ZyXEL Communications ZyXEL ZyWALL 2WE User Manual page 19

Zyxel internet security gateway user's guide
Hide thumbs Also See for ZyXEL ZyWALL 2WE:
Table of Contents

Advertisement

ZyWALL 2 and ZyWALL 2WE
Figure 13-3 SYN Flood................................................................................................................................ 13-5
Figure 13-4 Smurf Attack ............................................................................................................................ 13-6
Figure 14-1 Menu 21: Filter and Firewall Setup.......................................................................................... 14-1
Figure 14-2 Menu 21.2: Firewall Setup ....................................................................................................... 14-2
Figure 15-1 Enabling the Firewall ............................................................................................................... 15-2
Figure 15-2 Attack Alert .............................................................................................................................. 15-5
Figure 16-1 LAN to WAN Traffic................................................................................................................ 16-4
Figure 16-2 WAN to LAN Traffic................................................................................................................ 16-4
Figure 16-3 Firewall Rules Summary: First Screen..................................................................................... 16-5
Figure 16-4 Creating/Editing A Firewall Rule ............................................................................................16-11
Figure 16-5 Adding/Editing Source and Destination Addresses ................................................................ 16-13
Figure 16-6 Creating/Editing A Custom Port............................................................................................. 16-14
Figure 16-7 Firewall Rule Configuration Screen Example ........................................................................ 16-16
Figure 16-8 Firewall IP Config Screen Example ....................................................................................... 16-17
Figure 16-9 Custom Port Example............................................................................................................. 16-18
Figure 16-10 Rule Configuration Example ................................................................................................ 16-19
Figure 16-11 Rule Summary Example ....................................................................................................... 16-20
Figure 17-1Content Filter............................................................................................................................. 17-2
Figure 18-1 View Log .................................................................................................................................. 18-2
Figure 18-2 Log Settings.............................................................................................................................. 18-4
Figure 18-3 Reports ..................................................................................................................................... 18-7
Figure 18-4 Web Site Hits Report Example ................................................................................................. 18-9
Figure 18-5 Protocol/Port Report Example................................................................................................ 18-10
Figure 18-6 LAN IP Address Report Example............................................................................................18-11
Figure 19-1 Outgoing Packet Filtering Process ........................................................................................... 19-2
Figure 19-2 Filter Rule Process.................................................................................................................... 19-3
List of Figures
xix

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 2

Table of Contents