User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Contents
Contents iii
Configuring High Availability .........................................................................................................239
Overview.........................................................................................................................................239
Configuring High Availability on a Gateway .................................................................................242
Sample Implementation on Two Gateways.....................................................................................247
Using Traffic Shaper.........................................................................................................................251
Overview.........................................................................................................................................251
Setting Up Traffic Shaper ...............................................................................................................253
Predefined QoS Classes ..................................................................................................................254
Adding and Editing Classes ............................................................................................................256
Viewing and Deleting Classes.........................................................................................................260
Restoring Traffic Shaper Defaults...................................................................................................261
Working with Wireless Networks....................................................................................................263
Overview.........................................................................................................................................263
Configuring Wireless Networks......................................................................................................273
Troubleshooting Wireless Connectivity..........................................................................................302
Viewing Reports................................................................................................................................305
Viewing the Safe@Office Appliance Status...................................................................................305
Using the Traffic Monitor...............................................................................................................311
Viewing Computers ........................................................................................................................316
Viewing Connections......................................................................................................................318
Viewing Network Statistics.............................................................................................................321
Viewing the Routing Table.............................................................................................................334
Viewing Wireless Station Statistics ................................................................................................336
Viewing Logs .....................................................................................................................................339
Viewing the Event Log ...................................................................................................................339
Viewing the Security Log ...............................................................................................................343