Prestige 662H/HW Series User’s Guide
14.3.3.3 Source Address ...........................................................................
160
14.3.3.4 Destination Address ....................................................................
161
14.4
Connection Direction Example .......................................................................
14.4.1 LAN to WAN Rules ...............................................................................
14.4.2 WAN to LAN Rules ...............................................................................
14.4.3 Alerts .....................................................................................................
162
14.5
Configuring Basic Firewall Settings ................................................................
14.6
Rule Summary ...............................................................................................
164
14.6.1 Configuring Firewall Rules ....................................................................
165
14.7
Customized Services .....................................................................................
168
14.8
Creating/Editing A Customized Service .........................................................
14.9
Example Firewall Rule ...................................................................................
169
14.10 Predefined Services .....................................................................................
173
14.11 Anti-Probing ..................................................................................................
175
14.12 Configuring Attack Alert ...............................................................................
176
14.12.1 Threshold Values ................................................................................
177
14.12.2 Half-Open Sessions ............................................................................
14.12.2.1 TCP Maximum Incomplete and Blocking Time .........................
Chapter 15
180
15.1
Content Filtering Overview .............................................................................
15.2
Configuring Keyword Blocking .......................................................................
15.3
Configuring the Schedule ..............................................................................
181
15.4
Configuring Trusted Computers .....................................................................
182
Chapter 16
184
16.1
Content Access Control Overview .................................................................
16.1.1 Content Access Control WLAN Application ..........................................
16.1.2 Configuration Steps ..............................................................................
16.2
Activating CAC and Create User Groups .......................................................
185
16.2.1 Configuring Time Schedule ..................................................................
186
16.2.2 Configuring Services .............................................................................
188
16.2.2.1 Available Services .......................................................................
189
16.2.3 Configuring Web Site Filters .................................................................
191
16.2.4 Testing Web Site Access Privileges ......................................................
197
16.3
User Account Setup .......................................................................................
198
16.4
User Online Status .........................................................................................
200
16.5
Content Access Control Logins ......................................................................
201
16.5.1 User Login ............................................................................................
16.5.2 Administrator Login ...............................................................................
202
13