Prestige 2602H/HW Series User’s Guide

14.2

Firewall Policies Overview .............................................................................

181

14.3

Rule Logic Overview ......................................................................................

182

14.3.1 Rule Checklist .......................................................................................

182

14.3.2 Security Ramifications ..........................................................................

182

14.3.3 Key Fields For Configuring Rules .........................................................

183

 

14.3.3.1 Action ..........................................................................................

183

 

14.3.3.2 Service ........................................................................................

183

 

14.3.3.3 Source Address ...........................................................................

183

 

14.3.3.4 Destination Address ....................................................................

183

14.4

Connection Direction Example .......................................................................

183

14.4.1 LAN to WAN Rules ...............................................................................

184

14.4.2 WAN to LAN Rules ...............................................................................

184

14.4.3 Alerts .....................................................................................................

185

14.5

Configuring Basic Firewall Settings ................................................................

185

14.6

Rule Summary ...............................................................................................

186

14.6.1 Configuring Firewall Rules ....................................................................

188

14.7

Customized Services .....................................................................................

191

14.8

Creating/Editing A Customized Service .........................................................

191

14.9

Example Firewall Rule ...................................................................................

192

14.10 Predefined Services .....................................................................................

196

14.11 Anti-Probing ..................................................................................................

198

14.12 DoS Thresholds ...........................................................................................

199

14.12.1 Threshold Values ................................................................................

200

14.12.2 Half-Open Sessions ............................................................................

200

 

14.12.2.1 TCP Maximum Incomplete and Blocking Time .........................

200

Chapter 15

 

 

Content Filtering ..................................................................................................

203

15.1

Content Filtering Overview .............................................................................

203

15.2

Configuring Keyword Blocking .......................................................................

203

15.3

Configuring the Schedule ..............................................................................

204

15.4

Configuring Trusted Computers .....................................................................

205

Chapter 16

 

 

Introduction to IPSec ...........................................................................................

207

16.1

VPN Overview ................................................................................................

207

16.1.1 IPSec ....................................................................................................

207

16.1.2 Security Association .............................................................................

207

16.1.3 Other Terminology ................................................................................

207

 

16.1.3.1 Encryption ...................................................................................

207

 

16.1.3.2 Data Confidentiality .....................................................................

208

 

16.1.3.3 Data Integrity ...............................................................................

208

 

16.1.3.4 Data Origin Authentication ..........................................................

208

Table of Contents

17