ZyXEL Communications 792H User Manual
Page 16
Prestige 792H G.SHDSL Router
x Table of Contents
8.7.2
Firewall ....................................................................................................................................8-13
Chapter 9 Firewall Configuration ..............................................................................................................9-1
9.1
Remote Management and the Firewall ......................................................................................9-1
9.2
Enabling the Firewall.................................................................................................................9-1
9.3
Configuring E-mail Alerts .........................................................................................................9-2
9.4
Attack Alert................................................................................................................................9-3
9.4.1
Alerts..........................................................................................................................................9-4
9.4.2
Threshold Values .......................................................................................................................9-4
9.4.3
Half-Open Sessions....................................................................................................................9-4
Chapter 10 Creating Custom Rules .........................................................................................................10-1
10.1
Rules Overview........................................................................................................................10-1
10.2
Rule Logic Overview...............................................................................................................10-1
10.2.1
Rule Checklist..........................................................................................................................10-1
10.2.2
Security Ramifications.............................................................................................................10-2
10.2.3
Key Fields For Configuring Rules ...........................................................................................10-2
10.3
Connection Direction ...............................................................................................................10-3
10.3.1
LAN to WAN Rules.................................................................................................................10-3
10.3.2
WAN to LAN Rules.................................................................................................................10-4
10.4
Logs .........................................................................................................................................10-4
10.5
Rule Summary .........................................................................................................................10-6
10.6
Predefined Services..................................................................................................................10-8
10.7
Creating/Editing Firewall Rules.............................................................................................10-11
10.7.1
Source and Destination Addresses.........................................................................................10-13
10.8
Timeout..................................................................................................................................10-14
10.8.1
Factors Influencing Choices for Timeout Values ..................................................................10-15
Chapter 11 Customized Services .............................................................................................................. 11-1
11.1
Introduction to Customized Services .......................................................................................11-1
11.2
Creating/Editing A Customized Service ..................................................................................11-2
11.3
Example Custom Service Firewall Rule ..................................................................................11-3
Chapter 12 Content Filtering....................................................................................................................12-1
12.1
Content Filtering Overview .....................................................................................................12-1
12.2
Configuring Keyword Blocking...............................................................................................12-1
12.3
Configuring the Schedule ........................................................................................................12-3
12.4
Configuring Trusted Computers ..............................................................................................12-4
12.5
Configuring Logs.....................................................................................................................12-5
Chapter 13 Introduction to IPSec.............................................................................................................13-1
13.1
VPN Overview.........................................................................................................................13-1
13.1.1
IPSec ........................................................................................................................................13-1
13.1.2
Security Association ................................................................................................................13-1
13.1.3
Other Terminology...................................................................................................................13-1
13.1.4
VPN Applications ....................................................................................................................13-2