabling Bandwidth Control Rules
Deleting Bandwidth Control Rules
User VPN
Virtual Private Networks
Encryption Algorithms
Authentication Algorithms
Internet Key Exchange (IKE) Protocols
SSL VPN
Managing SSL VPN
Viewing SSL VPN Clients
Troubleshooting SSL VPN
Understanding SSL VPN Error Messages
L2TP VPN
Managing L2TP VPN
Viewing L2TP VPN Clients
Troubleshooting L2TP VPN
Site-to-Site VPN
IPsec Connections
Supported Configuration Information
Site-to-Site VPN Topologies
Example: Full-Mesh Site-to-Site VPN
Example: Star Site-to-Site VPN
Configuring Full-Mesh Site-to-Site VPNs
Configuring Star Site-to-Site VPNs
Configuring Peer-to-Peer Site-to-Site VPNs
Managing Site-to-Site VPNs
Managing IPsec VPN Connections
Adding an IPsec VPN Connection
Managing IPsec Policies
Adding an IPsec Policy
Configuring Advanced Site-to-Site VPN Settings
IPsec Status
IPsec Troubleshooting
Best Practice Configuration for IPsec Traffic Traversing Multiple Gateways
Viewing Troubleshooting Logs
Updates
Updating the Cloud Edge Gateway
Managing Network Access Control
WFBSS Endpoint Protection
Managing WFBSS Endpoint Protection
Configuring WFBSS Endpoint Protection
Adding Endpoints to the Protection List
Adding Endpoints to the Exception List
Viewing the WFBSS Endpoint Protection Client List
Troubleshooting WFBSS Endpoint Protection
Suspicious Endpoints
Managing Suspicious Endpoints
Configuring Suspicious Endpoints
Viewing the Suspicious Endpoints Violation List
Troubleshooting Suspicious Endpoints
Device Recognition
Endpoint Devices
Viewing Endpoint Devices
Endpoint Device Details
Viewing an Endpoint Device
General Scan Settings
Configuring General Scan Settings
Policies
Policy Rules
Policy Rules and IPv4/IPv6 Support
Managing Policy Rules
Adding/Editing Policy Rules
Matrix: Policy Rules Settings by Gateway Model
Viewing Information About Configured Policy Rules
Usage Information for Policy Rules
Duplicating Policy Rules
Enabling/Disabling Policy Rules
Deleting Policy Rules
Interfaces and Interface Groups
Managing Interface Objects and Interface Groups
Adding/Editing Interface Group Objects
Identity Objects
IP Addresses/FQDNs
Managing IP Address/FQDN Objects
Adding/Editing IP Address/FQDN Objects
IP Address/FQDN Object Parameters
Deleting IP Address/FQDN Objects
Duplicating IP Address/FQDN Objects
MAC Addresses
Managing MAC Addresses
Adding/Editing MAC Address Objects
Deleting Address Objects
Geolocations
Viewing Predefined Geolocations
Managing Grouped Geolocation Objects
Adding/Editing Grouped Geolocation Objects
Deleting Grouped Geolocation Objects
Other Objects
Services
Managing Services
Viewing Predefined Services
Adding/Editing Service Objects
Service Object Parameters
Deleting Service Objects
Duplicating Service Objects
Schedules
Managing Schedules
Adding/Editing Schedule Objects
Deleting Schedule Objects
Duplicating Schedule Objects
Content Type Objects
Applications and Application Groups
Managing Application Groups
Adding/Editing Application Group Objects
Deleting Application Group Objects
Duplicating Application Group Objects
URL Category Groups
Predefined URL Category Groups
Managing URL Category Groups
Adding/Editing URL Category Group Objects
Deleting URL Category Group Objects
Duplicating URL Category Group Objects
URL Category Groups
URL Filtering Categories
Security Profiles
Managing Security Profiles
Security Profile Status Icons
IPS Profiles
Configuring IPS Profiles
IPS Severity Levels
IPS Monitor/Block Categories
Where to Find IPS BID/CVE Information
Anti-Malware Profiles
Configuring Anti-Malware Profiles
Email Security Profiles
Cloud Message Scan (CMS) and Local Scan
Phishing Detection
Email Reputation Technology
Predictive Machine Learning
Virtual Analyzer
Configuring Email Security Profiles
Web Reputation Profiles
Configuring Web Reputation Profiles
HTTPS Profiles
Configuring HTTPS Profiles
Anti-DoS Profiles
Configuring Anti-DoS Profiles
Endpoint Identification Profiles
Configuring Endpoint Identification Profiles
Approved and Blocked Lists
Managing Approved and Blocked Lists
Adding/Editing Approved or Blocked URLs
Adding/Editing Approved or Blocked FQDNs or IP addresses
Deleting Approved or Blocked List
Exporting URLs, FQDNs or IP Addresses from Approved List or Blocked List
