System Settings
Account List

| Item Name | Sort |
|---|---|
| Account Name | × |
| Account Group ID | × |
| Item Name | Description |
|---|---|
| Account Name | Name of the login account. When clicked, the Update Account page for the account is displayed. |
| Account Group ID | Account group to which the Login Account belongs. When clicked, the Update Account Group page for the account group is displayed. If you delete the account group on the System settings > Account group list page after registering the account group to the login account, the link to the Update Account Group page above is deleted. |
| Item Name | Description |
|---|---|
| Page Top | |
| Add Account | Go to Add Account page. |
| Account List | |
| Delete Selected | Delete all the checked accounts. |
| Edit | Go to Update Account page for the account. |
| Delete | Delete the account. |
NoteDefault account "manager" cannot be deleted.
Add Account

| Item Name | Description |
|---|---|
| Account Name (Mandatory) | Name of the login account. Maximum length is 64 characters. Allowed characters are as follows. a-z, A-Z, 0-9, ' - _ . |
| Password | Login password for the account. Click "Edit" to configure password. |
| Account Group ID | Select the Account Group ID to which the Login Account belongs. |
| Permission | |
| Modify authentication database | Check this to grant permission to change authentication database to the account. |
| Configure system settings | Check this to grant permission to change system configurations to the account. |
| Item Name | Description |
|---|---|
| Password | |
| Edit | Open Password Configuration dialog to configure the account's password. |
| Page Bottom | |
| Submit | Add a new account with the input information. |
| Cancel | Cancel the operation for adding a new account. |
NoteWhen you forget all the passwords for user accounts with "Configure system settings The AMF Security configurations must be initialized if you forget passwords for all accounts with the permission of "Configure system settings" including the "manager" account. Please make sure that you keep your passwords safely and never forget them.
Password Configuration

| Item Name | Description |
|---|---|
| Password (Mandatory) | Login password for the account. Password must be 6 to 64 characters long. Allowed characters are as follows. a-z, A-Z, 0-9, ! # $ % & ' * + - / = ? ^ _ ` { | } ~ . |
| Confirm Password (Mandatory) | Enter the password again. |
| Item Name | Description |
|---|---|
| Bottom of the dialog | |
| Submit | Configure the input password. |
| Cancel | Cancel the operation for configuring a password. |
Update Account

| Item Name | Description |
|---|---|
| Account Name (Mandatory) | Name of the login account. Maximum length is 64 characters. Allowed characters are as follows. a-z, A-Z, 0-9, ' - _ . |
| Password | Login password for the account. Click "Edit" to configure password. |
| Account Group ID | Select the Account Group ID to which the Login Account belongs. |
| Permission | |
| Modify authentication database | Check this to grant permission to change authentication database to the account. |
| Configure system settings | Check this to grant permission to change system configurations to the account. |
| Item Name | Description |
|---|---|
| Password | |
| Edit | Open Password Configuration dialog to configure the account's password. |
| Page Bottom | |
| Submit | Update the account with the input information. |
| Cancel | Cancel the operation for updating the account. |
NoteAccount name and permissions of the default account "manager" cannot be changed.
NoteWhen you forget all the passwords for user accounts with "Configure system settings The AMF Security configurations must be initialized if you forget passwords for all accounts with the permission of "Configure system settings" including the "manager" account. Please make sure that you keep your passwords safely and never forget them.
Password Configuration

| Item Name | Description |
|---|---|
| Password (Mandatory) | Login password for the account. Password must be 6 to 64 characters long. Allowed characters are as follows. a-z, A-Z, 0-9, ! # $ % & ' * + - / = ? ^ _ ` { | } ~ . |
| Confirm Password (Mandatory) | Enter the password again. |
| Item Name | Description |
|---|---|
| Bottom of the dialog | |
| Submit | Configure the input password. |
| Cancel | Cancel the operation for configuring a password. |
Account Group List

