ZyXEL Communications P-2802H(W)(L)-I Series User Manual
Page 15
Table of Contents
P-2802H(W)(L)-I Series User’s Guide
15
11.1.1 Stateful Inspection Firewall ..................................................................................... 155
11.1.2 About the ZyXEL Device Firewall ........................................................................... 155
11.1.3 Guidelines For Enhancing Security With Your Firewall .......................................... 156
11.2 General Firewall Policy Overview ................................................................................... 156
11.3 Security Considerations ................................................................................................... 158
11.4 Triangle Route ................................................................................................................. 158
11.4.1 The “Triangle Route” Problem ................................................................................ 158
11.4.2 Solving the “Triangle Route” Problem .................................................................... 159
11.5 General Firewall Policy ................................................................................................... 160
11.6 Firewall Rules Summary ................................................................................................. 161
11.6.1 Configuring Firewall Rules ................................................................................... 163
11.6.2 Customized Services ............................................................................................. 166
11.6.3 Configuring A Customized Service ....................................................................... 166
11.7 Example Firewall Rule ..................................................................................................... 167
11.8 Firewall Thresholds ......................................................................................................... 171
12.1 Content Filtering Overview ............................................................................................. 175
12.2 Configuring Keyword Blocking ....................................................................................... 175
12.3 Configuring the Schedule .............................................................................................. 176
12.4 Configuring Trusted Computers ..................................................................................... 177
13.1.1 IPSec ...................................................................................................................... 179
13.1.2 Security Association ............................................................................................... 179
13.1.3 Other Terminology .................................................................................................. 179
13.1.4 VPN Applications ................................................................................................... 180