6 | Yoggie Management Server™
Table of Figures
Figure 1 – Yoggie Corporate Security Solution ...................................................... 10
Figure 2 – YMS Device: rear panel ....................................................................... 13
Figure 3 – YMS Device: front panel ..................................................................... 13
Figure 6 – Welcome page .................................................................................. 16
Figure 7 – Time Settings page ............................................................................ 16
Figure 8 – Network Settings page ....................................................................... 17
Figure 9 – External IP Address page ................................................................... 18
Figure 10 – Set Administrator Password page ...................................................... 19
Figure 11 – YMS Page Elements ......................................................................... 20
Figure 12 – Time Zone and Corporate Password page ........................................... 22
Figure 13 – Network Settings page ..................................................................... 23
Figure 14 – Display Preferences ......................................................................... 24
Figure 15 – Users page ..................................................................................... 25
Figure 16 – Edit User page ................................................................................ 26
Figure 17 – Gatekeeper Devices ......................................................................... 27
Figure 18 – Gatekeeper Device Detail ................................................................. 28
Figure 19 – Security Log.................................................................................... 28
Figure 20 – YMS Security Element ...................................................................... 30
Figure 21 – Gatekeeper Groups .......................................................................... 31
Figure 22 – Group Editor ................................................................................... 32
Figure 23 – Directory Services ........................................................................... 33
Figure 24 - Security Profiles ............................................................................... 36
Figure 25 – Security Profile Details ..................................................................... 37
Figure 26 – Policy Editor .................................................................................... 38
Figure 27 – Password Generator ......................................................................... 39
Figure 28 – Firewall Policy: Rules ....................................................................... 42
Figure 29 – Firewall Policy: Rule Editor ................................................................ 43
Figure 30 – Firewall Policy: Blacklist .................................................................... 44
Figure 31 – Firewall Policy: Whitelist ................................................................... 45
Figure 32 – Firewall Policy: Port Forwarding ......................................................... 46
Figure 33 – IDS/IPS Policy ................................................................................. 47
Figure 34 – VPN Policy: Generic ......................................................................... 48
Figure 35 – VPN Policy: Cisco ............................................................................. 49
Figure 36 – Anti-Virus Policy .............................................................................. 49
Figure 37 - Anti-Spam Policy .............................................................................. 50
Figure 38 – Web-Filtering Policy ......................................................................... 51
Figure 39 – System Logs ................................................................................... 52
Figure 40 - System Log: Individual Entry ............................................................. 53
Figure 41 – Security Log.................................................................................... 53
Figure 42 – Security Log: Individual Entry ........................................................... 54
Figure 43 – YMS Reports ................................................................................... 55
Figure 44 - Report Query Form: Security Summary .............................................. 56