Table of Contents
User’s Guide
16
15.3.2 Trusted CA Import
..................................................................................................
197
15.4 Technical Reference
........................................................................................................
198
15.4.1 Certificate Authorities
.............................................................................................
198
15.4.2 Verifying a Certificate
.............................................................................................
200
Chapter
16
The Firewall Screens
............................................................................................................
203
16.1 Overview
..........................................................................................................................
203
16.1.1 What You Can Do in This Chapter
.........................................................................
203
16.1.2 What You Need to Know
........................................................................................
203
16.2 Firewall Setting
................................................................................................................
204
16.2.1 Firewall Rule Directions
.........................................................................................
204
16.2.2 Triangle Route
........................................................................................................
205
16.2.3 Firewall Setting Options
.........................................................................................
206
16.3 Service Setting
................................................................................................................
207
16.4 Technical Reference
........................................................................................................
208
16.4.1 Stateful Inspection Firewall.
...................................................................................
208
16.4.2 Guidelines For Enhancing Security With Your Firewall
..........................................
209
16.4.3 The “Triangle Route” Problem
................................................................................
209
Chapter
17
Content Filter
.........................................................................................................................
213
17.1 Overview
..........................................................................................................................
213
17.1.1 What You Can Do in This Chapter
.........................................................................
213
17.2 Filter
.................................................................................................................................
214
17.3 Schedule
..........................................................................................................................
216
Chapter
18
The Remote Management Screens
.....................................................................................
217
18.1 Overview
..........................................................................................................................
217
18.1.1 What You Can Do in This Chapter
.........................................................................
217
18.1.2 What You Need to Know
........................................................................................
218
18.2 WWW
..............................................................................................................................
219
18.3 Telnet
...............................................................................................................................
220
18.4 FTP
..................................................................................................................................
220
18.5 SNMP
..............................................................................................................................
221
18.5.1 SNMP Traps
...........................................................................................................
222
18.5.2 SNMP Options
.......................................................................................................
223
18.6 DNS
.................................................................................................................................
224
18.7 Security
............................................................................................................................
225
Chapter
19
The Logs Screens
.................................................................................................................
227