Prestige 650 Series User’s Guide
List of Figures xv
Figure 10-5 Stateful Inspection.................................................................................................................... 10-8
Figure 11-1 Enabling the Firewall.................................................................................................................11-1
Figure 11-2 E-mail ........................................................................................................................................11-2
Figure 11-3 Alert...........................................................................................................................................11-6
Figure 12-1 LAN to WAN Traffic................................................................................................................ 12-3
Figure 12-2 WAN to LAN Traffic................................................................................................................ 12-4
Figure 12-3 Firewall Logs............................................................................................................................ 12-5
Figure 12-4 Firewall Rules Summary: First Screen..................................................................................... 12-7
Figure 12-5 Creating/Editing A Firewall Rule ........................................................................................... 12-12
Figure 12-6 Adding/Editing Source and Destination Addresses ................................................................ 12-14
Figure 12-7 Timeout................................................................................................................................... 12-15
Figure 13-1 Customized Services ................................................................................................................ 13-1
Figure 13-2 Creating/Editing A Customized Service ................................................................................... 13-2
Figure 13-3 Edit Rule Example.................................................................................................................... 13-3
Figure 13-4 Configure Source IP Example .................................................................................................. 13-4
Figure 13-5 Customized Service for MyService Example........................................................................... 13-4
Figure 13-6 Syslog Rule Configuration Example ........................................................................................ 13-5
Figure 13-7 Rule Summary Example........................................................................................................... 13-6
Figure 14-1 Content Filter: Keyword........................................................................................................... 14-2
Figure 14-2 Content Filter: Schedule........................................................................................................... 14-3
Figure 14-3 Content Filter: Trusted.............................................................................................................. 14-4
Figure 14-4 Content Filter Logs................................................................................................................... 14-5
Figure 15-1 Encryption and Decryption....................................................................................................... 15-2
Figure 15-2 VPN Application ...................................................................................................................... 15-3
Figure 15-3 IPSec Architecture.................................................................................................................... 15-4
Figure 15-4 Transport and Tunnel Mode IPSec Encapsulation.................................................................... 15-5
Figure 16-1 IPSec Summary Fields ............................................................................................................. 16-3
Figure 16-2 VPN Summary ......................................................................................................................... 16-4
Figure 16-3 VPN IKE .................................................................................................................................. 16-8
Figure 16-4 Two Phases to Set Up the IPSec SA....................................................................................... 16-13
Figure 16-5 VPN IKE: Advanced .............................................................................................................. 16-16
Figure 16-6 VPN Manual Key ................................................................................................................... 16-20
Figure 16-7 SA Monitor............................................................................................................................. 16-25
Figure 16-8 Global Setting......................................................................................................................... 16-26
Figure 16-9 VPN Logs............................................................................................................................... 16-27
Figure 16-10 Telecommuters Sharing One VPN Rule Example................................................................ 16-31
Figure 16-11 Telecommuters Using Unique VPN Rules Example ............................................................ 16-32
Figure 17-1 Telnet Configuration on a TCP/IP Network ............................................................................. 17-2
Figure 17-2 Remote Management................................................................................................................ 17-3
Figure 18-1 Configuring UPnP .................................................................................................................... 18-2
Figure 19-1 Log Settings.............................................................................................................................. 19-2