ZyXEL Communications 650 Series User Manual page 8

Zyxel communications network device user's guide prestige 650 series
Table of Contents

Advertisement

Prestige 650 Series User's Guide
10.5 Stateful Inspection ...................................................................................................................10-7
10.6 Guidelines for Enhancing Security with Your Firewall.........................................................10-11
10.7 Packet Filtering Vs Firewall ..................................................................................................10-12
Chapter 11 Firewall Configuration .......................................................................................................... 11-1
11.1 Remote Management and the Firewall ....................................................................................11-1
11.2 Enabling the Firewall...............................................................................................................11-1
11.3 Configuring E-mail Alerts .......................................................................................................11-2
11.4 Attack Alert..............................................................................................................................11-3
Chapter 12 Creating Custom Rules .........................................................................................................12-1
12.1 Rules Overview........................................................................................................................12-1
12.2 Rule Logic Overview...............................................................................................................12-1
12.3 Connection Direction ...............................................................................................................12-3
12.4 Logs .........................................................................................................................................12-4
12.5 Rule Summary .........................................................................................................................12-6
12.6 Predefined Services..................................................................................................................12-8
12.7 Creating/Editing Firewall Rules.............................................................................................12-11
12.8 Timeout..................................................................................................................................12-14
Chapter 13 Customized Services ..............................................................................................................13-1
13.1 Introduction to Customized Services .......................................................................................13-1
13.2 Creating/Editing A Customized Service ..................................................................................13-2
13.3 Example Custom Service Firewall Rule ..................................................................................13-3
Chapter 14 Content Filtering....................................................................................................................14-1
14.1 Content Filtering Overview .....................................................................................................14-1
14.2 Configuring Keyword Blocking...............................................................................................14-1
14.3 Configuring the Schedule ........................................................................................................14-3
14.4 Configuring Trusted Computers ..............................................................................................14-4
14.5 Configuring Logs .....................................................................................................................14-5
VPN/IPSec ...................................................................................................................................................... V
Chapter 15 Introduction to IPSec.............................................................................................................15-1
15.1 VPN Overview.........................................................................................................................15-1
15.2 IPSec Architecture ...................................................................................................................15-3
15.3 Encapsulation...........................................................................................................................15-5
15.4 IPSec and NAT ........................................................................................................................15-5
Chapter 16 VPN Screens ...........................................................................................................................16-1
16.1 VPN/IPSec Overview ..............................................................................................................16-1
16.2 IPSec Algorithms .....................................................................................................................16-1
16.3 My IP Address .........................................................................................................................16-2
16.4 Secure Gateway Address .........................................................................................................16-2
16.5 VPN Summary Screen .............................................................................................................16-3
16.6 Keep Alive ...............................................................................................................................16-5
16.7 ID Type and Content................................................................................................................16-5
viii
Table of Contents

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prestige 650 series

Table of Contents