ZyXEL Communications P-2602HWLNI User Manual
Page 18
Table of Contents
P-2602HWLNI User’s Guide
18
15.5 General Firewall Policy ................................................................................................... 248
15.6 Firewall Rules Summary ................................................................................................. 249
15.6.1 Configuring Firewall Rules ................................................................................... 251
15.6.2 Customized Services ............................................................................................ 254
15.6.3 Configuring a Customized Service ....................................................................... 254
15.7 Example Firewall Rule ..................................................................................................... 255
15.8 DoS Thresholds .............................................................................................................. 259
15.8.1 Threshold Values ................................................................................................... 259
15.8.2 Half-Open Sessions ............................................................................................... 260
15.8.3 Configuring Firewall Thresholds ............................................................................. 260
16.1 Content Filtering Overview ............................................................................................. 265
16.2 Configuring Keyword Blocking ........................................................................................ 265
16.3 Configuring the Schedule .............................................................................................. 266
16.4 Configuring Trusted Computers ..................................................................................... 267
17.1.1 IPSec ...................................................................................................................... 269
17.1.2 Security Association ............................................................................................... 269
17.1.3 Other Terminology .................................................................................................. 269
17.1.4 VPN Applications ................................................................................................... 270