Book Image

Untangle Network Security

By : Abd El Monem A Mohamed El Bawab
Book Image

Untangle Network Security

By: Abd El Monem A Mohamed El Bawab

Overview of this book

Table of Contents (21 chapters)
Untangle Network Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Chapter 6. Untangle Blockers

After completing the configuration of Untangle networking and administration settings in the previous chapters, we will now start to deal with Untangle modules (also known as apps) and learn how we can utilize them to protect our network. The chapter starts by giving an overview of how to install the different apps, and explaining the applications interface (also known as the faceplate).

Thanks to its position on the network edge, Untangle NGFW can protect your network against a lot of threats before they reach the end user workstations. Among the different threats that Untangle NGFW protects against, this chapter will cover viruses, spam, phishing, tracking cookies, and invasive advertisements.

This chapter will explain how each threat works, and how the anti-threat applications work; also, the chapter will cover the anti-threat technical details, how to configure the anti-threat application, review the scan history, and common issues with the anti-threats and...