Prestige 2602HW Series User’s Guide
14.4.2 WAN to LAN Rules ...............................................................................
172
14.4.3 Alerts .....................................................................................................
173
14.5
Configuring Basic Firewall Settings ................................................................
14.6
Rule Summary ...............................................................................................
174
14.6.1 Configuring Firewall Rules ....................................................................
176
14.7
Customized Services .....................................................................................
179
14.8
Creating/Editing A Customized Service .........................................................
14.9
Example Firewall Rule ...................................................................................
180
14.10 Predefined Services .....................................................................................
184
14.11 Anti-Probing ..................................................................................................
186
14.12 DOS Thresholds ...........................................................................................
187
14.12.1 Threshold Values ................................................................................
188
14.12.2 Half-Open Sessions ............................................................................
14.12.2.1 TCP Maximum Incomplete and Blocking Time .........................
Chapter 15
191
15.1
Content Filtering Overview .............................................................................
15.2
Configuring Keyword Blocking .......................................................................
15.3
Configuring the Schedule ..............................................................................
192
15.4
Configuring Trusted Computers .....................................................................
193
Chapter 16
195
16.1
VPN Overview ................................................................................................
16.1.1 IPSec ....................................................................................................
16.1.2 Security Association .............................................................................
16.1.3 Other Terminology ................................................................................
16.1.3.1 Encryption ...................................................................................
16.1.3.2 Data Confidentiality .....................................................................
196
16.1.3.3 Data Integrity ...............................................................................
16.1.3.4 Data Origin Authentication ..........................................................
16.1.4 VPN Applications ..................................................................................
16.2
IPSec Architecture .........................................................................................
197
16.2.1 IPSec Algorithms ..................................................................................
16.2.2 Key Management ..................................................................................
16.3
Encapsulation .................................................................................................
16.3.1 Transport Mode ....................................................................................
198
16.3.2 Tunnel Mode ........................................................................................
16.4
IPSec and NAT ...............................................................................................
Table of Contents
15