About this User Guide
Using the Yoggie Management Server™
6| Yoggie Management Server™
Table of Figures
Figure 1 – Yoggie Corporate Security Solution......................................................10
Figure 2 – YMS Device: rear panel.......................................................................13
Figure 3 – YMS Device: front panel .....................................................................13
Figure 6 – Welcome page ..................................................................................16
Figure 7 – Time Settings page............................................................................16
Figure 8 – Network Settings page.......................................................................17
Figure 9 – External IP Address page ...................................................................18
Figure 10 – Set Administrator Password page ......................................................19
Figure 11 – YMS Page Elements .........................................................................20
Figure 12 – Time Zone and Corporate Password page ...........................................22
Figure 13 – Network Settings page.....................................................................23
Figure 14 – Display Preferences .........................................................................24
Figure 15 – Users page .....................................................................................25
Figure 16 – Edit User page ................................................................................26
Figure 17 – Gatekeeper Devices .........................................................................27
Figure 18 – Gatekeeper Device Detail .................................................................28
Figure 19 – Security Log....................................................................................28
Figure 20 – YMS Security Element ......................................................................30
Figure 21 – Gatekeeper Groups..........................................................................31
Figure 22 – Group Editor ...................................................................................32
Figure 23 – Directory Services ...........................................................................33
Figure 24 - Security Profiles...............................................................................36
Figure 25 – Security Profile Details .....................................................................37
Figure 26 – Policy Editor....................................................................................38
Figure 27 – Password Generator.........................................................................39
Figure 28 – Firewall Policy: Rules .......................................................................42
Figure 29 – Firewall Policy: Rule Editor................................................................43
Figure 30 – Firewall Policy: Blacklist....................................................................44
Figure 31 – Firewall Policy: Whitelist...................................................................45
Figure 32 – Firewall Policy: Port Forwarding.........................................................46
Figure 33 – IDS/IPS Policy.................................................................................47
Figure 34 – VPN Policy: Generic .........................................................................48
Figure 35 – VPN Policy: Cisco.............................................................................49
Figure 36 – Anti-Virus Policy ..............................................................................49
Figure 37 - Anti-Spam Policy..............................................................................50
Figure 38 – Web-Filtering Policy.........................................................................51
Figure 39 – System Logs...................................................................................52
Figure 40 - System Log: Individual Entry.............................................................53
Figure 41 – Security Log....................................................................................53
Figure 42 – Security Log: Individual Entry...........................................................54
Figure 43 – YMS Reports ...................................................................................55
Figure 44 - Report Query Form: Security Summary ..............................................56