|
| |
13.7 | Packet Filtering Vs Firewall | 191 |
13.7.1 Packet Filtering: | 191 | |
| 13.7.1.1 When To Use Filtering | 192 |
13.7.2 Firewall | 192 | |
| 13.7.2.1 When To Use The Firewall | 192 |
Chapter 14 |
|
|
Firewall Configuration | 193 | |
14.1 | Access Methods | 193 |
14.2 | Firewall Policies Overview | 193 |
14.3 | Rule Logic Overview | 194 |
14.3.1 Rule Checklist | 194 | |
14.3.2 Security Ramifications | 194 | |
14.3.3 Key Fields For Configuring Rules | 195 | |
| 14.3.3.1 Action | 195 |
| 14.3.3.2 Service | 195 |
| 14.3.3.3 Source Address | 195 |
| 14.3.3.4 Destination Address | 195 |
14.4 | Connection Direction | 195 |
14.4.1 LAN to WAN Rules | 196 | |
14.4.2 Alerts | 196 | |
14.5 | General Firewall Policy | 196 |
14.6 | Firewall Rules Summary | 197 |
14.6.1 Configuring Firewall Rules | 199 | |
14.6.2 Customized Services | 202 | |
14.6.3 Configuring A Customized Service | 202 | |
14.7 | Example Firewall Rule | 203 |
14.8 | DoS Thresholds | 207 |
14.8.1 Threshold Values | 207 | |
14.8.2 | 208 | |
| 14.8.2.1 TCP Maximum Incomplete and Blocking Time | 208 |
14.8.3 Configuring Firewall Thresholds | 209 | |
Chapter 15 |
|
|
Content Filtering | 211 | |
15.1 | Content Filtering Overview | 211 |
15.2 | Configuring Keyword Blocking | 211 |
15.3 | Configuring the Schedule | 212 |
15.4 | Configuring Trusted Computers | 213 |
Chapter 16 |
|
|
Introduction to IPSec | 215 | |
16.1 | VPN Overview | 215 |
Table of Contents | 15 |