ZyXEL Communications ZYWALL2 ET 2WE User Manual page 609

Internet security gateway
Table of Contents

Advertisement

Filter................................. 23-12, 24-1, 26-9, 30-1
Applying .......................................................... 30-17
Configuration ..................................................... 30-1
Configuring........................................................ 30-4
Example ........................................................... 30-13
Generic Filter Rule........................................... 30-11
Generic Rule .................................................... 30-11
NAT ................................................................. 30-16
Remote Node ................................................... 30-17
Structure
...........................................................
TCP/IP Rule....................................................... 30-7
Filters
Executing a Filter Rule ...................................... 30-2
IP Filter Logic Flow........................................... 30-9
Finger ............................................................... 8-6
Firewall ............................................................ 1-3
Access Methods ................................................. 11-1
Activating........................................................... 29-1
Address Type ................................................... 11-12
Alerts.................................................................. 11-5
Connection Direction ......................................... 11-3
Creating/Editing Rules....................................... 11-8
Custom Ports..................................See Custom Ports
Enabling............................................................. 11-1
Firewall Vs Filters............................................ 10-11
Guidelines For Enhancing Security.................. 10-11
Introduction........................................................ 10-2
LAN to WAN Rules........................................... 11-4
Policies............................................................... 11-1
Rule Checklist.................................................... 11-2
Rule Logic.......................................................... 11-2
Rule Security Ramifications .............................. 11-2
Services............................................................ 11-18
SMT Menus ....................................................... 29-1
Types.................................................................. 10-1
When To Use ................................................... 10-12
Firmware File
Maintenance..................................... 20-5, 20-7, 33-1
Flow Control .................................................. 21-1
Fragmentation Threshold ................................. 7-2
Frequency-Hopping Spread Spectrum ............ D-2
FTP..............4-3, 5-1, 8-5, 17-2, 17-21, 33-3, 35-3
File Upload ...................................................... 33-12
GUI-based Clients.............................................. 33-4
Restoring Files ................................................... 33-8
Index
FTP File Transfer......................................... 33-11
FTP Restrictions .......................... 17-2, 33-5, 35-3
FTP Server............................................ 1-6, 28-13
Full Feature............................................. See NAT
Full Network Management .............................. 1-5
Gateway IP Addr ........................................... 26-7
30-2
Gateway IP Address ............................. 25-2, 27-2
General Setup .................................. 3-1, 4-1, 22-1
Global .............................................................. 8-1
Half-Open Sessions ..................................... 11-21
Hidden Menus................................................ 21-2
Host......................................................... 4-6, 22-3
Host IDs............................................................ I-1
HTTP ............... 8-6, 10-1, 10-3, 10-4, 37-9, 37-11
HyperTerminal.................................. 33-15, 33-17
HyperTerminal program ..................... 33-7, 33-10
i.e. ................................... See Syntax Conventions
IBSS................See Independent Basic Service Set
ICMP echo..................................................... 10-6
Idle Timeout .......................23-7, 23-8, 26-4, 26-5
IEEE 802.11.....................................................D-1
Deployment Issues............................................... E-1
Security Flaws ..................................................... E-1
IEEE 802.1x..................................................... E-1
Advantages .......................................................... E-1
IGMP ............................................................... 5-3
Incoming Protocol Filters .............................. 24-6
Independent Basic Service Set.........................D-2
Industry Canada ..................................................iv
Infrastructure Configuration ............................D-2
Initial Screen.................................................. 21-1
Inside ............................................................... 8-1
Inside Global Address...................................... 8-1
ZyWALL 2 Series User's Guide
G
H
I
Q-3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 2Zywall 2we

Table of Contents