Prestige 2602H/HW Series User’s Guide
14.2
Firewall Policies Overview .............................................................................
181
14.3
Rule Logic Overview ......................................................................................
182
14.3.1 Rule Checklist .......................................................................................
14.3.2 Security Ramifications ..........................................................................
14.3.3 Key Fields For Configuring Rules .........................................................
183
14.3.3.1 Action ..........................................................................................
14.3.3.2 Service ........................................................................................
14.3.3.3 Source Address ...........................................................................
14.3.3.4 Destination Address ....................................................................
14.4
Connection Direction Example .......................................................................
14.4.1 LAN to WAN Rules ...............................................................................
184
14.4.2 WAN to LAN Rules ...............................................................................
14.4.3 Alerts .....................................................................................................
185
14.5
Configuring Basic Firewall Settings ................................................................
14.6
Rule Summary ...............................................................................................
186
14.6.1 Configuring Firewall Rules ....................................................................
188
14.7
Customized Services .....................................................................................
191
14.8
Creating/Editing A Customized Service .........................................................
14.9
Example Firewall Rule ...................................................................................
192
14.10 Predefined Services .....................................................................................
196
14.11 Anti-Probing ..................................................................................................
198
14.12 DoS Thresholds ...........................................................................................
199
14.12.1 Threshold Values ................................................................................
200
14.12.2 Half-Open Sessions ............................................................................
14.12.2.1 TCP Maximum Incomplete and Blocking Time .........................
Chapter 15
203
15.1
Content Filtering Overview .............................................................................
15.2
Configuring Keyword Blocking .......................................................................
15.3
Configuring the Schedule ..............................................................................
204
15.4
Configuring Trusted Computers .....................................................................
205
Chapter 16
207
16.1
VPN Overview ................................................................................................
16.1.1 IPSec ....................................................................................................
16.1.2 Security Association .............................................................................
16.1.3 Other Terminology ................................................................................
16.1.3.1 Encryption ...................................................................................
16.1.3.2 Data Confidentiality .....................................................................
208
16.1.3.3 Data Integrity ...............................................................................
16.1.3.4 Data Origin Authentication ..........................................................
Table of Contents
17