CS-500 Content Security Gateway User's Manual

Content Security Gateway User’s Manual
4.4.4 DMZ To WAN & DMZ To LAN............................................................................................................ 162
4.5 MAIL SECURITY...............................................................................................................................................166
4.5.1 Configure............................................................................................................................................... 166
4.5.2 Anti-Spam .............................................................................................................................................170
4.5.2.1 Setting ..........................................................................................................................................171
4.5.2.2 Rule .............................................................................................................................................. 172
4.5.2.3 Whitelist........................................................................................................................................175
4.5.2.4 Blacklist........................................................................................................................................ 176
4.5.2.5 Training.........................................................................................................................................178
4.5.2.6 Spam Mail.................................................................................................................................... 185
4.5.3 Anti-Virus............................................................................................................................................... 185
4.5.3.1 Setting ..........................................................................................................................................185
4.5.3.2 Virus Mail .....................................................................................................................................187
4.6 IDP..................................................................................................................................................................187
4.6.1 Setting ...................................................................................................................................................187
4.6.2 Signature............................................................................................................................................... 188
4.6.3 IDP Report ............................................................................................................................................ 192
4.7 ANOMALY FLOW IP .........................................................................................................................................192
4.8 MONITOR......................................................................................................................................................... 193
4.8.1 Log .........................................................................................................................................................193
4.8.1.1 Traffic............................................................................................................................................ 193
4.8.1.2 Event ............................................................................................................................................ 195
4.8.1.3 Connection ..................................................................................................................................196
4.8.1.4 Log Backup..................................................................................................................................197
4.8.2 Accounting Report ............................................................................................................................... 198
4.8.2.1 Setting ..........................................................................................................................................199
4.8.2.2 Outbound.....................................................................................................................................199
4.8.2.3 Inbound ........................................................................................................................................202
4.8.3 Statistic..................................................................................................................................................205
4.8.3.1 WAN Statistics.............................................................................................................................206
4.8.3.2 Policy Statistics........................................................................................................................... 206
4.8.4 Status.....................................................................................................................................................208
4.8.4.1 Interface Status........................................................................................................................... 208
4.8.4.2 Authentication..............................................................................................................................209
4.8.4.3 ARP Table....................................................................................................................................209
4.8.4.4 DHCP Clients ..............................................................................................................................210