ZyXEL Communications ADSL 2+ Gateway P-660HW-T1 User Manual
Page 14
P-660H/HW/W-T Series User’ Guide
Table of Contents
14
11.1 Access Methods .............................................................................................132
11.2 Firewall Policies Overview .............................................................................132
11.3 Rule Logic Overview .....................................................................................133
11.3.1 Rule Checklist .......................................................................................133
11.3.2 Security Ramifications ..........................................................................133
11.3.3 Key Fields For Configuring Rules .........................................................134
11.4.1 LAN to WAN Rules ................................................................................134
11.4.2 Alerts .....................................................................................................135
11.5 Configuring Default Firewall Policy ..............................................................135
11.6 Rule Summary ..............................................................................................136
11.7 Customized Services .....................................................................................141
11.8 Configuring A Customized Service ...............................................................141
11.9 Example Firewall Rule ....................................................................................142
11.10 Predefined Services .....................................................................................146
11.11 Anti-Probing .................................................................................................148
11.12 DoS Thresholds ...........................................................................................149
11.12.2.1 TCP Maximum Incomplete and Blocking Time ..........................150
11.12.3 Configuring Firewall Thresholds .........................................................151
12.1 Content Filtering Overview ............................................................................154
12.2 The Main Content Filter Screen .....................................................................154
12.3 Configuring Keyword Blocking .....................................................................155
12.4 Configuring the Schedule .............................................................................156
12.5 Configuring Trusted Computers ...................................................................156
13.1.1 Remote Management Limitations .........................................................158
13.1.2 Remote Management and NAT ............................................................159
13.1.3 System Timeout ...................................................................................159