Planet CS-2000 User Manual page 5

Utm content security gateway
Table of Contents

Advertisement

5.5.2 Example 2 RADIUS Server Authentication.................................................................................... 84
5.5.3 Example 3 POP3 Server Authentication ........................................................................................ 98
5.5.4 Example 4 LDAP Server Authentication ...................................................................................... 101
5.9 VPN..................................................................................................................................................................... 148
5.9.1 VPN Wizard.................................................................................................................................. 151
5.9.2 Example 1 .................................................................................................................................... 158
5.9.3 Example 2 .................................................................................................................................... 173
5.9.4 Example 3 .................................................................................................................................... 219
5.9.5 Example 4 .................................................................................................................................... 233
5.9.6 Example 5 .................................................................................................................................... 253
CHAPTER 6: POLICY................................................................................................................................... 266
CHAPTER 7: MAIL SECURITY .................................................................................................................... 294
......................................................................................................................................................... 294
7.1.1 Setting .......................................................................................................................................... 295
7.1.2 Mail Relay .................................................................................................................................... 299
7.1.3 Mail Account................................................................................................................................. 305
7.1.4 Mail Notice ................................................................................................................................... 314
........................................................................................................................................................... 327
7.2.1 Setting .......................................................................................................................................... 328
7.2.2 Personal Rule .............................................................................................................................. 332
7.2.3 Global Rule .................................................................................................................................. 333
7.2.4 Whitelist........................................................................................................................................ 335
7.2.5 Blacklist ........................................................................................................................................ 335
7.2.6 Training ........................................................................................................................................ 336
7.2.7 Spam Mail .................................................................................................................................... 337
7.2.8 The Advanced Description ........................................................................................................... 339
7.2.9 Anti-Spam Examples.................................................................................................................... 343
.......................................................................................................................................................... 390
7.3.1 Setting .......................................................................................................................................... 391
7.3.2 Virus Mail ..................................................................................................................................... 394
7.3.3 Anti-Virus Examples..................................................................................................................... 396
...................................................................................................................................................... 407
7.4.1 Setting .......................................................................................................................................... 408
7.4.2 Statistics....................................................................................................................................... 414
7.4.3 Log ............................................................................................................................................... 416
........................................................................................................................................... 115
.............................................................................................................................................. 127
................................................................................................................................................. 134
CS-2000 UTM Content Security Gateway User's Manual

Advertisement

Table of Contents
loading

Table of Contents