ZyXEL Communications P-660HW-D Series User Manual
Page 16

P-660HW-D Series User’s Guide
15
Table of Contents
10.5 General Firewall Policy ...............................................................................157
10.6 Firewall Rules Summary ...............................................................................158
10.6.1 Configuring Firewall Rules ..................................................................160
10.6.2 Customized Services ...........................................................................163
10.6.3 Configuring A Customized Service .....................................................164
10.7 Example Firewall Rule ...................................................................................164
10.8 Predefined Services .......................................................................................168
10.9 Anti-Probing ..................................................................................................170
10.10 DoS Thresholds ..........................................................................................171
10.10.1 Threshold Values ................................................................................171
10.10.2 Half-Open Sessions ............................................................................172
10.10.2.1 TCP Maximum Incomplete and Blocking Time .........................172
10.10.3 Configuring Firewall Thresholds .........................................................173
11.1 Content Filtering Overview ............................................................................176
11.2 Configuring Keyword Blocking .....................................................................176
11.3 Configuring the Schedule .............................................................................177
11.4 Configuring Trusted Computers ...................................................................178
13.1 Bandwidth Management Overview ...............................................................184
13.2 Application-based Bandwidth Management ...................................................184
13.3 Subnet-based Bandwidth Management .........................................................184
13.4 Application and Subnet-based Bandwidth Management ...............................185
13.5 Scheduler .......................................................................................................185
13.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic ........................186
13.6.2 Maximize Bandwidth Usage Example ..................................................187
13.6.2.1 Priority-based Allotment of Unused and Unbudgeted Bandwidth 187
13.6.2.2 Fairness-based Allotment of Unused and Unbudgeted Bandwidth ...