ZyXEL Communications P-661H Series User Manual
Page 16
P-661H/HW Series User’s Guide
16
Table of Contents
9.5.1 The “Triangle Route” Problem ................................................................160
9.5.2 Solving the “Triangle Route” Problem .....................................................161
9.6 General Firewall Policy .................................................................................162
9.7 Firewall Rules Summary .................................................................................163
9.7.1 Configuring Firewall Rules ....................................................................164
9.7.2 Customized Services .............................................................................167
9.7.3 Configuring A Customized Service ........................................................168
9.8 Example Firewall Rule .....................................................................................168
9.9 Predefined Services .........................................................................................172
9.10 Anti Probing ....................................................................................................174
9.11 DoS Thresholds .............................................................................................175
9.11.1 Threshold Values ..................................................................................175
9.11.2 Half-Open Sessions ..............................................................................176
9.11.2.1 TCP Maximum Incomplete and Blocking Time ............................176
10.2 Configuring TMSS on the ZyXEL Device .......................................................182
10.2.1 General TMSS Settings ........................................................................182
10.2.2 TMSS Exception List ............................................................................184
10.3 TMSS Virus Protection ...................................................................................185
10.4 Parental Controls ...........................................................................................186
11.1 Content Filtering Overview ............................................................................193
11.2 Configuring Keyword Blocking ......................................................................193
11.3 Configuring the Schedule ..............................................................................194
11.4 Configuring Trusted Computers ....................................................................195