Content Security Gateway User’s Manual

4.4.4 DMZ To WAN & DMZ To LAN

............................................................................................................ 162

4.5 MAIL SECURITY...............................................................................................................................................

166

4.5.1 Configure...............................................................................................................................................

166

4.5.2 Anti-Spam .............................................................................................................................................

170

4.5.2.1 Setting ..........................................................................................................................................

171

4.5.2.2 Rule ..............................................................................................................................................

172

4.5.2.3 Whitelist........................................................................................................................................

175

4.5.2.4 Blacklist........................................................................................................................................

176

4.5.2.5 Training.........................................................................................................................................

178

4.5.2.6 Spam Mail....................................................................................................................................

185

4.5.3 Anti-Virus...............................................................................................................................................

185

4.5.3.1 Setting ..........................................................................................................................................

185

4.5.3.2 Virus Mail .....................................................................................................................................

187

4.6 IDP..................................................................................................................................................................

187

4.6.1 Setting ...................................................................................................................................................

187

4.6.2 Signature...............................................................................................................................................

188

4.6.3 IDP Report ............................................................................................................................................

192

4.7 ANOMALY FLOW IP .........................................................................................................................................

192

4.8 MONITOR.........................................................................................................................................................

193

4.8.1 Log .........................................................................................................................................................

193

4.8.1.1 Traffic............................................................................................................................................

193

4.8.1.2 Event ............................................................................................................................................

195

4.8.1.3 Connection ..................................................................................................................................

196

4.8.1.4 Log Backup..................................................................................................................................

197

4.8.2 Accounting Report ...............................................................................................................................

198

4.8.2.1 Setting ..........................................................................................................................................

199

4.8.2.2 Outbound .....................................................................................................................................

199

4.8.2.3 Inbound ........................................................................................................................................

202

4.8.3 Statistic ..................................................................................................................................................

205

4.8.3.1 WAN Statistics.............................................................................................................................

206

4.8.3.2 Policy Statistics ...........................................................................................................................

206

4.8.4 Status.....................................................................................................................................................

208

4.8.4.1 Interface Status...........................................................................................................................

208

4.8.4.2 Authentication..............................................................................................................................

209

4.8.4.3 ARP Table ....................................................................................................................................

209

4.8.4.4 DHCP Clients ..............................................................................................................................

210