III
11.4 Steps.........................................................................................................................................................................76
11.4.1 Setup PPTP Network Server.............. .. ... ................ ................ ............... .............................. ...........................76
11.4.2 Setup PPTP Network Client .. .. .. .. .............................. ............................. .............................. ...........................77
Chapter 12 Virtual Private Network – L2TP........................................... ........................................................... 79
12.1 Demands...................................................................................................................................................................79
12.2 Objectives.................................................................................................................................................................79
12.3 Methods....................................................................................................................................................................79
12.4 Steps.........................................................................................................................................................................80
12.4.1 Setup L2TP Network Server............ .. .. ... .. .............................. ............................. ...........................................80
Part IV Content Filters ................ ... ......................................................... ........................................................ 84
Chapter 13 Content Filtering – Web Filters........................................................................................................ 85
13.1 Demands...................................................................................................................................................................85
13.2 Objectives.................................................................................................................................................................86
13.3 Methods....................................................................................................................................................................86
13.4 Steps.........................................................................................................................................................................87
Chapter 14 Content Filtering – Mail Filters....................................................................................................... 93
14.1 Demands...................................................................................................................................................................93
14.2 Objectives.................................................................................................................................................................93
14.3 Methods....................................................................................................................................................................93
14.4 Steps for SMTP Filters.............................................................................................................................................94
14.5 Steps for POP3 Filters ..............................................................................................................................................95
Chapter 15 Content Filtering – FTP Filtering .................................................................................................... 97
15.1 Demands...................................................................................................................................................................97
15.2 Objectives.................................................................................................................................................................97
15.3 Methods....................................................................................................................................................................97
15.4 Steps.........................................................................................................................................................................98
Part V Intrusion Detection System .............................................................................................................. 100
Chapter 16 Intrusion Detection Systems.......... ... ....................................... ..................................... ................. 101
16.1 Demands.................................................................................................................................................................101
16.2 Objectives...............................................................................................................................................................101
16.3 Methods..................................................................................................................................................................101
16.4 Steps.......................................................................................................................................................................102
Part VI Bandwidth Management................................................................................................................... 104
Chapter 17 Bandwidth Management................................................................................................................ 105
17.1 Demands.................................................................................................................................................................105
17.2 Objectives...............................................................................................................................................................106
17.3 Methods..................................................................................................................................................................106
17.4 Steps.......................................................................................................................................................................107
17.4.1 Inbound Traffic Management....................... ............................................................... .................................107
17.4.2 Outbound Traffic Management........ .. ... ............................. .............................. ............................ .................111
Part VII System Maintenance..................................................................................................................114
Chapter 18 System Status..................................................................................................................................115
18.1 Demands.................................................................................................................................................................115
18.2 Objectives...............................................................................................................................................................115
18.3 Methods..................................................................................................................................................................115