Prestige 334W User’s Guide

13.3

The Firewall, NAT and Remote Management .....................................................................

13-5

13.3.1

LAN-to-WAN rules .............................................................................................................

13-5

13.3.2

WAN-to-LAN rules .............................................................................................................

13-5

13.4

Configuring Content Filtering ..............................................................................................

13-6

13.5

Services....................................................................................................................................

13-8

Remote Management and VPN/IPSec...........................................................................................................

V

Chapter 14 Remote Management Screens ...............................................................................................

14-1

14.1

Remote Management Overview ............................................................................................

14-1

14.1.1

Remote Management Limitations ........................................................................................

14-2

14.1.2 Remote Management and NAT............................................................................................

14-2

14.1.3

System Timeout ...................................................................................................................

14-2

14.2

Configuring WWW................................................................................................................

14-2

14.3

Configuring Telnet .................................................................................................................

14-4

14.4

Configuring TELNET............................................................................................................

14-4

14.5

Configuring FTP ....................................................................................................................

14-6

14.6

SNMP ......................................................................................................................................

14-7

14.6.1

Supported MIBs ...................................................................................................................

14-9

14.6.2

SNMP Traps.........................................................................................................................

14-9

14.6.3

Configuring SNMP ............................................................................................................

14-10

14.7

Configuring DNS...................................................................................................................

14-11

14.8

Configuring Security............................................................................................................

14-13

Chapter 15 Introduction to IPSec.............................................................................................................

15-1

15.1

VPN Overview ........................................................................................................................

15-1

15.1.1

IPSec ....................................................................................................................................

15-1

15.1.2

Security Association.............................................................................................................

15-1

15.1.3

Other Terminology...............................................................................................................

15-1

15.1.4

VPN Applications ................................................................................................................

15-2

15.2

IPSec Architecture..................................................................................................................

15-3

15.2.1

IPSec Algorithms .................................................................................................................

15-3

15.2.2

Key Management .................................................................................................................

15-4

15.3

Encapsulation .........................................................................................................................

15-4

15.3.1

Transport Mode....................................................................................................................

15-4

15.3.2

Tunnel Mode ........................................................................................................................

15-4

15.4

IPSec and NAT .......................................................................................................................

15-5

Chapter 16 VPN Screens ...........................................................................................................................

16-1

16.1

VPN/IPSec Overview .............................................................................................................

16-1

16.2

IPSec Algorithms....................................................................................................................

16-1

16.2.1 AH (Authentication Header) Protocol..................................................................................

16-1

16.2.2 ESP (Encapsulating Security Payload) Protocol ..................................................................

16-2

16.3

My IP Address ........................................................................................................................

16-2

16.4

Secure Gateway Address........................................................................................................

16-2

Table of Contents

xiii