beautypg.com

Chapter 5 policy, Chapter 6 web vpn / ssl vpn, Chapter 7 anomaly flow ip – PLANET SG-500 User Manual

Page 5: Chapter 8 monitor

background image

SG-500 VPN Security Gateway User’s Manual

4.8

E

XAMPLE

.................................................................................................................................. 77

4.9

A

UTHENTICATION

...................................................................................................................... 79

4.10

E

XAMPLE

................................................................................................................................ 85

4.11

C

ONTENT

B

LOCKING

............................................................................................................... 89

4.12

URL........................................................................................................................................ 93

4.13

S

CRIPT

..................................................................................................................................... 96

4.14

P2P ......................................................................................................................................... 98

4.15

IM ......................................................................................................................................... 100

4.16

D

OWNLOAD

........................................................................................................................... 102

4.17

V

IRTUAL

S

ERVER

................................................................................................................... 104

4.18

E

XAMPLE

.............................................................................................................................. 108

4.19

IPS

EC

VPN ...........................................................................................................................122

CHAPTER 5 POLICY.................................................................................. 223

5.1

P

OLICY

.................................................................................................................................... 225

5.2

E

XAMPLE

................................................................................................................................ 229

CHAPTER 6 WEB VPN / SSL VPN ............................................................ 247

6.1

S

ETTINGS

................................................................................................................................ 250

CHAPTER 7 ANOMALY FLOW IP .............................................................. 260

7.1

S

ETTINGS

................................................................................................................................ 261

CHAPTER 8 MONITOR .............................................................................. 271

8.1

LOG........................................................................................................................................ 271

8.2

T

RAFFIC

L

OG

........................................................................................................................... 273

8.3

E

VENT

L

OG

............................................................................................................................. 278

8.4

C

ONNECTION

L

OG

................................................................................................................... 281

8.5

L

OG

B

ACKUP

........................................................................................................................... 284

8.6

A

CCOUNTING

R

EPORT

............................................................................................................. 286

8.7

O

UTBOUND

............................................................................................................................. 289

8.8

I

NBOUND

................................................................................................................................. 295

8.9

S

TATISTICS

.............................................................................................................................. 301

8.10

WAN..................................................................................................................................... 303

8.11

P

OLICY

.................................................................................................................................. 305

8.12

W

AKE ON

LAN......................................................................................................................307

8.13

S

TATUS

.................................................................................................................................. 309

8.14

I

NTERFACE

............................................................................................................................ 310

8.15

A

UTHENTICATION

.................................................................................................................. 312

8.16

ARP

T

ABLE

........................................................................................................................... 313

8.17

DHCP

C

LIENTS

..................................................................................................................... 314