Planet SG-500 [5/319] Chapter 5 policy 223

Planet SG-500 [5/319] Chapter 5 policy 223
SG-500 VPN Security Gateway User’s Manual
4.8 EXAMPLE ..................................................................................................................................77
4.9 AUTHENTICATION......................................................................................................................79
4.10 EXAMPLE ................................................................................................................................85
4.11 CONTENT BLOCKING...............................................................................................................89
4.12 URL........................................................................................................................................93
4.13 SCRIPT.....................................................................................................................................96
4.14 P2P .........................................................................................................................................98
4.15 IM.........................................................................................................................................100
4.16 DOWNLOAD...........................................................................................................................102
4.17 VIRTUAL SERVER...................................................................................................................104
4.18 EXAMPLE ..............................................................................................................................108
4.19 IPSEC VPN...........................................................................................................................122
CHAPTER 5 POLICY.................................................................................. 223
5.1 POLICY....................................................................................................................................225
5.2 EXAMPLE ................................................................................................................................229
CHAPTER 6 WEB VPN / SSL VPN ............................................................ 247
6.1 SETTINGS ................................................................................................................................250
CHAPTER 7 ANOMALY FLOW IP.............................................................. 260
7.1 SETTINGS ................................................................................................................................261
CHAPTER 8 MONITOR.............................................................................. 271
8.1 LOG........................................................................................................................................271
8.2 TRAFFIC LOG...........................................................................................................................273
8.3 EVENT LOG .............................................................................................................................278
8.4 CONNECTION LOG...................................................................................................................281
8.5 LOG BACKUP...........................................................................................................................284
8.6 ACCOUNTING REPORT .............................................................................................................286
8.7 OUTBOUND .............................................................................................................................289
8.8 INBOUND.................................................................................................................................295
8.9 STATISTICS ..............................................................................................................................301
8.10 WAN.....................................................................................................................................303
8.11 POLICY..................................................................................................................................305
8.12 WAKE ON LAN......................................................................................................................307
8.13 STATUS ..................................................................................................................................309
8.14 INTERFACE ............................................................................................................................310
8.15 AUTHENTICATION..................................................................................................................312
8.16 ARP TABLE ...........................................................................................................................313
8.17 DHCP CLIENTS.....................................................................................................................314

Содержание

Скачать
Случайные обсуждения