11.1 URL....................................................................................................................................................75
11.2 Script .................................................................................................................................................77
11.3 Download..........................................................................................................................................79
11.4 Upload...............................................................................................................................................81
Chapter 12 Application Blocking..................................................................................... 83
Chapter 13 Virtual Server................................................................................................. 88
13.1 Mapped IP........................................................................................................................................90
13.2 Virtual Server 1/2/3/4......................................................................................................................92
Chapter 14 VPN.................................................................................................................99
14.1 IPSec Autokey................................................................................................................................100
14.2 PPTP Server..................................................................................................................................103
14.3 PPTP Client....................................................................................................................................104
14.4 Trunk ...............................................................................................................................................105
Chapter 15 Policy............................................................................................................ 126
Chapter 16 Mail Security ................................................................................................ 147
Chapter 17 Anti-Spam .................................................................................................... 152
17.1 Setting.............................................................................................................................................152
17.2 Rule.................................................................................................................................................156
17.3 Whitelist..........................................................................................................................................158
17.4 Blacklist...........................................................................................................................................158
17.5 Training...........................................................................................................................................159
17.6 Spam Mail.......................................................................................................................................159
Chapter 18 Anti-Virus ..................................................................................................... 201
Chapter 19 IDP ................................................................................................................ 212
19.1 Setting.............................................................................................................................................212
19.2 Signature........................................................................................................................................214
19.3 IDP Report......................................................................................................................................219
Chapter 20 Anomaly Flow IP.......................................................................................... 220
Chapter 21 Log................................................................................................................ 222
Chapter 22 Accounting Report...................................................................................... 232
Chapter 23 Statistic ........................................................................................................ 243
Chapter 24 Diagnostic.................................................................................................... 248
24.1 Ping .................................................................................................................................................248
24.2 Traceroute ......................................................................................................................................250
Chapter 25 Wake on Lan ................................................................................................ 251
Chapter 26 Status ........................................................................................................... 252
Chapter 27 Specification................................................................................................ 257
Chapter 28 Network Glossary........................................................................................ 264
2