beautypg.com

ZyXEL Communications P-660HW-D Series User Manual

Page 16

background image

P-660HW-D Series User’s Guide

15

Table of Contents

10.4.2 Alerts .....................................................................................................157

10.5 General Firewall Policy ...............................................................................157
10.6 Firewall Rules Summary ...............................................................................158

10.6.1 Configuring Firewall Rules ..................................................................160
10.6.2 Customized Services ...........................................................................163
10.6.3 Configuring A Customized Service .....................................................164

10.7 Example Firewall Rule ...................................................................................164
10.8 Predefined Services .......................................................................................168
10.9 Anti-Probing ..................................................................................................170
10.10 DoS Thresholds ..........................................................................................171

10.10.1 Threshold Values ................................................................................171
10.10.2 Half-Open Sessions ............................................................................172

10.10.2.1 TCP Maximum Incomplete and Blocking Time .........................172

10.10.3 Configuring Firewall Thresholds .........................................................173

Chapter 11
Content Filtering ..................................................................................................
176

11.1 Content Filtering Overview ............................................................................176
11.2 Configuring Keyword Blocking .....................................................................176
11.3 Configuring the Schedule .............................................................................177
11.4 Configuring Trusted Computers ...................................................................178

Chapter 12
Static Route ..........................................................................................................
180

12.1 Static Route .................................................................................................180
12.2 Configuring Static Route ...............................................................................180

12.2.1 Static Route Edit .................................................................................181

Chapter 13
Bandwidth Management ......................................................................................
184

13.1 Bandwidth Management Overview ...............................................................184
13.2 Application-based Bandwidth Management ...................................................184
13.3 Subnet-based Bandwidth Management .........................................................184
13.4 Application and Subnet-based Bandwidth Management ...............................185
13.5 Scheduler .......................................................................................................185

13.5.1 Priority-based Scheduler ......................................................................186
13.5.2 Fairness-based Scheduler ....................................................................186

13.6 Maximize Bandwidth Usage ...........................................................................186

13.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic ........................186
13.6.2 Maximize Bandwidth Usage Example ..................................................187

13.6.2.1 Priority-based Allotment of Unused and Unbudgeted Bandwidth 187
13.6.2.2 Fairness-based Allotment of Unused and Unbudgeted Bandwidth ...

188