12.07.2015 Views

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index515static keys 98static routes 34static users 77stealing information 22sniffing 22social engineering 22Trojan horse 22subnet entity 38subnet record 41suppress ICMP messages 120suppress reset messages 120Symantec antivirus scan engine (SAV/SE) 115Symantec driver, IP packet processing 20Symantec Striker technology 115symmetric ciphers 96SYN flood 23SYN flood protection 20, 118synchawk daemon 128system message block 49system parameters for location report 106system parameters for policy report 106system state report 106TTACACS+ authentication 86TCP session hijacking 21TCP/IP 32application layer 33host-to-host transport layer 33Internet layer 33medium access layer 33non-routable networks 35routing packets 34static routes 34Telnet proxy 60thid-party proxyDHCP relay 62third-party proxyOracle Connection Manager 62time periodreport 106time range sequence 86time range template 86time range 64sequence 86template 86transparent connections 51transport layer 32transport mode 92Trojan horse 22trusted users 77tunnelauthorization rules 89cascaded 91communication 89endpoints 88filters 89indexes 89mode 92nested 90passing traffic to a proxy 89security 89types of 90tunnel encryption keysdynamic 98static 98Uuniverse subnet entity 38untrusted usersmanaged security gateway 26URLlist 72pattern matching 72useraccount report 106dynamic users 77gateway users 77general users 77group report 106static users 77trusted users 77types 77Vvirtual IP addresses 129virtual private network report 107virtual private networking (VPN) 12virus detection 114Bloodhound heuristic technology 114NAVEX technology 114Symantec Striker technology 115VPNcascaded tunnels 91entity 38filter 69input 68output 68nested tunnels 90policiesencapsulation modes 92tunnel policy report 106tunnel report 106WWebDAV 55

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!