ZyXEL P-661H Series Manual de usuario Pagina 15

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 358
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 14
Table of Contents
P-661H/HW Series User’s Guide
15
8.5 Stateful Inspection ............................................................................................................. 142
8.5.1 Stateful Inspection Process ...................................................................................... 143
8.5.2 Stateful Inspection and the ZyXEL Device ............................................................... 144
8.5.3 TCP Security ............................................................................................................ 144
8.5.4 UDP/ICMP Security .................................................................................................. 145
8.5.5 Upper Layer Protocols ............................................................................................. 145
8.6 Guidelines for Enhancing Security with Your Firewall ....................................................... 146
8.6.1 Security In General .................................................................................................. 146
8.7 Packet Filtering Vs Firewall ...............................................................................................147
8.7.1 Packet Filtering: ....................................................................................................... 147
8.7.2 Firewall ..................................................................................................................... 147
Chapter 9
Firewall Configuration ..........................................................................................................149
9.1 Access Methods ................................................................................................................ 149
9.2 Firewall Policies Overview .................................................................................................149
9.3 Rule Logic Overview .......................................................................................................... 150
9.3.1 Rule Checklist .......................................................................................................... 150
9.3.2 Security Ramifications .............................................................................................. 150
9.3.3 Key Fields For Configuring Rules ............................................................................ 151
9.4 Connection Direction ......................................................................................................... 151
9.4.1 LAN to WAN Rules ................................................................................................... 152
9.4.2 Alerts ........................................................................................................................ 152
9.5 Triangle Route ................................................................................................................... 152
9.5.1 The “Triangle Route” Problem .................................................................................. 152
9.5.2 Solving the “Triangle Route” Problem ...................................................................... 153
9.6 General Firewall Policy ................................................................................................... 154
9.7 Firewall Rules Summary ................................................................................................... 155
9.7.1 Configuring Firewall Rules ..................................................................................... 157
9.7.2 Customized Services .............................................................................................. 160
9.7.3 Configuring A Customized Service ......................................................................... 160
9.8 Example Firewall Rule ....................................................................................................... 161
9.9 Anti Probing ....................................................................................................................... 165
9.10 DoS Thresholds .............................................................................................................. 166
9.10.1 Threshold Values ................................................................................................... 166
9.10.2 Half-Open Sessions ............................................................................................... 167
9.10.3 Configuring Firewall Thresholds ............................................................................. 167
Chapter 10
Content Filtering ................................................................................................................... 171
10.1 Content Filtering Overview ............................................................................................. 171
10.2 Configuring Keyword Blocking ........................................................................................ 171
10.3 Configuring the Schedule ............................................................................................... 172
Vista de pagina 14
1 2 ... 10 11 12 13 14 15 16 17 18 19 20 ... 357 358

Comentarios a estos manuales

Sin comentarios