Compex Technologies 18A 用户手册

下载
页码 204
 
 
110 
 
Chapter 9: Security Configuration 
 
The Security Configuration chapter covers: 
 
Firewall Configuration 
 
Firewall Logs 
 
Packet Filtering 
 
URL Filtering 
 
Multicast Filtering 
 
The router makes use of Packet Filtering and Stateful Packet Inspection 
(SPI) to examine each message entering or leaving your LAN and block 
those that do not satisfy your specified security criteria. Packet Filtering 
allows you to define security filter rules such that packets that make it 
through the filter rules are processed as per normal, while those that do 
not are discarded.  
 
SPI compares the packet content to a database of trusted information 
instead of only checking the packet header, before letting it through.  
 
Security Level 
Depending on the amount of protection you require, you can 
determine the level of security to implement: Low, Medium, and High.  
 
Log Information 
The router allows you to keep a record of data packets that have been 
allowed and/or that have been refused through the firewall.  
 
By customising the data traffic to record and reviewing the log files at 
regular intervals, you can monitor the system’s performance and 
identify irregularities. 
 
The following lists the usual types of data packets encountered. 
 
TCP  (Transmission Control Protocol) packets are exchanged 
between hosts to establish a connection and exchange data.  
 
UDP  (User Datagram Protocol) packets are primarily used for 
broadcasting messages and in streaming audio/video information. 
 
ICMP  (Internet Control Message Protocol) packets pertaining to 
error or control information are exchanged between access points. 
 
IGMP  (Internet Group Management Protocol) packets are sent to 
establish host memberships such as multicast groups on the LAN.