286
Controlling traffic at the security gateway
Understanding and using rules
10
If you selected the FTP option in step 4, in the FTP Options panel, check one or more of the
following:
All of these options are enabled by default.
11
In the Confirmation panel, to validate the configuration of your email, HTTP, and FTP services,
click
Finish
.
As the configuration is completed, the status of each of the tasks in the Task list appears in the
Status list.
12
If the configuration is successful, click
Close
.
If the configuration is unsuccessful, click
Back
to return to and correct the invalid part of the
configuration.
Related information
For further information related to this topic, see the following:
■
Using protocols and proxies for specific rules
The security gateway predefines the most commonly used protocols, including their ports and packet
types (TCP, UDP, IP, or ICMP). It also provides application-specific proxies for the protocols that are
most commonly used in IP networks.
You can configure the proxy for a particular kind of traffic, and then create a service group that
contains the protocols for that traffic. Within the service group, you can configure specific settings for
the protocols.
The following topics describe the configuration of proxies and service groups, and their use in rules
that pass specific kinds of traffic:
■
“Defining file control and access”
■
■
■
“Controlling Internet-based data communications”
■
■
■
“Synchronizing security gateway time”
■
■
“Handling streaming audio and video”
■
■
■
Allow antivirus scanning
To apply antivirus parameters to the FTP rules, check this option.
Allow puts
To allow FTP put operations, check this option.
Allow gets
To allow FTP get operations, check this option.
Inside interface
If more than one inside interface is enabled on the security gateway, select the
interface to be used for FTP traffic.
When the security gateway is in a cluster, this list lets you select from inside
VIPs.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...