Table of Contents
P-2612HW Series User’s Guide
16
12.3.2 Customized Services ............................................................................................ 240
12.3.3 Configuring a Customized Service ....................................................................... 241
12.4 The Firewall Threshold Screen ........................................................................................ 241
12.4.1 Threshold Values ................................................................................................... 242
12.4.2 Configuring Firewall Thresholds ............................................................................. 243
12.5 Firewall Technical Reference ........................................................................................... 245
12.5.1 Firewall Rules Overview .........................................................................................245
12.5.2 Guidelines For Enhancing Security With Your Firewall .......................................... 246
12.5.3 Security Considerations .........................................................................................247
12.5.4 Triangle Route ........................................................................................................ 247
Chapter 13
Content Filtering...................................................................................................................251
13.1 Overview ......................................................................................................................... 251
13.1.1 What You Can Do in the Content Filter Screens .................................................... 251
13.1.2 What You Need to Know About Content Filtering .................................................. 251
13.1.3 Before You Begin ................................................................................................... 251
13.1.4 Content Filtering Example ...................................................................................... 252
13.2 The Keyword Screen ......................................................................................................254
13.3 The Schedule Screen .....................................................................................................255
13.4 The Trusted Screen ........................................................................................................ 256
Chapter 14
VPN.........................................................................................................................................257
14.1 Overview ..........................................................................................................................257
14.1.1 What You Can Do in the VPN Screens .................................................................. 257
14.1.2 What You Need to Know About IPSec VPN ........................................................... 258
14.1.3 Before You Begin ................................................................................................... 259
14.2 VPN Setup Screen .........................................................................................................260
14.3 The VPN Edit Screen .....................................................................................................262
14.4 Configuring Advanced IKE Settings ............................................................................... 268
14.5 Manual Key Setup ...........................................................................................................271
14.5.1 Security Parameter Index (SPI) ............................................................................ 271
14.6 Configuring Manual Key .................................................................................................272
14.7 Viewing SA Monitor ........................................................................................................275
14.8 Configuring VPN Global Setting ..................................................................................... 277
14.9 IPSec VPN Technical Reference .....................................................................................277
14.9.1 IPSec Architecture ................................................................................................. 278
14.9.2 IPSec and NAT .......................................................................................................278
14.9.3 VPN, NAT, and NAT Traversal ............................................................................... 279
14.9.4 Encapsulation ......................................................................................................... 281
14.9.5 IKE Phases ........................................................................................................... 282
14.9.6 Negotiation Mode ...................................................................................................283