Cloud Edge > Introduction to Cloud Edge
        • Online Help Center Home

        • Privacy and Personal Data Collection Disclosure
        • Introduction to Cloud Edge
          • Cloud Edge Overview
          • How Cloud Edge Works
          • Main Features
            • Hybrid Security
            • On–Premises Capabilities
            • In–the–Cloud Capabilities
          • New Features and Enhancements
          • Support for IPv6
          • Getting Started Screen
          • Cloud Edge Console Supported Browsers
        • Dashboard
          • Dashboard Overview
            • Using the Dashboard
          • Tabs
            • Adding a New Tab
            • Modifying Tab Settings
            • Deleting a Tab
          • Widgets
            • Security Status Widgets
            • Traffic Status Widgets
            • High Availability Widgets
            • Device Map and Security Widgets
            • Widget Options
            • Adding New Widgets
            • Customizing Widgets
            • Deleting Widgets
        • Gateways
          • Managing Gateways
            • Registration
            • Gateway Actions
            • Registering Gateways
            • Importing Multiple Gateways
            • Verifying the Registration
            • Viewing Information for All Gateways
            • Creating an HA Group
              • HA Groups
              • HA Group - WAN Topologies
              • HA Group – Failover Conditions
              • HA Group – Heartbeat Interfaces
              • HA Group – VRRP Groups
              • HA Group - Endpoint Network Access
              • HA Group – Monitor Interfaces and Takeover Triggers
              • HA Groups - Configuration Settings Matrix
              • HA Groups – Policy Settings Matrix
              • HA Group Limitations
              • HA Group - Actions
            • Replacing a Gateway
          • Gateway Information
            • Viewing General Gateway Information
            • Viewing Gateway System Status
            • Viewing Gateway Logs and Events
              • Event Categories and Sub-Categories
            • Using Tools to Troubleshoot Network Connectivity
              • Performing a Ping Test
              • Performing a Traceroute Test
              • Retrieving ARP Results
            • Enabling/Disabling Conservative Mode
          • Network
            • Interfaces
              • Managing Network Interfaces
              • Editing Network Interfaces
                • Routing Mode: Editing Network Interfaces
                • Routing Mode: Editing Wireless Network Interfaces
                • Bridge Mode: Editing Network Interfaces
              • Enabling or Disabling Interfaces
              • Configuring Switch Interface (sw0) Settings
                • List of Switch Interface (sw0) Settings
                • Security Protections Provided by Each Intranet Security Mode
              • How VLANs Work
                • How to Deploy Cloud Edge With VLANs
                  • Bridge Mode VLANs
                  • Routing Mode VLANs
                • Adding/Editing VLAN Interfaces
            • Administrative Access
              • Enabling Administrative Access
            • DHCP
              • Viewing DHCP Services
              • Editing DHCP Settings
              • Deployment Mode Information for DHCP
              • Default DHCP IP Address Pools
            • Dynamic DNS
              • Supported DDNS Service Providers
              • Configuring Dynamic DNS Settings
              • Viewing DDNS Status
                • DDNS Status Messages
            • Routing Table
              • Viewing the Routing Table
              • Routing Table Indicators
            • Static Routes
              • Adding a Static Route
              • Enabling/Disabling Static Routes
              • Modifying a Static Route
              • Deleting a Static Route
            • Network Address Translation (NAT)
              • NAT Rules
                • Adding a Destination NAT Rule
                • Modifying NAT Rules
                • Changing NAT Rule Priorities
                • Adding a Source NAT Rule
                • Deleting NAT Rules
                • Adding NAT Rules to Support Hairpin NAT
          • SD-WAN
            • Enabling SD-WAN and Bandwidth Settings
            • Overview Widgets
            • SD-WAN Rules
              • Managing SD-WAN Rules
              • Adding/Editing SD-WAN Rules
              • Editing the Default SD-WAN Rule
              • Duplicating SD-WAN Rules
              • Moving SD-WAN Rules
              • Enabling/Disabling SD-WAN Rules
              • Deleting SD-WAN Rules
            • SLAs
              • Managing SLAs
              • Adding/Editing Health Check SLAs
              • Deleting SLAs
          • Wireless
            • Viewing Wireless Network Information
              • Viewing Wireless Network General Settings
              • Viewing Wireless Guest Network Settings
              • Viewing Wireless Troubleshooting Information
            • Wireless Network Access Control
              • How Wireless Network Access Control Rules Work
              • Configuring Access Control for the Wireless Networks
              • Viewing Wireless Connected Clients
