User's Manual

P-660H/HW/W-T Series User’ Guide
Table of Contents 14
Chapter 11
Firewall Configuration ......................................................................................... 132
11.1 Access Methods .............................................................................................132
11.2 Firewall Policies Overview .............................................................................132
11.3 Rule Logic Overview .....................................................................................133
11.3.1 Rule Checklist .......................................................................................133
11.3.2 Security Ramifications ..........................................................................133
11.3.3 Key Fields For Configuring Rules .........................................................134
11.3.3.1 Action ...........................................................................................134
11.3.3.2 Service .........................................................................................134
11.3.3.3 Source Address ...........................................................................134
11.3.3.4 Destination Address ....................................................................134
11.4 Connection Direction ......................................................................................134
11.4.1 LAN to WAN Rules ................................................................................134
11.4.2 Alerts .....................................................................................................135
11.5 Configuring Default Firewall Policy ..............................................................135
11.6 Rule Summary ..............................................................................................136
11.6.1 Configuring Firewall Rules ..................................................................138
11.7 Customized Services .....................................................................................141
11.8 Configuring A Customized Service ...............................................................141
11.9 Example Firewall Rule ....................................................................................142
11.10 Predefined Services .....................................................................................146
11.11 Anti-Probing .................................................................................................148
11.12 DoS Thresholds ...........................................................................................149
11.12.1 Threshold Values ................................................................................150
11.12.2 Half-Open Sessions ............................................................................150
11.12.2.1 TCP Maximum Incomplete and Blocking Time ..........................150
11.12.3 Configuring Firewall Thresholds .........................................................151
Chapter 12
Content Filtering .................................................................................................. 154
12.1 Content Filtering Overview ............................................................................154
12.2 The Main Content Filter Screen .....................................................................154
12.3 Configuring Keyword Blocking .....................................................................155
12.4 Configuring the Schedule .............................................................................156
12.5 Configuring Trusted Computers ...................................................................156
Chapter 13
Remote Management Configuration .................................................................. 158
13.1 Remote Management Overview ....................................................................158
13.1.1 Remote Management Limitations .........................................................158
13.1.2 Remote Management and NAT ............................................................159
13.1.3 System Timeout ...................................................................................159