P-202H Plus v2 User’s Guide
11
Table of Contents
9.3.1 Alerts
.........................................................................................................
90
9.3.2 Threshold Values
......................................................................................
90
9.3.3 Half-Open Sessions
..................................................................................
91
9.3.3.1 TCP Maximum Incomplete and Blocking Time
...............................
91
9.3.4 Configuring Firewall Alert
.........................................................................
91
9.4 Rules Overview
..................................................................................................
93
9.5 Rule Logic Overview
.........................................................................................
93
9.5.1 Rule Checklist
...........................................................................................
94
9.5.2 Security Ramifications
..............................................................................
94
9.5.3 Key Fields For Configuring Rules
.............................................................
94
9.5.3.1 Action
..............................................................................................
94
9.5.3.2 Service
............................................................................................
94
9.5.3.3 Source Address
...............................................................................
95
9.5.3.4 Destination Address
........................................................................
95
9.6 Connection Direction
..........................................................................................
95
9.6.1 LAN to WAN Rules
...................................................................................
95
9.6.2 WAN to LAN Rules
...................................................................................
95
9.7 Firewall Rules Summary
...................................................................................
95
9.7.1 Configuring Firewall Rules
......................................................................
97
9.7.2 Source and Destination Addresses
..........................................................
99
9.7.3 Customized Services
.............................................................................
100
9.7.4 Configuring A Customized Service
.......................................................
101
9.8 Timeout
............................................................................................................
101
9.8.1 Factors Influencing Choices for Timeout Values
.....................................
102
9.9 Logs Screen
.....................................................................................................
103
9.10 Example Firewall Rule
...................................................................................
104
9.11 Predefined Services
.......................................................................................
107
Chapter 10
Introduction to IPSec
...........................................................................................
110
10.1 VPN Overview
................................................................................................
110
10.1.1 IPSec
....................................................................................................
110
10.1.2 Security
.................................................................................................
110
10.1.3 Other Terminology
................................................................................
110
10.1.3.1 Encryption
...................................................................................
110
10.1.3.2 Data Confidentiality
.....................................................................
111
10.1.3.3 Data Integrity
...............................................................................
111
10.1.3.4 Data Origin Authentication
..........................................................
111
10.1.4 VPN Applications
..................................................................................
111
10.2 IPSec Architecture
.........................................................................................
111
10.2.1 IPSec Algorithms
..................................................................................
112
10.2.2 Key Management
..................................................................................
112
10.3 Encapsulation
.................................................................................................
112