encryption. NULL Algorithm doesn’t provide any other safety services but a way to substitute ESP
Encryption.
SHA-1 (Secure Hash Algorithm-1)
A message-digest hash algorithm that takes a message less than 264 bits and produces a 160-bit
digest.
MD5
MD5 is a common message digests algorithm that produces a 128-bit message digest from an arbitrary
length input, developed by Ron Rivest.
Main Mode
This is another first phase of the Oakley protocol in establishing a security association, but instead of
using three packets like in aggressive mode, it uses six packets.
Aggressive mode
This is the first phase of the Oakley protocol in establishing a security association using three data
packets.
GRE/IPSec
The device Select
GRE/IPSec (Generic Routing Encapsulation) packet seal technology.
Sasser
Sasser is a computer worm that affects computers running vulnerable versions of the Microsoft
operating systems Windows XP and Windows 2000. Sasser spreads by exploiting the system through
a vulnerable network port (as do certain other worms). Thus it is particularly virulent in that it can spread
without user intervention, but it is also easily stopped by a properly configured firewall or by
downloading system updates from Windows Update.
MSBlaster
The Blaster Worm (also known as Lovsan or Lovesan) was a computer worm that spread on computers
running the Microsoft operating systems: Windows XP and Windows 2000.
Code Red
The
Code Red worm
was a computer worm observed on the Internet on July 13, 2001. It attacked
computers running Microsoft's IIS web server.
268
Summary of Contents for RS-3000
Page 1: ...1 RS 3000 Office UTM Gateway User s Manual ...
Page 45: ...Figure 5 11 PPTP Connection Figure 5 12 Complete PPTP Connection Setting 43 ...
Page 133: ...Figure15 3 Traffic Log Monitor WebUI 131 ...
Page 142: ...Figure15 19 Complete Policy Setting 140 ...
Page 183: ...Figure17 33 Create Folder WebUI 181 ...
Page 185: ...Figure17 35 Select Folder for Spam Mail to move to 183 ...
Page 187: ...Figure17 37 Compact SpamMail Folder 185 ...
Page 189: ...Figure17 39 Copy the File Address that SpamMail File Store 187 ...
Page 192: ...Figure17 42 Confirm that All of the Mail in SpamMail File had been Deleted 190 ...
Page 194: ...Figure17 44 Create Folder Function WebUI 192 ...
Page 196: ...Figure17 46 Select the Folder for Needed Spam Mail to Move to 194 ...
Page 198: ...Figure17 48 Compact HamMail File 196 ...
Page 200: ...Figure17 50 Copy the File Address that HamMail File Store 198 ...