P312

Broadband Security Gateway

 

Figure

13-1 Activate the Firewall.................................................................................................................

13-2

Figure

13-2 Example 1: E-Mail Screen........................................................................................................

13-3

Figure

13-3 Example 1: Configuring a Rule ................................................................................................

13-4

Figure

13-4 Example 1: Destination Address for Traffic Originating from the Internet ..............................

13-5

Figure

13-5 Example 1: Rule Summary Screen...........................................................................................

13-6

Figure

13-6 Send Alerts When Attacked ......................................................................................................

13-7

Figure

13-7 Configuring A POP Custom Port..............................................................................................

13-8

Figure

13-8 Example 2: Local Network Rule 1 Configuration ....................................................................

13-9

Figure

13-9 Example 2: Local Network Rule Summary............................................................................

13-10

Figure

13-10 Example: Internet to Local Network Rule Summary ............................................................

13-11

Figure

13-11 Custom Port for Syslog.........................................................................................................

13-12

Figure

13-12 Syslog Rule Configuration ...................................................................................................

13-13

Figure

13-13 Example 3: Rule Summary...................................................................................................

13-14

Figure

15-1 Outgoing Packet Filtering Process ...........................................................................................

15-2

Figure

15-2 Filter Rule Process....................................................................................................................

15-3

Figure

15-4 Menu 21 — Filter and Firewall Setup ......................................................................................

15-4

Figure

15-5 Menu 21.1 — Filter Set Configuration.....................................................................................

15-4

Figure

15-6 NetBIOS_WAN Filter Rules Summary ....................................................................................

15-5

Figure

15-7 NetBIOS _LAN Filter Rules Summary....................................................................................

15-5

Figure

15-8 Menu 21.1.1.1 — TCP/IP Filter Rule .......................................................................................

15-8

Figure

15-9 Executing an IP Filter ..............................................................................................................

15-11

Figure

15-10 Menu 21.4.1.1 — Generic Filter Rule ..................................................................................

15-12

Figure

15-11 Telnet Filter Example............................................................................................................

15-14

Figure

15-12 Example Filter — Menu 21.1.3.1 .........................................................................................

15-15

Figure

15-13 Example Filter Rules Summary — Menu 21.1.3..................................................................

15-16

Figure

15-14 Protocol and Device Filter Sets ............................................................................................

15-17

Figure

15-15 Filtering LAN Traffic ...........................................................................................................

15-18

List Of Figures

xxii