EasyManua.ls Logo

Allied Telesis AR Series - Default Chapter; Table of Contents

Allied Telesis AR Series
75 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
C613-22104-00 REV B | Page 3
Advanced Network Protection
Contents
Introduction........................................................................................................................ 5
Products and Software Versions that apply to this Guide...................................................................6
Related Documents.............................................................................................................................7
Licensing .............................................................................................................................................8
Feature Overview............................................................................................................... 9
Intrusion Prevention System (IPS) .....................................................................................................10
Anti-virus ...........................................................................................................................................13
IP Reputation.....................................................................................................................................14
Malware Protection ...........................................................................................................................16
Web Control.......................................................................................................................................17
URL filtering.......................................................................................................................................20
UTM Offload ......................................................................................................................................22
Selecting a Security Solution.......................................................................................... 24
Proxy Versus Stream-based Security Processing.............................................................................24
Packet Flow Architecture ..................................................................................................................25
Selecting a UTM Firewall...................................................................................................................28
URL Filtering or Web Control? ..........................................................................................................30
Anti-virus or Malware Protection?.....................................................................................................31
Firewall/NAT Rules, Entities and Performance ..................................................................................32
Configuring Intrusion Prevention System (IPS) ............................................................ 34
Configuring Anti-virus ..................................................................................................... 35
Configuring IP Reputation .............................................................................................. 36
Configuring Malware Protection .................................................................................... 37
Configuring Web Control ................................................................................................ 38
How to Configure Basic Web Control ...............................................................................................38
How to Configure Web Control Default Action Per-entity .................................................................40

Table of Contents

Related product manuals