ZyXEL Communications 650 Series User Manual

Page 8

Advertising
background image

Prestige 650 Series User’s Guide

viii

Table of Contents

10.5

Stateful Inspection ...................................................................................................................10-7

10.6

Guidelines for Enhancing Security with Your Firewall.........................................................10-11

10.7

Packet Filtering Vs Firewall ..................................................................................................10-12

Chapter 11 Firewall Configuration .......................................................................................................... 11-1

11.1

Remote Management and the Firewall ....................................................................................11-1

11.2

Enabling the Firewall...............................................................................................................11-1

11.3

Configuring E-mail Alerts .......................................................................................................11-2

11.4

Attack Alert..............................................................................................................................11-3

Chapter 12 Creating Custom Rules .........................................................................................................12-1

12.1

Rules Overview........................................................................................................................12-1

12.2

Rule Logic Overview...............................................................................................................12-1

12.3

Connection Direction...............................................................................................................12-3

12.4

Logs .........................................................................................................................................12-4

12.5

Rule Summary .........................................................................................................................12-6

12.6

Predefined Services..................................................................................................................12-8

12.7

Creating/Editing Firewall Rules.............................................................................................12-11

12.8

Timeout..................................................................................................................................12-14

Chapter 13 Customized Services ..............................................................................................................13-1

13.1

Introduction to Customized Services .......................................................................................13-1

13.2

Creating/Editing A Customized Service ..................................................................................13-2

13.3

Example Custom Service Firewall Rule ..................................................................................13-3

Chapter 14 Content Filtering....................................................................................................................14-1

14.1

Content Filtering Overview .....................................................................................................14-1

14.2

Configuring Keyword Blocking...............................................................................................14-1

14.3

Configuring the Schedule ........................................................................................................14-3

14.4

Configuring Trusted Computers ..............................................................................................14-4

14.5

Configuring Logs.....................................................................................................................14-5

VPN/IPSec ...................................................................................................................................................... V

Chapter 15 Introduction to IPSec.............................................................................................................15-1

15.1

VPN Overview.........................................................................................................................15-1

15.2

IPSec Architecture ...................................................................................................................15-3

15.3

Encapsulation...........................................................................................................................15-5

15.4

IPSec and NAT ........................................................................................................................15-5

Chapter 16 VPN Screens ...........................................................................................................................16-1

16.1

VPN/IPSec Overview ..............................................................................................................16-1

16.2

IPSec Algorithms .....................................................................................................................16-1

16.3

My IP Address .........................................................................................................................16-2

16.4

Secure Gateway Address .........................................................................................................16-2

16.5

VPN Summary Screen .............................................................................................................16-3

16.6

Keep Alive ...............................................................................................................................16-5

16.7

ID Type and Content................................................................................................................16-5

Advertising