7.1.1 Interface Configuration..............................................................................................................36
7.1.2 Policy Rules............................................................................................................................... 37
7.1.3 Inbound Policies........................................................................................................................ 38
7.1.4 Outbound Policies...................................................................................................................... 39
7.1.5 Domain Filter.............................................................................................................................42
7.1.6 Web Filter.................................................................................................................................. 43
7.1.7 MAC Filter................................................................................................................................. 45
7.1.8 Blocking Log.............................................................................................................................. 45
7.2 INTRUSION DETECTION ........................................................................................... 46
7.2.1 IDS Configuration...................................................................................................................... 46
7.2.2 Intrusion Log..............................................................................................................................48
7.2.3 Black List................................................................................................................................... 48
8 VIRTUAL PRIVATE NETWORK...........................................................49
8.1 IPSEC TUNNEL OR PASSTHROUGH.......................................................................... 50
8.2 PEER-TO-PEER........................................................................................................ 50
8.3 IPSEC SERVER......................................................................................................... 53
8.4 TUNNEL TABLE........................................................................................................ 55
8.5 IPSEC STATUS......................................................................................................... 56
8.6 IPSEC LOG .............................................................................................................. 57
9 QUALITY OF SERVICE..........................................................................58
9.1 HIERARCHICAL TOKEN BUCKET (HTB).................................................................. 58
9.1.1 Class Configuration................................................................................................................... 58
9.1.2 Filter Configuration................................................................................................................... 60
9.2 TOS/DIFFSERV....................................................................................................... 61
10 ADMINISTRATION...............................................................................63
10.1 DEVICE INFORMATION .......................................................................................... 63
10.2 TRAFFIC STATISTICS .............................................................................................64
10.3 SESSION LOG......................................................................................................... 64
10.4 SYSLOG.................................................................................................................. 65
10.5 PASSWORD CHANGE .............................................................................................. 65
10.6 SYSTEM.................................................................................................................. 66
10.7 UPLOAD/DOWNLOAD............................................................................................. 67
10.8 PING TEST ............................................................................................................. 68
10.9 REMOTE ACCESS ................................................................................................... 68
11 FREQUENTLY ASKED QUESTIONS .................................................70
11.1 GENERAL............................................................................................................... 70
11.2 DHCP, DNS.......................................................................................................... 71
11.3 ROUTING................................................................................................................ 72
11.4 HIGH AVAILABILITY.............................................................................................. 72
11.5 FIREWALL.............................................................................................................. 73
11.6 NAT....................................................................................................................... 75
11.7 VPN....................................................................................................................... 76
11.8 QOS....................................................................................................................... 77