Table of Contents

15.4.1 LAN to WAN Rules .................................................................................................

248

15.4.2 Alerts ......................................................................................................................

248

15.5

General Firewall Policy ...................................................................................................

248

15.6

Firewall Rules Summary .................................................................................................

249

15.6.1 Configuring Firewall Rules ...................................................................................

251

15.6.2 Customized Services ............................................................................................

254

15.6.3 Configuring a Customized Service .......................................................................

254

15.7

Example Firewall Rule .....................................................................................................

255

15.8

DoS Thresholds ..............................................................................................................

259

15.8.1 Threshold Values ...................................................................................................

259

15.8.2 Half-Open Sessions ...............................................................................................

260

15.8.3 Configuring Firewall Thresholds .............................................................................

260

15.9

Firewall Commands .........................................................................................................

262

Chapter 16

 

 

Content Filtering ...................................................................................................................

265

 

16.1

Content Filtering Overview .............................................................................................

265

 

16.2

Configuring Keyword Blocking ........................................................................................

265

 

16.3

Configuring the Schedule ..............................................................................................

266

 

16.4

Configuring Trusted Computers .....................................................................................

267

 

Chapter 17

 

 

Introduction to IPSec............................................................................................................

269

 

17.1

VPN Overview ...............................................................................................................

269

 

 

17.1.1 IPSec ......................................................................................................................

269

 

 

17.1.2 Security Association ...............................................................................................

269

 

 

17.1.3 Other Terminology ..................................................................................................

269

 

 

17.1.4 VPN Applications ...................................................................................................

270

 

17.2

IPSec Architecture ...........................................................................................................

270

 

 

17.2.1 IPSec Algorithms ....................................................................................................

271

 

 

17.2.2 Key Management ...................................................................................................

271

 

17.3

Encapsulation ..................................................................................................................

271

 

 

17.3.1 Transport Mode ......................................................................................................

272

 

 

17.3.2 Tunnel Mode .........................................................................................................

272

 

17.4

IPSec and NAT ................................................................................................................

272

 

Chapter 18

 

 

VPN Screens..........................................................................................................................

275

 

18.1

VPN/IPSec Overview .......................................................................................................

275

 

18.2

IPSec Algorithms .............................................................................................................

275

 

 

18.2.1 AH (Authentication Header) Protocol .....................................................................

275

 

 

18.2.2 ESP (Encapsulating Security Payload) Protocol ....................................................

275

 

18.3

My IP Address .................................................................................................................

276

 

 

 

 

 

18

 

 

 

 

 

 

P-2602HWLNI User’s Guide