
P-202H Plus v2 User’s Guide
11 Table of Contents
9.3.1 Alerts .........................................................................................................90
9.3.2 Threshold Values ......................................................................................90
9.3.3 Half-Open Sessions ..................................................................................91
9.3.3.1 TCP Maximum Incomplete and Blocking Time ...............................91
9.3.4 Configuring Firewall Alert .........................................................................91
9.4 Rules Overview ..................................................................................................93
9.5 Rule Logic Overview .........................................................................................93
9.5.1 Rule Checklist ...........................................................................................94
9.5.2 Security Ramifications ..............................................................................94
9.5.3 Key Fields For Configuring Rules .............................................................94
9.5.3.1 Action ..............................................................................................94
9.5.3.2 Service ............................................................................................94
9.5.3.3 Source Address ...............................................................................95
9.5.3.4 Destination Address ........................................................................95
9.6 Connection Direction ..........................................................................................95
9.6.1 LAN to WAN Rules ...................................................................................95
9.6.2 WAN to LAN Rules ...................................................................................95
9.7 Firewall Rules Summary ...................................................................................95
9.7.1 Configuring Firewall Rules ......................................................................97
9.7.2 Source and Destination Addresses ..........................................................99
9.7.3 Customized Services .............................................................................100
9.7.4 Configuring A Customized Service .......................................................101
9.8 Timeout ............................................................................................................101
9.8.1 Factors Influencing Choices for Timeout Values .....................................102
9.9 Logs Screen .....................................................................................................103
9.10 Example Firewall Rule ...................................................................................104
9.11 Predefined Services .......................................................................................107
Chapter 10
Introduction to IPSec ........................................................................................... 110
10.1 VPN Overview ................................................................................................110
10.1.1 IPSec ....................................................................................................110
10.1.2 Security .................................................................................................110
10.1.3 Other Terminology ................................................................................ 110
10.1.3.1 Encryption ...................................................................................110
10.1.3.2 Data Confidentiality ..................................................................... 111
10.1.3.3 Data Integrity ............................................................................... 111
10.1.3.4 Data Origin Authentication .......................................................... 111
10.1.4 VPN Applications .................................................................................. 111
10.2 IPSec Architecture ......................................................................................... 111
10.2.1 IPSec Algorithms .................................................................................. 112
10.2.2 Key Management ..................................................................................112
10.3 Encapsulation .................................................................................................112