ZyXEL Communications ZyWall 10W User Manual page 16

Zywall series internet security gateway
Hide thumbs Also See for ZyWall 10W:
Table of Contents

Advertisement

ZyWALL Series Internet Security Gateway
Figure 9-4 SUA Server ...................................................................................................................................9-9
Figure 9-5 Address Mapping ........................................................................................................................9-10
Figure 9-6Address Mapping Edit..................................................................................................................9-12
Figure 9-7 Trigger Port Forwarding Process: Example ................................................................................9-14
Figure 9-8 Trigger Port .................................................................................................................................9-15
Figure 10-1 Example of Static Routing Topology ........................................................................................10-1
Figure 10-2 IP Static Route...........................................................................................................................10-2
Figure 10-3 Edit IP Static Route ...................................................................................................................10-3
Figure 11-1 ZyWALL Firewall Application..................................................................................................11-3
Figure 11-2 Three-Way Handshake ..............................................................................................................11-5
Figure 11-3 SYN Flood ................................................................................................................................11-5
Figure 11-4 Smurf Attack .............................................................................................................................11-6
Figure 11-5 Stateful Inspection.....................................................................................................................11-8
Figure 12-1 LAN to WAN Traffic.................................................................................................................12-4
Figure 12-2 WAN to LAN Traffic.................................................................................................................12-5
Figure 12-3 Application-based Bandwidth Management Example ..............................................................12-6
Figure 12-4 Subnet-based Bandwidth Management Example......................................................................12-6
Figure 12-5 Application and Subnet-based Bandwidth Management Example............................................12-7
Figure 12-6 Firewall Summary.....................................................................................................................12-8
Figure 12-7 Firewall Edit Rule ...................................................................................................................12-11
Figure 12-8 Source and Destination Addresses Add/Edit ...........................................................................12-14
Figure 12-9 Custom Port Create/Edit .........................................................................................................12-15
Figure 12-10 BM Global Setting ................................................................................................................12-16
Figure 12-11 Firewall Edit Rule Screen......................................................................................................12-18
Figure 12-12 Firewall Rule Edit IP Example..............................................................................................12-18
Figure 12-13 Edit Custom Port Example....................................................................................................12-19
Figure 12-14 My Service Rule Configuration ............................................................................................12-20
Figure 12-15 My Service Example Rule Summary ....................................................................................12-21
Figure 12-16 Attack Alert ...........................................................................................................................12-26
Figure 13-1 Content Filtering General..........................................................................................................13-2
Figure 13-2 Content Filtering Lookup Procedure.........................................................................................13-5
Figure 13-3 Content Filtering Categories .....................................................................................................13-6
Figure 13-4 Content Filtering Customization .............................................................................................13-14
Figure 14-1 Encryption and Decryption .......................................................................................................14-2
Figure 14-2 IPSec Architecture.....................................................................................................................14-3
Figure 14-3 Transport and Tunnel Mode IPSec Encapsulation.....................................................................14-4
Figure 15-1 IPSec VPN Rules Fields............................................................................................................15-3
Figure 15-2 VPN Rules.................................................................................................................................15-4
Figure 15-3 NAT Router Between IPSec Routers.........................................................................................15-6
Figure 15-4 VPN Host using Intranet DNS Server Example........................................................................15-8
Figure 15-5 VPN IKE .................................................................................................................................15-11
Figure 15-6 Two Phases to Set Up the IPSec SA........................................................................................15-19
xvi
List of Figures

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 30wZywall 100Zywall 50

Table of Contents