Filter Configuration Steps ...............................................................................................720
Filter Configuration Flow.................................................................................................722
Filter Configuration Commands......................................................................................723
Filter Show Commands ..................................................................................................727
Filter Deletion Commands..............................................................................................729
Filter Clear Commands...................................................................................................730
Filter Debug Commands.................................................................................................731
L2 (Layer2) Filter Configuration Commands ..................................................................732
L2 Filter Show Commands .............................................................................................735
L2 Filter Clear Commands..............................................................................................736
Sample Examples of Configuring Filters on OmniAccess 5740 USG ............................737
Managing Security Configuration..........................................................................................738
Insertions........................................................................................................................738
Updations .......................................................................................................................739
Network Attacks - An Overview.............................................................................................741
Types of Network Attacks...............................................................................................741
Default Attacks (Rate-limiting / Stateful).........................................................................742
Default Attacks (Non-rate Limiting / Stateless)...............................................................744
Optional Attacks .............................................................................................................746
Network Attack Prevention Configuration .............................................................................748
Network Attack Prevention Configuration Steps.............................................................748
Network Attack Prevention Configuration Flow ..............................................................750
Network Attack Prevention Configuration Commands ...................................................751
Firewall Show Commands..............................................................................................761
Firewall Debug Commands ............................................................................................768
Sample Firewall Policy Configurations on OmniAccess 5740 USG ...............................769
Zone Configuration................................................................................................................771
Trusted Zone Configuration............................................................................................771
Untrusted Zone Configuration ........................................................................................771
Semi-trusted Zone or Demilitarized Zone.......................................................................772
Three Zone Firewall Example.........................................................................................773
Example 2: Simple Zone Configuration in OmniAccess 5740 USG ...............................781
Time-range/Timer Configuration...........................................................................................783
Time-range Configuration Commands ...........................................................................783
Time-range Show Command..........................................................................................784
ALGs Supported in OmniAccess 5740 USG.........................................................................785
ALG Configuration Commands.......................................................................................787
Customized-service Rule Based ALG Configuration ............................................................794
Customizing ALG Commands ........................................................................................794
Typical Rule Based ALG and DNAT Example Using OmniAccess 5740 USG.....................797
Security - Best Practices.......................................................................................................799
Rules for Configuring Packet Filters...............................................................................799
32 IP Security - Virtual Private Network ........................................................803
Chapter Conventions......................................................................................................804
IPsec VPN Overview.............................................................................................................805