9.1.5
NAT Mapping Types.......................................................................................................... 9-4
9.2
Using NAT ................................................................................................................................. 9-6
9.2.1
9.2.2
Applying NAT.................................................................................................................... 9-6
9.3
NAT Setup.................................................................................................................................. 9-8
9.3.1
Address Mapping Sets........................................................................................................ 9-8
9.4
9.4.1
9.5
General NAT Examples ........................................................................................................... 9-16
9.5.1
Internet Access Only ........................................................................................................ 9-16
9.5.2
9.5.3
9.5.4
Chapter 10 Firewalls.............................................................................................................................. 10-1
10.1
What Is a Firewall?............................................................................................................... 10-1
10.2
Types of Firewalls ................................................................................................................ 10-1
10.2.1
10.2.2
10.2.3
10.3
10.4
Denial of Service .................................................................................................................. 10-3
10.4.1
Basics ............................................................................................................................... 10-3
10.4.2
Types of DoS Attacks....................................................................................................... 10-4
10.5
Stateful Inspection ................................................................................................................ 10-7
10.5.1
10.5.2
10.5.3
TCP Security .................................................................................................................. 10-10
Table of Contents
ZYWALL 10/10 II/50 Internet Security Gateway
xi