
Contents
Introducing the security gateway
Firewall technology ...........................................................................................................................................16
Virtual Private Network (VPN) server technology .......................................................................................16
Antispam scanning ............................................................................................................................................17
Antivirus scanning ............................................................................................................................................18
Intrusion detection and prevention ................................................................................................................18
Content filtering ................................................................................................................................................19
High availability/load balancing .....................................................................................................................19
LiveUpdate support ...........................................................................................................................................19
Security Gateway Management Interface ......................................................................................................20
Becoming familiar with the SGMI
Logging on to the SGMI for the first time ......................................................................................................22
Integrating the SGMI to the desktop ..............................................................................................................24
Logging on to the SGMI from the desktop .....................................................................................................25
Logging on to the SGMI from a browser ........................................................................................................26
Avoiding hostname mismatches .....................................................................................................................27
Viewing Quick Status ........................................................................................................................................29
Accessing commonly used configuration wizards .......................................................................................30
Viewing DeepSight’s ThreatCon status ..........................................................................................................31
Leaving the SGMI .......................................................................................................................................................31
Navigating in the SGMI ............................................................................................................................................33
Using the SGMI menus .....................................................................................................................................35
Using the SGMI toolbar ....................................................................................................................................37
Navigating from the left pane ..........................................................................................................................38
Navigating the right pane .................................................................................................................................43
Displaying Help ..................................................................................................................................................45
Searching Help ...................................................................................................................................................46
Printing Help ......................................................................................................................................................47
Changing the display of objects in a table .....................................................................................................48
Viewing and modifying object properties ......................................................................................................50
Adding configuration objects ...........................................................................................................................52
Configuring objects that reference other objects .........................................................................................55
Saving and activating configuration changes ...............................................................................................59
Deleting configuration objects ........................................................................................................................61
Using the lower pane when you change configurations ..............................................................................62
Viewing system information ....................................................................................................................................63
Using wizards to simplify configuration ...............................................................................................................64
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...