Overview.........................................................................................................................................265
Viewing Reports ................................................................................................................................305
Viewing the Event Log ...................................................................................................................305
Using the Traffic Monitor ...............................................................................................................308
Viewing Computers ........................................................................................................................312
Viewing Connections ......................................................................................................................314
Viewing Wireless Statistics.............................................................................................................316
Viewing ADSL Statistics ................................................................................................................320
Viewing the Routing Table .............................................................................................................322
Setting Your Security Policy ............................................................................................................325
Default Security Policy ...................................................................................................................327
Configuring Servers ........................................................................................................................331
Using Rules .....................................................................................................................................334
Using Port-Based Security ..............................................................................................................347
Using Secure HotSpot .....................................................................................................................351
Using NAT Rules............................................................................................................................357
Using Web Rules ............................................................................................................................365
Using SmartDefense..........................................................................................................................375
Overview.........................................................................................................................................375
Configuring SmartDefense..............................................................................................................376
SmartDefense Categories ................................................................................................................383
Contents
Contents
iii
Need help?
Do you have a question about the UTM-1 Edge and is the answer not in the manual?
Questions and answers