| Item Name | Search | Sort |
|---|---|---|
| Account Group ID | × | × |
| Note | × | × |
| Item Name | Description |
|---|---|
| Account Group ID | Account group name. |
| Note | Arbitrary string (comment) for the Account Group. |
| Item Name | Description |
|---|---|
| Page Top | |
| Add Account Group | Go to Add Account Group page. |
| Export to CSV | Start downloading of a list of account groups in CSV format. |
| Account Group List | |
| Delete Selected | Delete all the checked account groups. |
| Edit | Go to Update Account Group page for the account group. |
| Delete | Delete the account group. |
NoteRefer to CSV File in Appendix for CSV Files.
Add Account Group

| Item Name | Description |
|---|---|
| Account Group ID (Mandatory) | Account group to which the Login Account belongs. Account Group ID must be unique. Max 255 characters |
| Note | Arbitrary string (comment) for the Account Group. |
| Item Name | Description |
|---|---|
| Submit | Add a new account group with the input information. |
| Cancel | Cancel the operation for adding a new account group. |
Update Account Group

| Item Name | Description |
|---|---|
| Account Group ID (Mandatory) | Account group to which the Login Account belongs. Account Group ID must be unique. Max 255 characters |
| Note | Arbitrary string (comment) for the Account Group. |
| Item Name | Description |
|---|---|
| Submit | Go to Update Account Group page for the account group. |
| Cancel | Cancel the operation for updating the account group. |
Network Settings
View and change network configurations for the AMF Security system.
Services

| Item Name | Description |
|---|---|
| Web Server Protocol | Protocol (HTTP or HTTPS) to use for the web interface. Default is HTTPS. |
| Web Server Port Number | TCP port number that AMF Security's web interface is listening on. Valid range is 1 to 65535. Default is 443. |
NoteOnly TLS 1.1 and TLS 1.2 are supported for HTTPS.
NoteAMF Security is using several ports internally. Refer to Appendix's TCP or UDP port used by AMF Security for the ports used by AMF Security.
| Item Name | Description |
|---|---|
| Submit | Save the input services configurations. |
SSL Certificate
Register the SSL server certificate of the Web server (AMF Security) and the SSL server certificate of the whitelist authentication server installed in AMF Security.If you want external applications to interact with AMF Security via HTTPS, you may have to install an SSL server certificate issued by a trusted certificate authority (CA).
If you want to encrypt control session between AMF Master and Whitelist Server (AMF Security), upload an SSL server certificate issued by a trusted certificate authority (CA).
"SSL Certificate" section shows a summary of the installed SSL server certificate.

- If your CA provides you with intermediate CA certificates or cross root CA certificates in addition to your server certificate, concatenate those certificates into a single file then upload the file to AMF Security. Contact the CA for detailed information on how to concatenate certificate files.
- To install a certificate file, it must meet the following requirements.
Table 21: SSL Certificate Requirements
Type X.509, RFC6818 Encryption PEM (Privacy Enhanced Mail) Extension .crt
| Item Name | Description |
|---|---|
| Role | Displays Web (Web server) or WhiteList (Authentication server). |
| Common Name(CN) | Displays the common name of the web server (AMF Security) or authentication server (AMF Security). |
| Organization(O) | Displays the name of the organization to which the Web server (AMF Security) or authentication server (AMF Security) belongs. |
| Expiration Date [UTC] | Expiration date of the certificate. |
| Item Name | Description |
|---|---|
| Detail | The detailed information of the registered SSL server certificate is displayed. |
| Upload | Register the SSL server certificate in AMF Security. |
| Delete | Delete the installed SSL server certificate and restore the default certificate which is self-signed by AMF Security. |
Database Synchronization
Set AMF security to redundant and synchronize the authentication database.Set up database synchronization on the device used first as the secondary device and then on the device used as the primary device.
Disable database synchronization on the device used first as the secondary device and then on the device used as the primary device.
NoteThe Device > Active Device List page and Switches > Active OpenFlow Switch List page show the live information retrieved from OpenFlow Switches managed by AMF Security. Therefore, the information displayed on those pages may differ between the primary and secondary's web interfaces.
NoteAMF Application Proxy Whitelist does not support redundant AMF Security configuration.
NoteWhen an OpenFlow packet control flow (flow entry) is updated, such as when an authenticated node moves to another port, multiple logs indicating that the flow entry has been deleted may be recorded. However, it does not affect the authentication behavior.
NoteDatabase synchronization settings are not included in the file exported (downloaded) on the System Settings > System Information page. Therefore, after importing the system settings file, set the database synchronization again.


