PLANET CS-2001 User Manual
Utm content security gateway, Cs-2001, User’s manual
Table of contents
Document Outline
- Quick Installation Guide
- System
- Interface
- Chapter 3 Interface
- 3.1 Example
- 3.1.1 Modifying the LAN Interface (NAT / Routing)
- 3.1.2 Configuring the WAN Interface
- 3.1.3 Using CS-2001 as a Gateway for Users on Two Subnets to Access the Internet (NAT/Routing)
- 3.1.4 Using CS-2001 as a Gateway for the Internal Users to Access the Internet and Configure the DMZ for the External Users to Access the Network Resource
- 3.1.5 Deploying the CS-2001 between the Gateway and LAN (configuring two subnets, one using Transparent Routing, the other one using NAT/Routing) for the LAN users to access the Internet
- 3.1.6 Deploying the CS-2001 between the Gateway and the LAN (LAN1 and DMZ1), connecting LAN1 to the user’s PC (using NAT/Routing mode) and then connecting DMZ1 to user’s PC (using Transparent Bridging mode)
- 3.1.7 Deploying CS-2001 between the Gateway and LAN (LAN1 and DMZ1) for LAN Users and DMZ Users to Access the Internet
- 3.1.8 Using the CS-2001 Device as the Gateway and Connecting it to the LAN (There are Two LAN Interface, One Use NAT/Routing, the Other One Use Transparent Bridging Mode) for the LAN Users to Access the Internet
- 3.1 Example
- Chapter 3 Interface
- Policy Object
- Chapter 4 Address
- Chapter 5 Service
- Chapter 6 Schedule
- Chapter 7 QoS
- Chapter 8 Authentication
- Chapter 9 Application Blocking
- Chapter 10 Virtual Server
- 10.1 Example
- 10.1.1 Using a Server to Provide FTP, Web and Mail Services through the Regulation of a Policy
- 10.1.2 Using Multiple Virtual Servers to Host a Web Site through the Regulation of a Policy
- 10.1.3 A VoIP Session Between an External and Internal User (VoIP Ports: TCP 1720, TCP 15321-15333 and UDP 15321-15333)
- 10.1.4 Using Multiple Virtual Servers to Provide HTTP, POP3, SMTP and DNS Services through the Regulation of a Policy
- 10.1 Example
- Chapter 11 VPN
- 11.1 Example
- 11.1.1 Using Two CS-2001 Devices to Mutually Access the Resources of Two Subnets via an IPSec VPN Connection
- 11.1.2 Creating an IPSec VPN Connection under Windows 2000 by a CS-2001 Device
- 11.1.3 Creating an IPSec VPN Connection between Two CS-2001 Devices (An Aggressive Mode Example)
- 11.1.4 Using Two CS-2001 Devices to Connect Outbound Load Balance with IPSec VPN (Using GRE/IPSec Package Algorithm)
- 11.1.5 Establishing an IPSec VPN Connection by Three CS-2001 Devices
- 11.1.6 Using Two CS-2001 Devices to Establish PPTP VPN Connection (Outbound Load Balancing)
- 11.1.7 Using Two CS-2001 Devices to Establish PPTP VPN Connection
- 11.1.8 Establishing PPTP VPN Connection by One CS-2001 Device and One PC Running Windows 2000
- 11.1 Example
- Mail Security
- Chapter 12 Configuration
- 12.1 Mail Domains
- 12.2 Account Manager
- 12.3 Mail Relay
- 12.3.1 Using CS-2001 as a Gateway (Set the Mail Server in DMZ under Transparent Mode)
- 12.3.2 Deploying the CS-2001 Device between the Gateway and Mail Server (Mail Server is in DMZ under Transparent Mode)
- 12.3.3 Using CS-2001 as Gateway to Enable Branch’s Employees to Send Emails via Headquarters’ Mail Server (Set the Mail Server under DMZ Transparent Routing Mode)
- 12.4 Mail Notice
- 12.5 Queued Mail
- 12.6 Mail Signatures
- Chapter 13 Anti-Spam
- 13.1 Example
- 13.1.1 Detecting Whether Emails are Spam
- 13.1.2 Using CS-2001 in Accordance with Whitelist and Blacklist to Filter Spam (Mail Server Is Deployed in DMZ under Transparent Mode)
- 13.1.3 Deploying CS-2001 in between Gateway and Mail Server and Filtering Spam with Global Rule (Mail Server Is Deployed in DMZ under Transparent Mode)
- 13.1.4 Improving Bayesian Filtering Accuracy by Training Spam Filtering / Ham-Filtering (An Outlook Express Example)
- 13.1.5 Improving Bayesian Filtering Accuracy by Training Spam Filtering / Ham-Filtering
- 13.1 Example
- Chapter 14 Anti-Virus
- Chapter 15 Mail Reports
- Chapter 12 Configuration
- Web Filter
- IDP
- Web VPN / SSL VPN
- IM Recording
- Policy
- Chapter 24 Policy
- 24.1 Example
- 24.1.1 Creating a Policy to Monitor the Internet Access of LAN Users
- 24.1.2 Creating a Policy to Restrict the Access to Specific Web Sites
- 24.1.3 Creating a Policy to Grant Internet Access to Only Authenticated Users on Schedule
- 24.1.4 Creating a Policy to Enable a Remote User to Control a LAN PC with Remote Control Software (pcAnywhere)
- 24.1.5 Creating a Policy to Limit the Bandwidth, Daily Total Traffic Amount and Maximum Concurrent Sessions of an Incoming Session to a FTP Server (A NAT Mode Example)
- 24.1.6 Creating a Policy to Enable LAN / WAN Users to Have Email Access (A Transparent Mode Example)
- 24.1 Example
- Chapter 24 Policy
- Anomaly Flow IP
- Advance
- Chapter 26 Inbound Balancing
- 26.1 Example
- 26.1.1 Creating an A Record to Load Balance a Web Server Using the Backup Mode
- 26.1.2 Creating an A Record to Load Balance a Web Server Using the Round-Robin Mode
- 26.1.3 Creating a CNAME Record to Load Balance a Web Server Using the Round-Robin Mode
- 26.1.4 Creating a MX Record to Load Balance a Mail Server Using the Round-Robin Mode
- 26.1 Example
- Chapter 27 High Availability
- Chapter 28 Co-Defense System
- Chapter 26 Inbound Balancing
- Monitoring