ZyXEL Communications 792H Router User Manual


 
Prestige 792H G.SHDSL Router
x Table of Contents
8.7.2 Firewall ....................................................................................................................................8-13
Chapter 9 Firewall Configuration..............................................................................................................9-1
9.1 Remote Management and the Firewall ......................................................................................9-1
9.2 Enabling the Firewall.................................................................................................................9-1
9.3 Configuring E-mail Alerts .........................................................................................................9-2
9.4 Attack Alert................................................................................................................................9-3
9.4.1 Alerts..........................................................................................................................................9-4
9.4.2 Threshold Values .......................................................................................................................9-4
9.4.3 Half-Open Sessions....................................................................................................................9-4
Chapter 10 Creating Custom Rules .........................................................................................................10-1
10.1 Rules Overview........................................................................................................................10-1
10.2 Rule Logic Overview...............................................................................................................10-1
10.2.1 Rule Checklist..........................................................................................................................10-1
10.2.2 Security Ramifications.............................................................................................................10-2
10.2.3 Key Fields For Configuring Rules ...........................................................................................10-2
10.3 Connection Direction...............................................................................................................10-3
10.3.1 LAN to WAN Rules.................................................................................................................10-3
10.3.2 WAN to LAN Rules.................................................................................................................10-4
10.4 Logs .........................................................................................................................................10-4
10.5 Rule Summary .........................................................................................................................10-6
10.6 Predefined Services..................................................................................................................10-8
10.7 Creating/Editing Firewall Rules.............................................................................................10-11
10.7.1 Source and Destination Addresses.........................................................................................10-13
10.8 Timeout..................................................................................................................................10-14
10.8.1 Factors Influencing Choices for Timeout Values ..................................................................10-15
Chapter 11 Customized Services .............................................................................................................. 11-1
11.1 Introduction to Customized Services .......................................................................................11-1
11.2 Creating/Editing A Customized Service ..................................................................................11-2
11.3 Example Custom Service Firewall Rule ..................................................................................11-3
Chapter 12 Content Filtering....................................................................................................................12-1
12.1 Content Filtering Overview .....................................................................................................12-1
12.2 Configuring Keyword Blocking...............................................................................................12-1
12.3 Configuring the Schedule ........................................................................................................12-3
12.4 Configuring Trusted Computers ..............................................................................................12-4
12.5 Configuring Logs.....................................................................................................................12-5
Chapter 13 Introduction to IPSec.............................................................................................................13-1
13.1 VPN Overview.........................................................................................................................13-1
13.1.1 IPSec........................................................................................................................................13-1
13.1.2 Security Association ................................................................................................................13-1
13.1.3 Other Terminology...................................................................................................................13-1
13.1.4 VPN Applications....................................................................................................................13-2