User Guide vii
About the HTTP proxy..................................................................................................................................... 130
HTTP proxy: Proxy Limits........................................................................................................................... 130
HTTP requests: General settings............................................................................................................. 130
HTTP proxy: Deny message...................................................................................................................... 131
Define exceptions ................................................................................................................................... 133
HTTP responses: Content types .............................................................................................................. 133
HTTP requests: URL paths ......................................................................................................................... 134
HTTP responses: Cookies........................................................................................................................... 134
Block cookies from a site ...................................................................................................................... 134
About the FTP proxy........................................................................................................................................ 135
Edit the FTP proxy........................................................................................................................................ 135
Set access control options........................................................................................................................ 135
FTP proxy: Proxy limits ............................................................................................................................... 136
Edit the POP3 proxy .................................................................................................................................... 138
Set access control options........................................................................................................................ 138
POP3 proxy: Proxy limits............................................................................................................................ 139
POP3 proxy: Content types ...................................................................................................................... 141
POP 3 proxy: Deny unsafe file name patterns .............................................................................. 142
Edit the SMTP proxy .................................................................................................................................... 143
SMTP proxy: Deny message ..................................................................................................................... 146
SMTP Proxy: Filter email by address pattern...................................................................................... 146
SMTP proxy: Email content....................................................................................................................... 147
Allow only safe content types ............................................................................................................ 147
Add or remove file name patterns.................................................................................................... 148
Deny unsafe file name patterns......................................................................................................... 148
About the HTTPS proxy .................................................................................................................................. 148
About the Outgoing Proxy............................................................................................................................ 151
Settings tab ............................................................................................................................................... 151
Content tab ............................................................................................................................................... 151
About additional security subscriptions for proxies............................................................................ 151
Chapter 9 Default Threat Protection .................................................................................................... 153
About intrusion prevention .......................................................................................................................... 153
About Blocked Sites......................................................................................................................................... 154
Permanently blocked sites................................................................................................................... 154
Auto-blocked sites/Temporary Blocked Sites list........................................................................ 154
Block a site permanently ........................................................................................................................... 155
Block sites temporarily............................................................................................................................... 156
About blocked ports........................................................................................................................................ 157
Default blocked ports ............................................................................................................................ 157
Block a port .................................................................................................................................................... 158
Drop DoS flood attacks .............................................................................................................................. 159
Distributed denial-of-service prevention............................................................................................ 161
Configure firewall options............................................................................................................................. 162
Chapter 10 Traffic Management ............................................................................................................. 165
About Traffic Management........................................................................................................................... 165
About network traffic ................................................................................................................................. 165
Causes for slow network traffic .......................................................................................................... 165
Traffic Categories .............................................................................................................................................. 166
Interactive traffic ..................................................................................................................................... 166
High priority .............................................................................................................................................. 166
Medium priority....................................................................................................................................... 166
Low priority ...................................................................................................................
............................ 166