9.5 Stateful Inspection ............................................................................................................. 148
9.5.3 TCP Security ............................................................................................................ 150
9.5.4 UDP/ICMP Security .................................................................................................. 151
9.6.1 Security In General .................................................................................................. 152
9.7.1 Packet Filtering: ....................................................................................................... 153
9.7.2 Firewall ..................................................................................................................... 153
Chapter 10
Firewall Configuration .......................................................................................................... 155
10.1 Access Methods .............................................................................................................. 155
10.3 Rule Logic Overview ........................................................................................................ 156
10.3.1 Rule Checklist ........................................................................................................ 156
10.4 Connection Direction ....................................................................................................... 157
10.4.1 LAN to WAN Rules ................................................................................................. 158
10.4.2 Alerts ...................................................................................................................... 158
10.7 Example Firewall Rule ..................................................................................................... 165
10.8 Predefined Services ........................................................................................................ 169
10.9 Anti-Probing ..................................................................................................................... 171
10.10 DoS Thresholds ............................................................................................................ 172
10.10.1 Threshold Values ................................................................................................. 172
Content Filtering ................................................................................................................... 177
P-660HW-Dx v2 User's Guide
................................................................................................. 158
Table of Contents
15