beautypg.com
Multi-Homing Security Gateway User’s Manual
3.5.2.1 Setting .......................................................................................................................................... 178
3.5.2.2 Rule .............................................................................................................................................. 179
3.5.2.3 Whitelist........................................................................................................................................ 182
3.5.2.4 Blacklist ........................................................................................................................................ 184
3.5.2.5 Training......................................................................................................................................... 187
3.5.2.6 Spam Mail.................................................................................................................................... 193
3.5.3 Anti-Virus............................................................................................................................................... 193
3.5.3.1 Setting .......................................................................................................................................... 193
3.5.3.2 Virus Mail ..................................................................................................................................... 194
3.6
IDP.................................................................................................................................................................. 195
3.6.1 Setting ................................................................................................................................................... 195
3.6.2 Signature............................................................................................................................................... 196
3.6.3 IDP Report ............................................................................................................................................ 199
3.7
A
NOMALY
F
LOW
IP ......................................................................................................................................... 200
3.8
M
ONITOR
......................................................................................................................................................... 201
3.8.1 Log ......................................................................................................................................................... 201
3.8.1.1 Traffic ............................................................................................................................................ 201
3.8.1.2 Event ............................................................................................................................................ 203
3.8.1.3 Connection .................................................................................................................................. 205
3.8.1.4 Log Backup.................................................................................................................................. 206
3.8.2 Accounting Report ............................................................................................................................... 208
3.8.2.1 Setting .......................................................................................................................................... 208
3.8.2.2 Outbound ..................................................................................................................................... 209
3.8.2.3 Inbound ........................................................................................................................................ 212
3.8.3 Statistic .................................................................................................................................................. 214
3.8.3.1 WAN Statistics............................................................................................................................. 215
3.8.3.2 Policy Statistics ........................................................................................................................... 216
3.8.4 Status..................................................................................................................................................... 217
3.8.4.1 Interface Status................................................................................................................................. 217
3.8.4.2 Authentication.............................................................................................................................. 218
3.8.4.3 ARP Table .................................................................................................................................... 219
3.8.4.4 DHCP Clients .............................................................................................................................. 219