| Item Name | Description |
|---|---|
| Node | Displays the database synchronization node as Local or Peer. |
| IPv4 address | The set IPv4 address is displayed. |
| Status | Displays the status of database synchronization as Primary, Secondary, Not Ready, or Down. |
| Item Name | Description |
|---|---|
| Enable | Open the Database Synchronization Node Settings dialog. |
| Disable | Disable authentication database synchronization. Only when database synchronization is enabled, the "Enable" button changes to the "Disable" button. |
| Reconnect | Reconnect to the authentication database. |
Database Synchronization Node Settings

| Item Name | Description |
|---|---|
| Local IPv4 Address | Set the currently set AMF Security IPv4 address. |
| Peer IPv4 Address | Remote IPv4 address to use for synchronization. |
| Item Name | Description |
|---|---|
| Enable as Primary | AMF Security works as the primary. |
| Enable as Secondary | AMF Security works as a secondary. |
| Close | Go back to the Network Settings page. |
Database Synchronization Option Settings

| Item Name | Description |
|---|---|
| Don't send error response against authentication database modification request by API via the Secondary host. | Suppress error logs generated by the secondary AMF Security system. |
| Suppress duplicated syslog messages and mail from secondary host. | Suppress duplicated log messages by disabling log transmission on the secondary AMF Security system. |
| Item Name | Description |
|---|---|
| Submit | Save the settings. |
Logging Settings
NoteWhen changing the Logging Settings, the connection with the connected OpenFlow switch is temporarily disconnected.

◼ Log Output
You can view and configure levels for various types of logs.
| Item Name | Description |
|---|---|
| Device Authentication Result | Minimum level for device authentication logs to be output. Default is Informational. |
| OpenFlow Controller | Minimum level for the OpenFlow protocol logs to be output. Default is Informational. |
| OpenFlow Protocol Packets | Minimum level for the OpenFlow packet logs to be output. Default is Disable (do not output any log of this type). |
| GUI Operation | Minimum level for the web interface logs to be output. Default is Informational. |
| Trap Monitor | Minimum level for the trap monitor logs to be output. Default is Informational. |
| Escape double quotation characters in quoted string | Escape double quotes in the log message. Default is disabled. |
◼ Syslog
| Item Name | Description |
|---|---|
| Syslog Server | Set the IPv4 address or hostname and UDP port number of the external Syslog server that sends the log. The forwarding destination should be in the form of "A.B.C.D:P" where the A.B.C.D is an IPv4 address and P is a port number. Multiple Syslog servers can be specified by separating each address by a semicolon (;). A colon (:) and a port number can be omitted if the host is listening on the default syslog port (514). |
NoteAMF Security is using several ports internally. Refer to Appendix's TCP or UDP port used by AMF Security for the ports used by AMF Security.
| Item Name | Description |
|---|---|
| Page Bottom | |
| Submit | Save the input logging configurations. |
Date / Time Settings

| Item Name | Description |
|---|---|
| Current Date / Time | Display system date. |
| Item Name | Description |
|---|---|
| Timezone | Display the system timezone. Default is UTC. Click the "Edit" button to set the timezone. |
| Item Name | Description |
|---|---|
| Edit | Display the Select Timezone dialog and set the system timezone. |
Select Timezone

| Item Name | Description |
|---|---|
| Timezone | Select the timezone from the dropdown list. |
| Item Name | Description |
|---|---|
| Submit | Save the selected timezone. |
OpenFlow Settings
NoteWhen changing the OpenFlow Settings, the connection with the connected OpenFlow switch is temporarily disconnected.

