P-2602H(W)(L)-DxA Series User’s Guide

13.7

Packet Filtering Vs Firewall

191

13.7.1 Packet Filtering:

191

 

13.7.1.1 When To Use Filtering

192

13.7.2 Firewall

192

 

13.7.2.1 When To Use The Firewall

192

Chapter 14

 

 

Firewall Configuration

193

14.1

Access Methods

193

14.2

Firewall Policies Overview

193

14.3

Rule Logic Overview

194

14.3.1 Rule Checklist

194

14.3.2 Security Ramifications

194

14.3.3 Key Fields For Configuring Rules

195

 

14.3.3.1 Action

195

 

14.3.3.2 Service

195

 

14.3.3.3 Source Address

195

 

14.3.3.4 Destination Address

195

14.4

Connection Direction

195

14.4.1 LAN to WAN Rules

196

14.4.2 Alerts

196

14.5

General Firewall Policy

196

14.6

Firewall Rules Summary

197

14.6.1 Configuring Firewall Rules

199

14.6.2 Customized Services

202

14.6.3 Configuring A Customized Service

202

14.7

Example Firewall Rule

203

14.8

DoS Thresholds

207

14.8.1 Threshold Values

207

14.8.2 Half-Open Sessions

208

 

14.8.2.1 TCP Maximum Incomplete and Blocking Time

208

14.8.3 Configuring Firewall Thresholds

209

Chapter 15

 

 

Content Filtering

211

15.1

Content Filtering Overview

211

15.2

Configuring Keyword Blocking

211

15.3

Configuring the Schedule

212

15.4

Configuring Trusted Computers

213

Chapter 16

 

 

Introduction to IPSec

215

16.1

VPN Overview

215

Table of Contents

15

Page 15
Image 15
ZyXEL Communications P-2602 manual Chapter Firewall Configuration 193