ZyXEL Communications ZyWall P1 User Manual page 13

Hide thumbs Also See for ZyWall P1:
Table of Contents

Advertisement

ZyWALL P1 User's Guide
Firewall Screens................................................................................................... 103
7.1 Access Methods ...............................................................................................103
7.2 Firewall Policies Overview ...............................................................................103
7.3 Rule Logic Overview ........................................................................................104
7.4 Connection Direction Examples .......................................................................105
7.5 Alerts ................................................................................................................106
7.6 Configuring Firewall .........................................................................................107
7.7 Example Firewall Rule .....................................................................................112
7.8 Predefined Services .........................................................................................116
7.9 Anti-Probing .....................................................................................................118
7.10 Configuring Attack Alert .................................................................................119
Chapter 8
Introduction to IPSec ........................................................................................... 123
8.1 VPN Overview ..................................................................................................123
12
6.7.2 Firewall ...................................................................................................102
6.7.2.1 When To Use The Firewall ............................................................102
7.3.1 Rule Checklist .........................................................................................104
7.3.2 Security Ramifications ............................................................................104
7.3.3 Key Fields For Configuring Rules ...........................................................105
7.3.3.1 Action ............................................................................................105
7.3.3.2 Service ..........................................................................................105
7.3.3.3 Source Address .............................................................................105
7.3.3.4 Destination Address ......................................................................105
7.4.1 LAN To WAN Rules ................................................................................106
7.4.2 WAN To LAN Rules ................................................................................106
7.6.1 Rule Summary ........................................................................................107
7.6.2 Configuring Firewall Rules ......................................................................109
7.6.3 Configuring Custom Services .................................................................112
7.10.1 Threshold Values ..................................................................................120
7.10.2 Half-Open Sessions ..............................................................................120
8.1.1 IPSec ......................................................................................................123
8.1.2 Security Association ...............................................................................123
8.1.3 Other Terminology ..................................................................................123
8.1.3.1 Encryption .....................................................................................123
8.1.3.2 Data Confidentiality .......................................................................124
8.1.3.3 Data Integrity .................................................................................124
8.1.3.4 Data Origin Authentication ............................................................124
8.1.4 VPN Applications ....................................................................................124
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents