Prestige 650 Series User’s Guide

10.5

Stateful Inspection ...................................................................................................................

10-7

10.6

Guidelines for Enhancing Security with Your Firewall.........................................................

10-11

10.7

Packet Filtering Vs Firewall ..................................................................................................

10-12

Chapter 11 Firewall Configuration ..........................................................................................................

11-1

11.1

Remote Management and the Firewall ....................................................................................

11-1

11.2

Enabling the Firewall...............................................................................................................

11-1

11.3

Configuring E-mail Alerts .......................................................................................................

11-2

11.4

Attack Alert..............................................................................................................................

11-3

Chapter 12 Creating Custom Rules .........................................................................................................

12-1

12.1

Rules Overview........................................................................................................................

12-1

12.2

Rule Logic Overview...............................................................................................................

12-1

12.3

Connection Direction...............................................................................................................

12-3

12.4

Logs .........................................................................................................................................

12-4

12.5

Rule Summary .........................................................................................................................

12-6

12.6

Predefined Services..................................................................................................................

12-8

12.7

Creating/Editing Firewall Rules.............................................................................................

12-11

12.8

Timeout..................................................................................................................................

12-14

Chapter 13 Customized Services ..............................................................................................................

13-1

13.1

Introduction to Customized Services .......................................................................................

13-1

13.2

Creating/Editing A Customized Service ..................................................................................

13-2

13.3

Example Custom Service Firewall Rule ..................................................................................

13-3

Chapter 14 Content Filtering....................................................................................................................

14-1

14.1

Content Filtering Overview .....................................................................................................

14-1

14.2

Configuring Keyword Blocking...............................................................................................

14-1

14.3

Configuring the Schedule ........................................................................................................

14-3

14.4

Configuring Trusted Computers ..............................................................................................

14-4

14.5

Configuring Logs.....................................................................................................................

14-5

VPN/IPSec

......................................................................................................................................................

V

Chapter 15 Introduction to IPSec.............................................................................................................

15-1

15.1

VPN Overview.........................................................................................................................

15-1

15.2

IPSec Architecture ...................................................................................................................

15-3

15.3

Encapsulation...........................................................................................................................

15-5

15.4

IPSec and NAT ........................................................................................................................

15-5

Chapter 16 VPN Screens ...........................................................................................................................

16-1

16.1

VPN/IPSec Overview ..............................................................................................................

16-1

16.2

IPSec Algorithms.....................................................................................................................

16-1

16.3

My IP Address .........................................................................................................................

16-2

16.4

Secure Gateway Address .........................................................................................................

16-2

16.5

VPN Summary Screen .............................................................................................................

16-3

16.6

Keep Alive ...............................................................................................................................

16-5

16.7

ID Type and Content................................................................................................................

16-5

viii

Table of Contents