ZYWALL 10/10 II/50 Internet Security Gateway
Figure 15-1 Log Screen................................................................................................................................ 15-1
Figure 16-11 Custom Port for Syslog......................................................................................................... 16-12
Figure 16-12 Syslog Rule Configuration ................................................................................................... 16-13
Figure 16-13 Example 3: Rule Summary................................................................................................... 16-14
Figure 18-3 Menu 21 - Filter and Firewall Setup ...................................................................................... 18-4
Figure 18-4 Menu 21.1 - Filter Set Configuration..................................................................................... 18-5
Figure 18-5 NetBIOS_WAN Filter Rules Summary .................................................................................... 18-5
Figure 18-6 Menu 21.1.1.1 - TCP/IP Filter Rule....................................................................................... 18-8
Figure 18-7 Executing an IP Filter ..............................................................................................................18-11
Figure 18-8 Menu 21.4.1.1 - Generic Filter Rule .................................................................................... 18-12
Figure 18-9 Telnet Filter Example ............................................................................................................. 18-14
Figure 18-10 Example Filter - Menu 21.1.3.1 ......................................................................................... 18-15
Figure 18-11 Example Filter Rules Summary - Menu 21.1.3.................................................................. 18-16
Figure 18-12 Protocol and Device Filter Sets ............................................................................................ 18-17
Figure 18-13 Filtering LAN Traffic ........................................................................................................... 18-18
List of Figures
xxiii