User`s manual
Content Security Gateway User’s Manual
4.5.1 Configure...............................................................................................................................................160
4.5.2 Anti-Spam .............................................................................................................................................164
4.5.2.1 Setting ........................................................................................................................................ 165
4.5.2.2 Rule ............................................................................................................................................ 166
4.5.2.3 Whitelist......................................................................................................................................169
4.5.2.4 Blacklist...................................................................................................................................... 170
4.5.2.5 Training.......................................................................................................................................172
4.5.2.6 Spam Mail.................................................................................................................................. 179
4.5.3 Anti-Virus............................................................................................................................................... 179
4.5.3.1 Setting ........................................................................................................................................ 179
4.5.3.2 Virus Mail ................................................................................................................................... 181
4.6 ANTI-ATTACK................................................................................................................................................... 181
4.6.1 Alert Setting .......................................................................................................................................... 181
4.6.1.1 Internal Alert ..............................................................................................................................181
4.6.1.2 External Alert............................................................................................................................. 182
4.6.2 Attack Alarm..........................................................................................................................................184
4.6.2.1 Internal Alarm............................................................................................................................184
4.6.2.2 External Alarm...........................................................................................................................185
4.7 MONITOR......................................................................................................................................................... 186
4.7.1 Log .........................................................................................................................................................186
4.7.1.1 Traffic.......................................................................................................................................... 187
4.7.1.2 Event .......................................................................................................................................... 188
4.7.1.3 Connection ................................................................................................................................190
4.7.1.4 Log Backup................................................................................................................................191
4.7.2 Statistic..................................................................................................................................................192
4.7.2.1 WAN Statistics...........................................................................................................................193
4.7.2.2 Policy Statistics......................................................................................................................... 193
4.7.3 Status.....................................................................................................................................................195
4.7.3.1 Interface Status......................................................................................................................... 195
4.7.3.2 Authentication............................................................................................................................195
4.7.3.3 ARP Table ..................................................................................................................................196
.7.3.4 DHCP Clients .............................................................................................................................. 197