![background image](http://html1.mh-extra.com/html/zyxel-communications/prestige-792h/prestige-792h_user-manual_944272012.webp)
Prestige 792H User’s Guide
xii
Table of Contents
9.1
Remote Management and the Firewall ..........................................................................................9-1
9.2
Enabling the Firewall.....................................................................................................................9-1
9.3
Configuring E-mail Alerts .............................................................................................................9-2
9.4
Attack Alert....................................................................................................................................9-3
9.4.1 Alerts.....................................................................................................................................9-4
9.4.2 Threshold Values ..................................................................................................................9-4
9.4.3 Half-Open Sessions...............................................................................................................9-4
Chapter 10 Creating Custom Rules..........................................................................................................10-1
10.1
Rules Overview............................................................................................................................10-1
10.2
Rule Logic Overview...................................................................................................................10-1
10.2.1 Rule Checklist...................................................................................................................10-1
10.2.2
Security Ramifications......................................................................................................10-2
10.2.3 Key Fields For Configuring Rules ....................................................................................10-2
10.3
Connection Direction ...................................................................................................................10-3
10.3.1 LAN to WAN Rules..........................................................................................................10-3
10.3.2
WAN to LAN Rules .........................................................................................................10-4
10.4
Logs .............................................................................................................................................10-4
10.5
Rule Summary .............................................................................................................................10-6
10.6
Predefined Services......................................................................................................................10-8
10.7
Creating/Editing Firewall Rules.................................................................................................10-11
10.7.1 Source and Destination Addresses ..................................................................................10-13
10.8
Timeout......................................................................................................................................10-14
10.8.1
Factors
Influencing Choices for Timeout Values............................................................10-15
Chapter 11 Customized Services...............................................................................................................11-1
11.1
Introduction to Customized Services ...........................................................................................11-1
11.2
Creating/Editing A Customized Service ......................................................................................11-2
11.3
Example Custom Service Firewall Rule ......................................................................................11-3
Chapter 12 Content Filtering....................................................................................................................12-1
12.1
Content Filtering Overview .........................................................................................................12-1
12.2
Configuring Keyword Blocking...................................................................................................12-1
12.3
Configuring the Schedule.............................................................................................................12-3
12.4
Configuring Trusted Computers ..................................................................................................12-4
12.5
Configuring Logs .........................................................................................................................12-5
Chapter 13 Introduction to IPSec.............................................................................................................13-1
13.1
VPN Overview.............................................................................................................................13-1
13.1.1 IPSec .................................................................................................................................13-1
13.1.2 Security Association .........................................................................................................13-1
13.1.3 Other Terminology............................................................................................................13-1
13.1.4 VPN Applications .............................................................................................................13-2
13.2
IPSec Architecture .......................................................................................................................13-3
13.2.1 IPSec Algorithms ..............................................................................................................13-4
13.2.2 Key Management ..............................................................................................................13-4
Summary of Contents for Prestige 792H
Page 1: ...Prestige 792H G SHDSL 4 port Security Gateway User s Guide Version 3 40 BZ 0 March 2004...
Page 8: ......
Page 32: ......
Page 34: ......
Page 40: ......
Page 46: ......
Page 66: ......
Page 86: ...Prestige 792H User s Guide 5 14 WAN Setup Figure 5 6 Advanced WAN Backup...
Page 94: ......
Page 108: ......
Page 112: ......
Page 134: ......
Page 164: ......
Page 178: ...Prestige 792H User s Guide 14 8 VPN Screens Figure 14 3 VPN IKE...
Page 206: ......
Page 210: ......
Page 220: ......
Page 221: ...Maintenance VI Part VI Maintenance This part covers the maintenance screens...
Page 222: ......
Page 234: ......
Page 236: ......
Page 246: ......
Page 268: ......
Page 270: ......
Page 282: ......
Page 286: ......
Page 312: ......
Page 334: ......
Page 348: ......
Page 370: ......
Page 380: ......
Page 388: ......
Page 390: ......
Page 406: ......
Page 410: ......
Page 415: ...XI Part XI Appendices and Index This section provides some Appendices and an Index...
Page 416: ......
Page 420: ......
Page 424: ......
Page 426: ......
Page 430: ......