| Item Name | Description |
|---|---|
| OpenFlow TCP Port Number | TCP port number on which AMF Security's OpenFlow controller is waiting for control plane connections. Valid range is 1 to 65535. Default is 6653. |
| OpenFlow Session Timeout | Configure a timeout (in seconds) to disconnect an OpenFlow session with an irresponsive switch. When AMF Security does not receive any message from an OpenFlow Switch for half of this timeout value, AMF Security sends Echo request message to the switch. If the switch does not respond to the Echo request within the timeout period, AMF Security automatically closes the session with the switch. Valid range is 20 to 300. Default is 30. |
| Default Upstream Port | Default setting for OpenFlow Switch's upstream port. If no upstream port is specified in a configuration for an OpenFlow Switch, the default upstream port is used as upstream port on the OpenFlow Switch. Specify it with a port name or an OpenFlow port number. Default is unspecified (empty) which means that the OpenFlow port with the smallest OpenFlow port number on a switch is used as upstream port. |
| Quarantine VLAN ID | VLAN ID of the quarantine network where quarantined devices are placed. Valid range is 0 to 4094. Default is 4089. |
| Flow Lifetime (Hard Timeout) |
Configure the default flow lifetime (in seconds) on the switch. When this amount of time has passed since a flow is created for a device, the flow is automatically deleted from OpenFlow Switches even though the device is still sending traffic. Valid range is 0 to 65535. Default is 65535. Specifying 0 means that flows are never timed out. This value is used when a security policy for a device does not have Schedule. This value may be preceded by a Schedule's End Date / Time. This value is used as it is when the interval between the successful authentication and a scheduled End Date / Time is less than 65535 seconds. If the interval between the successful authentication and a scheduled End Date / Time is larger than or equals to 65535 seconds, actual timeout is set to 65535 seconds. |
| Flow Lifetime fluctuation | Configure a maximum fluctuation value for Flow Lifetime (in seconds). When set to non-zero value (X), actual flow lifetime value is calculated by subtracting a random fluctuation value between 0 and X from the Default Flow Lifetime. This value must be less than the Flow Lifetime value and in the range between 0 and 600 (Only 0 is valid when the Default Flow Lifetime is 0). Default is 0. (The Default Flow Lifetime is used as is). For example, when the Flow Lifetime fluctuation is set to 600 seconds, actual flow lifetime set to flow entries is determined by subtracting a random value between 0 and 600 from the Default Flow Lifetime (If the Default Flow Lifetime is 65535 (default), actual flow lifetime can be any value in the range between 64935 and 65535). |
| Reject Flow Lifetime | Flow lifetime in seconds for devices which failed to authenticate. Valid range is 0 to 65535. Default is 30. Specifying 0 means that reject flows are never created. |
| Flow Idle Timeout (Idle Timeout) |
An amount of time that should have passed without any traffic from a device before the flow for the device is deleted automatically. Valid range is 0 to 65535. Default is 300. Specifying 0 means that flows are never deleted even though no traffic is seen from devices. |
| Encrypt the OpenFlow control session. | Check this to encrypt control plane traffic between AMF Security and OpenFlow Switches. TLS is used for encryption. To use encrypted control plane, you also have to configure OpenFlow Switches to use encryption. |
| Discard packets generated by OpenFlow Switches. | Check this to install flows on the OpenFlow Switches that discard packets originated from the OpenFlow Switch themselves. |
| Reject Flow is operated same as normal flow. | Configure the timer and deletion behavior of Reject flows. Default is disabled.
|
NoteAMF Security is using several ports internally. Refer to Appendix's TCP or UDP port used by AMF Security for the ports used by AMF Security.
NoteDefault Upstream Port is applied to unregistered OpenFlow Switches When you are using both AlliedWare plus switches and AT-TQ wireless access points as OpenFlow Switches, configuring the Default Upstream Port disturbs flow entry registration due to the difference in the port number structure between AlliedWare Plus and AT-TQ series.
When you use non-minimum number OpenFlow port as upstream port on AlliedWare Plus Devices, individually configure the upstream port on each OpenFlow Switch.
Refer to Switches > Add OpenFlow Switch for instructions on how to register OpenFlow Switches.
| Item Name | Description |
|---|---|
| Page Bottom | |
| Submit | Save the input OpenFlow configurations. |
System Information
NoteWhen changing the hostname, the connection with connected OpenFlow Switch or AMF Master is temporarily disconnected.

