User's Manual

23
Security > Firewall
The Firewall screen is used to configure a firewall that can filter out various types of
unwanted traffic on the Router’s local network.
Firewall
Intrusion Detection Protection To use Intrusion Detection System (IDS) and Denial of Service
(DoS) protection, select Enabled. Otherwise, keep the default, Disabled.
Web Content Filtering To filter web content, keep the default, Enabled. Otherwise, select
Disabled. (This feature must be enabled to use the Website Blocking options on the Access
Restrictions > Internet Access Policy screen.)
Max Firewall Sessions Enter the maximum number of firewall sessions that will be processed
at any given time.
Max QoS Sessions Enter the maximum number of QoS sessions that will be processed at any
given time.
SIP ALG The SIP ALG feature assists VoIP phones behind the Router when NAT problems are
encountered. This feature also assists QoS (when enabled) with automatic classification of SIP-
and RTP-related traffic. To use the SIP ALG feature, keep the default, Enabled. Otherwise, select
Disabled.
Firewall Profile
Apply Firewall Profile For a low level of firewall protection, keep the default, Low. For a high
level of firewall protection, select High. To disable the firewall, select Off.
To configure user-based security rules, click Access Restrictions. (Refer to the “Access
Restrictions > Internet Access Policy” section for details.)
Click Save Settings to apply your changes, or click Cancel Changes to cancel your
changes.
Security > Certificates
Local Certificates: This section shows the certificates associated with the router and allows
you to import certificates.
CA Certificates: This section shows the certificates of a certificate authority chain and allows you
to import certificates.
Certificate Request: Click here to generate a certificate request, which can be filed to CA.
Security > VPN
VPN: Choose whether to enable or disable VPN.
Local Domain Name: Type the FQDN (domain name) of the router for IKE phase 1 negotiation.
Local Email Address: Type the user-FQDN(email address) of the router for IKE phase 1
negotiation.
View IKE Status: Click to view the IKE negotiation status of the configured endpoints.
VPN Log: Click to view the IKE negotiation log.
IPSec VPN Tunnel: This section shows the IPsec tunnel (endpoint) configuration.
IKE Proposal: This section shows a predefined parameter set for IKE negotiation, which can be
associated with a specific IPsec tunnel.
Security > Firewall
Security > Certificates
Security > VPN
DRAFT - 6/25/201
0