Compex Technologies 18A manual Security Configuration, 110

Models: 18A

1 204
Download 204 pages 21.83 Kb
Page 119
Image 119

Chapter 9: Security Configuration

The Security Configuration chapter covers: Firewall Configuration

Firewall Logs Packet Filtering URL Filtering Multicast Filtering

The router makes use of Packet Filtering and Stateful Packet Inspection (SPI) to examine each message entering or leaving your LAN and block those that do not satisfy your specified security criteria. Packet Filtering allows you to define security filter rules such that packets that make it through the filter rules are processed as per normal, while those that do not are discarded.

SPI compares the packet content to a database of trusted information instead of only checking the packet header, before letting it through.

Security Level

Depending on the amount of protection you require, you can determine the level of security to implement: Low, Medium, and High.

Log Information

The router allows you to keep a record of data packets that have been allowed and/or that have been refused through the firewall.

By customising the data traffic to record and reviewing the log files at regular intervals, you can monitor the system’s performance and identify irregularities.

The following lists the usual types of data packets encountered.

TCP (Transmission Control Protocol) packets are exchanged between hosts to establish a connection and exchange data.

UDP (User Datagram Protocol) packets are primarily used for broadcasting messages and in streaming audio/video information. ICMP (Internet Control Message Protocol) packets pertaining to error or control information are exchanged between access points. IGMP (Internet Group Management Protocol) packets are sent to establish host memberships such as multicast groups on the LAN.

110

Page 119
Image 119
Compex Technologies 18A manual Security Configuration, 110