              • Adding Connected Clients to Access Control Rules
              • Adding Wireless Network Access Control Rules
              • Deleting Wireless Network Access Control Rules
          • Bandwidth Control
            • Managing Bandwidth Control
            • Adding/Editing Bandwidth Control Rules
            • Duplicating Bandwidth Control Rules
            • Enabling/Disabling Bandwidth Control Rules
            • Deleting Bandwidth Control Rules
          • User VPN
            • Virtual Private Networks
              • Encryption Algorithms
              • Authentication Algorithms
              • Internet Key Exchange (IKE) Protocols
            • SSL VPN
              • Managing SSL VPN
              • Viewing SSL VPN Clients
              • Troubleshooting SSL VPN
                • Understanding SSL VPN Error Messages
            • L2TP VPN
              • Managing L2TP VPN
              • Viewing L2TP VPN Clients
              • Troubleshooting L2TP VPN
          • Site-to-Site VPN
            • IPsec Connections
            • Supported Configuration Information
            • Site-to-Site VPN Topologies
              • Example: Full-Mesh Site-to-Site VPN
              • Example: Star Site-to-Site VPN
            • Configuring Full-Mesh Site-to-Site VPNs
            • Configuring Star Site-to-Site VPNs
            • Configuring Peer-to-Peer Site-to-Site VPNs
            • Managing Site-to-Site VPNs
              • Managing IPsec VPN Connections
              • Adding an IPsec VPN Connection
              • Managing IPsec Policies
              • Adding an IPsec Policy
              • Configuring Advanced Site-to-Site VPN Settings
            • IPsec Status
            • IPsec Troubleshooting
              • Best Practice Configuration for IPsec Traffic Traversing Multiple Gateways
              • Viewing Troubleshooting Logs
          • Updates
            • Updating the Cloud Edge Gateway
          • Managing Network Access Control
            • WFBSS Endpoint Protection
              • Managing WFBSS Endpoint Protection
              • Configuring WFBSS Endpoint Protection
              • Adding Endpoints to the Protection List
              • Adding Endpoints to the Exception List
              • Viewing the WFBSS Endpoint Protection Client List
              • Troubleshooting WFBSS Endpoint Protection
            • Suspicious Endpoints
              • Managing Suspicious Endpoints
              • Configuring Suspicious Endpoints
              • Viewing the Suspicious Endpoints Violation List
              • Troubleshooting Suspicious Endpoints
          • Device Recognition
            • Endpoint Devices
              • Viewing Endpoint Devices
                • Endpoint Device Details
                  • Viewing an Endpoint Device
            • General Scan Settings
              • Configuring General Scan Settings
        • Policies
          • Policy Rules
            • Policy Rules and IPv4/IPv6 Support
            • Managing Policy Rules
            • Adding/Editing Policy Rules
              • Matrix: Policy Rules Settings by Gateway Model
            • Viewing Information About Configured Policy Rules
            • Usage Information for Policy Rules
            • Duplicating Policy Rules
            • Enabling/Disabling Policy Rules
            • Deleting Policy Rules
          • Interfaces and Interface Groups
            • Managing Interface Objects and Interface Groups
            • Adding/Editing Interface Group Objects
          • Identity Objects
            • IP Addresses/FQDNs
              • Managing IP Address/FQDN Objects
              • Adding/Editing IP Address/FQDN Objects
                • IP Address/FQDN Object Parameters
              • Deleting IP Address/FQDN Objects
              • Duplicating IP Address/FQDN Objects
            • MAC Addresses
              • Managing MAC Addresses
              • Adding/Editing MAC Address Objects
              • Deleting Address Objects
            • Geolocations
              • Viewing Predefined Geolocations
              • Managing Grouped Geolocation Objects
              • Adding/Editing Grouped Geolocation Objects
              • Deleting Grouped Geolocation Objects
          • Other Objects
            • Services
              • Managing Services
              • Viewing Predefined Services
              • Adding/Editing Service Objects
                • Service Object Parameters
              • Deleting Service Objects
              • Duplicating Service Objects
            • Schedules
              • Managing Schedules
              • Adding/Editing Schedule Objects
              • Deleting Schedule Objects
              • Duplicating Schedule Objects
          • Content Type Objects
            • Applications and Application Groups
              • Managing Application Groups
              • Adding/Editing Application Group Objects
              • Deleting Application Group Objects
              • Duplicating Application Group Objects
            • URL Category Groups
              • Predefined URL Category Groups
                • Managing URL Category Groups
                • Adding/Editing URL Category Group Objects
                • Deleting URL Category Group Objects
                • Duplicating URL Category Group Objects
