EasyManua.ls Logo

Check Point 770 - Configuring Access Policy

Check Point 770
112 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
80
Botnet
Spam
Anonymizer
Hacking
This option is selected by default.
Block inappropriate content - Lets you block access to
websites with inappropriate content like pornography,
violence, gambling and alcohol.
Block file sharing applications - Lets you block
file-sharing from sources that use torrents and
peer-to-peer (P2P) applications.
Block other undesired applications - Lets you block
specified applications or URLs. Click this option to manage
your basic Application and URL Filtering policy.
Limit bandwidth-consuming applications - Lets you limit
or block applications that take up a lot of bandwidth. P2P
file sharing, media sharing and media streams are
selected by default. You can edit the group to add other
applications or categories.
Note - Your maximum bandwidth limit must be lower than
the actual bandwidth provided by your ISP.
Configuring Access Policy
To configure your access policy using standard
categories:
1.
Go to Users & Objects > Applications & URLs.
2.
Click applications Default Policy or Applications Blade
Control page.

Table of Contents

Related product manuals