
T A B L E O F C O N T E N T S
iii
Create runtime program .......................................................................................................................................... 3–22
Update All ................................................................................................................................................................ 3–23
Firewall Advanced ...................................................................................................................................................... 3–24
Overview.................................................................................................................................................................. 3–24
Masquerading (SNAT)............................................................................................................................................. 3–25
Firewall Rules .......................................................................................................................................................... 3–26
Create Firewall Rules .............................................................................................................................................. 3–27
Action ................................................................................................................................................................... 3–27
Logging................................................................................................................................................................. 3–27
Source Zone......................................................................................................................................................... 3–28
Destination Zone .................................................................................................................................................. 3–28
Protocol ................................................................................................................................................................ 3–28
Source Ports ........................................................................................................................................................ 3–28
Destination Ports.................................................................................................................................................. 3–28
Common Rules........................................................................................................................................................ 3–29
DNS...................................................................................................................................................................... 3–29
Client Email (POP3, IMAP, SMTP) ...................................................................................................................... 3–30
FTP....................................................................................................................................................................... 3–31
ICQ/IM .................................................................................................................................................................. 3–32
Laplink™ .............................................................................................................................................................. 3–33
MSN™ Messenger............................................................................................................................................... 3–34
PCAnywhere™..................................................................................................................................................... 3–36
Ping and Traceroute............................................................................................................................................. 3–37
PPTP .................................................................................................................................................................... 3–38
Telnet ................................................................................................................................................................... 3–40
VNC...................................................................................................................................................................... 3–41
Yahoo™ Chat....................................................................................................................................................... 3–42
Web Access (browsing) ....................................................................................................................................... 3–43
Apply Configuration ................................................................................................................................................. 3–45
Stop Firewall............................................................................................................................................................ 3–45
Check Firewall ......................................................................................................................................................... 3–45
Backup..................................................................................................................................................................... 3–45
Restore .................................................................................................................................................................... 3–45
Firewall Basic (Templates) ......................................................................................................................................... 3–46
Template 1, High Security ....................................................................................................................................... 3–46
Template 2, High – Medium Security ...................................................................................................................... 3–46
Template 3, Medium Security.................................................................................................................................. 3–46
Template 4, Medium – Low Security ....................................................................................................................... 3–47
Template 5, Low Security........................................................................................................................................ 3–47
Network Configuration ................................................................................................................................................ 3–48
Содержание CS-8D Pro
Страница 1: ...ComSifter protect web users now User Guide Model CS 8D Pro Version March 26 2012 0326121500 ...
Страница 153: ...F I L T E R S E T U P User Guide ComSifter CS 8D Pro 4 23 Figure 4 19 Modify Page RegEx ...
Страница 178: ...U S E R S User Guide ComSifter CS 8D Pro 6 12 User Management Utilities Figure 6 14 User List Management ...
Страница 194: ...U S E R S User Guide ComSifter CS 8D Pro 6 28 Figure 6 19 Windows Firewall ...
Страница 215: ...U S E R S User Guide ComSifter CS 8D Pro 6 49 Figure 6 40 Add User ...
Страница 219: ...U S E R S User Guide ComSifter CS 8D Pro 6 53 Figure 6 43 Add IP ...
Страница 227: ...U S E R S User Guide ComSifter CS 8D Pro 6 61 Figure 6 51 Delete a Domain URL to the Client Program Application Bypass ...
Страница 229: ...U S E R S User Guide ComSifter CS 8D Pro 6 63 Figure 6 53 Turning off Merge with Comsift Maintained Bypass List ...
Страница 231: ...U S E R S User Guide ComSifter CS 8D Pro 6 65 Figure 6 55 Turning off Merge with Exception Domain List ...