12.07.2015 Views

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

110 Monitoring security gateway trafficAdvanced optionsTable 8-3ParameterAdvanced options (Continued)Descriptioncontentfiltering.liveupdate.workdirentrust.client_ini_fileentrust.client_password_fileentrust.client_profile_filehttp.browser.capabilities.allow_allhttp.browser.capabilities.ie.versionhttp.browser.capabilities.java.versionhttp.browser.capabilities.ne.versionhttp.browser.capabilities.thirdpartyhttp.denied_url_patterns.addhttp.denied_url_patterns.removehttp.external_proxieslog.level..newlevellog.level..patternlog.stats..firstmessagelog.stats..intervallog.stats.default.firstmessagelog.stats.default.intervalmisc.httpd.extensionblacklistWorking directory for the LiveUpdate engine when processing contentfiltering updates. This defaults to /Symantec/LiveUpdate.Name of the client initialization file used with Entrust userauthentication. The default is isakmp.ini.Name of the client password file used with Entrust user authentication.Name of the client profile used with Entrust user authentication. Thedefault is isakmp.epf.Enable/disable all other browsers that support proxy authentication.The default is enable.Defines the minimum version of Microsoft Internet Explorer thatsupports proxy authentication. The default is 3.0.Defines the minimum Java version of a Java-based browser thatsupports proxy authentication.Defines the minimum version of the Netscape Web browser thatsupports proxy authentication. The default is 1.1.Defines third-party browser that supports proxy authentication.Defines new patterns to be added to the URL list.Defines new patterns to be removed from the URL list.Defines external Web proxies that would be used by internal user’s Webbrowsers. Proxy servers are defined using either their DNS-resolvablefully-qualified domain name (FQDN) or IP address with netmask (forexample, 10.10.10.10 & 255.255.255.255).Used to map a log message to a different message level. should be replaced with the original message ID. For example,log.level.120.newlevel=150.Message pattern to be matched. should be replaced withthe original message ID. For example, log.level.120.pattern. The valueshould be a regular expression pattern.Elapsed time after a connection using the defined protocol that statsdwaits before sending a statistics message to the log file. The field should be replaced with the protocol name. For example,log.stats.telnet.firstmessage.Time that statsd waits to log the next statistics message to the log filefor the defined protocol. The field should be replaced withthe protocol name. For example, log.stats.telnet.interval.Default time in seconds to for statsd to start logging messages. Thedefault is 120 seconds.Default time in seconds for statsd to wait before logging anothermessage. The default is 3600 seconds (1 hour).Option to modify the default behavior of the file extensions filter forHTTP traffic. By default, this option is set to False and any fileextensions added to the list designate allowed file extensions. All othersare blocked. IF this option is changed to True, all file extensions addedto the list are now blocked, and all others are allowed.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!