beautypg.com

ZyXEL Communications P-2602HWLNI User Manual

Page 18

background image

Table of Contents

P-2602HWLNI User’s Guide

18

15.4.1 LAN to WAN Rules ................................................................................................. 248
15.4.2 Alerts ...................................................................................................................... 248

15.5 General Firewall Policy ................................................................................................... 248
15.6 Firewall Rules Summary ................................................................................................. 249

15.6.1 Configuring Firewall Rules ................................................................................... 251
15.6.2 Customized Services ............................................................................................ 254
15.6.3 Configuring a Customized Service ....................................................................... 254

15.7 Example Firewall Rule ..................................................................................................... 255
15.8 DoS Thresholds .............................................................................................................. 259

15.8.1 Threshold Values ................................................................................................... 259
15.8.2 Half-Open Sessions ............................................................................................... 260
15.8.3 Configuring Firewall Thresholds ............................................................................. 260

15.9 Firewall Commands ......................................................................................................... 262

Chapter 16
Content Filtering ................................................................................................................... 265

16.1 Content Filtering Overview ............................................................................................. 265
16.2 Configuring Keyword Blocking ........................................................................................ 265
16.3 Configuring the Schedule .............................................................................................. 266
16.4 Configuring Trusted Computers ..................................................................................... 267

Chapter 17
Introduction to IPSec............................................................................................................ 269

17.1 VPN Overview ............................................................................................................... 269

17.1.1 IPSec ...................................................................................................................... 269
17.1.2 Security Association ............................................................................................... 269
17.1.3 Other Terminology .................................................................................................. 269
17.1.4 VPN Applications ................................................................................................... 270

17.2 IPSec Architecture ........................................................................................................... 270

17.2.1 IPSec Algorithms .................................................................................................... 271
17.2.2 Key Management ................................................................................................... 271

17.3 Encapsulation .................................................................................................................. 271

17.3.1 Transport Mode ...................................................................................................... 272
17.3.2 Tunnel Mode ......................................................................................................... 272

17.4 IPSec and NAT ................................................................................................................ 272

Chapter 18
VPN Screens.......................................................................................................................... 275

18.1 VPN/IPSec Overview ....................................................................................................... 275
18.2 IPSec Algorithms ............................................................................................................. 275

18.2.1 AH (Authentication Header) Protocol ..................................................................... 275
18.2.2 ESP (Encapsulating Security Payload) Protocol .................................................... 275

18.3 My IP Address ................................................................................................................. 276