Content Security Gateway User’s Manual
4.4.4 DMZ To WAN & DMZ To LAN
............................................................................................................ 162
4.5 MAIL SECURITY...............................................................................................................................................
166
4.5.1 Configure...............................................................................................................................................
4.5.2 Anti-Spam .............................................................................................................................................
170
4.5.2.1 Setting ..........................................................................................................................................
171
4.5.2.2 Rule ..............................................................................................................................................
172
4.5.2.3 Whitelist........................................................................................................................................
175
4.5.2.4 Blacklist........................................................................................................................................
176
4.5.2.5 Training.........................................................................................................................................
178
4.5.2.6 Spam Mail....................................................................................................................................
185
4.5.3 Anti-Virus...............................................................................................................................................
4.5.3.1 Setting ..........................................................................................................................................
4.5.3.2 Virus Mail .....................................................................................................................................
187
4.6 IDP..................................................................................................................................................................
4.6.1 Setting ...................................................................................................................................................
4.6.2 Signature...............................................................................................................................................
188
4.6.3 IDP Report ............................................................................................................................................
192
4.7 ANOMALY FLOW IP .........................................................................................................................................
4.8 MONITOR.........................................................................................................................................................
193
4.8.1 Log .........................................................................................................................................................
4.8.1.1 Traffic............................................................................................................................................
4.8.1.2 Event ............................................................................................................................................
195
4.8.1.3 Connection ..................................................................................................................................
196
4.8.1.4 Log Backup..................................................................................................................................
197
4.8.2 Accounting Report ...............................................................................................................................
198
4.8.2.1 Setting ..........................................................................................................................................
199
4.8.2.2 Outbound .....................................................................................................................................
4.8.2.3 Inbound ........................................................................................................................................
202
4.8.3 Statistic ..................................................................................................................................................
205
4.8.3.1 WAN Statistics.............................................................................................................................
206
4.8.3.2 Policy Statistics ...........................................................................................................................
4.8.4 Status.....................................................................................................................................................
208
4.8.4.1 Interface Status...........................................................................................................................
4.8.4.2 Authentication..............................................................................................................................
209
4.8.4.3 ARP Table ....................................................................................................................................
4.8.4.4 DHCP Clients ..............................................................................................................................
210