Chapter 2. Administration and Configuration
Prev
Next
Chapter 2. Administration and Configuration
Table of Contents
2.1. Home Administrative Window
2.2. System Web Pages
2.2.1. Updates
2.2.2. Passwords
2.2.3. SSH Access
2.2.4. GUI Settings
2.2.5. Backup Web Page
2.2.6. Shutdown Web Page
2.3. Status Menu
2.3.1. System Status
2.3.2. Network Status
2.3.3. System Graphs
2.3.4. Traffic Graphs
2.3.5. Proxy Graphs
2.3.6. Connections
2.4. Network Menu
2.4.1. Dialup
2.4.2. Upload
2.4.3. Modem
2.4.4. External Aliases Administrative Web Page
2.5. Services Menu
2.5.1. Web Proxy Administrative Web Page
2.5.2. DHCP Administrative Web Page
2.5.3. Dynamic DNS Administrative Web Page
2.5.4. Edit Hosts Administrative Web Page
2.5.5. Time Server Administrative Web Page
2.5.6. Traffic Shaping Administrative Web Page
2.5.7. Intrusion Detection System Administrative Web Page
2.6. Firewall Menu
2.6.1. What traffic is allowed between Interfaces?
2.6.2. User Customization
2.6.3. Port Forwarding Administrative Web Page
2.6.4. External Access Administrative Web Page
2.6.5. DMZ Pinholes Administrative Web Page
2.6.6. Blue Access Administrative Web Page
2.6.7. Firewall Options Administrative Web Page
2.7. VPNs Menu
2.7.1. Virtual Private Networks (VPNs)
2.7.2. Methods of Authentication
2.7.3. Global Settings
2.7.4. Connection Status and Control
2.8. Logs Menu
2.8.1. Introduction
2.8.2. Log Settings Administrative Web Page
2.8.3. Log Summary Page
2.8.4. Proxy Logs Page
2.8.5. Firewall Logs Page
2.8.6. Intrusion Detection System Log Page
2.8.7. System Log Page