C
ONTENTS
iv
Service Ports . ........................................................................... 26
Rules ........................................................................................ 26
Filter Settings ............................................................................ 27
Filtering Rules ................................................................................. 28
Web Access Logging ...................................................................... 31
IM Blocking.......................................................................... 31
P2P Blocking....................................................................... 32
Using IM and P2P ..................................................................... 33
M86 S
U
G
ECURITY
SER
UIDE