Prestige 652 ADSL Security Router
5.1
Remote Node Setup ...................................................................................................................5-1
5.2
Remote Node Setup ...................................................................................................................5-6
5.3
Remote Node Filter....................................................................................................................5-8
Chapter 6 Remote Node TCP/IP Configuration........................................................................................6-1
6.1
TCP/IP Configuration ................................................................................................................6-1
Chapter 7 Bridging Setup ...........................................................................................................................7-1
7.1
Bridging in General....................................................................................................................7-1
7.2
Bridge Ethernet Setup ................................................................................................................7-1
8.1
Introduction................................................................................................................................8-1
8.2
Using NAT.................................................................................................................................8-6
8.3
NAT Setup .................................................................................................................................8-8
8.4
8.5
General NAT Examples ...........................................................................................................8-20
Chapter 9 Firewalls......................................................................................................................................9-1
9.1
What Is a Firewall? ....................................................................................................................9-1
9.2
Types of Firewalls......................................................................................................................9-1
9.3
9.4
Denial of Service .......................................................................................................................9-3
9.5
Stateful Inspection .....................................................................................................................9-7
9.6
9.7
10.2 Access Methods .......................................................................................................................10-1
11.2 Enabling the Firewall...............................................................................................................11-2
11.3 E-mail ......................................................................................................................................11-2
11.4 Attack Alert..............................................................................................................................11-6
12.1 Rules Overview........................................................................................................................12-1
12.2 Rule Logic Overview...............................................................................................................12-1
12.3 Connection Direction ...............................................................................................................12-3
12.4 Rule Summary .........................................................................................................................12-4
12.5 Predefined Services..................................................................................................................12-6
12.6 Timeout..................................................................................................................................12-13
viii
Table of Contents