Prestige 2602H/HW Series User’s Guide
Table of Contents 17
14.2 Firewall Policies Overview .............................................................................181
14.3 Rule Logic Overview ......................................................................................182
14.3.1 Rule Checklist .......................................................................................182
14.3.2 Security Ramifications ..........................................................................182
14.3.3 Key Fields For Configuring Rules .........................................................183
14.3.3.1 Action ..........................................................................................183
14.3.3.2 Service ........................................................................................183
14.3.3.3 Source Address ...........................................................................183
14.3.3.4 Destination Address ....................................................................183
14.4 Connection Direction Example .......................................................................183
14.4.1 LAN to WAN Rules ...............................................................................184
14.4.2 WAN to LAN Rules ...............................................................................184
14.4.3 Alerts .....................................................................................................185
14.5 Configuring Basic Firewall Settings ................................................................185
14.6 Rule Summary ...............................................................................................186
14.6.1 Configuring Firewall Rules ....................................................................188
14.7 Customized Services .....................................................................................191
14.8 Creating/Editing A Customized Service .........................................................191
14.9 Example Firewall Rule ...................................................................................192
14.10 Predefined Services .....................................................................................196
14.11 Anti-Probing ..................................................................................................198
14.12 DoS Thresholds ...........................................................................................199
14.12.1 Threshold Values ................................................................................200
14.12.2 Half-Open Sessions ............................................................................200
14.12.2.1 TCP Maximum Incomplete and Blocking Time .........................200
Chapter 15
Content Filtering .................................................................................................. 203
15.1 Content Filtering Overview .............................................................................203
15.2 Configuring Keyword Blocking .......................................................................203
15.3 Configuring the Schedule ..............................................................................204
15.4 Configuring Trusted Computers .....................................................................205
Chapter 16
Introduction to IPSec ........................................................................................... 207
16.1 VPN Overview ................................................................................................207
16.1.1 IPSec ....................................................................................................207
16.1.2 Security Association .............................................................................207
16.1.3 Other Terminology ................................................................................207
16.1.3.1 Encryption ...................................................................................207
16.1.3.2 Data Confidentiality .....................................................................208
16.1.3.3 Data Integrity ...............................................................................208
16.1.3.4 Data Origin Authentication ..........................................................208