Importing URLs, FQDNs or IP Addresses to Approved List or Blocked List
User Notifications
Managing User Notifications
Editing User Notifications
Suspicious Objects
Configuring Settings for Suspicious Objects
Analysis & Reports
Log Analysis
Time Measurements
Analyzing Logs
Application Bandwidth
Managing Application Bandwidth
Policy Enforcement
Managing Policy Enforcement
Policy Enforcement Raw Log Display Columns
Internet Access
Managing Internet Access
Internet Security Test
Managing Internet Security
Log Favorites
Managing Log Favorites
Reports
Managing Report Templates
Adding/Editing Report Templates
Deleting Report Templates
Duplicating Report Templates
Report Content
Summary Reports
Adding/Editing Summary Report Templates
Deleting Summary Report Templates
Duplicating Summary Report Templates
Summary Report Content
Administration
Managing Your License
Creating a Service Plan
Creating a Company and Assigning the Service Plan
License Expiration Warnings
Users and Accounts
Accounts Management
Managing Users and Accounts
Adding/Editing Accounts
Deleting Accounts
Changing User Profiles
Changing User Profiles
User Authentication
UserID Sync
Managing UserID Sync
Authentication Settings
Configuring Authentication Settings
Hosted Users and Groups
Managing Hosted Users
Adding/Editing a Hosted User
Managing Hosted Groups
Adding/Editing a Hosted Group
Importing/Exporting Hosted Users and Groups
Preparing the Import File
LDAP Settings
LDAP Authentication
Configuring LDAP Settings
Basic LDAP Authentication
Advanced LDAP Authentication
RADIUS Settings
RADIUS Authentication
Configuring RADIUS Settings
Managing RADIUS Users/Groups
RADIUS Users and Groups
Captive Portal
Managing Captive Portal
Audit Logs
Configuring Audit Logs
Viewing Policy Change Log Details
Administrator Alerts
Configuring Informational Alerts
Configuring Gateway Offline Alerts
Updates
Updateable Components
Anti-Spam Pattern and Engine
IntelliTrap Pattern and Exceptions
IPS Pattern
Spyware Pattern
Virus Scan Engines and Pattern
Smart Scan Agent Pattern
Scheduling Updates
Maintenance
Configuration Backups
Backing Up or Restoring Configuration
Certificate Management
Importing a Third-Party CA Certificate
Installing a Cloud Edge CA Certificate to Your Browser
Glossary
Viewing Wireless Network Information
You can view information about wireless networks from
Cloud Edge
Cloud Console.
Related information
Viewing Wireless Network General Settings
Viewing Wireless Guest Network Settings
Viewing Wireless Troubleshooting Information
Table of Contents
Privacy and Personal Data Collection Disclosure
Introduction to SydneyCloud Edge
Cloud Edge Overview
How Cloud Edge Works
Main Features
Hybrid Security
On–Premises Capabilities
In–the–Cloud Capabilities
New Features and Enhancements
Support for IPv6
Getting Started Screen
Cloud Edge Console Supported Browsers
Dashboard
Dashboard Overview
Using the Dashboard
Tabs
Adding a New Tab
Modifying Tab Settings
Deleting a Tab
Widgets
Security Status Widgets
Traffic Status Widgets
High Availability Widgets
Device Map and Security Widgets
Widget Options
Adding New Widgets
Customizing Widgets
Deleting Widgets
Gateways
Managing Gateways
Registration
Gateway Actions
Registering Gateways
Importing Multiple Gateways
Verifying the Registration
Viewing Information for All Gateways
Creating an HA Group
HA Groups
HA Group - WAN Topologies
HA Group – Failover Conditions
HA Group – Heartbeat Interfaces
HA Group – VRRP Groups
HA Group - Endpoint Network Access
HA Group – Monitor Interfaces and Takeover Triggers
HA Groups - Configuration Settings Matrix
HA Groups – Policy Settings Matrix
HA Group Limitations
HA Group - Actions
Replacing a Gateway
Gateway Information
Viewing General Gateway Information
Viewing Gateway System Status
Viewing Gateway Logs and Events
Event Categories and Sub-Categories
Using Tools to Troubleshoot Network Connectivity
Performing a Ping Test
Performing a Traceroute Test
Retrieving ARP Results
Enabling/Disabling Conservative Mode
Network
Interfaces
Managing Network Interfaces
Editing Network Interfaces
Routing Mode: Editing Network Interfaces
Routing Mode: Editing Wireless Network Interfaces
Bridge Mode: Editing Network Interfaces
