Cisco SA520-K9 Administration Guide - Page 6

Contents, Intrusion Prevention System, Using Cisco ProtectLink Security Services - security firewall appliance

Page 6 highlights

Contents Configuring a Firewall Rule for Inbound Traffic 110 Prioritizing Firewall Rules 113 Firewall Rule Configuration Examples 114 Using Other Tools to Prevent Attacks, Restrict Access, and Control Inbound Traffic 117 Configuring Attack Checks 118 Configuring MAC Filtering to Allow or Block Traffic 119 Configuring IP/MAC Binding 120 Port Triggering 121 Configuring a Port Triggering Rule to Direct Traffic to Specified Ports 122 Viewing the Port Triggering Status 122 Configuring Session Settings to Analyze Incoming Packets 123 Using Other Tools to Control Access to the Internet 124 Configuring Content Filtering to Allow or Block Web Components 124 Configuring Approved URLs to Allow Access to Websites 126 Configuring Blocked URLs to Prevent Access to Websites 127 Configuring IP/MAC Binding to Prevent Spoofing 128 SIP 129 Chapter 5: Intrusion Prevention System Configuring IPS Configuring the IPS Policy Configuring the Protocol Inspection Settings Configuring Peer-to-Peer Blocking and Instant Messaging 130 131 132 133 134 Chapter 6: Using Cisco ProtectLink Security Services 135 Chapter 7: Configuring VPN About VPN Configuring a Site-to-Site VPN Tunnel Configuring an IPsec VPN Tunnel for Remote Access with a VPN Client Configuring the User Database for the IPsec Remote Access VPN Advanced Configuration of IPsec VPN 136 136 137 139 142 144 Cisco SA500 Series Security Appliances Administration Guide 6

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Cisco SA500 Series Security Appliances Administration Guide
6
Contents
Configuring a Firewall Rule for Inbound Traffic
110
Prioritizing Firewall Rules
113
Firewall Rule Configuration Examples
114
Using Other Tools to Prevent Attacks, Restrict Access, and
Control Inbound Traffic
117
Configuring Attack Checks
118
Configuring MAC Filtering to Allow or Block Traffic
119
Configuring IP/MAC Binding
120
Port Triggering
121
Configuring a Port Triggering Rule to Direct Traffic to Specified Ports
122
Viewing the Port Triggering Status
122
Configuring Session Settings to Analyze Incoming Packets
123
Using Other Tools to Control Access to the Internet
124
Configuring Content Filtering to Allow or Block Web Components
124
Configuring Approved URLs to Allow Access to Websites
126
Configuring Blocked URLs to Prevent Access to Websites
127
Configuring IP/MAC Binding to Prevent Spoofing
128
SIP
129
Chapter 5: Intrusion Prevention System
130
Configuring IPS
131
Configuring the IPS Policy
132
Configuring the Protocol Inspection Settings
133
Configuring Peer-to-Peer Blocking and Instant Messaging
134
Chapter 6: Using Cisco ProtectLink Security Services
135
Chapter 7: Configuring VPN
136
About VPN
136
Configuring a Site-to-Site VPN Tunnel
137
Configuring an IPsec VPN Tunnel for Remote Access with a VPN Client
139
Configuring the User Database for the IPsec Remote Access VPN
142
Advanced Configuration of IPsec VPN
144