Page 71 / 102 Scroll up to view Page 66 - 70
Chapter 4
SpeedTouch™ Web Interface
E-DOC-CTC-20050429-0100 v1.0
63
4.5.8
Content Level
Accessing this page
Proceed as follows:
1
On the
Toolbox
menu, click
Web Site Filtering
.
2
Click
Configure
.
3
Click the
Edit
link of the content level you want to edit.
Overview
This page gives you an overview of the different categories and their rules.
Following icons indicate whether the content type is allowed or not:
Configure
This page allows you to change:
±
The content level name.
±
The content level description.
±
The content level configuration.
Icon
Description
The category/group is allowed
The category/group is not allowed.
The group is partly allowed.
Page 72 / 102
Chapter 4
SpeedTouch™ Web Interface
E-DOC-CTC-20050429-0100 v1.0
64
4.5.9
New Content Level
Introduction
This page allows you to create a new content level. To access this page:
1
On the
Toolbox
menu, click
Web Site Filtering
.
2
In the upper right corner, click
Configure
.
3
Under
Pick a task...
, click
Create a new content level
.
Procedure
To apply a new content level following actions must be performed:
1
Content level creation
2
Content level configuration
3
Content level definition
4
Content level activation
Content level creation
Proceed as follows:
1
In the
Name
box, type a name for the new content level.
2
In the
Description
box, type a short text to describe what this security level will
do.
3
Click
Next
.
Content level
configuration
Proceed as follows:
1
The Configuration section becomes available.
2
Click:
±
Clone Existing Level
to start from a previously created content level.
±
Black List
to allow all web sites by default.
±
White List
to block all web sites by default.
3
Click
Next
.
Content level definition
Only web sites that match the selected content level will be allowed. Proceed as
follows:
1
If you want to:
±
Allow a category:
Select the check box next to the category name.
±
Allow an entire group:
Select the check box next to the group name.
±
Block a category:
Clear the check box next to the category name.
±
Block an entire group:
Clear the check box next to the group name.
2
Click
Apply
.
!
You can create up to 16 content levels.
If no levels have been defined before, this option will not be
shown.
Page 73 / 102
Chapter 4
SpeedTouch™ Web Interface
E-DOC-CTC-20050429-0100 v1.0
65
Content level activation
To activate your new content level:
1
On the
Toolbox
menu, click
Web Site Filtering
.
2
In the upper right corner, click
Configure
.
3
In the
Content Level
list, select your new content level.
4
The new content level is now active.
Page 74 / 102
Chapter 4
SpeedTouch™ Web Interface
E-DOC-CTC-20050429-0100 v1.0
66
4.5.10 Firewall
Overview
The
Overview
page summarizes the overall security policy configured on your
SpeedTouch™.
Configure
The
Configure
page allows you to select the security level of the SpeedTouch™.
Select one of following security levels:
±
Block All
: to protect your network from all attempts of incoming (from
untrusted site) connection requests and to perform checks on outgoing (from
trusted site) connections. This level is meant to prevent incoming malicious
traffic.
±
Standard
: to protect your network from all incoming (from untrusted site)
connection requests while permitting safe outgoing connections. This is the
default.
±
Disabled
: to allow all incoming and outgoing traffic. This does not mean the
complete SpeedTouch™ firewall is disabled. It means all traffic coming in on one
interface and going out on another is allowed, but access to the embedded
services of the SpeedTouch™ (as telnet, web interface,...) is only allowed for
clients residing on the LAN side, so the SpeedTouch™ itself stays protected.
±
High
:
Use this Security Level to block all outgoing connections except well known
applications (DNS, HTTP, HTTPS, FTP, TELNET, IMAP, POP) and block all
incoming connections. Game & Application sharing is not allowed by the
firewall.
Page 75 / 102
Chapter 4
SpeedTouch™ Web Interface
E-DOC-CTC-20050429-0100 v1.0
67
4.5.11
Intrusion Detection
Intrusion Detection
Your SpeedTouch™ is protecting your network against malicious intrusions. This page
shows you the intrusions you are protected against.
The
Protected Intrusions
table shows the number of times the SpeedTouch™ actively
protected your network against each intrusion since last statistics reset.

Rate

124.8 / 5 based on 304 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top