Firewall Configuration; Figure 6-5 Configuration; Figure 6-6 Configuration; Dmz - ZyXEL Communications Vantage CNM 2.0 User Manual

Centralized network management
Hide thumbs Also See for Vantage CNM 2.0:
Table of Contents

Advertisement

Source Address
What is the connection's source address; is it on the LAN, DMZ or WAN? Is it a single IP, a range of IPs or a
subnet?
Destination Address
What is the connection's destination address; is it on the LAN, DMZ or WAN? Is it a single IP, a range of IPs or
a subnet?
12.7.4 Alerts
Alerts are reports on events, such as attacks, that you may want to know about right away. You can choose to
generate an alert when an attack is detected by selecting the Generate alert when attack detected checkbox
Configure the Log Settings screen to have the ZyXEL device send an immediate e-mail message to you when an
event generates an alert. Refer to the chapter on logs for details.
12.7.5 Services and Port Numbers
The most often used port numbers are shown in the following table. Please refer to RFC 1700 for further
information about port numbers.
ECHO
FTP (File Transfer Protocol)
SMTP (Simple Mail Transfer Protocol)
DNS (Domain Name System)
Finger
HTTP (Hyper Text Transfer protocol or WWW, Web)
POP3 (Post Office Protocol)
NNTP (Network News Transport Protocol)
SNMP (Simple Network Management Protocol)
SNMP trap
PPTP (Point-to-Point Tunneling Protocol)

12.8 Firewall Configuration

12.8.1 Firewall Summary
Ordering Rules
When you click Add, a new rule is always appended to the end of the list. Use the Move selected item to
beginning index number textbox and Move button to put a single rule in a different place.
Select a device and then click Configuration > Firewall.
Configuration > Firewall

Table 12-5 Services and Port Numbers

SERVICES
Vantage CNM 2.0
PORT NUMBER
7
21
25
53
79
80
110
119
161
162
1723
.
12-9

Advertisement

Table of Contents
loading

Table of Contents