12.07.2015 Views

WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Changing the deny message ..........................................................................................................171Configuring the IPS (Intrusion Prevention System) for SMTP ...................................................171Configuring spamBlocker ...............................................................................................................171Configuring proxy and antivirus alarms for SMTP .....................................................................171Configuring the FTP Proxy ...............................................................................................................172Configuring general settings ..........................................................................................................172Defining commands rules for FTP .................................................................................................173Setting download rules for FTP ......................................................................................................173Setting upload rules for FTP ............................................................................................................173Enabling intrusion prevention for FTP ..........................................................................................173Configuring proxy alarms for FTP .................................................................................................174Configuring the HTTP Proxy ............................................................................................................174Configuring settings for HTTP requests .......................................................................................174Configuring general settings for HTTP responses ......................................................................177Setting header fields for HTTP responses .....................................................................................177Setting content types for HTTP responses ....................................................................................177Setting cookies for HTTP responses ...............................................................................................177Setting HTTP body content types ..................................................................................................178Defining antivirus responses for HTTP .........................................................................................178Changing the deny message ..........................................................................................................178Enabling intrusion prevention for HTTP .......................................................................................179Defining proxy and antivirus alarms for HTTP ...........................................................................179Configuring the DNS Proxy ..............................................................................................................180Configuring general settings for the DNS proxy .........................................................................180Configuring DNS OPcodes ..............................................................................................................181Configuring DNS query types .........................................................................................................181Configuring DNS query names ......................................................................................................182Enabling intrusion prevention for DNS ........................................................................................182Configuring DNS proxy alarms ......................................................................................................182Configuring the TCP Proxy ...............................................................................................................183Configuring general settings for the TCP proxy ..........................................................................183Enabling intrusion prevention for TCP .........................................................................................183CHAPTER 14 Generating Reports of Network Activity ............................................................185Creating and Editing Reports ..........................................................................................................185Starting Historical Reports ..............................................................................................................185Starting a new report .......................................................................................................................186Editing an existing report ................................................................................................................187Deleting a report ...............................................................................................................................187Viewing the reports list ....................................................................................................................187Backing up report definition files ..................................................................................................187Setting Report Properties .................................................................................................................187Specifying a report time interval ...................................................................................................187Specifying report sections ...............................................................................................................188Consolidating report sections ........................................................................................................189Setting report properties .................................................................................................................190Viewing network interface relationships .....................................................................................190<strong>User</strong> <strong>Guide</strong>ix

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!