PLANET CS-2000 User Manual
Page 5
CS-2000 UTM Content Security Gateway User’s Manual
5.2
S
ERVICE
................................................................................................................................................................ 64
5.3
S
CHEDULE
............................................................................................................................................................. 73
5.4
Q
O
S....................................................................................................................................................................... 75
5.5
A
UTHENTICATION
................................................................................................................................................... 79
5.5.1 Example 1 User & User Group Authentication .............................................................................. 85
5.5.2 Example 2 RADIUS Server Authentication.................................................................................... 88
5.5.3 Example 3 POP3 Server Authentication...................................................................................... 102
5.5.4 Example 4 LDAP Server Authentication ...................................................................................... 105
5.6
C
ONTENT
B
LOCKING
........................................................................................................................................... 119
5.7
IM/P2P
B
LOCKING
.............................................................................................................................................. 131
5.8
V
IRTUAL
S
ERVER
................................................................................................................................................. 138
5.9
VPN..................................................................................................................................................................... 152
5.9.1 VPN Wizard.................................................................................................................................. 155
5.9.2 Example 1 .................................................................................................................................... 162
5.9.3 Example 2 .................................................................................................................................... 177
5.9.4 Example 3 .................................................................................................................................... 223
5.9.5 Example 4 .................................................................................................................................... 237
5.9.6 Example 5 .................................................................................................................................... 257
CHAPTER 6: POLICY................................................................................................................................... 270
CHAPTER 7: MAIL SECURITY .................................................................................................................... 298
7.1
C
ONFIGURE
......................................................................................................................................................... 298
7.1.1 Setting .......................................................................................................................................... 299
7.1.2 Mail Relay .................................................................................................................................... 303
7.1.3 Mail Account................................................................................................................................. 309
7.1.4 Mail Notice ................................................................................................................................... 318
7.2
A
NTI
-S
PAM
........................................................................................................................................................... 331
7.2.1 Setting .......................................................................................................................................... 332
7.2.2 Personal Rule .............................................................................................................................. 336
7.2.3 Global Rule .................................................................................................................................. 337
7.2.4 Whitelist........................................................................................................................................ 339
7.2.5 Blacklist ........................................................................................................................................ 339
7.2.6 Training ........................................................................................................................................ 340
7.2.7 Spam Mail .................................................................................................................................... 341
7.2.8 The Advanced Description........................................................................................................... 343
7.2.9 Anti-Spam Examples.................................................................................................................... 347
7.3
A
NTI
-V
IRUS
.......................................................................................................................................................... 394
7.3.1 Setting .......................................................................................................................................... 395
7.3.2 Virus Mail ..................................................................................................................................... 398