Westermo MR Series User Manual

Page 9

Advertising
background image

9

6622-3201

Web Interface and Command Line Reference Guide

www.westermo.com

11.3 ............................................ D-channel X.25 .........................................................................................376

11.4 ............................................ X.28 Commands ......................................................................................377

11.4.1 ................................. CALL Make an X.25 Call .......................................................................377

11.4.2 ................................. Aborting a CALL ......................................................................................379

11.4.3 ................................. CLR Clear an X.25 Call .........................................................................381

11.4.4 ................................. ICLR Invitation To CLR ...........................................................................381

11.4.5 ................................. INT Send Interrupt Packet ....................................................................381

11.4.6 ................................. LOG Logoff and Disconnect .................................................................381

11.4.7 ................................. PAR? List Local X.3 Parameters ...........................................................381

11.4.8 ................................. PROF Load/Save PAD Profile ................................................................382

11.4.9 ................................. RESET Send Reset Packet ......................................................................383

11.4.10 ............................... RPAR? Read Remote X.3 Parameters .................................................383

11.4.11 ............................... RSET Set Remote X.3 Parameters ......................................................383

11.4.12 ............................... SET Set Local X.3 Parameters ..............................................................383

12 ......................................... PPP Over Ethernet ............................................................. 384

13 ......................................... IPSEC and VPNs .................................................................. 385

13.1 ............................................ What is IPSec? ..........................................................................................385

13.2 ............................................ Data Encryption Methods ......................................................................385

13.2.1 ................................. DES (64-bit key) .......................................................................................385

13.2.2 ................................. DES (192-bit key) .....................................................................................386

13.2.3 ................................. AES (128-bit key) .....................................................................................386

13.3 ............................................ What is a VPN? .........................................................................................386

13.4 ............................................ The Benefits of IPSec ..............................................................................386

13.5 ............................................ X.509 Certificates ....................................................................................387

14 ......................................... The Event Log ...................................................................... 389

14.1 ............................................ What is the Event Log? ..........................................................................389

14.2 ............................................ The LOGCODES.TXT File ...................................................................390

14.2.1 ................................. Event Blocks .............................................................................................391

14.2.2 ................................. Reason Blocks ...........................................................................................391

14.2.3 ................................. Editing the File ..........................................................................................391

15 ......................................... Firewall Scripts .................................................................... 392

15.1 ............................................ Introduction ...............................................................................................392

15.2 ............................................ Firewall Script Syntax ..............................................................................392

15.2.1 ................................. Labels ..........................................................................................................392

15.2.2 ................................. Comments .................................................................................................392

15.2.3 ................................. Filter Rules .................................................................................................393

15.3 ............................................ Specifying IP Addresses and Ranges .....................................................397

15.4 ............................................ Address/Port Translation ........................................................................398

15.5 ............................................ Filtering on Port Numbers ....................................................................398

15.6 ............................................ Filtering on TCP Flags .............................................................................400

15.7 ............................................ Filtering on ICMP Codes .......................................................................401

15.8 ............................................ Stateful Inspection ....................................................................................402

15.8.1 ................................. Using [inspect-state] with Flags ............................................................403

15.8.2 ................................. Using [inspect-state] with ICMP ..........................................................403

15.8.3 ................................. Using [inspect-state] with the Out Of Service Option ..................404

15.8.4 ................................. Using [inspect-state] with the Stat Option .......................................405

15.8.5 ................................. Assigning DSCP Values ............................................................................405

15.9 ............................................ The FWLOG.TXT File ...........................................................................406

15.9.1 ................................. Log File Examples .....................................................................................407

Advertising
This manual is related to the following products: