7.5 IPv6-Firewall..........................................................................................................................................451
7.5.1 Funktion................................................................................................................................451
7.5.2 Konfiguration.........................................................................................................................451
7.8 IPv6-Konfigurationsmenü.......................................................................................................................456
7.8.1 Allgemein..............................................................................................................................456
7.8.2 Router-Advertisement............................................................................................................461
7.8.3 DHCPv6.................................................................................................................................465
7.8.4 Tunnel....................................................................................................................................473
7.9 Tutorials.................................................................................................................................................474
8 Firewall...........................................................................................................................500
8.1 Gefährdungsanalyse..............................................................................................................................500
8.1.1 Die Gefahren..........................................................................................................................500
8.1.2 Die Wege der Täter................................................................................................................500
8.1.3 Die Methoden........................................................................................................................501
8.1.4 Die Opfer...............................................................................................................................501
8.2 Was ist eine Firewall?.............................................................................................................................502
8.3 Die Firewall im Gerät.............................................................................................................................506
8.3.2 Besondere Protokolle.............................................................................................................509
8.5.1 Regel-Tabelle.........................................................................................................................528
8.5.2 Objekttabelle.........................................................................................................................529
8.5.3 Aktionstabelle........................................................................................................................530
8.6 Firewall-Diagnose..................................................................................................................................530
8.6.1 Die Firewall-Tabelle................................................................................................................530
8.7 Grenzen der Firewall..............................................................................................................................535
Referenzhandbuch
Inhalt
9