
9Contents
Protecting your network resources from virus infections ................................................................................333
About antivirus scanning ...............................................................................................................................333
Preventing denial of service attacks .............................................................................................................335
Blocking files that cannot be scanned ..........................................................................................................336
Optimizing scanning resources .....................................................................................................................337
Avoiding potential session time-out errors .................................................................................................340
Blocking mail attachments that are known threats ...................................................................................342
Responding to virus detections .....................................................................................................................344
Adding antivirus protection to a rule ...........................................................................................................347
Troubleshooting antivirus protection ..........................................................................................................349
Increasing productivity by identifying spam email ...........................................................................................349
About the antispam scanning process ..........................................................................................................350
Identifying spam email ...................................................................................................................................351
Reducing false positives .................................................................................................................................356
Adding antispam protection to a rule ...........................................................................................................358
Making your network more secure by hiding addresses ...................................................................................359
Controlling IP addresses with address transforms ....................................................................................359
Mapping addresses with NAT pools ..............................................................................................................361
Redirecting connections to unpublished addresses with service redirections ......................................364
Creating virtual clients by using NAT pools and address transforms ....................................................366
Enabling protection for logical network interfaces ...........................................................................................368
Enabling port scan detection .........................................................................................................................368
Enabling SYN flood protection ......................................................................................................................369
Enabling spoof protection ..............................................................................................................................370
Chapter 10 Providing remote access using VPN tunnels
About VPN tunnels ..................................................................................................................................................373
Understanding gateway-to-gateway tunnels ..............................................................................................374
Understanding Client VPN tunnels ..............................................................................................................374
Tunnel endpoints .............................................................................................................................................375
Tunnel indexes .................................................................................................................................................376
Tunnel communication ...................................................................................................................................376
Tunnel security ................................................................................................................................................377
Types of tunnels ...............................................................................................................................................377
Understanding VPN policies ..................................................................................................................................378
Understanding tunnel negotiation ...............................................................................................................379
Using pre-configured VPN policies ...............................................................................................................379
Creating custom VPN policies ........................................................................................................................380
Creating a VPN policy for IPsec with static key ..........................................................................................382
Viewing or modifying the global IKE policy ................................................................................................384
Configuring tunnels ................................................................................................................................................385
Running the Gateway-to-Gateway Tunnel Wizard ....................................................................................385
Using the Remote Access Tunnel Wizard to create Client VPN tunnels ................................................389
Creating tunnels manually .............................................................................................................................392
Ensuring compliance of remote Client VPN computers ....................................................................................397
Applying client compliance to user groups .................................................................................................398
Simplifying multiple Client VPN computer configuration ...............................................................................399
Delivering Client VPN packages to users .....................................................................................................400
How the Client VPN package is processed on the Symantec Client VPN ................................................400
Importing Client VPN information .......................................................................................................................401
Creating the pkimpvpn file ............................................................................................................................401
Authenticating tunnels using Entrust certificates .............................................................................................402
Multicast traffic through gateway-to-gateway IPsec tunnels ..........................................................................403
How multicast traffic passes through a gateway-to-gateway IPsec tunnel ...........................................404
Configuring multicast support for a gateway-to-gateway IPsec tunnel .................................................406