Symantec 360R Administration Guide - Page 6

Configuring internal connections, Network traffic control

Page 6 highlights

6 Contents Chapter 4 Chapter 5 Chapter 6 Load balancing 51 SMTP binding 52 Binding to other protocols 52 Failover ...52 DNS gateway 53 Optional network settings 54 Configuring internal connections Configuring LAN IP settings 57 Configuring the appliance as DHCP server 58 Monitoring DHCP usage 60 Configuring port assignments 60 Standard port assignment 61 Network traffic control Planning network access 63 Understanding computers and computer groups 64 Defining computer group membership 65 Defining computer groups 67 Defining inbound access 68 Defining outbound access 69 Configuring services 72 Redirecting services 73 Configuring special applications 74 Configuring advanced options 76 Enabling the IDENT port 76 Disabling NAT mode 77 Enabling IPsec pass-thru 77 Configuring an exposed host 78 Managing ICMP requests 79 Establishing secure VPN connections About using this chapter 82 Creating security policies 82 Understanding VPN policies 82 Creating custom Phase 2 VPN policies 84 Viewing VPN Policies List 85 Identifying users 85 Understanding user types 86 Defining users 86 Viewing the User List 88 Configuring Gateway-to-Gateway tunnels 88

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

6
Contents
Load balancing
.............................................................................................
51
SMTP binding
...............................................................................................
52
Binding to other protocols
.........................................................................
52
Failover
..........................................................................................................
52
DNS gateway
.................................................................................................
53
Optional network settings
..........................................................................
54
Chapter
4
Configuring internal connections
Configuring LAN IP settings
..............................................................................
57
Configuring the appliance as DHCP server
.....................................................
58
Monitoring DHCP usage
.............................................................................
60
Configuring port assignments
...........................................................................
60
Standard port assignment
..........................................................................
61
Chapter
5
Network traffic control
Planning network access
....................................................................................
63
Understanding computers and computer groups
..........................................
64
Defining computer group membership
....................................................
65
Defining computer groups
.........................................................................
67
Defining inbound access
.....................................................................................
68
Defining outbound access
..................................................................................
69
Configuring services
...........................................................................................
72
Redirecting services
....................................................................................
73
Configuring special applications
.......................................................................
74
Configuring advanced options
...........................................................................
76
Enabling the IDENT port
............................................................................
76
Disabling NAT mode
...................................................................................
77
Enabling IPsec pass-thru
............................................................................
77
Configuring an exposed host
.....................................................................
78
Managing ICMP requests
............................................................................
79
Chapter
6
Establishing secure VPN connections
About using this chapter
....................................................................................
82
Creating security policies
...................................................................................
82
Understanding VPN policies
......................................................................
82
Creating custom Phase 2 VPN policies
.....................................................
84
Viewing VPN Policies List
..........................................................................
85
Identifying users
..................................................................................................
85
Understanding user types
..........................................................................
86
Defining users
..............................................................................................
86
Viewing the User List
..................................................................................
88
Configuring Gateway-to-Gateway tunnels
......................................................
88