User Manual Part 2
Table Of Contents
- Using SmartDefense
- Using Antivirus and Antispam Filtering
- Overview
- Using VStream Antivirus
- Using VStream Antispam
- How VStream Antispam Works
- Header Marking
- Default Antispam Policy
- Enabling/Disabling VStream Antispam
- Viewing VStream Antispam Statistics
- Configuring the Content Based Antispam Engine
- Configuring the Block List Engine
- Configuring the IP Reputation Engine
- Configuring the VStream Antispam Policy
- Configuring the Safe Sender List
- Configuring VStream Antispam Advanced Settings
- Using Centralized Email Filtering
- Using Web Content Filtering
- Updating the Firmware
- Using Subscription Services
- Working With VPNs
- Overview
- Setting Up Your Safe@Office Appliance as a VPN Server
- Adding and Editing VPN Sites
- Viewing and Deleting VPN Sites
- Enabling/Disabling a VPN Site
- Logging in to a Remote Access VPN Site
- Logging Out of a Remote Access VPN Site
- Using Certificates
- Viewing VPN Tunnels
- Viewing IKE Traces for VPN Connections
- Viewing VPN Topology
- Managing Users
- Using Remote Desktop
- Controlling the Appliance via the Command Line
- Maintenance
- Viewing Firmware Status
- Upgrading Your Software Product
- Configuring a Gateway Hostname
- Configuring Syslog Logging
- Configuring HTTPS
- Configuring SNMP
- Setting the Time on the Appliance
- Using Diagnostic Tools
- Backing Up and Restoring the Safe@Office Appliance Configuration
- Using Rapid Deployment
- Resetting the Safe@Office Appliance to Defaults
- Running Diagnostics
- Rebooting the Safe@Office Appliance
- Using Network Printers
- Troubleshooting
- Specifications
- Glossary of Terms
- Index
Using the EAP Authenticator
Chapter 13: Setting Your Security Policy 397
The certificate can be any of the following:
A self-signed certificate generated by the Safe@Office appliance, version
8.0 or later.
If a self-signed certificate is installed on the appliance, but was generated by
an earlier firmware version, you must generate a new certificate. For
instructions on generating a self-signed certificate, see Generating a
Certificate on page 621.
A certific
ate r
eceived from the Service Center.
c. Export the Safe@Office appliance's CA certificate.
See Exporting the Safe@Office Appliance CA Certificate on page 630.
d. For each client that should be allowed to connect to t
h
e Safe@Office
appliance, add a user with Network Access permissions to the local user
database.
See Adding and Editing Users on page 643.
e. Provide each of the users with the authentication credentials you
configured fo
r them
.
2. Configure each wireless client as follows:
a. Configure the client for server authentication.
See Configuring Clients for Server Authentication on Wired Connections on
page 401.
b. Install the Safe@Office appliance's CA
certificate as a trusted root CA.
See Installing the Safe@Office Appliance's CA Certificate on Clients on page
403.
3. Connect the client directly
to the port
, and enter the Network Access user's
authentication credentials when prompted.