
Prestige 660W/HW Series User’s Guide
Table of Contents xi
Firewall and Content Filter......................................................................................................................... IV
Chapter 11 Firewalls ..................................................................................................................................11-1
11.1 Firewall Overview....................................................................................................................11-1
11.2 Types of Firewalls....................................................................................................................11-1
11.3 Introduction to ZyXEL’s Firewall............................................................................................11-2
11.4 Denial of Service......................................................................................................................11-3
11.5 Stateful Inspection....................................................................................................................11-7
11.6 Guidelines for Enhancing Security with Your Firewall .........................................................11-11
11.7 Packet Filtering Vs Firewall...................................................................................................11-12
Chapter 12 Firewall Configuration ..........................................................................................................12-1
12.1 Remote Management and the Firewall.....................................................................................12-1
12.2 Enabling the Firewall ...............................................................................................................12-1
12.3 Attack Alert..............................................................................................................................12-2
Chapter 13 Creating Custom Rules..........................................................................................................13-1
13.1 Rules Overview........................................................................................................................13-1
13.2 Rule Logic Overview ...............................................................................................................13-1
13.3 Connection Direction ...............................................................................................................13-3
13.4 Rule Summary..........................................................................................................................13-4
13.5 Predefined Services..................................................................................................................13-6
13.6 Creating/Editing Firewall Rules...............................................................................................13-9
13.7 Timeout ..................................................................................................................................13-12
Chapter 14 Customized Services ..............................................................................................................14-1
14.1 Introduction to Customized Services .......................................................................................14-1
14.2 Creating/Editing A Customized Service ..................................................................................14-2
14.3 Example Custom Service Firewall Rule...................................................................................14-3
Chapter 15 Content Filtering....................................................................................................................15-1
15.1 Content Filtering Overview......................................................................................................15-1
15.2 Configuring Keyword Blocking...............................................................................................15-1
15.3 Configuring the Schedule.........................................................................................................15-3
15.4 Configuring Trusted Computers...............................................................................................15-4
Remote Management, UPnP and Logs......................................................................................................... V
Chapter 16 Remote Management Configuration ....................................................................................16-1
16.1 Remote Management Overview...............................................................................................16-1
16.2 Telnet .......................................................................................................................................16-2
16.3 FTP...........................................................................................................................................16-2
16.4 Web ..........................................................................................................................................16-3
16.5 Configuring Remote Management ...........................................................................................16-3
Chapter 17 Universal Plug-and-Play (UPnP) ..........................................................................................17-1
17.1 Introducing Universal Plug and Play........................................................................................17-1
17.2 UPnP and ZyXEL ....................................................................................................................17-2
17.3 Installing UPnP in Windows Example.....................................................................................17-3