
6. Firewall ....................................................................................................58
Incoming access ..................................................................................................58
Outgoing access ..................................................................................................62
Firewall rules........................................................................................................63
Intrusion detection and blocking ..........................................................................64
Content filtering....................................................................................................66
7. Virtual Private Networking .....................................................................69
PPTP client setup ................................................................................................70
PPTP server setup...............................................................................................72
IPSec setup .........................................................................................................85
IPSec interoperability...........................................................................................90
8. System.....................................................................................................91
Time server..........................................................................................................91
Password .............................................................................................................91
Diagnostics ..........................................................................................................92
Advanced.............................................................................................................92
Flash upgrade......................................................................................................93
RESET button......................................................................................................93
9. Technical support .......................................................................................94
Appendix A – LED status patterns.................................................................95
Appendix B – System Log ..............................................................................96
Access Logging ...................................................................................................96
Creating Custom Log Rules.................................................................................98
Rate Limiting......................................................................................................101
Administrative Access Logging..........................................................................101
Boot Log Messages ...........................................................................................102
Introduction