Symantec 360R - Security Gateway SGS Administration Manual page 7

Gateway security 300 series
Hide thumbs Also See for 360R - Security Gateway SGS:
Table of Contents

Advertisement

Chapter 7
Chapter 8
Chapter 9
Understanding Gateway-to-Gateway tunnels ......................................... 88
Configuring dynamic Gateway-to-Gateway tunnels .............................. 91
Configuring static Gateway-to-Gateway tunnels ................................... 93
Configuring Client-to-Gateway VPN tunnels .................................................. 96
Understanding Client-to-Gateway VPN tunnels ..................................... 97
Defining client VPN tunnels ...................................................................... 99
VPN tunnels ................................................................................................101
Sharing information with your clients ...................................................101
Monitoring VPN tunnel status .........................................................................102
How antivirus policy enforcement (AVpe) works .........................................104
Before you begin configuring AVpe ................................................................105
Configuring AVpe ..............................................................................................106
Enabling AVpe ............................................................................................107
Configuring the antivirus clients ............................................................109
Monitoring antivirus status .............................................................................109
Log messages ..............................................................................................110
Verifying AVpe operation ................................................................................110
About content filtering .....................................................................................111
Special considerations ..............................................................................111
Managing content filtering lists ......................................................................112
Special considerations ..............................................................................112
Enabling content filtering for LAN .........................................................113
Enabling content filtering for WAN .......................................................113
Monitoring content filtering ............................................................................114
How intrusion detection and prevention works ...........................................115
Trojan horse protection ............................................................................116
Setting protection preferences ........................................................................116
Enabling advanced protection settings ..........................................................117
IP spoofing protection ...............................................................................117
TCP flag validation ....................................................................................118
Managing logging ..............................................................................................119
Configuring log preferences .....................................................................120
Managing log messages ............................................................................124
Updating firmware ............................................................................................124
Contents
7

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

320360

Table of Contents