ZyXEL Communications ZyXEL ZyWALL 5 User Manual
Page 12

ZyWALL 5 User’s Guide
11
9.7.2.1 When To Use The Firewall ............................................................164
10.1 Access Methods .............................................................................................165
10.2 Firewall Policies Overview .............................................................................165
10.3 Rule Logic Overview ......................................................................................166
10.3.1 Rule Checklist .......................................................................................166
10.3.2 Security Ramifications ..........................................................................167
10.3.3 Key Fields For Configuring Rules .........................................................167
10.6.1 Rule Summary ......................................................................................172
10.6.2 Configuring Firewall Rules ....................................................................173
10.6.3 Configuring Custom Services ...............................................................176
10.7 Example Firewall Rule ...................................................................................176
10.8 Predefined Services .......................................................................................180
10.9 Anti-Probing ...................................................................................................182
10.10 DoS Thresholds ...........................................................................................183
10.10.2.1 TCP Maximum Incomplete and Blocking Time .........................184
11.2 General Content Filter Configuration ..............................................................187
11.3 Content Filtering with an External Database ..................................................190
11.4 Categories and Registering ............................................................................190
11.5 Customization .................................................................................................197
11.6 Customizing Keyword Blocking URL Checking ..............................................200
11.6.1 Domain Name or IP Address URL Checking ........................................200