Prestige 660H/HW Series User’s Guide
12
12.7.2.1 When To Use The Firewall ..........................................................141
Chapter 13
Firewall Configuration ......................................................................................... 144
13.1 Access Methods .............................................................................................144
13.2 Firewall Policies Overview .............................................................................144
13.3 Rule Logic Overview ......................................................................................145
13.3.1 Rule Checklist .......................................................................................145
13.3.2 Security Ramifications ..........................................................................145
13.3.3 Key Fields For Configuring Rules .........................................................146
13.3.3.1 Action ..........................................................................................146
13.3.3.2 Service ........................................................................................146
13.3.3.3 Source Address ...........................................................................146
13.3.3.4 Destination Address ....................................................................146
13.4 Connection Direction Example .......................................................................146
13.4.1 LAN to WAN Rules ...............................................................................147
13.4.2 WAN to LAN Rules ...............................................................................147
13.4.3 Alerts .....................................................................................................148
13.5 Configuring Basic Firewall Settings ................................................................148
13.6 Rule Summary ...............................................................................................149
13.6.1 Configuring Firewall Rules ....................................................................151
13.7 Customized Services .....................................................................................154
13.8 Creating/Editing A Customized Service .........................................................154
13.9 Example Firewall Rule ...................................................................................155
13.10 Predefined Services .....................................................................................159
13.11 Anti-Probing ..................................................................................................161
13.12 Configuring Attack Alert ...............................................................................162
13.12.1 Threshold Values ................................................................................163
13.12.2 Half-Open Sessions ............................................................................163
13.12.2.1 TCP Maximum Incomplete and Blocking Time .........................163
Chapter 14
Content Filtering .................................................................................................. 166
14.1 Content Filtering Overview .............................................................................166
14.2 Configuring Keyword Blocking .......................................................................166
14.3 Configuring the Schedule ..............................................................................167
14.4 Configuring Trusted Computers .....................................................................168
Chapter 15
Remote Management Configuration .................................................................. 170
15.1 Remote Management Overview .....................................................................170
15.1.1 Remote Management Limitations .........................................................170
15.1.2 Remote Management and NAT ............................................................171