Symantec 460R - Gateway Security Administrator's Manual page 6

Administration guide
Hide thumbs Also See for 460R - Gateway Security:
Table of Contents

Advertisement

6
Contents
Configuring advanced WAN/ISP settings ....................................................................................................45
Chapter 4
Configuring LAN IP settings ..........................................................................................................................51
Configuring the appliance as a DHCP server ..............................................................................................52
Configuring port assignments .......................................................................................................................53
Chapter 5
Planning network access ................................................................................................................................55
Understanding computers and computer groups ......................................................................................55
Defining inbound access .................................................................................................................................58
Defining outbound access ..............................................................................................................................59
Configuring services .......................................................................................................................................61
Configuring special applications ...................................................................................................................62
Configuring advanced options .......................................................................................................................64
Chapter 6
How to use this chapter ..................................................................................................................................67
Creating security policies ...............................................................................................................................68
Identifying users ..............................................................................................................................................70
Configuring gateway-to-gateway tunnels ...................................................................................................72
Configuring client-to-gateway VPN tunnels ...............................................................................................78
Configuring static route entries ............................................................................................................44
High availability .......................................................................................................................................45
Load balancing .........................................................................................................................................46
SMTP binding ...........................................................................................................................................46
Binding to other protocols .....................................................................................................................47
Configuring failover ................................................................................................................................47
DNS gateway .............................................................................................................................................47
Optional network settings ......................................................................................................................48
Monitoring DHCP usage .........................................................................................................................53
Standard port assignment ......................................................................................................................53
SGS Access Point Secured port assignment ........................................................................................53
Enforce VPN tunnels port assignment .................................................................................................53
Defining computer group membership ................................................................................................56
Defining computer groups .....................................................................................................................57
Outbound rule example ..........................................................................................................................60
Redirecting services ................................................................................................................................61
Enabling the IDENT port ........................................................................................................................64
Disabling NAT mode ...............................................................................................................................64
Blocking ICMP requests ..........................................................................................................................65
Enabling WAN broadcast storm protection ........................................................................................65
Enabling IPsec pass-thru ........................................................................................................................65
Configuring an exposed host .................................................................................................................66
Understanding VPN policies ..................................................................................................................68
Creating custom Phase 2 VPN policies .................................................................................................69
Viewing VPN Policies List ......................................................................................................................70
Understanding user types ......................................................................................................................70
Defining users ..........................................................................................................................................71
Viewing the User List ..............................................................................................................................72
Understanding gateway-to-gateway tunnels ......................................................................................72
Configuring dynamic gateway-to-gateway tunnels ...........................................................................74
Configuring static gateway-to-gateway tunnels .................................................................................75
Sharing information with the remote gateway administrator .........................................................77

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 460R - Gateway Security and is the answer not in the manual?

Table of Contents