Contents
Contents iii
Restoring Traffic Shaper Defaults...................................................................................................264
Working with Wireless Networks....................................................................................................265
Overview.........................................................................................................................................265
Configuring Wireless Networks......................................................................................................273
Troubleshooting Wireless Connectivity..........................................................................................302
Viewing Reports................................................................................................................................305
Viewing the Event Log ...................................................................................................................305
Using the Traffic Monitor...............................................................................................................308
Viewing Computers ........................................................................................................................312
Viewing Connections......................................................................................................................314
Viewing Wireless Statistics.............................................................................................................316
Viewing ADSL Statistics................................................................................................................320
Viewing the Routing Table.............................................................................................................322
Setting Your Security Policy............................................................................................................325
The UTM-1 Firewall Security Policy..............................................................................................326
Default Security Policy...................................................................................................................327
Setting the Firewall Security Level.................................................................................................328
Configuring Servers........................................................................................................................331
Using Rules.....................................................................................................................................334
Using Port-Based Security..............................................................................................................347
Using Secure HotSpot.....................................................................................................................351
Using NAT Rules............................................................................................................................357
Using Web Rules ............................................................................................................................365
Using SmartDefense..........................................................................................................................375
Overview.........................................................................................................................................375
Configuring SmartDefense..............................................................................................................376
SmartDefense Categories................................................................................................................383