User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Contents
iv Check Point Safe@Office User Guide
Setting Your Security Policy............................................................................................................351
The Safe@Office Firewall Security Policy.....................................................................................351
Default Security Policy ...................................................................................................................353
Setting the Firewall Security Level.................................................................................................354
Configuring Servers........................................................................................................................357
Using Rules.....................................................................................................................................360
Using Port-Based Security..............................................................................................................374
Using Secure HotSpot.....................................................................................................................380
Using NAT Rules............................................................................................................................386
Using the EAP Authenticator..........................................................................................................394
Using SmartDefense..........................................................................................................................410
Overview.........................................................................................................................................410
Configuring SmartDefense..............................................................................................................411
SmartDefense Categories................................................................................................................419
Resetting SmartDefense to its Defaults...........................................................................................464
Using Antivirus and Antispam Filtering.........................................................................................465
Overview.........................................................................................................................................465
Using VStream Antivirus................................................................................................................467
Using VStream Antispam ...............................................................................................................487
Using Centralized Email Filtering...................................................................................................521
Using Web Content Filtering ...........................................................................................................527
Overview.........................................................................................................................................527
Using Web Rules ............................................................................................................................529
Using Web Filtering........................................................................................................................537
Customizing the Access Denied Page.............................................................................................543
Updating the Firmware....................................................................................................................545
Overview.........................................................................................................................................545