Vigor2910 Series User’s Guide
69
Profile Name
Type a name for the CSM profile.
Check for Disallow
Check the items that disallow to use. Any device that uses
such profile might not be allowed to access into the forbidden
items.
3
3
.
.
5
5
C
C
S
S
M
M
C
C
o
o
n
n
t
t
e
e
n
n
t
t
S
S
e
e
c
c
u
u
r
r
i
i
t
t
y
y
M
M
a
a
n
n
a
a
g
g
e
e
m
m
e
e
n
n
t
t
(
(
C
C
S
S
M
M
)
)
CSM
is an abbreviation of
Content Security Management
which is used to control IM/P2P
usage, filter the web content and URL content to reach a goal of security management.
I
I
M
M
/
/
P
P
2
2
P
P
F
F
i
i
l
l
t
t
e
e
r
r
As the popularity of all kinds of instant messenger application arises, communication cannot
become much easier. Nevertheless, while some industry may leverage this as a great tool to
connect with their customers, some industry may take reserve attitude in order to reduce
employee misusage during office hour or prevent unknown security leak. It is similar
situation for corporation towards peer-to-peer applications since file-sharing can be
convenient but insecure at the same time. To address these needs, we provide CSM
functionality.
U
U
R
R
L
L
C
C
o
o
n
n
t
t
e
e
n
n
t
t
F
F
i
i
l
l
t
t
e
e
r
r
To provide an appropriate cyberspace to users, Vigor router equips with
URL Content Filter
not only to limit illegal traffic from/to the inappropriate web sites but also prohibit other web
feature where malicious code may conceal.
Once a user type in or click on an URL with objectionable keywords, URL keyword blocking
facility will decline the HTTP request to that web page thus can limit user’s access to the
website. You may imagine
URL Content Filter
as a well-trained convenience-store clerk
who won’t sell adult magazines to teenagers. At office,
URL Content Filter
can also provide
a job-related only environment hence to increase the employee work efficiency. How can
URL Content Filter work better than traditional firewall in the field of filtering? Because it
checks the URL strings or some of HTTP data hiding in the payload of TCP packets while
legacy firewall inspects packets based on the fields of TCP/IP headers only.
On the other hand, Vigor router can prevent user from accidentally downloading malicious
codes from web pages. It’s very common that malicious codes conceal in the executable
objects, such as ActiveX, Java Applet, compressed files, and other executable files. Once
downloading these types of files from websites, you may risk bringing threat to your system.
Содержание Vigor2910 Series
Страница 1: ......
Страница 2: ...Vigor2910 Series User s Guide ii ...
Страница 6: ...Vigor2910 Series User s Guide vi ...
Страница 24: ...Vigor2910 Series User s Guide 14 This page is left blank ...
Страница 265: ...Vigor2910 Series User s Guide 255 ...