P-662H/HW-D Series User’s Guide
11.3 Rule Logic Overview ......................................................................................
182
11.3.1 Rule Checklist .......................................................................................
11.3.2 Security Ramifications ..........................................................................
11.3.3 Key Fields For Configuring Rules .........................................................
183
11.3.3.1 Action ...........................................................................................
11.3.3.2 Service .........................................................................................
11.3.3.3 Source Address ...........................................................................
11.3.3.4 Destination Address ....................................................................
11.4 Connection Direction ......................................................................................
11.4.1 LAN to WAN Rules ................................................................................
184
11.4.2 Alerts .....................................................................................................
11.5 General Firewall Policy ................................................................................
11.6 Firewall Rules Summary ...............................................................................
185
11.6.1 Configuring Firewall Rules ...................................................................
187
11.6.2 Customized Services ............................................................................
190
11.6.3 Configuring A Customized Service .......................................................
191
11.7 Example Firewall Rule ....................................................................................
11.8 Predefined Services .......................................................................................
195
11.9 Anti-Probing ....................................................................................................
197
11.10 DoS Thresholds ...........................................................................................
198
11.10.1 Threshold Values ................................................................................
11.10.2 Half-Open Sessions ............................................................................
199
11.10.2.1 TCP Maximum Incomplete and Blocking Time ..........................
11.10.3 Configuring Firewall Thresholds ..........................................................
200
Chapter 12
Anti-Virus Packet Scan........................................................................................
203
12.1 Overview ........................................................................................................
12.1.1 Types of Computer Viruses ..................................................................
12.2 Signature-Based Virus Scan ..........................................................................
12.2.1 Computer Virus Infection and Prevention .............................................
204
12.3 Introduction to the ZyXEL Device Anti-virus Packet Scan .............................
12.3.1 How the ZyXEL Device Virus Scan Works ..........................................
205
12.3.2 Limitations of the ZyXEL Device Packet Scan ......................................
12.4 Anti-Virus Packet Scan Configuration ...........................................................
12.5 Registration and Online Update ....................................................................
207
12.5.1 Updating the Anti-Virus Packet Scan ....................................................
209
Chapter 13
211
13.1 Content Filtering Overview ............................................................................
13.2 Configuring Keyword Blocking ......................................................................
13.3 Configuring the Schedule ..............................................................................
212
16
Table of Contents