Specifications
77
Chapter 7: Security Configuration
The Security Configuration chapter covers:
Firewall Configuration
Firewall Logs
Packet Filtering
URL Filtering
Multicast Filtering
The access point makes use of Packet Filtering and Stateful Packet
Inspection (SPI) to examine each message entering or leaving your LAN
and block those that do not satisfy your specified security criteria.
Packet Filtering allows you to define security filter rules such that
packets that make it through the filter rules are processed as per
normal, while those that do not are discarded.
SPI compares the packet content to a database of trusted information
instead of only checking the packet header, before letting it through.
Security Level
Depending on the amount of protection you require, you can
determine the level of security to implement: Low, Medium, and High.
Log Information
The access point allows you to keep a record of data packets that
have been allowed and/or that have been refused through the
firewall.
By customising the data traffic to record and reviewing the log files at
regular intervals, you can monitor the system’s performance and
identify irregularities.
The following lists the usual types of data packets encountered.
TCP (Transmission Control Protocol) packets are exchanged
between hosts to establish a connection and exchange data.
UDP (User Datagram Protocol) packets are primarily used for
broadcasting messages and in streaming audio/video information.
ICMP (Internet Control Message Protocol) packets pertaining to
error or control information are exchanged between access points.
IGMP (Internet Group Management Protocol) packets are sent to
establish host memberships such as multicast groups on the LAN.