ZyXEL Communications 650 Series User Manual
Page 8

Prestige 650 Series User’s Guide
viii
Table of Contents
10.5
Stateful Inspection ...................................................................................................................10-7
10.6
Guidelines for Enhancing Security with Your Firewall.........................................................10-11
10.7
Packet Filtering Vs Firewall ..................................................................................................10-12
Chapter 11 Firewall Configuration .......................................................................................................... 11-1
11.1
Remote Management and the Firewall ....................................................................................11-1
11.2
Enabling the Firewall...............................................................................................................11-1
11.3
Configuring E-mail Alerts .......................................................................................................11-2
11.4
Attack Alert..............................................................................................................................11-3
Chapter 12 Creating Custom Rules .........................................................................................................12-1
12.1
Rules Overview........................................................................................................................12-1
12.2
Rule Logic Overview...............................................................................................................12-1
12.3
Connection Direction...............................................................................................................12-3
12.4
Logs .........................................................................................................................................12-4
12.5
Rule Summary .........................................................................................................................12-6
12.6
Predefined Services..................................................................................................................12-8
12.7
Creating/Editing Firewall Rules.............................................................................................12-11
12.8
Timeout..................................................................................................................................12-14
Chapter 13 Customized Services ..............................................................................................................13-1
13.1
Introduction to Customized Services .......................................................................................13-1
13.2
Creating/Editing A Customized Service ..................................................................................13-2
13.3
Example Custom Service Firewall Rule ..................................................................................13-3
Chapter 14 Content Filtering....................................................................................................................14-1
14.1
Content Filtering Overview .....................................................................................................14-1
14.2
Configuring Keyword Blocking...............................................................................................14-1
14.3
Configuring the Schedule ........................................................................................................14-3
14.4
Configuring Trusted Computers ..............................................................................................14-4
14.5
Configuring Logs.....................................................................................................................14-5
VPN/IPSec ...................................................................................................................................................... V
Chapter 15 Introduction to IPSec.............................................................................................................15-1
15.1
VPN Overview.........................................................................................................................15-1
15.2
IPSec Architecture ...................................................................................................................15-3
15.3
Encapsulation...........................................................................................................................15-5
15.4
IPSec and NAT ........................................................................................................................15-5
Chapter 16 VPN Screens ...........................................................................................................................16-1
16.1
VPN/IPSec Overview ..............................................................................................................16-1
16.2
IPSec Algorithms .....................................................................................................................16-1
16.3
My IP Address .........................................................................................................................16-2
16.4
Secure Gateway Address .........................................................................................................16-2
16.5
VPN Summary Screen .............................................................................................................16-3
16.6
Keep Alive ...............................................................................................................................16-5
16.7
ID Type and Content................................................................................................................16-5