◼ System Information
| Item Name | Description |
|---|---|
| Hostname | Hostname of the system Default is "sesc". To change the hostname, enter a new hostname and click "Update". Max 63 characters. Allowed characters are as follows. a-z, A-Z, 0-9, - Hyphen (-) cannot be used for the first letter. |
| Database Synchronization | Status of database synchronization. One of Disabled, Syncing or Disconnected. |
| Item Name | Description |
|---|---|
| Refresh | Update the hostname. |
◼ Software Info
| Item Name | Description |
|---|---|
| Version | Version and build number (internal version) of the installed AMF Security software. |
| Build Time | Build date and time of the installed AMF Security software. |
◼ System Settings
| Item Name | Description |
|---|---|
| Size | Displays the file size of system setting data. |
| Updated Date / Time | Displays the date and time when the system setting data was updated. |
| Item Name | Description |
|---|---|
| Export | Download system configuration for backup. |
| Import | Import and restore system settings. |
| Reset | Reset system configuration to factory default. |
Manually backup, configure or delete those elements.
- Configurations to be backed up, restored and reset.
- Account List
- Network Settings - Services
- Logging Settings
- Date / Time Settings
- Trap Monitor Settings
- Email Notification Settings
- AMF Settings
- Account List
- Configurations not to be backed up, restored and reset.
- Network Settings - SSL Certificate
- Network Settings - Database Synchronization
- AMF - SSL Certificate
- SESC Log
- Action Log
- Network Settings - SSL Certificate
◼ Authentication Data
| Item Name | Description |
|---|---|
| Size | Displays the file size of the authentication data. |
| Updated Date / Time | Displays the date and time when the authentication data was updated. |
| Item Name | Description |
|---|---|
| Export | Download authentication data for backup. |
| Import | Import authentication data from a CSV file. |
| Reset | Delete all authentication data on this system. |
| Compact | Rebuild the authentication database. |
NoteAuthentication data file to import should be in CSV format. Refer to CSV File in Appendix for CSV Files.
◼ Services
| Item Name | Description |
|---|---|
| Restart All | Restart AMF Security system. |
◼ Technical Support Information
| Item Name | Description |
|---|---|
| Download | Download technical support information for trouble shooting. |
Trap Monitor Settings
This page lets you configure various parameters required for interaction with external applications.You can also setup AMF Security to forward SNMP traps and syslog messages to other systems.
NoteTrap monitor only responds to specific set of log messages and SNMP traps. You cannot define actions for arbitrary messages and traps.

