P-660H/HW/W-T Series User’ Guide

Chapter 11

 

 

Firewall Configuration .........................................................................................

132

11.1

Access Methods .............................................................................................

132

11.2

Firewall Policies Overview .............................................................................

132

11.3

Rule Logic Overview .....................................................................................

133

11.3.1 Rule Checklist .......................................................................................

133

11.3.2 Security Ramifications ..........................................................................

133

11.3.3 Key Fields For Configuring Rules .........................................................

134

 

11.3.3.1 Action ...........................................................................................

134

 

11.3.3.2 Service .........................................................................................

134

 

11.3.3.3 Source Address ...........................................................................

134

 

11.3.3.4 Destination Address ....................................................................

134

11.4

Connection Direction ......................................................................................

134

11.4.1 LAN to WAN Rules ................................................................................

134

11.4.2 Alerts .....................................................................................................

135

11.5

Configuring Default Firewall Policy ..............................................................

135

11.6

Rule Summary ..............................................................................................

136

11.6.1 Configuring Firewall Rules ..................................................................

138

11.7

Customized Services .....................................................................................

141

11.8

Configuring A Customized Service ...............................................................

141

11.9

Example Firewall Rule ....................................................................................

142

11.10 Predefined Services .....................................................................................

146

11.11 Anti-Probing .................................................................................................

148

11.12 DoS Thresholds ...........................................................................................

149

11.12.1 Threshold Values ................................................................................

150

11.12.2 Half-Open Sessions ............................................................................

150

 

11.12.2.1 TCP Maximum Incomplete and Blocking Time ..........................

150

11.12.3 Configuring Firewall Thresholds .........................................................

151

Chapter 12

 

 

Content Filtering ..................................................................................................

154

12.1 Content Filtering Overview ............................................................................

154

12.2 The Main Content Filter Screen .....................................................................

154

12.3 Configuring Keyword Blocking .....................................................................

155

12.4 Configuring the Schedule .............................................................................

156

12.5 Configuring Trusted Computers ...................................................................

156

Chapter 13

 

 

Remote Management Configuration ..................................................................

158

13.1 Remote Management Overview ....................................................................

158

13.1.1 Remote Management Limitations .........................................................

158

13.1.2 Remote Management and NAT ............................................................

159

13.1.3 System Timeout ...................................................................................

159

Table of Contents

14