RuggedCom RX1100 Network Router User Manual


 
RuggedRouter® User Guide
Modem Status............................................................................................................................105
Modem PPP Client Connections................................................................................................106
Modem PPP Client ....................................................................................................................106
PPP Logs, PPP Connection Logs...............................................................................................107
Current Route and Interfaces Table...........................................................................................107
Chapter 13 - Configuring The Firewall..............................................................................................109
Introduction....................................................................................................................................109
Firewall Fundamentals ..................................................................................................................109
Stateless vs Stateful Firewalls................................................................................................109
Linux® netfilter, iptables And The Shoreline Firewall ........................................................109
Network Address Translation................................................................................................110
Port Forwarding.....................................................................................................................111
Shorewall Quick Setup...................................................................................................................111
ShoreWall Terminology And Concepts.........................................................................................113
Zones......................................................................................................................................113
Interfaces................................................................................................................................113
Hosts.......................................................................................................................................114
Policy......................................................................................................................................114
Masquerading And SNAT......................................................................................................115
Rules.......................................................................................................................................116
Configuring The Firewall And VPN..............................................................................................117
Route Based Virtual Private Networking...............................................................................117
Policy Based Virtual Private Networking..............................................................................118
Virtual Private Networking To A DMZ.................................................................................118
Firewall Configuration...................................................................................................................119
Network Zones...........................................................................................................................121
Network Interfaces.....................................................................................................................121
Network Zone Hosts..................................................................................................................123
Default Policies..........................................................................................................................124
Masquerading.............................................................................................................................125
Firewall Rules............................................................................................................................126
Static NAT.................................................................................................................................127
TC (Traffic Control) Interfaces, Classes, and Rules..................................................................128
Actions When Stopped...............................................................................................................128
Chapter 14 - Traffic Control..............................................................................................................129
Traffic Control (TC) Fundamentals...............................................................................................129
Traffic Control Example............................................................................................................129
TC Interfaces..........................................................................................................................129
TC Classes..............................................................................................................................130
TC Rules................................................................................................................................130
Traffic Control Configuration........................................................................................................131
TC Interfaces (tcdevices)...........................................................................................................131
TC Classes..................................................................................................................................132
TC Rules....................................................................................................................................134
Hints on optimizing the TC Rule table..................................................................................136
Chapter 15 - Configuring IPsec VPN ................................................................................................137
Introduction....................................................................................................................................137
VPN Fundamentals ...................................................................................................................137
10 RuggedCom