◼ Protocols
| Item Name | Description |
|---|---|
| Syslog Port Number | Listening port number to receive syslog messages. Valid range is 1 to 65535. Default is 514. |
| SNMP Trap Port Number | Listening port number to receive SNMP traps. Valid range is 1 to 65535. Default is 162. |
NoteAMF Security is using several ports internally. Refer to Appendix's TCP or UDP port used by AMF Security for the ports used by AMF Security.
◼ Networks
Specify the monitored or unmonitored network, Syslog message, and SNMP Trap transfer destination host.
If Monitored Networks and Excluded Networks overlap, Exclude Networks have precedence.
NoteSome external applications do not respect settings of Monitored Networks and Excluded Networks.
| Item Name | Description |
|---|---|
| Monitored Networks | IPv4 networks to monitor using syslog and trap messages. Multiple networks can be specified by separating each network by a semicolon (;). If this field is empty or 0.0.0.0/0 is specified, all networks are monitored. Default is 0.0.0.0/0. |
| Excluded Networks | IPv4 networks not to monitor. Multiple networks can be specified by separating each network by a semicolon (;). |
| Syslog Forwarding Destination Hosts | Specify a host to which AMF Security forwards the received syslog messages. The forwarding destination should be in the form of "A.B.C.D:P" where the A.B.C.D is an IPv4 address and P is a port number. Multiple hosts can be specified by separating each address by a semicolon (;). A colon (:) and a port number can be omitted if the host is listening on the default syslog port (514). Source IPv4 address of the forwarded messages are the address of AMF Security. |
| SNMP Trap Forwarding Destination Hosts | Specify a host to which AMF Security forwards the received trap messages. The forwarding destination should be in the form of "A.B.C.D:P" where the A.B.C.D is an IPv4 address and P is a port number. A colon (:) and a port number can be omitted if the host is listening on the default trap port (162). Multiple hosts can be specified by separating each address by a semicolon (;). Source IPv4 address of the forwarded messages are the address of AMF Security. |
◼ Device Lookup
Specify a target range of the action to notify.
| Item Name | Description |
|---|---|
| None | Notify actions on MAC address. |
| Device | Notify actions on Device. |
| Tag | Notify actions on Device Tag. |
NoteDevice Lookup is not supported for AMF Application Proxy's IP-Filter action.
| Item Name | Description |
|---|---|
| Submit | Save the settings. |
◼ Rules
Trap monitor rules can be updated and added through trap monitor rule files.
By default, trap monitor rules for the UTM functions of AT-AR3050S/AT-AR4050S routers are installed.
NoteTrap monitor rule files are provided by our "AMF-SEC Technology Partner Program". Contact our sales engineer for the Technology Partner Program.
- AT-AR3050S/AR4050S
This tab lets you configure trap monitor rules for the UTM functions of AT-AR3050S/AT-AR4050S routers.
To receive and monitor syslog messages from AT-AR3050S/AT-AR4050S routers, check "Enable the monitoring of traps from this host.".
Then, check events which you want to monitor in the "Trap Action Target Trigger" table.
- IP Reputation:Detection of Malware Category
Block traffic from a device when AMF Security receives a syslog message indicating that the IP reputation feature on the router detects the device tries to communicate with a destination classified as Malware category (Malware C&C server (CnC), Malware-infected host (Bot) or Mobile C&C Server (Mobile_CnC)).
