Table of Contents
15.4.1 LAN to WAN Rules ................................................................................................. 248
15.4.2 Alerts ...................................................................................................................... 248
15.7 Example Firewall Rule ..................................................................................................... 255
15.8 DoS Thresholds .............................................................................................................. 259
15.8.1 Threshold Values ................................................................................................... 259
15.8.2 Half-Open Sessions ............................................................................................... 260
15.9 Firewall Commands ......................................................................................................... 262
Content Filtering ................................................................................................................... 265
Introduction to IPSec............................................................................................................ 269
17.1 VPN Overview ............................................................................................................... 269
17.1.1 IPSec ...................................................................................................................... 269
17.1.3 Other Terminology .................................................................................................. 269
17.1.4 VPN Applications ................................................................................................... 270
17.2 IPSec Architecture ........................................................................................................... 270
17.2.1 IPSec Algorithms .................................................................................................... 271
17.2.2 Key Management ................................................................................................... 271
17.3 Encapsulation .................................................................................................................. 271
17.3.1 Transport Mode ...................................................................................................... 272
17.3.2 Tunnel Mode ......................................................................................................... 272
17.4 IPSec and NAT ................................................................................................................ 272
VPN Screens.......................................................................................................................... 275
18.1 VPN/IPSec Overview ....................................................................................................... 275
18.2 IPSec Algorithms ............................................................................................................. 275
18.3 My IP Address ................................................................................................................. 276
18
P-2602HWLNI User's Guide