12.07.2015 Views

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6 ContentsMail server record ..............................................................................................................................................39Name server record ...........................................................................................................................................40Recursion record ................................................................................................................................................40Root server record .............................................................................................................................................41Subnet record .....................................................................................................................................................41Chapter 4Chapter 5Chapter 6Understanding accessNetwork protocols .....................................................................................................................................................43Protocols with a proxy ......................................................................................................................................43Protocols without a proxy ................................................................................................................................44Custom protocols ...............................................................................................................................................47Proxies .........................................................................................................................................................................48Application data scanning ................................................................................................................................48The CIFS (SMB) proxy .......................................................................................................................................49The DNS proxy ...................................................................................................................................................52The FTP proxy ....................................................................................................................................................53The H.323 proxy .................................................................................................................................................54The HTTP proxy .................................................................................................................................................54The NBDGRAM proxy .......................................................................................................................................56The NNTP proxy ................................................................................................................................................56The NTP proxy ...................................................................................................................................................57The ping proxy ...................................................................................................................................................57The RCMD proxy ................................................................................................................................................57The RTSP proxy .................................................................................................................................................57The SMTP proxy ................................................................................................................................................58The Telnet proxy ................................................................................................................................................60Generic Server Proxy (GSP) .............................................................................................................................61Third-party proxies (appliance only) ..............................................................................................................61Service groups ............................................................................................................................................................62Rules ............................................................................................................................................................................63Rule definitions ..................................................................................................................................................63Rule priority .......................................................................................................................................................64Rules with groups ..............................................................................................................................................65Rule authentication ...........................................................................................................................................65Controlling service accessFilters ...........................................................................................................................................................................67Understanding filters ........................................................................................................................................67Types of filters ...................................................................................................................................................68How filters are used ...........................................................................................................................................69Filter processing ................................................................................................................................................70Content filtering ........................................................................................................................................................71Rating Profiles ....................................................................................................................................................71URL List ...............................................................................................................................................................72URL pattern matching ......................................................................................................................................72MIME Types ........................................................................................................................................................74File Extensions ...................................................................................................................................................74Newsgroups ........................................................................................................................................................75Newsgroup Profiles ...........................................................................................................................................75Controlling user accessUsers ............................................................................................................................................................................77Types of users .....................................................................................................................................................77Authentication ...........................................................................................................................................................78

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!