Table of Contents
15.4.1 LAN to WAN Rules .................................................................................................
248
15.4.2 Alerts ......................................................................................................................
15.5
General Firewall Policy ...................................................................................................
15.6
Firewall Rules Summary .................................................................................................
249
15.6.1 Configuring Firewall Rules ...................................................................................
251
15.6.2 Customized Services ............................................................................................
254
15.6.3 Configuring a Customized Service .......................................................................
15.7
Example Firewall Rule .....................................................................................................
255
15.8
DoS Thresholds ..............................................................................................................
259
15.8.1 Threshold Values ...................................................................................................
15.8.2 Half-Open Sessions ...............................................................................................
260
15.8.3 Configuring Firewall Thresholds .............................................................................
15.9
Firewall Commands .........................................................................................................
262
Chapter 16
Content Filtering ...................................................................................................................
265
16.1
Content Filtering Overview .............................................................................................
16.2
Configuring Keyword Blocking ........................................................................................
16.3
Configuring the Schedule ..............................................................................................
266
16.4
Configuring Trusted Computers .....................................................................................
267
Chapter 17
Introduction to IPSec............................................................................................................
269
17.1
VPN Overview ...............................................................................................................
17.1.1 IPSec ......................................................................................................................
17.1.2 Security Association ...............................................................................................
17.1.3 Other Terminology ..................................................................................................
17.1.4 VPN Applications ...................................................................................................
270
17.2
IPSec Architecture ...........................................................................................................
17.2.1 IPSec Algorithms ....................................................................................................
271
17.2.2 Key Management ...................................................................................................
17.3
Encapsulation ..................................................................................................................
17.3.1 Transport Mode ......................................................................................................
272
17.3.2 Tunnel Mode .........................................................................................................
17.4
IPSec and NAT ................................................................................................................
Chapter 18
VPN Screens..........................................................................................................................
275
18.1
VPN/IPSec Overview .......................................................................................................
18.2
IPSec Algorithms .............................................................................................................
18.2.1 AH (Authentication Header) Protocol .....................................................................
18.2.2 ESP (Encapsulating Security Payload) Protocol ....................................................
18.3
My IP Address .................................................................................................................
276
18
P-2602HWLNI User’s Guide