©2011 Check Point Software Technologies Ltd. All rights reserved
.
4.4 识别同一 IP 地址的多用户访问记录 .............................................................................. 123
4.5 使用 CAPTIVE PORTAL 认证 .................................................................................................. 125
5 SMARTEVENT 事件分析器 ......................................................................................................................... 128
6 应用程序控制与 URL 过滤(APP CONTROL & URL FILTERING) .................................................................... 132
6.1 初始化 APPLICATION CONTROL .............................................................................................. 132
6.2 创建 USERCHECK 策略的动作 ............................................................................................ 134
6.3 初始化 URL FILTERING ......................................................................................................... 136
7 对 HTTPS 协议的检查 ............................................................................................................................... 138
7.1 为什么要检查 HTTPS ........................................................................................................ 138
7.2 启用 HTTPS INSPECTION ....................................................................................................... 138
7.3 BYPASS HTTPS INSPECTION .......................................................................................................... 138
8 数据防泄密测试(DLP) ............................................................................................................................... 139
8.1 DLP 部署方案的条件: ......................................................................................................... 139
8.2 DLP 部署环境的选择: ......................................................................................................... 139
8.2.1
使用集成
DLP Blade
的防火墙网关部署
.................................................................... 139
8.2.2
使用专业
DLP
硬件的部署方案
.................................................................................. 139
8.2.3
专用
DLP
网关部署到火墙后部
.................................................................................. 139
8.3 DLP 部署的注意事项:............................................................................................................ 140
8.4 DLP 数据防泄密测试 ............................................................................................................. 140
8.4.1 HTTP
协议的数据防泄密测试
..................................................................................... 141
8.4.2 SMTP
发送关键字数据防泄密的测试
........................................................................ 145
8.4.3 FTP
文件上传数据防泄密测试
.................................................................................... 149
9 防垃圾邮件与防病毒 ................................................................................................................................ 151
9.1 开启防病毒与邮件安全模块 ........................................................................................... 151
9.2 配置防病毒与邮件安全策略 ........................................................................................... 151
9.3 下发防病毒与邮件安全策略 ........................................................................................... 152
9.4 测试邮件过滤功能 ........................................................................................................... 153
9.5 测试防病毒功能 ............................................................................................................... 154
评论1
最新资源