ZyXEL Communications Prestige 2602R Series User Manual
Page 14
Prestige 2602R Series User’s Guide
14
Table of Contents
12.5.3 TCP Security .........................................................................................143
12.5.4 UDP/ICMP Security ..............................................................................144
12.5.5 Upper Layer Protocols ..........................................................................144
12.6 Guidelines for Enhancing Security with Your Firewall ....................................144
12.7.1.1 When To Use Filtering .................................................................146
12.7.2.1 When To Use The Firewall ..........................................................146
13.1 Access Methods .............................................................................................149
13.2 Firewall Policies Overview .............................................................................149
13.3 Rule Logic Overview ......................................................................................150
13.3.1 Rule Checklist .......................................................................................150
13.3.2 Security Ramifications ..........................................................................150
13.3.3 Key Fields For Configuring Rules .........................................................151
13.5 Configuring Basic Firewall Settings ................................................................153
13.6 Rule Summary ...............................................................................................154
13.7 Customized Services .....................................................................................158
13.8 Creating/Editing A Customized Service .........................................................158
13.9 Example Firewall Rule ...................................................................................159
13.10 Predefined Services .....................................................................................163
13.11 Anti-Probing ..................................................................................................165
13.12 DoS Thresholds ...........................................................................................166
13.12.2.1 TCP Maximum Incomplete and Blocking Time .........................167