User's Manual

Table Of Contents
P-660H/HW-D Series User’s Guide
15 Table of Contents
10.4.2 Alerts .....................................................................................................159
10.5 General Firewall Policy ...............................................................................159
10.6 Firewall Rules Summary ...............................................................................160
10.6.1 Configuring Firewall Rules ..................................................................162
10.6.2 Customized Services ...........................................................................165
10.6.3 Configuring A Customized Service .....................................................166
10.7 Example Firewall Rule ...................................................................................166
10.8 Predefined Services .......................................................................................170
10.9 Anti-Probing ..................................................................................................172
10.10 DoS Thresholds ..........................................................................................173
10.10.1 Threshold Values ................................................................................173
10.10.2 Half-Open Sessions ............................................................................174
10.10.2.1 TCP Maximum Incomplete and Blocking Time .........................174
10.10.3 Configuring Firewall Thresholds .........................................................175
Chapter 11
Content Filtering .................................................................................................. 178
11.1 Content Filtering Overview ............................................................................178
11.2 Configuring Keyword Blocking .....................................................................178
11.3 Configuring the Schedule .............................................................................179
11.4 Configuring Trusted Computers ...................................................................180
Chapter 12
Static Route .......................................................................................................... 182
12.1 Static Route .................................................................................................182
12.2 Configuring Static Route ...............................................................................182
12.2.1 Static Route Edit .................................................................................183
Chapter 13
Bandwidth Management ...................................................................................... 186
13.1 Bandwidth Management Overview ...............................................................186
13.2 Application-based Bandwidth Management ...................................................186
13.3 Subnet-based Bandwidth Management .........................................................186
13.4 Application and Subnet-based Bandwidth Management ...............................187
13.5 Scheduler .......................................................................................................187
13.5.1 Priority-based Scheduler ......................................................................187
13.5.2 Fairness-based Scheduler ....................................................................188
13.6 Maximize Bandwidth Usage ...........................................................................188
13.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic ........................188
13.6.2 Maximize Bandwidth Usage Example ..................................................189
13.6.2.1 Priority-based Allotment of Unused and Unbudgeted Bandwidth 189
13.6.2.2 Fairness-based Allotment of Unused and Unbudgeted Bandwidth ...
190