Prestige 792H User’s Guide
xii
Table of Contents
9.1
Remote Management and the Firewall ..........................................................................................9-1
9.2
Enabling the Firewall.....................................................................................................................9-1
9.3
Configuring E-mail Alerts .............................................................................................................9-2
9.4
Attack Alert....................................................................................................................................9-3
9.4.1 Alerts.....................................................................................................................................9-4
9.4.2 Threshold Values ..................................................................................................................9-4
9.4.3 Half-Open Sessions...............................................................................................................9-4
Chapter 10 Creating Custom Rules..........................................................................................................10-1
10.1
Rules Overview............................................................................................................................10-1
10.2
Rule Logic Overview...................................................................................................................10-1
10.2.1 Rule Checklist...................................................................................................................10-1
10.2.2
Security Ramifications......................................................................................................10-2
10.2.3 Key Fields For Configuring Rules ....................................................................................10-2
10.3
Connection Direction ...................................................................................................................10-3
10.3.1 LAN to WAN Rules..........................................................................................................10-3
10.3.2
WAN to LAN Rules .........................................................................................................10-4
10.4
Logs .............................................................................................................................................10-4
10.5
Rule Summary .............................................................................................................................10-6
10.6
Predefined Services......................................................................................................................10-8
10.7
Creating/Editing Firewall Rules.................................................................................................10-11
10.7.1 Source and Destination Addresses ..................................................................................10-13
10.8
Timeout......................................................................................................................................10-14
10.8.1
Factors
Influencing Choices for Timeout Values............................................................10-15
Chapter 11 Customized Services...............................................................................................................11-1
11.1
Introduction to Customized Services ...........................................................................................11-1
11.2
Creating/Editing A Customized Service ......................................................................................11-2
11.3
Example Custom Service Firewall Rule ......................................................................................11-3
Chapter 12 Content Filtering....................................................................................................................12-1
12.1
Content Filtering Overview .........................................................................................................12-1
12.2
Configuring Keyword Blocking...................................................................................................12-1
12.3
Configuring the Schedule.............................................................................................................12-3
12.4
Configuring Trusted Computers ..................................................................................................12-4
12.5
Configuring Logs .........................................................................................................................12-5
Chapter 13 Introduction to IPSec.............................................................................................................13-1
13.1
VPN Overview.............................................................................................................................13-1
13.1.1 IPSec .................................................................................................................................13-1
13.1.2 Security Association .........................................................................................................13-1
13.1.3 Other Terminology............................................................................................................13-1
13.1.4 VPN Applications .............................................................................................................13-2
13.2
IPSec Architecture .......................................................................................................................13-3
13.2.1 IPSec Algorithms ..............................................................................................................13-4
13.2.2 Key Management ..............................................................................................................13-4
Содержание Prestige 792H
Страница 1: ...Prestige 792H G SHDSL 4 port Security Gateway User s Guide Version 3 40 BZ 0 March 2004...
Страница 8: ......
Страница 32: ......
Страница 34: ......
Страница 40: ......
Страница 46: ......
Страница 66: ......
Страница 86: ...Prestige 792H User s Guide 5 14 WAN Setup Figure 5 6 Advanced WAN Backup...
Страница 94: ......
Страница 108: ......
Страница 112: ......
Страница 134: ......
Страница 163: ...VPN IPSec IV Part IV VPN IPSec This part provides information about configuring VPN IPSec for secure communications...
Страница 164: ......
Страница 178: ...Prestige 792H User s Guide 14 8 VPN Screens Figure 14 3 VPN IKE...
Страница 205: ...Remote Management and UPnP V Part V Remote Management and UPnP This part contains Remote Management and UPnP...
Страница 206: ......
Страница 210: ......
Страница 220: ......
Страница 221: ...Maintenance VI Part VI Maintenance This part covers the maintenance screens...
Страница 222: ......
Страница 234: ......
Страница 236: ......
Страница 246: ......
Страница 268: ......
Страница 270: ......
Страница 282: ......
Страница 286: ......
Страница 312: ......
Страница 334: ......
Страница 348: ......
Страница 370: ......
Страница 380: ......
Страница 388: ......
Страница 390: ......
Страница 406: ......
Страница 410: ......
Страница 415: ...XI Part XI Appendices and Index This section provides some Appendices and an Index...
Страница 416: ......
Страница 420: ......
Страница 424: ......
Страница 426: ......
Страница 430: ......