background image
iii
Table of Contents
1
Introduction...............................................1
1.1
Features ..................................................................................................................1
1.2
System Requirements............................................................................................1
1.3
Using this Document ..............................................................................................1
1.3.1
Notational conventions ................................................................................1
1.3.2
Typographical conventions .........................................................................1
1.3.3
Special messages........................................................................................1
2
Getting to Know the Internet Security
Router .......................................................3
2.1
Parts List .................................................................................................................3
2.2
Front Panel..............................................................................................................3
2.3
Rear Panel ..............................................................................................................3
2.4
Major Features........................................................................................................4
2.4.1
Firewall Features .........................................................................................4
2.4.1.1
Address Sharing and Management...............................................4
2.4.1.1
ACL (Access Control List) ..............................................................5
2.4.1.2
Stateful Packet Inspection ..............................................................5
2.4.1.3
Defense against DoS Attacks ........................................................5
2.4.1.4
Application Command Filtering ......................................................6
2.4.1.5
Application Level Gateway (ALG)..................................................6
2.4.1.6
URL Filtering....................................................................................6
2.4.1.7
Log and Alerts .................................................................................6
2.4.1.8
Remote Access ...............................................................................7
2.4.2
VPN...............................................................................................................7
3
Quick Start Guide.....................................9
3.1
Part 1
— Connecting the Hardware......................................................................9
3.1.1
Step 1. Connect an ADSL or a cable modem. ..........................................9
3.1.2
Step 2. Connect computers or a LAN. .......................................................9
3.1.3
Step 3. Attach the power adapter. ..............................................................9