Enabling or Disabling Interfaces
Configuring Switch Interface (sw0) Settings
List of Switch Interface (sw0) Settings
Security Protections Provided by Each Intranet Security Mode
How VLANs Work
How to Deploy Cloud Edge With VLANs
Bridge Mode VLANs
Routing Mode VLANs
Adding/Editing VLAN Interfaces
Administrative Access
Enabling Administrative Access
DHCP
Viewing DHCP Services
Editing DHCP Settings
Deployment Mode Information for DHCP
Default DHCP IP Address Pools
Dynamic DNS
Supported DDNS Service Providers
Configuring Dynamic DNS Settings
Viewing DDNS Status
DDNS Status Messages
Routing Table
Viewing the Routing Table
Routing Table Indicators
Static Routes
Adding a Static Route
Enabling/Disabling Static Routes
Modifying a Static Route
Deleting a Static Route
Network Address Translation (NAT)
NAT Rules
Adding a Destination NAT Rule
Modifying NAT Rules
Changing NAT Rule Priorities
Adding a Source NAT Rule
Deleting NAT Rules
Adding NAT Rules to Support Hairpin NAT
SD-WAN
Enabling SD-WAN and Bandwidth Settings
Overview Widgets
SD-WAN Rules
Managing SD-WAN Rules
Adding/Editing SD-WAN Rules
Editing the Default SD-WAN Rule
Duplicating SD-WAN Rules
Moving SD-WAN Rules
Enabling/Disabling SD-WAN Rules
Deleting SD-WAN Rules
SLAs
Managing SLAs
Adding/Editing Health Check SLAs
Deleting SLAs
Wireless
Viewing Wireless Network Information
Viewing Wireless Network General Settings
Viewing Wireless Guest Network Settings
Viewing Wireless Troubleshooting Information
Wireless Network Access Control
How Wireless Network Access Control Rules Work
Configuring Access Control for the Wireless Networks
Viewing Wireless Connected Clients
Adding Connected Clients to Access Control Rules
Adding Wireless Network Access Control Rules
Deleting Wireless Network Access Control Rules
Bandwidth Control
Managing Bandwidth Control
Adding/Editing Bandwidth Control Rules
Duplicating Bandwidth Control Rules
Enabling/Disabling Bandwidth Control Rules
Deleting Bandwidth Control Rules
User VPN
Virtual Private Networks
Encryption Algorithms
Authentication Algorithms
Internet Key Exchange (IKE) Protocols
SSL VPN
Managing SSL VPN
Viewing SSL VPN Clients
Troubleshooting SSL VPN
Understanding SSL VPN Error Messages
L2TP VPN
Managing L2TP VPN
Viewing L2TP VPN Clients
Troubleshooting L2TP VPN
Site-to-Site VPN
IPsec Connections
Supported Configuration Information
Site-to-Site VPN Topologies
Example: Full-Mesh Site-to-Site VPN
Example: Star Site-to-Site VPN
Configuring Full-Mesh Site-to-Site VPNs
Configuring Star Site-to-Site VPNs
Configuring Peer-to-Peer Site-to-Site VPNs
Managing Site-to-Site VPNs
Managing IPsec VPN Connections
Adding an IPsec VPN Connection
Managing IPsec Policies
Adding an IPsec Policy
Configuring Advanced Site-to-Site VPN Settings
IPsec Status
IPsec Troubleshooting
Best Practice Configuration for IPsec Traffic Traversing Multiple Gateways
Viewing Troubleshooting Logs
Updates
Updating the Cloud Edge Gateway
Managing Network Access Control
WFBSS Endpoint Protection
Managing WFBSS Endpoint Protection
Configuring WFBSS Endpoint Protection
Adding Endpoints to the Protection List
Adding Endpoints to the Exception List
Viewing the WFBSS Endpoint Protection Client List
Troubleshooting WFBSS Endpoint Protection
Suspicious Endpoints
Managing Suspicious Endpoints
Configuring Suspicious Endpoints
Viewing the Suspicious Endpoints Violation List
Troubleshooting Suspicious Endpoints
Device Recognition
Endpoint Devices
Viewing Endpoint Devices
Endpoint Device Details
Viewing an Endpoint Device
General Scan Settings
Configuring General Scan Settings
Policies
Policy Rules
Policy Rules and IPv4/IPv6 Support
Managing Policy Rules
Adding/Editing Policy Rules
Matrix: Policy Rules Settings by Gateway Model
Viewing Information About Configured Policy Rules
Usage Information for Policy Rules
Duplicating Policy Rules
Enabling/Disabling Policy Rules
Deleting Policy Rules
Interfaces and Interface Groups
Managing Interface Objects and Interface Groups
Adding/Editing Interface Group Objects
Identity Objects
IP Addresses/FQDNs
Managing IP Address/FQDN Objects
Adding/Editing IP Address/FQDN Objects
IP Address/FQDN Object Parameters
Deleting IP Address/FQDN Objects
Duplicating IP Address/FQDN Objects
