P-660H/HW/W-T Series User’ Guide
Chapter 11
132
11.1
Access Methods .............................................................................................
11.2
Firewall Policies Overview .............................................................................
11.3
Rule Logic Overview .....................................................................................
133
11.3.1 Rule Checklist .......................................................................................
11.3.2 Security Ramifications ..........................................................................
11.3.3 Key Fields For Configuring Rules .........................................................
134
11.3.3.1 Action ...........................................................................................
11.3.3.2 Service .........................................................................................
11.3.3.3 Source Address ...........................................................................
11.3.3.4 Destination Address ....................................................................
11.4
Connection Direction ......................................................................................
11.4.1 LAN to WAN Rules ................................................................................
11.4.2 Alerts .....................................................................................................
135
11.5
Configuring Default Firewall Policy ..............................................................
11.6
Rule Summary ..............................................................................................
136
11.6.1 Configuring Firewall Rules ..................................................................
138
11.7
Customized Services .....................................................................................
141
11.8
Configuring A Customized Service ...............................................................
11.9
Example Firewall Rule ....................................................................................
142
11.10 Predefined Services .....................................................................................
146
11.11 Anti-Probing .................................................................................................
148
11.12 DoS Thresholds ...........................................................................................
149
11.12.1 Threshold Values ................................................................................
150
11.12.2 Half-Open Sessions ............................................................................
11.12.2.1 TCP Maximum Incomplete and Blocking Time ..........................
11.12.3 Configuring Firewall Thresholds .........................................................
151
Chapter 12
154
12.1 Content Filtering Overview ............................................................................
12.2 The Main Content Filter Screen .....................................................................
12.3 Configuring Keyword Blocking .....................................................................
155
12.4 Configuring the Schedule .............................................................................
156
12.5 Configuring Trusted Computers ...................................................................
Chapter 13
158
13.1 Remote Management Overview ....................................................................
13.1.1 Remote Management Limitations .........................................................
13.1.2 Remote Management and NAT ............................................................
159
13.1.3 System Timeout ...................................................................................
Table of Contents
14