              • URL Category Groups
              • URL Filtering Categories
          • Security Profiles
            • Managing Security Profiles
              • Security Profile Status Icons
            • IPS Profiles
              • Configuring IPS Profiles
              • IPS Severity Levels
              • IPS Monitor/Block Categories
              • Where to Find IPS BID/CVE Information
            • Anti-Malware Profiles
              • Configuring Anti-Malware Profiles
            • Email Security Profiles
              • Cloud Message Scan (CMS) and Local Scan
              • Phishing Detection
              • Email Reputation Technology
              • Predictive Machine Learning
              • Virtual Analyzer
              • Configuring Email Security Profiles
            • Web Reputation Profiles
              • Configuring Web Reputation Profiles
            • HTTPS Profiles
              • Configuring HTTPS Profiles
            • Anti-DoS Profiles
              • Configuring Anti-DoS Profiles
            • Endpoint Identification Profiles
              • Configuring Endpoint Identification Profiles
          • Approved and Blocked Lists
            • Managing Approved and Blocked Lists
            • Adding/Editing Approved or Blocked URLs
            • Adding/Editing Approved or Blocked FQDNs or IP addresses
            • Deleting Approved or Blocked List
            • Exporting URLs, FQDNs or IP Addresses from Approved List or Blocked List
            • Importing URLs, FQDNs or IP Addresses to Approved List or Blocked List
          • User Notifications
            • Managing User Notifications
            • Editing User Notifications
          • Suspicious Objects
            • Configuring Settings for Suspicious Objects
        • Analysis & Reports
          • Log Analysis
            • Time Measurements
            • Analyzing Logs
            • Application Bandwidth
              • Managing Application Bandwidth
            • Policy Enforcement
              • Managing Policy Enforcement
              • Policy Enforcement Raw Log Display Columns
            • Internet Access
              • Managing Internet Access
            • Internet Security
              • Managing Internet Security
          • Log Favorites
            • Managing Log Favorites
          • Reports
            • Managing Report Templates
            • Adding/Editing Report Templates
            • Deleting Report Templates
            • Duplicating Report Templates
            • Report Content
            • Summary Reports
              • Adding/Editing Summary Report Templates
              • Deleting Summary Report Templates
              • Duplicating Summary Report Templates
              • Summary Report Content
        • Administration
          • Managing Your License
            • Creating a Service Plan
            • Creating a Company and Assigning the Service Plan
            • License Expiration Warnings
          • Users and Accounts
            • Accounts Management
              • Managing Users and Accounts
              • Adding/Editing Accounts
              • Deleting Accounts
            • Changing User Profiles
              • Changing User Profiles
          • User Authentication
            • UserID Sync
              • Managing UserID Sync
            • Authentication Settings
              • Configuring Authentication Settings
            • Hosted Users and Groups
              • Managing Hosted Users
              • Adding/Editing a Hosted User
              • Managing Hosted Groups
              • Adding/Editing a Hosted Group
              • Importing/Exporting Hosted Users and Groups
                • Preparing the Import File
            • LDAP Settings
              • LDAP Authentication
              • Configuring LDAP Settings
                • Basic LDAP Authentication
                • Advanced LDAP Authentication
            • RADIUS Settings
              • RADIUS Authentication
              • Configuring RADIUS Settings
              • Managing RADIUS Users/Groups
                • RADIUS Users and Groups
            • Captive Portal
              • Managing Captive Portal
          • Audit Logs
            • Configuring Audit Logs
            • Viewing Policy Change Log Details
          • Administrator Alerts
            • Configuring Informational Alerts
            • Configuring Gateway Offline Alerts
          • Updates
            • Updateable Components
              • Anti-Spam Pattern and Engine
              • IntelliTrap Pattern and Exceptions
              • IPS Pattern
              • Spyware Pattern
              • Virus Scan Engines and Pattern
              • Smart Scan Agent Pattern
            • Scheduling Updates
          • Maintenance
            • Configuration Backups
            • Backing Up or Restoring Configuration
          • Certificate Management
            • Exporting or Regenerating Certificate
            • Importing a Third-Party CA Certificate
        • Glossary

        Introduction to Cloud Edge

        • Cloud Edge Overview
        • How Cloud Edge Works
        • Main Features
        • New Features and Enhancements
        • Support for IPv6
        • Getting Started Screen
        • Cloud Edge Console Supported Browsers