EasyManua.ls Logo

3Com OfficeConnect 3C16771 - Internet Filtering; Logs and Alerts

3Com OfficeConnect 3C16771
182 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Internet Firewall Features
21
Advanced users can extend the security functions of the
Internet Firewall by adding network access rules and user
privileges. See Examples of Network Access Rules
on
page 107
and User Privileges on page 108 for more
information.
Internet Filtering
You can use the Internet Firewall to monitor and restrict
LAN users from accessing inappropriate information on the
Internet. You can block access to this information or record
attempts to access it in a log. See Filter Settings
on
page 69
for more information.
You can create a list of all
forbidden
URLs to which you
want to restrict access. Alternatively, you can restrict access
to the Internet to certain
trusted
URLs. See Setting up
Trusted and Forbidden Domains on page 77 for more
information.
Web site technologies such as cookies and Java and
ActiveX applets give enhancements to web pages, but
hackers may use the technologies to steal or damage data.
The Internet Firewall can block these potentially damaging
applications from being downloaded from the Internet, or
allow them only from trusted sites. See Filter Settings
on
page 69
for more information.
You can also use the optional OfficeConnect Web Site Filter
to extend these filtering capabilities of your Internet
Firewall. It provides a list of Web site categories that might
be considered inappropriate for business use. The Web Site
Filter updates the Internet Firewall with the latest URLs
matching the selected categories. You can block access to
these sites or log them. The Internet Firewall is supplied
with a one-month free subscription to the Web Site Filter.
You can then purchase a 12-month subscription.
Logs and Alerts
The Internet Firewall maintains a log of all events that could
be seen as security concerns. It can also track key events
such as the top 25 most accessed Web sites, or the top 25
users of Internet bandwidth. You can also set up the
Internet Firewall to send an alert message through e-mail

Table of Contents