beautypg.com

Chapter 9: security configuration, Security level, Log information – Compex Technologies NetPassage 18A User Manual

Page 119

background image

110

Chapter 9: Security Configuration

The Security Configuration chapter covers:

Firewall Configuration

Firewall Logs

Packet Filtering

URL Filtering

Multicast Filtering

The router makes use of Packet Filtering and Stateful Packet Inspection

(SPI) to examine each message entering or leaving your LAN and block
those that do not satisfy your specified security criteria. Packet Filtering

allows you to define security filter rules such that packets that make it
through the filter rules are processed as per normal, while those that do

not are discarded.

SPI compares the packet content to a database of trusted information
instead of only checking the packet header, before letting it through.

Security Level
Depending on the amount of protection you require, you can

determine the level of security to implement: Low, Medium, and High.

Log Information
The router allows you to keep a record of data packets that have been

allowed and/or that have been refused through the firewall.

By customising the data traffic to record and reviewing the log files at

regular intervals, you can monitor the system’s performance and
identify irregularities.

The following lists the usual types of data packets encountered.

TCP (Transmission Control Protocol) packets are exchanged
between hosts to establish a connection and exchange data.

UDP (User Datagram Protocol) packets are primarily used for

broadcasting messages and in streaming audio/video information.

ICMP (Internet Control Message Protocol) packets pertaining to

error or control information are exchanged between access points.

IGMP (Internet Group Management Protocol) packets are sent to
establish host memberships such as multicast groups on the LAN.