Table 41 Security > Firewall > Rule Summary - ZyXEL Communications ZYWALL P1 User Manual

Internet security appliance
Hide thumbs Also See for ZYWALL P1:
Table of Contents

Advertisement

The following table describes the labels in this screen.
Table 41 SECURITY > FIREWALL > Rule Summary
LABEL
Firewall Rules
Storage Space
in Use
Packet Direction Use the drop-down list box to select a direction of travel of packets for which you
Default Policy
The following read-only fields summarize the rules you have created that apply to traffic traveling in the
selected packet direction. The firewall rules that you configure (summarized below) take priority over
the general firewall action settings above.
#
Name
Active
Source Address
Destination
Address
Service Type
Action
Sch.
Log
Modify
Insert
Move
ZyWALL P1 User's Guide
DESCRIPTION
This bar displays the percentage of the ZyWALL's firewall rules storage space that
is currently in use. The bar turns from green to red when the maximum is being
approached. When the bar is red, you should consider deleting unnecessary firewall
rules before adding more firewall rules.
want to configure firewall rules.
Note: The VPN connection directions apply to the traffic going to or
from the ZyWALL's VPN tunnels. They do not apply to other
VPN traffic for which the ZyWALL is not one of the gateways
(VPN pass-through traffic).
This field displays the default action and log policy you selected in the Default Rule
screen for the packet direction shown in the field above.
This is your firewall rule number. The ordering of your rules is important as rules are
applied in turn. Click + to expand or - to collapse the Source Address, Destination
Address and Service Type drop down lists.
This is the name of the firewall rule.
This field displays whether a firewall is turned on (Y) or not (N). Click the letter to
change it to the other state (click Y to change it to N or N to change it to Y).
This drop-down list box displays the source addresses or ranges of addresses to
which this firewall rule applies. Please note that a blank source or destination
address is equivalent to Any.
This drop-down list box displays the destination addresses or ranges of addresses
to which this firewall rule applies. Please note that a blank source or destination
address is equivalent to Any.
This drop-down list box displays the services to which this firewall rule applies. See
Appendix E on page 449
for a list of common services.
This field displays whether the firewall silently discards packets (Drop), discards
packets and sends a TCP reset packet or an ICMP destination-unreachable
message to the sender (Reject) or allows the passage of packets (Permit).
This field tells you whether a schedule is specified (Yes) or not (No).
This field shows you whether a log is created when packets match this rule (Yes) or
not (No).
Click the edit icon to go to the screen where you can edit the rule.
Click the delete icon to delete an existing firewall rule. A window display asking you
to confirm that you want to delete the firewall rule. Note that subsequent firewall
rules move up by one when you take this action.
Type the index number for where you want to put a rule. For example, if you type 6,
your new rule becomes number 6 and the previous rule 6 (if there is one) becomes
rule 7.
Click Insert to display this screen and refer to the following table for information on
the fields.
Type a rule's index number and the number for where you want to put that rule.
Click Move to move the rule to the number that you typed. The ordering of your
rules is important as they are applied in order of their numbering.
Chapter 9 Firewall
155

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents