ZyXEL Communications 650 Series Network Card User Manual


 
Prestige 650 Series User’s Guide
viii Table of Contents
10.5 Stateful Inspection ...................................................................................................................10-7
10.6 Guidelines for Enhancing Security with Your Firewall.........................................................10-11
10.7 Packet Filtering Vs Firewall ..................................................................................................10-12
Chapter 11 Firewall Configuration ..........................................................................................................11-1
11.1 Remote Management and the Firewall ....................................................................................11-1
11.2 Enabling the Firewall...............................................................................................................11-1
11.3 Configuring E-mail Alerts .......................................................................................................11-2
11.4 Attack Alert..............................................................................................................................11-3
Chapter 12 Creating Custom Rules .........................................................................................................12-1
12.1 Rules Overview........................................................................................................................12-1
12.2 Rule Logic Overview...............................................................................................................12-1
12.3 Connection Direction...............................................................................................................12-3
12.4 Logs .........................................................................................................................................12-4
12.5 Rule Summary .........................................................................................................................12-6
12.6 Predefined Services..................................................................................................................12-8
12.7 Creating/Editing Firewall Rules.............................................................................................12-11
12.8 Timeout..................................................................................................................................12-14
Chapter 13 Customized Services..............................................................................................................13-1
13.1 Introduction to Customized Services.......................................................................................13-1
13.2 Creating/Editing A Customized Service..................................................................................13-2
13.3 Example Custom Service Firewall Rule ..................................................................................13-3
Chapter 14 Content Filtering....................................................................................................................14-1
14.1 Content Filtering Overview .....................................................................................................14-1
14.2 Configuring Keyword Blocking...............................................................................................14-1
14.3 Configuring the Schedule ........................................................................................................14-3
14.4 Configuring Trusted Computers ..............................................................................................14-4
14.5 Configuring Logs.....................................................................................................................14-5
VPN/IPSec...................................................................................................................................................... V
Chapter 15 Introduction to IPSec.............................................................................................................15-1
15.1 VPN Overview.........................................................................................................................15-1
15.2 IPSec Architecture...................................................................................................................15-3
15.3 Encapsulation...........................................................................................................................15-5
15.4 IPSec and NAT........................................................................................................................15-5
Chapter 16 VPN Screens...........................................................................................................................16-1
16.1 VPN/IPSec Overview ..............................................................................................................16-1
16.2 IPSec Algorithms.....................................................................................................................16-1
16.3 My IP Address .........................................................................................................................16-2
16.4 Secure Gateway Address .........................................................................................................16-2
16.5 VPN Summary Screen.............................................................................................................16-3
16.6 Keep Alive...............................................................................................................................16-5
16.7 ID Type and Content................................................................................................................16-5