MAC Addresses
Managing MAC Addresses
Adding/Editing MAC Address Objects
Deleting Address Objects
Geolocations
Viewing Predefined Geolocations
Managing Grouped Geolocation Objects
Adding/Editing Grouped Geolocation Objects
Deleting Grouped Geolocation Objects
Other Objects
Services
Managing Services
Viewing Predefined Services
Adding/Editing Service Objects
Service Object Parameters
Deleting Service Objects
Duplicating Service Objects
Schedules
Managing Schedules
Adding/Editing Schedule Objects
Deleting Schedule Objects
Duplicating Schedule Objects
Content Type Objects
Applications and Application Groups
Managing Application Groups
Adding/Editing Application Group Objects
Deleting Application Group Objects
Duplicating Application Group Objects
URL Category Groups
Predefined URL Category Groups
Managing URL Category Groups
Adding/Editing URL Category Group Objects
Deleting URL Category Group Objects
Duplicating URL Category Group Objects
URL Category Groups
URL Filtering Categories
Security Profiles
Managing Security Profiles
Security Profile Status Icons
IPS Profiles
Configuring IPS Profiles
IPS Severity Levels
IPS Monitor/Block Categories
Where to Find IPS BID/CVE Information
Anti-Malware Profiles
Configuring Anti-Malware Profiles
Email Security Profiles
Cloud Message Scan (CMS) and Local Scan
Phishing Detection
Email Reputation Technology
Predictive Machine Learning
Virtual Analyzer
Configuring Email Security Profiles
Web Reputation Profiles
Configuring Web Reputation Profiles
HTTPS Profiles
Configuring HTTPS Profiles
Anti-DoS Profiles
Configuring Anti-DoS Profiles
Endpoint Identification Profiles
Configuring Endpoint Identification Profiles
Approved and Blocked Lists
Managing Approved and Blocked Lists
Adding/Editing Approved or Blocked URLs
Adding/Editing Approved or Blocked FQDNs or IP addresses
Deleting Approved or Blocked List
Exporting URLs, FQDNs or IP Addresses from Approved List or Blocked List
Importing URLs, FQDNs or IP Addresses to Approved List or Blocked List
User Notifications
Managing User Notifications
Editing User Notifications
Suspicious Objects
Configuring Settings for Suspicious Objects
Analysis & Reports
Log Analysis
Time Measurements
Analyzing Logs
Application Bandwidth
Managing Application Bandwidth
Policy Enforcement
Managing Policy Enforcement
Policy Enforcement Raw Log Display Columns
Internet Access
Managing Internet Access
Internet Security Test
Managing Internet Security
Log Favorites
Managing Log Favorites
Reports
Managing Report Templates
Adding/Editing Report Templates
Deleting Report Templates
Duplicating Report Templates
Report Content
Summary Reports
Adding/Editing Summary Report Templates
Deleting Summary Report Templates
Duplicating Summary Report Templates
Summary Report Content
Administration
Managing Your License
Creating a Service Plan
Creating a Company and Assigning the Service Plan
License Expiration Warnings
Users and Accounts
Accounts Management
Managing Users and Accounts
Adding/Editing Accounts
Deleting Accounts
Changing User Profiles
Changing User Profiles
User Authentication
UserID Sync
Managing UserID Sync
Authentication Settings
Configuring Authentication Settings
Hosted Users and Groups
Managing Hosted Users
Adding/Editing a Hosted User
Managing Hosted Groups
Adding/Editing a Hosted Group
Importing/Exporting Hosted Users and Groups
Preparing the Import File
LDAP Settings
LDAP Authentication
Configuring LDAP Settings
Basic LDAP Authentication
Advanced LDAP Authentication
RADIUS Settings
RADIUS Authentication
Configuring RADIUS Settings
Managing RADIUS Users/Groups
RADIUS Users and Groups
Captive Portal
Managing Captive Portal
Audit Logs
Configuring Audit Logs
Viewing Policy Change Log Details
Administrator Alerts
Configuring Informational Alerts
Configuring Gateway Offline Alerts
Updates
Updateable Components
Anti-Spam Pattern and Engine
IntelliTrap Pattern and Exceptions
IPS Pattern
Spyware Pattern
Virus Scan Engines and Pattern
Smart Scan Agent Pattern
Scheduling Updates
Maintenance
Configuration Backups
Backing Up or Restoring Configuration
Certificate Management
Importing a Third-Party CA Certificate
Installing a Cloud Edge CA Certificate to Your Browser
Glossary