beautypg.com
11.1 URL....................................................................................................................................................75
11.2 Script .................................................................................................................................................77
11.3 Download ..........................................................................................................................................79
11.4 Upload ...............................................................................................................................................81
Chapter 12 Application Blocking..................................................................................... 83
Chapter 13 Virtual Server ................................................................................................. 88
13.1 Mapped IP ........................................................................................................................................90
13.2 Virtual Server 1/2/3/4 ......................................................................................................................92
Chapter 14 VPN ................................................................................................................. 99
14.1 IPSec Autokey................................................................................................................................ 100
14.2 PPTP Server .................................................................................................................................. 103
14.3 PPTP Client.................................................................................................................................... 104
14.4 Trunk ............................................................................................................................................... 105
Chapter 15 Policy............................................................................................................ 126
Chapter 16 Mail Security ................................................................................................ 147
Chapter 17 Anti-Spam .................................................................................................... 152
17.1 Setting ............................................................................................................................................. 152
17.2 Rule ................................................................................................................................................. 156
17.3 Whitelist .......................................................................................................................................... 158
17.4 Blacklist........................................................................................................................................... 158
17.5 Training ........................................................................................................................................... 159
17.6 Spam Mail....................................................................................................................................... 159
Chapter 18 Anti-Virus ..................................................................................................... 201
Chapter 19 IDP ................................................................................................................ 212
19.1 Setting ............................................................................................................................................. 212
19.2 Signature ........................................................................................................................................ 214
19.3 IDP Report...................................................................................................................................... 219
Chapter 20 Anomaly Flow IP.......................................................................................... 220
Chapter 21 Log ................................................................................................................ 222
Chapter 22 Accounting Report ...................................................................................... 232
Chapter 23 Statistic ........................................................................................................ 243
Chapter 24 Diagnostic .................................................................................................... 248
24.1 Ping ................................................................................................................................................. 248
24.2 Traceroute ...................................................................................................................................... 250
Chapter 25 Wake on Lan ................................................................................................ 251
Chapter 26 Status ........................................................................................................... 252
Chapter 27 Specification ................................................................................................ 257
Chapter 28 Network Glossary ........................................................................................ 264
2