Prestige 650 Series User’s Guide

Figure 10-5 Stateful Inspection....................................................................................................................

10-8

Figure 11-1 Enabling the Firewall.................................................................................................................

11-1

Figure 11-2 E-mail ........................................................................................................................................

11-2

Figure 11-3 Alert...........................................................................................................................................

11-6

Figure 12-1 LAN to WAN Traffic................................................................................................................

12-3

Figure 12-2 WAN to LAN Traffic................................................................................................................

12-4

Figure 12-3 Firewall Logs............................................................................................................................

12-5

Figure 12-4 Firewall Rules Summary: First Screen.....................................................................................

12-7

Figure 12-5 Creating/Editing A Firewall Rule ...........................................................................................

12-12

Figure 12-6 Adding/Editing Source and Destination Addresses ................................................................

12-14

Figure 12-7 Timeout...................................................................................................................................

12-15

Figure 13-1 Customized Services ................................................................................................................

13-1

Figure 13-2 Creating/Editing A Customized Service ...................................................................................

13-2

Figure 13-3 Edit Rule Example....................................................................................................................

13-3

Figure 13-4 Configure Source IP Example ..................................................................................................

13-4

Figure 13-5 Customized Service for MyService Example...........................................................................

13-4

Figure 13-6 Syslog Rule Configuration Example ........................................................................................

13-5

Figure 13-7 Rule Summary Example...........................................................................................................

13-6

Figure 14-1 Content Filter: Keyword...........................................................................................................

14-2

Figure 14-2 Content Filter: Schedule...........................................................................................................

14-3

Figure 14-3 Content Filter: Trusted..............................................................................................................

14-4

Figure 14-4 Content Filter Logs...................................................................................................................

14-5

Figure 15-1 Encryption and Decryption.......................................................................................................

15-2

Figure 15-2 VPN Application ......................................................................................................................

15-3

Figure 15-3 IPSec Architecture....................................................................................................................

15-4

Figure 15-4 Transport and Tunnel Mode IPSec Encapsulation....................................................................

15-5

Figure 16-1 IPSec Summary Fields .............................................................................................................

16-3

Figure 16-2 VPN Summary .........................................................................................................................

16-4

Figure 16-3 VPN IKE ..................................................................................................................................

16-8

Figure 16-4 Two Phases to Set Up the IPSec SA.......................................................................................

16-13

Figure 16-5 VPN IKE: Advanced ..............................................................................................................

16-16

Figure 16-6 VPN Manual Key ...................................................................................................................

16-20

Figure 16-7 SA Monitor.............................................................................................................................

16-25

Figure 16-8 Global Setting.........................................................................................................................

16-26

Figure 16-9 VPN Logs...............................................................................................................................

16-27

Figure 16-10 Telecommuters Sharing One VPN Rule Example ................................................................

16-31

Figure 16-11 Telecommuters Using Unique VPN Rules Example ............................................................

16-32

Figure 17-1 Telnet Configuration on a TCP/IP Network .............................................................................

17-2

Figure 17-2 Remote Management................................................................................................................

17-3

Figure 18-1 Configuring UPnP ....................................................................................................................

18-2

Figure 19-1 Log Settings..............................................................................................................................

19-2

List of Figures

xv