Prestige 2602HW Series User’s Guide

14.4.2 WAN to LAN Rules ...............................................................................

172

14.4.3 Alerts .....................................................................................................

173

14.5

Configuring Basic Firewall Settings ................................................................

173

14.6

Rule Summary ...............................................................................................

174

14.6.1 Configuring Firewall Rules ....................................................................

176

14.7

Customized Services .....................................................................................

179

14.8

Creating/Editing A Customized Service .........................................................

179

14.9

Example Firewall Rule ...................................................................................

180

14.10 Predefined Services .....................................................................................

184

14.11 Anti-Probing ..................................................................................................

186

14.12 DOS Thresholds ...........................................................................................

187

14.12.1 Threshold Values ................................................................................

188

14.12.2 Half-Open Sessions ............................................................................

188

 

14.12.2.1 TCP Maximum Incomplete and Blocking Time .........................

188

Chapter 15

 

 

Content Filtering ..................................................................................................

191

15.1

Content Filtering Overview .............................................................................

191

15.2

Configuring Keyword Blocking .......................................................................

191

15.3

Configuring the Schedule ..............................................................................

192

15.4

Configuring Trusted Computers .....................................................................

193

Chapter 16

 

 

Introduction to IPSec ...........................................................................................

195

16.1

VPN Overview ................................................................................................

195

16.1.1 IPSec ....................................................................................................

195

16.1.2 Security Association .............................................................................

195

16.1.3 Other Terminology ................................................................................

195

 

16.1.3.1 Encryption ...................................................................................

195

 

16.1.3.2 Data Confidentiality .....................................................................

196

 

16.1.3.3 Data Integrity ...............................................................................

196

 

16.1.3.4 Data Origin Authentication ..........................................................

196

16.1.4 VPN Applications ..................................................................................

196

16.2

IPSec Architecture .........................................................................................

197

16.2.1 IPSec Algorithms ..................................................................................

197

16.2.2 Key Management ..................................................................................

197

16.3

Encapsulation .................................................................................................

197

16.3.1 Transport Mode ....................................................................................

198

16.3.2 Tunnel Mode ........................................................................................

198

16.4

IPSec and NAT ...............................................................................................

198

Table of Contents

15