ZyXEL Communications P-2602H User Manual page 17

P-2602h series adsl2+ voip iad
Hide thumbs Also See for P-2602H:
Table of Contents

Advertisement

15.1 Access Methods .............................................................................................................. 207
15.2 General Firewall Policy Overview ................................................................................... 207
15.3 Rule Logic Overview ....................................................................................................... 208
15.3.1 Rule Checklist ........................................................................................................ 208
15.3.2 Security Ramifications ............................................................................................ 208
15.3.3 Key Fields For Configuring Rules .......................................................................... 209
15.4 Connection Direction ....................................................................................................... 209
15.4.1 LAN to WAN Rules ................................................................................................. 210
15.4.2 Alerts ...................................................................................................................... 210
15.5 General Firewall Policy ................................................................................................... 210
15.6 Firewall Rules Summary ..................................................................................................211
15.6.1 Configuring Firewall Rules ................................................................................... 213
15.6.2 Customized Services ............................................................................................ 216
15.7 Example Firewall Rule ..................................................................................................... 217
15.8 DoS Thresholds .............................................................................................................. 221
15.8.1 Threshold Values ................................................................................................... 221
15.8.2 Half-Open Sessions ............................................................................................... 222
15.8.3 Configuring Firewall Thresholds ............................................................................. 222
15.9 Firewall Commands ......................................................................................................... 224
Content Filtering ................................................................................................................... 227
16.1 Content Filtering Overview ............................................................................................. 227
16.2 Configuring Keyword Blocking ....................................................................................... 227
16.3 Configuring the Schedule .............................................................................................. 228
16.4 Configuring Trusted Computers ..................................................................................... 229
Introduction to IPSec............................................................................................................ 231
17.1 VPN Overview ................................................................................................................. 231
17.1.1 IPSec ...................................................................................................................... 231
17.1.2 Security Association ............................................................................................... 231
17.1.3 Other Terminology .................................................................................................. 231
17.1.4 VPN Applications ................................................................................................... 232
17.2 IPSec Architecture ........................................................................................................... 232
17.2.1 IPSec Algorithms .................................................................................................... 233
17.2.2 Key Management ................................................................................................... 233
17.3 Encapsulation .................................................................................................................. 233
17.3.1 Transport Mode ...................................................................................................... 234
17.3.2 Tunnel Mode ......................................................................................................... 234
17.4 IPSec and NAT ................................................................................................................ 234
P-2602H(W)(L)-DxA User's Guide
...................................................................... 216
Table of Contents
17

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents