Contents
Viewing Computers ........................................................................................................................194
Viewing Connections ......................................................................................................................197
Viewing Wireless Statistics.............................................................................................................198
Setting Your Security Policy ............................................................................................................203
Default Security Policy ...................................................................................................................203
Setting the Firewall Security Level.................................................................................................204
Configuring Servers ........................................................................................................................207
Using Rules .....................................................................................................................................209
Adding and Editing Rules ...........................................................................................................213
Enabling/Disabling Rules ...........................................................................................................218
Changing Rules' Priority .............................................................................................................219
Deleting Rules.............................................................................................................................219
Using SmartDefense .......................................................................................................................220
Configuring SmartDefense..........................................................................................................221
SmartDefense Categories ............................................................................................................224
Using Secure HotSpot .....................................................................................................................256
Setting Up Secure HotSpot .........................................................................................................257
Enabling/Disabling Secure HotSpot............................................................................................258
Customizing Secure HotSpot ......................................................................................................259
Defining an Exposed Host ..............................................................................................................261
Using VStream Antivirus .................................................................................................................263
Overview.........................................................................................................................................263
Enabling/Disabling VStream Antivirus...........................................................................................265
Viewing VStream Signature Database Information ........................................................................266
Configuring VStream Antivirus ......................................................................................................267
Configuring the VStream Antivirus Policy .................................................................................267
Configuring VStream Advanced Settings ...................................................................................275
Contents
v