ZyXEL Communications Prestige 2602R Series User Manual page 14

Adsl voip iad
Hide thumbs Also See for Prestige 2602R Series:
Table of Contents

Advertisement

Prestige 2602R Series User's Guide
12.6 Guidelines for Enhancing Security with Your Firewall ....................................144
12.7 Packet Filtering Vs Firewall ............................................................................146
Chapter 13
Firewall Configuration ......................................................................................... 149
13.1 Access Methods .............................................................................................149
13.2 Firewall Policies Overview .............................................................................149
13.3 Rule Logic Overview ......................................................................................150
13.4 Connection Direction Example .......................................................................151
13.5 Configuring Basic Firewall Settings ................................................................153
13.6 Rule Summary ...............................................................................................154
13.7 Customized Services .....................................................................................158
13.8 Creating/Editing A Customized Service .........................................................158
13.9 Example Firewall Rule ...................................................................................159
13.10 Predefined Services .....................................................................................163
13.11 Anti-Probing ..................................................................................................165
13.12 DoS Thresholds ...........................................................................................166
Content Filtering .................................................................................................. 171
14.1 Content Filtering Overview .............................................................................171
14
12.5.3 TCP Security .........................................................................................143
12.5.4 UDP/ICMP Security ..............................................................................144
12.5.5 Upper Layer Protocols ..........................................................................144
12.6.1 Security In General ...............................................................................145
12.7.1 Packet Filtering: ....................................................................................146
12.7.1.1 When To Use Filtering .................................................................146
12.7.2 Firewall .................................................................................................146
12.7.2.1 When To Use The Firewall ..........................................................146
13.3.1 Rule Checklist .......................................................................................150
13.3.2 Security Ramifications ..........................................................................150
13.3.3 Key Fields For Configuring Rules .........................................................151
13.3.3.1 Action ..........................................................................................151
13.3.3.2 Service ........................................................................................151
13.3.3.3 Source Address ...........................................................................151
13.3.3.4 Destination Address ....................................................................151
13.4.1 LAN to WAN Rules ...............................................................................152
13.4.2 WAN to LAN Rules ...............................................................................152
13.4.3 Alerts .....................................................................................................152
13.6.1 Configuring Firewall Rules ....................................................................155
13.12.1 Threshold Values ................................................................................167
13.12.2 Half-Open Sessions ............................................................................167
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents