Quick Reference Guide

ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
Index-8
v1.0, January 2010
rules
blocking traffic 5-2
inbound 5-4
inbound example 5-12
outbound 5-3
service blocking 5-3
services-based 5-2
running tracert 9-12
S
SA
IKE policies 6-14, 6-17
VPN policies 6-25, 6-26
schedule
blocking traffic 5-24
Schedule 1 screen 5-24
secondary IP addresses
DHCP, use with 3-11
Secondary LAN IPs
see Multi Home LAN IPs 3-10
Secure Hash Algorithm 1. See SHA-1.
security
network enhancements 4-3
WPA 4-3
WPA-PSK 4-3
security association. See SA.
security options
WEP data encryption 4-3
WPA-PSK 4-3
Security Parameters Index. See SPI.
self certificate request 8-14
Send To E-mail Address 10-3
service 5-19
Service Based Rules 5-2
service blocking 5-3
Outbound Rules 5-2
port filtering 5-3
reducing traffic 9-2
service numbers
common protocols 5-19
Services 5-19
Services menu 5-20
Session Initiation Protocol. See SIP.
Session Limits screen 5-17
Setting Up One-to-One NAT Mapping
example of 5-12
Settings Backup & Upgrade screen 9-14
Settings Backup and Firmware Upgrade 9-14
SHA-1
IKE policies 6-17
VPN policies 6-26
Simple Network Management Protocol. See SNMP.
SIP 5-18
sniffer 11-3
SNMP
about 9-12
configuring 9-12
global access 9-13
host only access 9-13
subnet access 9-13
SNMP screen 9-12
Source MAC Filter screen 5-28, 5-30
Source MAC Filtering
enabling
5-28
reducing traffic 9-4
Specifying an Exposed Host
example of 5-13
SPI 6-25
split tunnel
configuring 7-12
description 7-11
spoof MAC address 11-5
SSID 1-4
11a default name 4-5
11b/g default name 4-5
disabling, consequences of 4-3
SSL VPN Client
description 7-2
Starting IP Address
DHCP Address Pool 3-4
Stateful Packet Inspection
firewall, use with 5-2
stateful packet inspection. See SPI.
Static 3-11