ZyXEL Communications P-2602HW(L) Series User Manual
Page 15
P-2602H(W)(L)-DxA Series User’s Guide
Table of Contents
15
13.7.1.1 When To Use Filtering .................................................................192
13.7.2.1 When To Use The Firewall ..........................................................192
14.1 Access Methods .............................................................................................193
14.2 Firewall Policies Overview ............................................................................193
14.3 Rule Logic Overview .....................................................................................194
14.3.1 Rule Checklist .......................................................................................194
14.3.2 Security Ramifications ..........................................................................194
14.3.3 Key Fields For Configuring Rules .........................................................195
14.5 General Firewall Policy ...............................................................................196
14.6 Firewall Rules Summary ...............................................................................197
14.6.1 Configuring Firewall Rules ...................................................................199
14.6.2 Customized Services ............................................................................202
14.6.3 Configuring A Customized Service ......................................................202
14.7 Example Firewall Rule ...................................................................................203
14.8 DoS Thresholds ............................................................................................207
14.8.1 Threshold Values ..................................................................................207
14.8.2 Half-Open Sessions ..............................................................................208
14.8.2.1 TCP Maximum Incomplete and Blocking Time ...........................208
15.1 Content Filtering Overview ............................................................................211
15.2 Configuring Keyword Blocking .....................................................................211
15.3 Configuring the Schedule .............................................................................212
15.4 Configuring Trusted Computers ...................................................................213