III
11.4 Steps.........................................................................................................................................................................76
11.4.1 Setup PPTP Network Server...........................................................................................................................76
11.4.2 Setup PPTP Network Client............................................................................................................................77
Chapter 12 Virtual Private Network – L2TP...................................................................................................... 79
12.1 Demands...................................................................................................................................................................79
12.2 Objectives.................................................................................................................................................................79
12.3 Methods....................................................................................................................................................................79
12.4 Steps.........................................................................................................................................................................80
12.4.1 Setup L2TP Network Server...........................................................................................................................80
Part IV Content Filters.................................................................................................................................... 84
Chapter 13 Content Filtering – Web Filters........................................................................................................ 85
13.1 Demands...................................................................................................................................................................85
13.2 Objectives.................................................................................................................................................................86
13.3 Methods....................................................................................................................................................................86
13.4 Steps.........................................................................................................................................................................87
Chapter 14 Content Filtering – Mail Filters ....................................................................................................... 93
14.1 Demands...................................................................................................................................................................93
14.2 Objectives.................................................................................................................................................................93
14.3 Methods....................................................................................................................................................................93
14.4 Steps for SMTP Filters.............................................................................................................................................94
14.5 Steps for POP3 Filters..............................................................................................................................................95
Chapter 15 Content Filtering – FTP Filtering .................................................................................................... 97
15.1 Demands...................................................................................................................................................................97
15.2 Objectives.................................................................................................................................................................97
15.3 Methods....................................................................................................................................................................97
15.4 Steps.........................................................................................................................................................................98
Part V Intrusion Detection System .............................................................................................................. 100
Chapter 16 Intrusion Detection Systems.......................................................................................................... 101
16.1 Demands.................................................................................................................................................................101
16.2 Objectives...............................................................................................................................................................101
16.3 Methods..................................................................................................................................................................101
16.4 Steps.......................................................................................................................................................................102
Part VI Bandwidth Management................................................................................................................... 104
Chapter 17 Bandwidth Management................................................................................................................ 105
17.1 Demands.................................................................................................................................................................105
17.2 Objectives...............................................................................................................................................................106
17.3 Methods..................................................................................................................................................................106
17.4 Steps.......................................................................................................................................................................107
17.4.1 Inbound Traffic Management .......................................................................................................................107
17.4.2 Outbound Traffic Management.....................................................................................................................111
Part VII System Maintenance..................................................................................................................114
Chapter 18 System Status..................................................................................................................................115
18.1 Demands.................................................................................................................................................................115
18.2 Objectives...............................................................................................................................................................115
18.3 Methods..................................................................................................................................................................115