- IP Reputation:Detection of Spyware Category
Block traffic from a device when AMF Security receives a syslog message indicating that the IP reputation feature on the router detects the device tries to communicate a destination classified as Spyware category (drop site (Drop), Spyware C&C server (SpywareCnC) or Mobile Spyware C&C server (Mobile_Spyware_CnC)).
- Malware Protection:Detection of known malware on communicate from LAN to WAN
Block traffic from a device when AMF Security receives a syslog message indicating that the malware protection feature on the router detects the known malware on the device.
- Antivirus:Detection of virus on communicate from LAN to WAN
Block traffic from a device when AMF Security receives a syslog message indicating that the anti-virus feature on the router detects the known virus on the device.
- Firewall(IDS):Detection of Syn Flood attacks from LAN to WAN
Block traffic from a device when AMF Security receives a syslog message indicating that the firewall's IDS feature on the router detects the SYN Flood attack from the device.
- Firewall(IDS):Detection of ICMP Flood attacks from LAN to WAN
Block traffic from a device when AMF Security receives a syslog message indicating that the firewall's IDS feature on the router detects the ICMP Flood attack from the device.
- Firewall(IDS):Detection of UDP Flood attacks from LAN to WAN
Block traffic from a device when AMF Security receives a syslog message indicating that the firewall's IDS feature on the router detects the UDP Flood attack from the device.
- Firewall(IDS):Detection of TCP Stealth Scan from LAN to WAN
Block traffic from a device when AMF Security receives a syslog message indicating that the firewall's IDS feature on the router detects the TCP Stealth Scan attack from the device.
Note
To use those rules, you also have to configure AT-AR3050S/AT-AR4050S. Refer to the AT-AR3050S/AT-AR4050S's documentation for more details.
Table 53: Buttons
Item Name Description Value Open the Rule Setup page.
Table 54: Displayed columns
Item Name Description Version Version of the Trap Monitor Rules
Table 55: Configurable fields
Item Name Description Enable the monitoring of traps from this host. If you want to monitor the device by receiving Syslog message from AT-AR3050S or AT-AR4050S, check the check box. Host Addresses IPv4 address of AT-AR3050S/AT-AR4050S routers. Multiple hosts can be specified by separating each address by a semicolon (;). Default is unspecified (empty) which means that AMF Security accepts syslog messages from any IPv4 address. OpenFlow Action Specify an OpenFlow action to run when the event occurs. - Drop Packets: Block traffic from the device at the layer two (MAC) level.
- Quarantine: Move the device to the quarantine network.
- Log-Only: Record the device information.
AMF Action An action to be taken on the AMF network deploying AMF Application Proxy feature. - Drop Packets: Block traffic from the device at the layer two (MAC) level.
- Link-Down: Shutdown the port where the device is connected.
- Quarantine: Move the port where the device is connected to the quarantine VLAN.
- AMF Dependency: AMF Security does not specify an action and lets AMF devices determine its action.
- IP-Filter: Block traffic from the device at the layer 3 (IP) level.
- Log-Only: AMF Security does not specify an action and records the device information.
Table 56: Buttons
Item Name Description Page Bottom Submit Save the settings. - IP Reputation:Detection of Malware Category
Rules

