ZyXEL Communications Network Device P-2602 User Manual page 15

802.11g wireless adsl2+ voip iad/adsl2+ voip iad
Table of Contents

Advertisement

13.7 Packet Filtering Vs Firewall ............................................................................191
Chapter 14
Firewall Configuration ......................................................................................... 193
14.1 Access Methods .............................................................................................193
14.2 Firewall Policies Overview ............................................................................193
14.3 Rule Logic Overview .....................................................................................194
14.4 Connection Direction ......................................................................................195
14.6 Firewall Rules Summary ...............................................................................197
14.7 Example Firewall Rule ...................................................................................203
14.8 DoS Thresholds ............................................................................................207
Content Filtering .................................................................................................. 211
15.1 Content Filtering Overview ............................................................................211
15.2 Configuring Keyword Blocking .....................................................................211
15.3 Configuring the Schedule .............................................................................212
15.4 Configuring Trusted Computers ...................................................................213
Introduction to IPSec ........................................................................................... 215
16.1 VPN Overview ................................................................................................215
Table of Contents
13.7.1 Packet Filtering: ....................................................................................191
13.7.1.1 When To Use Filtering .................................................................192
13.7.2 Firewall .................................................................................................192
13.7.2.1 When To Use The Firewall ..........................................................192
14.3.1 Rule Checklist .......................................................................................194
14.3.2 Security Ramifications ..........................................................................194
14.3.3 Key Fields For Configuring Rules .........................................................195
14.3.3.1 Action ..........................................................................................195
14.3.3.2 Service ........................................................................................195
14.3.3.3 Source Address ...........................................................................195
14.3.3.4 Destination Address ....................................................................195
14.4.1 LAN to WAN Rules ...............................................................................196
14.4.2 Alerts .....................................................................................................196
14.6.1 Configuring Firewall Rules ...................................................................199
14.6.2 Customized Services ............................................................................202
14.6.3 Configuring A Customized Service ......................................................202
14.8.1 Threshold Values ..................................................................................207
14.8.2 Half-Open Sessions ..............................................................................208
14.8.3 Configuring Firewall Thresholds ............................................................209
P-2602H(W)(L)-DxA Series User's Guide
...............................................................................196
15

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents