^ Monitor and Analyze|||||||||||||| ^Control Center|||||||||||||| | |**Current Activities**|Live Users|Live Connections|Live Connections IPV6|IPsec Connections|Remote Users|||||||| | |**Reports**|Dashboards|Application & Web|Network & Threats|VPN|Email|Compliance|Custom|||||| | |**Diagnostics**|Tools|System Graphs|URL Catagory Lookup|Packet Capture|Connection List|Support Access|||||||| ^ Protect|||||||||||||| | |**Firewall**|IPv4|IPv6|Enable Filter|||||||||| | |**Intrusion Protection**|DoS Attacks|IPS policy|Custom IPS signatures|DoS and Spoof Protection||||||||| | |**Web**|Policies|User activities|Catagories|URL Groups|Exceptions|General Settings|File Types|Surfing Quotas|User Notifications|Content Filters|| | |**Applications**|Application Filter|Synchronized Application Control|Cloud Applications|Application List|Traffic Shaping Default|||||||| | |**Wireless**|Wireless Clientlist|Wireless Networks|Access Points|Access Point Groups|Mesh Networks|Hotspots|Hotspot Voucher Definition|Wireless Settings|HotspotSettings|||| | |**Email**|Policies and exceptions|Data Control List|SMTP Quarantine|Mail spool|Mail logs|Encryption|General settings|Quarantine settings|Address groups|Relay settings|File types|| | |**Web Servers**|Protection policies|Authentication policies|Authentication templates|General settings||||||||| | |**Advance Threat**|Advance Threat Protection|Sandstorm Activity|Sandstrom Settings|||||||||| | |**Central synchronization**||||||||||||| ^ Configure|||||||||||||| | |**VPN**|IPec Connections|SSL VPN (remote connections)|SSL VPN (site-to-site)|Sophos connect client|L2TP (remote access)|Clientless access|Bookmarks|Bookmark groups|PPTP (remote access)|IPsec policies||| | |**Network**|Interfaces|Zones|Wan link manager|DNS|DHCP|IPv6 router advertisement|Cellular WAN|IP tunnels|neighbors (ARP-NDP)|Dynamic DNS||| | |**Routing**|Static routing|Policy routing|Gateways|BGP|OSPF|Infromation|Upstream proxy|Multicast (PIM_SM)|RIP||||| | |**Authentication**|Servers|Services|Groups|Users|One-time password|Captive portal|Guest Users|Clientless users|STAS|||| | |**System Services**|High Availability|Traffic shapping setting|RED|Malware protection|Log settings|Data anonymization|Traffic shaping|Services||||| ^ System|||||||||||||| | |**Profiles**|Schedule|Access time|Surfing quota|Network traffic quota|Network address translation|Device access||||||| | |**Host and Services**|IP host|IP host group|MAC host|FDQN host group|Country group|Services|Service group|||||| | |**Administration**|Licensing|Device access|Admin settings|Central management|time|Notification Settings|SNMP|Netflow|Messages|||| | |**Backup & Firmware**|Backup & firmware|API|Import export|Firmware|Pattern updates|||||||| | |**Cerficates**|Certificates|Certificate authority|Certificate revocation list||||||||||