ZyWALL 2 and ZyWALL 2WE
Figure 13-3 SYN Flood................................................................................................................................ 13-5
Figure 13-4 Smurf Attack ............................................................................................................................ 13-6
Figure 15-2 Attack Alert .............................................................................................................................. 15-5
Figure 17-1Content Filter............................................................................................................................. 17-2
Figure 18-1 View Log .................................................................................................................................. 18-2
Figure 18-2 Log Settings.............................................................................................................................. 18-4
Figure 18-3 Reports ..................................................................................................................................... 18-7
List of Figures
xix