beautypg.com
ii
Virtual device group ·············································································································································· 60
Managing virtual devices ····································································································································· 63
Security zones ························································································································································ 67
Time ranges ···························································································································································· 71
Services ·································································································································································· 73
IP addresses ··························································································································································· 78
Interzone rules························································································································································ 86
Interzone policy application ································································································································· 91
Intrusion detection ·························································································································································· 97
Blacklist ··································································································································································· 97
Packet inspection ················································································································································· 102
Firewall device management ······································································································································ 105
Managing firewall devices ································································································································· 105
Viewing device statistics ····································································································································· 107
Managing the device configuration database ································································································· 107
Managing deployment tasks ······························································································································ 114
SSL VPN auditing ···················································································································································· 116
Comprehensive analysis ·············································································································································· 116
Online users ························································································································································· 116
Online users trends ·············································································································································· 117
Daily user statistics ·············································································································································· 117
Device monitoring ··············································································································································· 118
SSL VPN log auditing ·················································································································································· 119
User access records auditing ····························································································································· 119
Operation log auditing ······································································································································· 119
Resource access auditing ··································································································································· 120
Authentication failure auditing ··························································································································· 120
Configuration example 1 ······································································································································· 122
Network requirements ················································································································································· 122
Configuration procedure ············································································································································· 122
Adding devices to the firewall manager ··········································································································· 122
Index ········································································································································································ 124