Symantec 360R Administration Guide - Page 7

Advanced network traffic control, Preventing attacks, Logging, monitoring and updates

Page 7 highlights

Contents 7 Chapter 7 Chapter 8 Chapter 9 Understanding Gateway-to-Gateway tunnels 88 Configuring dynamic Gateway-to-Gateway tunnels 91 Configuring static Gateway-to-Gateway tunnels 93 Sharing information with the remote gateway administrator 96 Configuring Client-to-Gateway VPN tunnels 96 Understanding Client-to-Gateway VPN tunnels 97 Defining client VPN tunnels 99 Setting global policy settings for Client-to-Gateway VPN tunnels 101 Sharing information with your clients 101 Monitoring VPN tunnel status 102 Advanced network traffic control How antivirus policy enforcement (AVpe) works 104 Before you begin configuring AVpe 105 Configuring AVpe 106 Enabling AVpe 107 Configuring the antivirus clients 109 Monitoring antivirus status 109 Log messages 110 Verifying AVpe operation 110 About content filtering 111 Special considerations 111 Managing content filtering lists 112 Special considerations 112 Enabling content filtering for LAN 113 Enabling content filtering for WAN 113 Monitoring content filtering 114 Preventing attacks How intrusion detection and prevention works 115 Trojan horse protection 116 Setting protection preferences 116 Enabling advanced protection settings 117 IP spoofing protection 117 TCP flag validation 118 Logging, monitoring and updates Managing logging 119 Configuring log preferences 120 Managing log messages 124 Updating firmware 124

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

7
Contents
Understanding Gateway-to-Gateway tunnels
.........................................
88
Configuring dynamic Gateway-to-Gateway tunnels
..............................
91
Configuring static Gateway-to-Gateway tunnels
...................................
93
Sharing information with the remote gateway administrator
.............
96
Configuring Client-to-Gateway VPN tunnels
..................................................
96
Understanding Client-to-Gateway VPN tunnels
.....................................
97
Defining client VPN tunnels
......................................................................
99
Setting global policy settings for Client-to-Gateway
VPN tunnels
................................................................................................
101
Sharing information with your clients
...................................................
101
Monitoring VPN tunnel status
.........................................................................
102
Chapter
7
Advanced network traffic control
How antivirus policy enforcement (AVpe) works
.........................................
104
Before you begin configuring AVpe
................................................................
105
Configuring AVpe
..............................................................................................
106
Enabling AVpe
............................................................................................
107
Configuring the antivirus clients
............................................................
109
Monitoring antivirus status
.............................................................................
109
Log messages
..............................................................................................
110
Verifying AVpe operation
................................................................................
110
About content filtering
.....................................................................................
111
Special considerations
..............................................................................
111
Managing content filtering lists
......................................................................
112
Special considerations
..............................................................................
112
Enabling content filtering for LAN
.........................................................
113
Enabling content filtering for WAN
.......................................................
113
Monitoring content filtering
............................................................................
114
Chapter
8
Preventing attacks
How intrusion detection and prevention works
...........................................
115
Trojan horse protection
............................................................................
116
Setting protection preferences
........................................................................
116
Enabling advanced protection settings
..........................................................
117
IP spoofing protection
...............................................................................
117
TCP flag validation
....................................................................................
118
Chapter
9
Logging, monitoring and updates
Managing logging
..............................................................................................
119
Configuring log preferences
.....................................................................
120
Managing log messages
............................................................................
124
Updating firmware
............................................................................................
124