6
Contents
Chapter 4
Configuring LAN IP settings ..........................................................................................................................51
Configuring port assignments .......................................................................................................................53
Chapter 5
Planning network access ................................................................................................................................55
Defining inbound access .................................................................................................................................58
Defining outbound access ..............................................................................................................................59
Configuring services .......................................................................................................................................61
Configuring advanced options .......................................................................................................................64
Chapter 6
How to use this chapter ..................................................................................................................................67
Creating security policies ...............................................................................................................................68
Identifying users ..............................................................................................................................................70
High availability .......................................................................................................................................45
Load balancing .........................................................................................................................................46
SMTP binding ...........................................................................................................................................46
Binding to other protocols .....................................................................................................................47
Configuring failover ................................................................................................................................47
DNS gateway .............................................................................................................................................47
Optional network settings ......................................................................................................................48
Monitoring DHCP usage .........................................................................................................................53
Standard port assignment ......................................................................................................................53
Defining computer groups .....................................................................................................................57
Outbound rule example ..........................................................................................................................60
Redirecting services ................................................................................................................................61
Enabling the IDENT port ........................................................................................................................64
Disabling NAT mode ...............................................................................................................................64
Blocking ICMP requests ..........................................................................................................................65
Enabling IPsec pass-thru ........................................................................................................................65
Configuring an exposed host .................................................................................................................66
Understanding VPN policies ..................................................................................................................68
Viewing VPN Policies List ......................................................................................................................70
Understanding user types ......................................................................................................................70
Defining users ..........................................................................................................................................71
Viewing the User List ..............................................................................................................................72
Need help?
Do you have a question about the 460R - Gateway Security and is the answer not in the manual?