P-661H/HW Series User’s Guide

9.4.2 Alerts .......................................................................................................

160

9.5 Triangle Route ..................................................................................................

160

9.5.1 The “Triangle Route” Problem ................................................................

160

9.5.2 Solving the “Triangle Route” Problem .....................................................

161

9.6 General Firewall Policy .................................................................................

162

9.7 Firewall Rules Summary .................................................................................

163

9.7.1 Configuring Firewall Rules ....................................................................

164

9.7.2 Customized Services .............................................................................

167

9.7.3 Configuring A Customized Service ........................................................

168

9.8 Example Firewall Rule .....................................................................................

168

9.9 Predefined Services .........................................................................................

172

9.10 Anti-Probing ...................................................................................................

174

9.11 DoS Thresholds .............................................................................................

175

9.11.1 Threshold Values ..................................................................................

175

9.11.2 Half-Open Sessions ..............................................................................

176

9.11.2.1 TCP Maximum Incomplete and Blocking Time ............................

176

9.11.3 Configuring Firewall Thresholds ...........................................................

177

Chapter 10

 

Trend Micro Security Services............................................................................

179

10.1 Trend Micro Security Services Overview .......................................................

179

10.1.1 TMSS Web Page ..................................................................................

179

10.2 Configuring TMSS on the ZyXEL Device .......................................................

182

10.2.1 General TMSS Settings ........................................................................

182

10.2.2 TMSS Exception List ............................................................................

184

10.3 TMSS Virus Protection ...................................................................................

185

10.4 Parental Controls ...........................................................................................

186

10.4.1 Parental Controls Statistics ...................................................................

188

10.5 ActiveX Controls in Internet Explorer .............................................................

189

Chapter 11

 

Content Filtering ..................................................................................................

193

11.1 Content Filtering Overview ............................................................................

193

11.2 Configuring Keyword Blocking ......................................................................

193

11.3 Configuring the Schedule ..............................................................................

194

11.4 Configuring Trusted Computers ....................................................................

195

Chapter 12

 

Introduction to IPSec ...........................................................................................

197

12.1 VPN Overview ................................................................................................

197

12.1.1 IPSec ....................................................................................................

197

12.1.2 Security Association .............................................................................

197

12.1.3 Other Terminology ................................................................................

197

16

Table of Contents