User`s guide
Table of Contents
XSR-1805 User’s Guide xxix
Fragmented ICMP Traffic.................................................................................... 318
Large ICMP Packets ............................................................................................. 318
Ping of Death Attack ............................................................................................ 318
Spurious State Transition.............................................................................................318
General Security Precautions .............................................................................................319
AAA Services........................................................................................................................320
Connecting Remotely via SSH or Telnet with AAA Service ..................................322
Firewall Feature Set Overview...........................................................................................325
Reasons for Installing a Firewall ................................................................................325
Types of Firewalls .........................................................................................................327
ACL and Packet Filter Firewalls......................................................................... 327
ALG and Proxy Firewalls.................................................................................... 327
Stateful Inspection Firewalls............................................................................... 328
XSR Firewall Feature Set Functionality ............................................................................329
Firewall CLI Commands.....................................................................................................334
Firewall Limitations.............................................................................................................339
Pre-configuring the Firewall...............................................................................................342
Steps to Configure the Firewall..........................................................................................342
Configuration Examples .....................................................................................................343
XSR with Firewall .........................................................................................................343
XSR with Firewall, PPPoE and DHCP.......................................................................346
XSR with Firewall and VPN........................................................................................348
Firewall Configuration for VRRP ...............................................................................356
Firewall Configuration for RADIUS Authentication and Accounting .................356
Configuring Simple Security.......................................................................................357