beautypg.com

ZyXEL Communications Prestige 2602R Series User Manual

Page 14

background image

Prestige 2602R Series User’s Guide

14

Table of Contents

12.5.3 TCP Security .........................................................................................143
12.5.4 UDP/ICMP Security ..............................................................................144
12.5.5 Upper Layer Protocols ..........................................................................144

12.6 Guidelines for Enhancing Security with Your Firewall ....................................144

12.6.1 Security In General ...............................................................................145

12.7 Packet Filtering Vs Firewall ............................................................................146

12.7.1 Packet Filtering: ....................................................................................146

12.7.1.1 When To Use Filtering .................................................................146

12.7.2 Firewall .................................................................................................146

12.7.2.1 When To Use The Firewall ..........................................................146

Chapter 13
Firewall Configuration .........................................................................................
149

13.1 Access Methods .............................................................................................149
13.2 Firewall Policies Overview .............................................................................149
13.3 Rule Logic Overview ......................................................................................150

13.3.1 Rule Checklist .......................................................................................150
13.3.2 Security Ramifications ..........................................................................150
13.3.3 Key Fields For Configuring Rules .........................................................151

13.3.3.1 Action ..........................................................................................151
13.3.3.2 Service ........................................................................................151
13.3.3.3 Source Address ...........................................................................151
13.3.3.4 Destination Address ....................................................................151

13.4 Connection Direction Example .......................................................................151

13.4.1 LAN to WAN Rules ...............................................................................152
13.4.2 WAN to LAN Rules ...............................................................................152
13.4.3 Alerts .....................................................................................................152

13.5 Configuring Basic Firewall Settings ................................................................153
13.6 Rule Summary ...............................................................................................154

13.6.1 Configuring Firewall Rules ....................................................................155

13.7 Customized Services .....................................................................................158
13.8 Creating/Editing A Customized Service .........................................................158
13.9 Example Firewall Rule ...................................................................................159
13.10 Predefined Services .....................................................................................163
13.11 Anti-Probing ..................................................................................................165
13.12 DoS Thresholds ...........................................................................................166

13.12.1 Threshold Values ................................................................................167
13.12.2 Half-Open Sessions ............................................................................167

13.12.2.1 TCP Maximum Incomplete and Blocking Time .........................167

Chapter 14
Content Filtering ..................................................................................................
171

14.1 Content Filtering Overview .............................................................................171