| Item Name | Description |
|---|---|
| Name | Name of the Trap Monitor Rules |
| Item Name | Description |
|---|---|
| Choose File | Select the rule settings file to upload. |
| Upload | Upload the selected rule settings file. |
| Delete | Delete the registered rule settings. |
| Close | Go back to the Trap Monitor Settings page. |
Email Notification Settings
This page lets you configure Email Notifications.You can configure AMF Security to notify an administrator with an email when an event such as device authentication or block happens.
AMF Security also sends emails to forward the contents of syslog messages and SNMP traps it receives.
NoteEmail notification of syslog and trap messages are always enabled and cannot be disabled.
NoteWhen changing the Email Notification Settings, the connections with the connected OpenFlow Switch is temporarily disconnected.
AMF Security queues the Notification Emails by the following rules and tries to resend them upon failure.
- When an event occurs, AMF Security queues up to 100 emails for the event in the first 10 seconds after the event.
- Queued emails are sent out as a single email after 10 seconds.
- If 100 or more events occur in 10 seconds after the first event, AMF Security queues them too.
- A Queue is created for each event types of Email Notification Settings.
- AMF Security attempts up to four retries, i.e. AMF Security tries to send an email up to 5 times.

◼ Email Notification Settings
You can enable or disable email notification for each event with checkboxes.
- Send Email Notification on Authentication Success
- Send Email Notification on UnAuth Authentication Success
- Send Email Notification on Block Event
- Send Email Notification on Quarantine Event
- Send Email when Switch License Exceeded
- Send Email when Database Synchronization Status has changed
Note"Send Email Notification on Block Event" or "Send Email Notification on Quarantine Event" is checked, AMF Security also sends notification email when a device is blocked or quarantined by AMF Application Proxy.
◼ SMTP Server Settings
| Item Name | Description |
|---|---|
| SMTP Server | IPv4 address of a SMTP server which AMF Security uses to send out emails. |
| SMTP Port | Listening port of the SMTP server. |
| Sender | Mail address of the sender. |
| Receiver | Mail address of the recipient. Multiple addresses can be specified by separating them with a semicolon (;). |
| Username | Username for SMTP authentication. |
| Password | Password for SMTP authentication. |
| Encryption | Check this to use TLS connection to the SMTP server. |
| Language | Select a language used in emails. |
NoteAMF Security is using several ports internally. Refer to Appendix's TCP or UDP port used by AMF Security for the ports used by AMF Security.
NoteIf your browser is configured to use Japanese, some part of emails is written in Japanese even if Language setting for Email Notification is English. If both browser and Email Notification are configured to use English, mail body is written in English. Note that strings contained in authentication data or messages received from an external application are left unchanged.
NoteWhen you want AMF Security to send notification emails when a device is blocked by the AMF Application Proxy with "Drop Packets", "Link-Down" or "IP-Filter" action, check "Send Email Notification on Block Event" .
| Item Name | Description |
|---|---|
| SMTP Server Settings | |
| Send Test Email | Send a test email. |
| Page Bottom | |
| Submit | Save the SMTP server settings. |
Licenses
This section lets you manage licenses for AMF Security.There are two types of licenses: "Base" and "Addon".
- You always need the Base license to run AMF Security.
OpenFlow and AMF Application Proxy do not work until the base license is installed.
- The Addon license is for adding an OpenFlow switch. AMF Application Proxy works with a Base license only, no Addon license for nodes is required.
Although you can install Addon licenses before installing the Base license, AMF Security does not work until the Base license is installed.
NotePurchase a license to use OpenFlow.
NoteAfter registering the basic license, if you delete or add the basic license during operation of the OpenFlow and AMF Application Proxy network, OpenFlow and AMF Application Proxy may not operate normally.
Therefore, disconnect AMF security from the operating network before removing or adding a registered base license.
If the base license is removed or added during operation and AMF Application Proxy does not work properly, restart AMF security.

| Item Name | Description |
|---|---|
| The maximum number of concurrent OpenFlow Switch connections | The maximum number of OpenFlow Switches which can be supported by the installed licenses. |
| Name | Name of the license. |
| Serial Number | Internal serial number of the license. |
| Expiration Date | Displays the license years. |
| Number of Switches | Number of OpenFlow Switches supported by the license. |
| Item Name | Description |
|---|---|
| Add | Add a license. In the dialog, enter the Serial Number and Authentication Key shown on the license certificate and click the "Submit" button. |
| Delete | Delete the license. |
SESC Log
This page shows log messages generated by AMF Security service. The latest 1000 messages are displayed in this page.You can view messages for a specific date by selecting a date at the right side of the page.

| Item Name | Description |
|---|---|
| Clear All Logs | Clear all log messages. |
| Download | Download the latest log messages. |
| Refresh | Refresh SESC Log page. |
Action Log
This page shows AMF Security services' log messages related to actions.It is possible to filter messages by each field's content.
NoteDepending on the specifications of the Web browser, it may not be possible to display all action logs on this page. In that case, download and check the action log.

| Item Name | Description |
|---|---|
| Date / Time | Date / Time the action was applied to a device. |
| MAC Address | MAC address of the device. |
| Device ID | Device ID |
| Device IPv4 Address | IPv4 address of the device. |
| Device Tag | Device Tag |
| Connected Switch ID | ID of the switch to which the device is connected. |
| Connected Switch IPv4 Address | IPv4 address of the connected switch |
| Connected Port ID | ID of the port to which the device is connected. |
| Connected Port Number | Port number of the port to which the device is connected. |
| Status | Type of action applied to the device. |
| VLAN ID | VLAN ID to which the device belongs |
| Network ID | Network ID to which the device belongs |
| Action ID | ID of the action applied to the device |
| Priority | Priority of the action applied to the device |
| Action Originator | Originator of the action applied to the device |
| Reason | Reason of the action applied to the device. |
| Item Name | Description |
|---|---|
| Refresh | Refresh the Action Log page. |
| Download | Download the latest log messages. |
| Clear Action Log | Deletes action logs. |
| Item Name | Search | Filter | Sort |
|---|---|---|---|
| Duration | × | − | − |
| MAC Address | × | − | − |
| Device IPv4 Address | × | − | − |
| Device Tag | × | − | − |
| Action Originator | × | − | − |
| Status | − | × | − |
25 Mar 2021 14:11