ZyXEL Communications 792H User Manual

Page 16

Advertising
background image

Prestige 792H G.SHDSL Router

x Table of Contents

8.7.2

Firewall ....................................................................................................................................8-13

Chapter 9 Firewall Configuration ..............................................................................................................9-1

9.1

Remote Management and the Firewall ......................................................................................9-1

9.2

Enabling the Firewall.................................................................................................................9-1

9.3

Configuring E-mail Alerts .........................................................................................................9-2

9.4

Attack Alert................................................................................................................................9-3

9.4.1

Alerts..........................................................................................................................................9-4

9.4.2

Threshold Values .......................................................................................................................9-4

9.4.3

Half-Open Sessions....................................................................................................................9-4

Chapter 10 Creating Custom Rules .........................................................................................................10-1

10.1

Rules Overview........................................................................................................................10-1

10.2

Rule Logic Overview...............................................................................................................10-1

10.2.1

Rule Checklist..........................................................................................................................10-1

10.2.2

Security Ramifications.............................................................................................................10-2

10.2.3

Key Fields For Configuring Rules ...........................................................................................10-2

10.3

Connection Direction ...............................................................................................................10-3

10.3.1

LAN to WAN Rules.................................................................................................................10-3

10.3.2

WAN to LAN Rules.................................................................................................................10-4

10.4

Logs .........................................................................................................................................10-4

10.5

Rule Summary .........................................................................................................................10-6

10.6

Predefined Services..................................................................................................................10-8

10.7

Creating/Editing Firewall Rules.............................................................................................10-11

10.7.1

Source and Destination Addresses.........................................................................................10-13

10.8

Timeout..................................................................................................................................10-14

10.8.1

Factors Influencing Choices for Timeout Values ..................................................................10-15

Chapter 11 Customized Services .............................................................................................................. 11-1

11.1

Introduction to Customized Services .......................................................................................11-1

11.2

Creating/Editing A Customized Service ..................................................................................11-2

11.3

Example Custom Service Firewall Rule ..................................................................................11-3

Chapter 12 Content Filtering....................................................................................................................12-1

12.1

Content Filtering Overview .....................................................................................................12-1

12.2

Configuring Keyword Blocking...............................................................................................12-1

12.3

Configuring the Schedule ........................................................................................................12-3

12.4

Configuring Trusted Computers ..............................................................................................12-4

12.5

Configuring Logs.....................................................................................................................12-5

Chapter 13 Introduction to IPSec.............................................................................................................13-1

13.1

VPN Overview.........................................................................................................................13-1

13.1.1

IPSec ........................................................................................................................................13-1

13.1.2

Security Association ................................................................................................................13-1

13.1.3

Other Terminology...................................................................................................................13-1

13.1.4

VPN Applications ....................................................................................................................13-2

Advertising