ZyXEL Communications ZyXEL ZyWALL 35 User Manual
Page 13
ZyWALL 35 User’s Guide
11
10.1 Access Methods .............................................................................................185
10.2 Firewall Policies Overview .............................................................................185
10.3 Rule Logic Overview ......................................................................................186
10.3.1 Rule Checklist .......................................................................................186
10.3.2 Security Ramifications ..........................................................................187
10.3.3 Key Fields For Configuring Rules .........................................................187
10.3.3.1 Action ..........................................................................................187
10.3.3.2 Service ........................................................................................187
10.3.3.3 Source Address ...........................................................................187
10.3.3.4 Destination Address ....................................................................188
10.6.1 Rule Summary ......................................................................................192
10.6.2 Configuring Firewall Rules ....................................................................193
10.6.3 Configuring Custom Services ...............................................................196
10.7 Example Firewall Rule ...................................................................................196
10.8 Predefined Services .......................................................................................200
10.9 Anti-Probing ...................................................................................................202
10.10 Configuring Attack Alert ...............................................................................203
10.10.2.1 TCP Maximum Incomplete and Blocking Time .........................204
11.2 General Content Filter Configuration ..............................................................207
11.3 Content Filtering with an External Database ..................................................210
11.4 Categories and Registering ............................................................................210
11.5 Customization .................................................................................................217
11.6 Customizing Keyword Blocking URL Checking ..............................................220