User Manual Part 2
Table Of Contents
- Using SmartDefense
- Using Antivirus and Antispam Filtering
- Overview
- Using VStream Antivirus
- Using VStream Antispam
- How VStream Antispam Works
- Header Marking
- Default Antispam Policy
- Enabling/Disabling VStream Antispam
- Viewing VStream Antispam Statistics
- Configuring the Content Based Antispam Engine
- Configuring the Block List Engine
- Configuring the IP Reputation Engine
- Configuring the VStream Antispam Policy
- Configuring the Safe Sender List
- Configuring VStream Antispam Advanced Settings
- Using Centralized Email Filtering
- Using Web Content Filtering
- Updating the Firmware
- Using Subscription Services
- Working With VPNs
- Overview
- Setting Up Your Safe@Office Appliance as a VPN Server
- Adding and Editing VPN Sites
- Viewing and Deleting VPN Sites
- Enabling/Disabling a VPN Site
- Logging in to a Remote Access VPN Site
- Logging Out of a Remote Access VPN Site
- Using Certificates
- Viewing VPN Tunnels
- Viewing IKE Traces for VPN Connections
- Viewing VPN Topology
- Managing Users
- Using Remote Desktop
- Controlling the Appliance via the Command Line
- Maintenance
- Viewing Firmware Status
- Upgrading Your Software Product
- Configuring a Gateway Hostname
- Configuring Syslog Logging
- Configuring HTTPS
- Configuring SNMP
- Setting the Time on the Appliance
- Using Diagnostic Tools
- Backing Up and Restoring the Safe@Office Appliance Configuration
- Using Rapid Deployment
- Resetting the Safe@Office Appliance to Defaults
- Running Diagnostics
- Rebooting the Safe@Office Appliance
- Using Network Printers
- Troubleshooting
- Specifications
- Glossary of Terms
- Index
Glossary of Terms
Glossary of Terms 775
HTTPS
Hypertext Transfer Protocol over Secure
Socket Layer, or HTTP over SSL.
A protocol for accessing a secure Web
server. It uses SSL as a sublayer under
the regular HTTP application. This
directs messages to a secure port
number rather than the default Web port
number, and uses a public key to
encrypt data
HTTPS is used to transfer confidential
user information.
Hub
A device with multiple ports,
connecting several PCs or network
devices on a network.
I
IP Address
An IP address is a 32-bit number that
identifies each computer sending or
receiving data packets across the
Internet. When you request an HTML
page or send e-mail, the Internet
Protocol part of TCP/IP includes your
IP address in the message and sends it
to the IP address that is obtained by
looking up the domain name in the
Uniform Resource Locator you
requested or in the e-mail address you're
sending a note to. At the other end, the
recipient can see the IP address of the
Web page requestor or the e-mail sender
and can respond by sending another
message using the IP address it
received.
IP Spoofing
A technique where an attacker attempts
to gain unauthorized access through a
false source address to make it appear as
though communications have originated
in a part of the network with higher
access privileges. For example, a packet
originating on the Internet may be
masquerading as a local packet with the
source IP address of an internal host.
The firewall can protect against IP
spoofing attacks by limiting network
access based on the gateway interface
from which data is being received.
IPSEC
IPSEC is the leading Virtual Private
Networking (VPN) standard. IPSEC
enables individuals or offices to
establish secure communication
channels ('tunnels') over the Internet.
ISP
An ISP (Internet service provider) is a
company that provides access to the
Internet and other related services.
L
LAN
A local area network (LAN) is a group
of computers and associated devices
that share a common communications
line and typically share the resources of
a single server within a small
geographic area.