ZyXEL Communications P-2602HW-63C Podręcznik Użytkownika Strona 17

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 550
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 16
Prestige 2602H/HW Series User’s Guide
Table of Contents 17
14.2 Firewall Policies Overview .............................................................................181
14.3 Rule Logic Overview ......................................................................................182
14.3.1 Rule Checklist .......................................................................................182
14.3.2 Security Ramifications ..........................................................................182
14.3.3 Key Fields For Configuring Rules .........................................................183
14.3.3.1 Action ..........................................................................................183
14.3.3.2 Service ........................................................................................183
14.3.3.3 Source Address ...........................................................................183
14.3.3.4 Destination Address ....................................................................183
14.4 Connection Direction Example .......................................................................183
14.4.1 LAN to WAN Rules ...............................................................................184
14.4.2 WAN to LAN Rules ...............................................................................184
14.4.3 Alerts .....................................................................................................185
14.5 Configuring Basic Firewall Settings ................................................................185
14.6 Rule Summary ...............................................................................................186
14.6.1 Configuring Firewall Rules ....................................................................188
14.7 Customized Services .....................................................................................191
14.8 Creating/Editing A Customized Service .........................................................191
14.9 Example Firewall Rule ...................................................................................192
14.10 Predefined Services .....................................................................................196
14.11 Anti-Probing ..................................................................................................198
14.12 DoS Thresholds ...........................................................................................199
14.12.1 Threshold Values ................................................................................200
14.12.2 Half-Open Sessions ............................................................................200
14.12.2.1 TCP Maximum Incomplete and Blocking Time .........................200
Chapter 15
Content Filtering .................................................................................................. 203
15.1 Content Filtering Overview .............................................................................203
15.2 Configuring Keyword Blocking .......................................................................203
15.3 Configuring the Schedule ..............................................................................204
15.4 Configuring Trusted Computers .....................................................................205
Chapter 16
Introduction to IPSec ........................................................................................... 207
16.1 VPN Overview ................................................................................................207
16.1.1 IPSec ....................................................................................................207
16.1.2 Security Association .............................................................................207
16.1.3 Other Terminology ................................................................................207
16.1.3.1 Encryption ...................................................................................207
16.1.3.2 Data Confidentiality .....................................................................208
16.1.3.3 Data Integrity ...............................................................................208
16.1.3.4 Data Origin Authentication ..........................................................208
Przeglądanie stron 16
1 2 ... 12 13 14 15 16 17 18 19 20 21 22 ... 549 550

Komentarze do niniejszej Instrukcji

Brak uwag