P-661H/HW Series User’s Guide
9.4.2 Alerts .......................................................................................................
160
9.5 Triangle Route ..................................................................................................
9.5.1 The “Triangle Route” Problem ................................................................
9.5.2 Solving the “Triangle Route” Problem .....................................................
161
9.6 General Firewall Policy .................................................................................
162
9.7 Firewall Rules Summary .................................................................................
163
9.7.1 Configuring Firewall Rules ....................................................................
164
9.7.2 Customized Services .............................................................................
167
9.7.3 Configuring A Customized Service ........................................................
168
9.8 Example Firewall Rule .....................................................................................
9.9 Predefined Services .........................................................................................
172
9.10 Anti-Probing ...................................................................................................
174
9.11 DoS Thresholds .............................................................................................
175
9.11.1 Threshold Values ..................................................................................
9.11.2 Half-Open Sessions ..............................................................................
176
9.11.2.1 TCP Maximum Incomplete and Blocking Time ............................
9.11.3 Configuring Firewall Thresholds ...........................................................
177
Chapter 10
Trend Micro Security Services............................................................................
179
10.1 Trend Micro Security Services Overview .......................................................
10.1.1 TMSS Web Page ..................................................................................
10.2 Configuring TMSS on the ZyXEL Device .......................................................
182
10.2.1 General TMSS Settings ........................................................................
10.2.2 TMSS Exception List ............................................................................
184
10.3 TMSS Virus Protection ...................................................................................
185
10.4 Parental Controls ...........................................................................................
186
10.4.1 Parental Controls Statistics ...................................................................
188
10.5 ActiveX Controls in Internet Explorer .............................................................
189
Chapter 11
193
11.1 Content Filtering Overview ............................................................................
11.2 Configuring Keyword Blocking ......................................................................
11.3 Configuring the Schedule ..............................................................................
194
11.4 Configuring Trusted Computers ....................................................................
195
Chapter 12
197
12.1 VPN Overview ................................................................................................
12.1.1 IPSec ....................................................................................................
12.1.2 Security Association .............................................................................
12.1.3 Other Terminology ................................................................................
16
Table of Contents