ZyXEL Communications Prestige 792H User Manual page 12

G.shdsl 4-port security gateway
Hide thumbs Also See for Prestige 792H:
Table of Contents

Advertisement

Prestige 792H User's Guide
9.1 Remote Management and the Firewall ..........................................................................................9-1
9.2 Enabling the Firewall.....................................................................................................................9-1
9.3 Configuring E-mail Alerts .............................................................................................................9-2
9.4 Attack Alert....................................................................................................................................9-3
9.4.1 Alerts.....................................................................................................................................9-4
9.4.2 Threshold Values ..................................................................................................................9-4
9.4.3 Half-Open Sessions...............................................................................................................9-4
Chapter 10 Creating Custom Rules..........................................................................................................10-1
10.1 Rules Overview............................................................................................................................10-1
10.2 Rule Logic Overview...................................................................................................................10-1
10.2.1 Rule Checklist...................................................................................................................10-1
10.2.2 Security Ramifications......................................................................................................10-2
10.2.3 Key Fields For Configuring Rules ....................................................................................10-2
10.3 Connection Direction ...................................................................................................................10-3
10.3.1 LAN to WAN Rules..........................................................................................................10-3
10.3.2 WAN to LAN Rules .........................................................................................................10-4
10.4 Logs .............................................................................................................................................10-4
10.5 Rule Summary .............................................................................................................................10-6
10.6 Predefined Services......................................................................................................................10-8
10.7 Creating/Editing Firewall Rules.................................................................................................10-11
10.7.1 Source and Destination Addresses ..................................................................................10-13
10.8 Timeout......................................................................................................................................10-14
10.8.1 Factors Influencing Choices for Timeout Values............................................................10-15
Chapter 11 Customized Services...............................................................................................................11-1
11.1 Introduction to Customized Services ...........................................................................................11-1
11.2 Creating/Editing A Customized Service ......................................................................................11-2
11.3 Example Custom Service Firewall Rule ......................................................................................11-3
Chapter 12 Content Filtering ....................................................................................................................12-1
12.1 Content Filtering Overview .........................................................................................................12-1
12.2 Configuring Keyword Blocking...................................................................................................12-1
12.3 Configuring the Schedule.............................................................................................................12-3
12.4 Configuring Trusted Computers ..................................................................................................12-4
12.5 Configuring Logs .........................................................................................................................12-5
Chapter 13 Introduction to IPSec.............................................................................................................13-1
13.1 VPN Overview.............................................................................................................................13-1
13.1.1 IPSec .................................................................................................................................13-1
13.1.2 Security Association .........................................................................................................13-1
13.1.3 Other Terminology............................................................................................................13-1
13.1.4 VPN Applications .............................................................................................................13-2
13.2 IPSec Architecture .......................................................................................................................13-3
13.2.1 IPSec Algorithms ..............................................................................................................13-4
13.2.2 Key Management ..............................................................................................................13-4
xii
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents