ZyXEL Communications ZyXEL ZYWALL10 User Manual page 14

Internet security gateway
Hide thumbs Also See for ZyXEL ZYWALL10:
Table of Contents

Advertisement

ZyWALL 10 Internet Security Gateway
14.1
SMT Menus...............................................................................................................................14-1
14.1.1
View Firewall Log ............................................................................................................14-2
14.1.2
Attack Types .....................................................................................................................14-2
14.2
The Big Picture - Filtering, Firewall and NAT .........................................................................14-5
14.3
Packet Filtering Vs Firewall......................................................................................................14-6
14.3.1
Packet Filtering: ................................................................................................................14-6
14.3.2
Firewall .............................................................................................................................14-7
Chapter 15 Introducing the ZyWALL Web Configurator..................................................................15-1
15.1
Web Configurator Login and Welcome Screens.......................................................................15-1
15.2
Enabling the Firewall ................................................................................................................15-3
15.3
E-mail........................................................................................................................................15-3
15.3.1
What are Alerts?................................................................................................................15-3
15.3.2
What are Logs? .................................................................................................................15-4
15.3.3
SMTP Error Messages ......................................................................................................15-6
15.3.4
Example E-mail Log .........................................................................................................15-6
15.4
Attack Alert...............................................................................................................................15-7
15.4.1
Threshold Values: .............................................................................................................15-7
15.4.2
Half-Open Sessions ...........................................................................................................15-8
Chapter 16 Creating Custom Rules ......................................................................................................16-1
16.1
Rules Overview.........................................................................................................................16-1
16.2
Rule Logic Overview ................................................................................................................16-1
16.2.1
Rule Checklist ...................................................................................................................16-1
16.2.2
Security Ramifications ......................................................................................................16-2
16.2.3
Key Fields For Configuring Rules ....................................................................................16-2
16.3
Connection Direction ................................................................................................................16-3
16.3.1
LAN to WAN Rules..........................................................................................................16-3
16.3.2
WAN to LAN Rules..........................................................................................................16-3
16.4
Rule Summary...........................................................................................................................16-4
16.5
Predefined Services...................................................................................................................16-7
16.5.1
Creating/Editing Firewall Rules......................................................................................16-10
16.5.2
Source and Destination Addresses ..................................................................................16-12
16.6
Timeout ...................................................................................................................................16-14
16.6.1
Factors Influencing Choices for Timeout Values............................................................16-14
Chapter 17 Custom Ports.......................................................................................................................17-1
xiv
Table of Contents

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 10

Table of Contents