Westermo MR Series User Manual
Page 9

9
6622-3201
Web Interface and Command Line Reference Guide
www.westermo.com
11.3 ............................................ D-channel X.25 .........................................................................................376
11.4 ............................................ X.28 Commands ......................................................................................377
11.4.1 ................................. CALL Make an X.25 Call .......................................................................377
11.4.2 ................................. Aborting a CALL ......................................................................................379
11.4.3 ................................. CLR Clear an X.25 Call .........................................................................381
11.4.4 ................................. ICLR Invitation To CLR ...........................................................................381
11.4.5 ................................. INT Send Interrupt Packet ....................................................................381
11.4.6 ................................. LOG Logoff and Disconnect .................................................................381
11.4.7 ................................. PAR? List Local X.3 Parameters ...........................................................381
11.4.8 ................................. PROF Load/Save PAD Profile ................................................................382
11.4.9 ................................. RESET Send Reset Packet ......................................................................383
11.4.10 ............................... RPAR? Read Remote X.3 Parameters .................................................383
11.4.11 ............................... RSET Set Remote X.3 Parameters ......................................................383
11.4.12 ............................... SET Set Local X.3 Parameters ..............................................................383
12 ......................................... PPP Over Ethernet ............................................................. 384
13 ......................................... IPSEC and VPNs .................................................................. 385
13.1 ............................................ What is IPSec? ..........................................................................................385
13.2 ............................................ Data Encryption Methods ......................................................................385
13.2.1 ................................. DES (64-bit key) .......................................................................................385
13.2.2 ................................. DES (192-bit key) .....................................................................................386
13.2.3 ................................. AES (128-bit key) .....................................................................................386
13.3 ............................................ What is a VPN? .........................................................................................386
13.4 ............................................ The Benefits of IPSec ..............................................................................386
13.5 ............................................ X.509 Certificates ....................................................................................387
14 ......................................... The Event Log ...................................................................... 389
14.1 ............................................ What is the Event Log? ..........................................................................389
14.2 ............................................ The LOGCODES.TXT File ...................................................................390
14.2.1 ................................. Event Blocks .............................................................................................391
14.2.2 ................................. Reason Blocks ...........................................................................................391
14.2.3 ................................. Editing the File ..........................................................................................391
15 ......................................... Firewall Scripts .................................................................... 392
15.1 ............................................ Introduction ...............................................................................................392
15.2 ............................................ Firewall Script Syntax ..............................................................................392
15.2.1 ................................. Labels ..........................................................................................................392
15.2.2 ................................. Comments .................................................................................................392
15.2.3 ................................. Filter Rules .................................................................................................393
15.3 ............................................ Specifying IP Addresses and Ranges .....................................................397
15.4 ............................................ Address/Port Translation ........................................................................398
15.5 ............................................ Filtering on Port Numbers ....................................................................398
15.6 ............................................ Filtering on TCP Flags .............................................................................400
15.7 ............................................ Filtering on ICMP Codes .......................................................................401
15.8 ............................................ Stateful Inspection ....................................................................................402
15.8.1 ................................. Using [inspect-state] with Flags ............................................................403
15.8.2 ................................. Using [inspect-state] with ICMP ..........................................................403
15.8.3 ................................. Using [inspect-state] with the Out Of Service Option ..................404
15.8.4 ................................. Using [inspect-state] with the Stat Option .......................................405
15.8.5 ................................. Assigning DSCP Values ............................................................................405
15.9 ............................................ The FWLOG.TXT File ...........................................................................406
15.9.1 ................................. Log File Examples .....................................................................................407