User guide
Contents
iv Check Point Safe@Office User Guide
Viewing Network Statistics ............................................................................................................. 362
Viewing the Routing Table ............................................................................................................. 374
Viewing Wireless Station Statistics ................................................................................................ 376
Viewing Logs ..................................................................................................................................... 379
Viewing the Event Log ................................................................................................................... 379
Viewing the Security Log ............................................................................................................... 383
Setting Your Security Policy ............................................................................................................ 391
The Safe@Office Firewall Security Policy ..................................................................................... 391
Default Security Policy ................................................................................................................... 393
Setting the Firewall Security Level ................................................................................................. 394
Configuring Servers ........................................................................................................................ 397
Using Rules ..................................................................................................................................... 400
Using Port-Based Security .............................................................................................................. 413
Using Secure HotSpot ..................................................................................................................... 419
Using NAT Rules ............................................................................................................................ 425
Using the EAP Authenticator .......................................................................................................... 433
Using SmartDefense .......................................................................................................................... 449
Overview ......................................................................................................................................... 449
Configuring SmartDefense .............................................................................................................. 450
SmartDefense Categories ................................................................................................................ 458
Resetting SmartDefense to its Defaults ........................................................................................... 503
Using Antivirus and Antispam Filtering ......................................................................................... 505
Overview ......................................................................................................................................... 505
Using VStream Antivirus ................................................................................................................ 507
Using VStream Antispam ............................................................................................................... 525
Using Centralized Email Filtering ................................................................................................... 558