Application Level Commands ......................................................................................................... 16-13
Application Level Gateway ............................................................................................................. 16-13
On Board URL Filtering .................................................................................................................. 16-14
Alarm Logging ................................................................................................................................ 16-16
Alarms ............................................................................................................................................ 16-16
Authentication................................................................................................................................. 16-17
Firewall and NAT ............................................................................................................................ 16-18
Firewall and VPN ............................................................................................................................ 16-18
ACLs and Firewall .......................................................................................................................... 16-18
Dynamic Reconfiguration ............................................................................................................... 16-18
Firewall CLI Commands ............................................................................................................................. 16-19
Firewall Limitations ..................................................................................................................................... 16-22
Pre-configuring the Firewall ........................................................................................................................ 16-23
Configuration Examples ............................................................................................................................. 16-24
XSR with Firewall ................................................................................................................................. 16-24
XSR with Firewall and VPN .................................................................................................................. 16-27
Configuring Simple Security ................................................................................................................. 16-34
RPC Policy Configuration ..................................................................................................................... 16-35
Appendix A: Alarms/Events, System Limits, and Standard ASCII Table
Recommended System Limits ........................................................................................................................A-1
System Alarms and Events ............................................................................................................................A-3
etsysSrvcLvlMetricTable.....................................................................................................................B-1
etsysSrvcLvlOwnerTable ....................................................................................................................B-2
etsysSrvcLvlHistoryTable ...................................................................................................................B-2
etsysSrvcLvlNetMeasureTable ...........................................................................................................B-3
BGP v4 MIB Tables ........................................................................................................................................B-5
General Variables Table .....................................................................................................................B-5
BGP v4 Peer Table.............................................................................................................................B-5
BGP-4 Traps.......................................................................................................................................B-8
Firewall MIB Tables ........................................................................................................................................B-9
Global Interface Operations .....................................................................................................................B-9
Monitoring Objects .................................................................................................................................B-10
Policy Rule True Table .....................................................................................................................B-10
Session Totals Counters ..................................................................................................................B-10
Session Totals Table ........................................................................................................................B-10
IP Session Counters.........................................................................................................................B-11
IP Session Table ..............................................................................................................................B-11
xxv