Prestige 792H User's Guide
9.2 Enabling the Firewall.....................................................................................................................9-1
9.4 Attack Alert....................................................................................................................................9-3
9.4.1 Alerts.....................................................................................................................................9-4
9.4.2 Threshold Values ..................................................................................................................9-4
9.4.3 Half-Open Sessions...............................................................................................................9-4
10.1 Rules Overview............................................................................................................................10-1
10.2 Rule Logic Overview...................................................................................................................10-1
10.2.1 Rule Checklist...................................................................................................................10-1
10.3 Connection Direction ...................................................................................................................10-3
10.3.1 LAN to WAN Rules..........................................................................................................10-3
10.3.2 WAN to LAN Rules .........................................................................................................10-4
10.4 Logs .............................................................................................................................................10-4
10.5 Rule Summary .............................................................................................................................10-6
10.6 Predefined Services......................................................................................................................10-8
10.8 Timeout......................................................................................................................................10-14
Chapter 12 Content Filtering ....................................................................................................................12-1
12.5 Configuring Logs .........................................................................................................................12-5
13.1 VPN Overview.............................................................................................................................13-1
13.1.1 IPSec .................................................................................................................................13-1
13.1.2 Security Association .........................................................................................................13-1
13.1.3 Other Terminology............................................................................................................13-1
13.1.4 VPN Applications .............................................................................................................13-2
13.2 IPSec Architecture .......................................................................................................................13-3
13.2.1 IPSec Algorithms ..............................................................................................................13-4
13.2.2 Key Management ..............................................................................................................13-4
xii
Table of Contents