Sophos AP - Eine Übersicht

Wiki Article

Using log settings, you can specify system activity to be logged and how to store logs. Data anonymization lets you encrypt identities rein logs and reports.

Profiles Profiles allow you to control users’ internet access and administrators’ access to the firewall. You can define schedules, access time, and quotas for surfing and data transfer.

Wireless Wireless protection lets you define wireless networks and control access to them. The firewall supports the latest security and encryption, including rogue access point scanning and WPA2.

Mesh networks A mesh network is a network topology hinein which each node relays data for the network, allowing the network to extend over a large area. In a mesh network, access points can act as root or as mesh nodes. You can deploy a mesh network as a wireless repeater or as a wireless bridge.

When you complete this unit, you’ll know how to do the following: Create a wireless network to be bridged into an access point LAN

Application filters allow you to control traffic by category or on an individual Lager. With synchronized application control, you can restrict traffic on endpoints that are managed with Sophos Central. Managing cloud application traffic is also supported.

You can specify protection on a zone-specific basis and Grenzmarke traffic to trusted MAC addresses or IP–MAC pairs. You can also create rules to bypass DoS inspection.

Deploying a hotspot with a custom sign-rein page We want to create a hotspot with a customized sign-hinein page for the end-Endbenutzer.

Security Heartbeat Security Heartbeat is a feature that allows endpoints and firewalls to communicate their health Konstitution with each other. Find the details on how it works, what different health statuses there are, and what they mean.

Authentication You can set up authentication using an internal Endbenutzer database or third-party authentication service. To authenticate themselves, users must have access to an authentication client.

Organismus services Use system services to configure the RED provisioning service, high availability, and global malware protection settings. Other options let you view bandwidth usage and manage bandwidth to reduce the impact of heavy usage.

Email With email protection, you can manage email routing and relay and protect domains and mail servers. You can specify SMTP/S, POP/S, and IMAP/S policies with spam and malware checks, data protection, and email encryption.

Access point groups With access point groups, you can assign wireless networks and specify VLAN tagging to a group of access points. Groups provide a convenient method of managing wireless networks for several access points, rather than individually.

Mesh networks A mesh network is a network topology in which each node relays data for the network, allowing the network to extend over a large area. Rein a mesh network, access points can act as root or as mesh nodes. You can deploy a mesh network as a click here wireless repeater or as a wireless bridge.

Report this wiki page