beautypg.com

ZyXEL Communications Prestige 2602H Series User Manual

Page 17

background image

Prestige 2602H/HW Series User’s Guide

Table of Contents

17

14.2 Firewall Policies Overview .............................................................................181
14.3 Rule Logic Overview ......................................................................................182

14.3.1 Rule Checklist .......................................................................................182
14.3.2 Security Ramifications ..........................................................................182
14.3.3 Key Fields For Configuring Rules .........................................................183

14.3.3.1 Action ..........................................................................................183
14.3.3.2 Service ........................................................................................183
14.3.3.3 Source Address ...........................................................................183
14.3.3.4 Destination Address ....................................................................183

14.4 Connection Direction Example .......................................................................183

14.4.1 LAN to WAN Rules ...............................................................................184
14.4.2 WAN to LAN Rules ...............................................................................184
14.4.3 Alerts .....................................................................................................185

14.5 Configuring Basic Firewall Settings ................................................................185
14.6 Rule Summary ...............................................................................................186

14.6.1 Configuring Firewall Rules ....................................................................188

14.7 Customized Services .....................................................................................191
14.8 Creating/Editing A Customized Service .........................................................191
14.9 Example Firewall Rule ...................................................................................192
14.10 Predefined Services .....................................................................................196
14.11 Anti-Probing ..................................................................................................198
14.12 DoS Thresholds ...........................................................................................199

14.12.1 Threshold Values ................................................................................200
14.12.2 Half-Open Sessions ............................................................................200

14.12.2.1 TCP Maximum Incomplete and Blocking Time .........................200

Chapter 15
Content Filtering ..................................................................................................
203

15.1 Content Filtering Overview .............................................................................203
15.2 Configuring Keyword Blocking .......................................................................203
15.3 Configuring the Schedule ..............................................................................204
15.4 Configuring Trusted Computers .....................................................................205

Chapter 16
Introduction to IPSec ...........................................................................................
207

16.1 VPN Overview ................................................................................................207

16.1.1 IPSec ....................................................................................................207
16.1.2 Security Association .............................................................................207
16.1.3 Other Terminology ................................................................................207

16.1.3.1 Encryption ...................................................................................207
16.1.3.2 Data Confidentiality .....................................................................208
16.1.3.3 Data Integrity ...............................................................................208
16.1.3.4 Data Origin Authentication ..........................................................208