P-661H/HW Series User’s Guide

Figure 82 Stateful Inspection ...............................................................................................

151

Figure 83 Ideal Firewall Setup ............................................................................................

160

Figure 84 “Triangle Route” Problem ....................................................................................

161

Figure 85 IP Alias ................................................................................................................

161

Figure 86 Firewall: General .................................................................................................

162

Figure 87 Firewall Rules ....................................................................................................

163

Figure 88 Firewall: Edit Rule ...............................................................................................

165

Figure 89 Firewall: Customized Services ............................................................................

167

Figure 90 Firewall: Configure Customized Services ...........................................................

168

Figure 91 Firewall Example: Rules .....................................................................................

169

Figure 92 Edit Custom Port Example ..................................................................................

169

Figure 93 Firewall Example: Edit Rule: Destination Address .............................................

170

Figure 94 Firewall Example: Edit Rule: Select Customized Services .................................

171

Figure 95 Firewall Example: Rules: MyService ..................................................................

172

Figure 96 Firewall: Anti Probing ..........................................................................................

174

Figure 97 Firewall: Threshold ..............................................................................................

177

Figure 98 TMSS First Time Access .....................................................................................

179

Figure 99 Download ActiveX to View TMSS Web Page .....................................................

180

Figure 100 TMSS Web Page (Dashboard) .........................................................................

180

Figure 101 TMSS Service Summary ...................................................................................

180

Figure 102 TMSS 3 Steps ...................................................................................................

181

Figure 103 TMSS Registration Form ..................................................................................

181

Figure 104 Example TMSS Activated Service Summary Screen .......................................

182

Figure 105 Example TMSS Activated Parental Controls Screen ........................................

182

Figure 106 General TMSS Settings ....................................................................................

183

Figure 107 TMSS Exception List .........................................................................................

184

Figure 108 Virus Protection .................................................................................................

185

Figure 109 No Parental Controls License ...........................................................................

186

Figure 110 Parental Controls ..............................................................................................

187

Figure 111 Parental Controls Statistics ................................................................................

189

Figure 112 Internet Options Security ...................................................................................

190

Figure 113 Security Setting ActiveX Controls .....................................................................

191

Figure 114 Content Filter: Keyword .....................................................................................

193

Figure 115 Content Filter: Schedule ....................................................................................

194

Figure 116 Content Filter: Trusted .......................................................................................

195

Figure 117 Encryption and Decryption ................................................................................

198

Figure 118 IPSec Architecture ............................................................................................

199

Figure 119 Transport and Tunnel Mode IPSec Encapsulation ............................................

200

Figure 120 IPSec Summary Fields .....................................................................................

205

Figure 121 VPN Setup ........................................................................................................

206

Figure 122 NAT Router Between IPSec Routers ................................................................

208

Figure 123 VPN Host using Intranet DNS Server Example ................................................

209

Figure 124 Edit VPN Policies .............................................................................................

212

List of Figures

25