
17
Introducing the security gateway
Key components of the security gateway
VPN features include:
Antispam scanning
Spam is unsolicited bulk email, most often advertising messages for a product or service. Spam email
wastes user productivity and consumes network and mail server resources. The security gateway
provides scanning processes that let you optimize spam detection and reduce false positives. You can
also configure how to respond to spam email.
When antispam protection is enabled in a rule, the security gateway scans emails that are handled by
the SMTP and POP3 proxies.
The security gateway lets you configure the following options to optimize spam detection:
To minimize false positives, you can define a list of sender domains that are not evaluated by the real-
time blacklists. You can also specify email addresses and domains that are allowed to bypass scanning
processes.
VPN policies
Symantec Gateway Security 5000 Series v3.0 ships with pre-configured VPN policies that
you can apply to your secure IPsec tunnels.
For example, you can apply pre-configured IPsec/IKE policies and IPsec/Static policies to
the IPsec/IKE or IPsec/Static secure tunnel that you create.
Symantec Client VPN
tunnel configurations
Client VPN tunnels let remote users running the Symantec Client VPN software (or any
IPsec compliant VPN client software) safely connect over the Internet to a network secured
by a Symantec security gateway.
A Client configuration is created when a workstation, running Symantec Client VPN
software, connects to the security gateway from either inside the protected network or
from a remote location through the Internet.
Gateway-to-gateway
VPN tunnel
configurations
A gateway-to-gateway configuration is created when two security gateways are connected,
across an internal network, or the Internet, through a VPN tunnel.
Gateway-to-gateway tunnels help secure your internal network by providing a secure
bridge to an external LAN.
Clientless VPN
Clientless VPN technology is integrated into the security gateway. It provides portal-based
access for Web-enabled and non-Web based applications, connecting large numbers of
remote users to your corporate network.
Clientless VPN lets users at any dial-up, broadband, or wireless access point gain
authenticated and controlled remote access to email, shared network files and resources,
corporate applications, corporate intranets, and corporate Web-based applications from
any location.
Client compliance
The security gateway enforces security parameters set by the administrator prior to
establishing a VPN tunnel. This includes determining if the client is running the expected
corporate profile for required security products.
Real-Time blacklist servers
Blocks mail that comes from mail servers known or believed to send spam.
Heuristic sensitivity
Sets the sensitivity level of the heuristic antispam scanner.
Email senders identified as spam
Identifies spam based on addresses or domains that you specify.
Subject patterns identified as spam
Identifies spam based on subject line content that you specify.
Identify messages with no subject line
as spam
Identifies spam based on subject lines that do not contain content.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...