ZyWALL 10 Internet Security Gateway
14.1
SMT Menus...............................................................................................................................14-1
14.1.1
View Firewall Log ............................................................................................................14-2
14.1.2
Attack Types .....................................................................................................................14-2
14.2
14.3
14.3.1
Packet Filtering: ................................................................................................................14-6
14.3.2
Firewall .............................................................................................................................14-7
15.1
15.2
Enabling the Firewall ................................................................................................................15-3
15.3
E-mail........................................................................................................................................15-3
15.3.1
What are Alerts?................................................................................................................15-3
15.3.2
What are Logs? .................................................................................................................15-4
15.3.3
SMTP Error Messages ......................................................................................................15-6
15.3.4
Example E-mail Log .........................................................................................................15-6
15.4
Attack Alert...............................................................................................................................15-7
15.4.1
Threshold Values: .............................................................................................................15-7
15.4.2
Half-Open Sessions ...........................................................................................................15-8
16.1
Rules Overview.........................................................................................................................16-1
16.2
Rule Logic Overview ................................................................................................................16-1
16.2.1
Rule Checklist ...................................................................................................................16-1
16.2.2
Security Ramifications ......................................................................................................16-2
16.2.3
16.3
Connection Direction ................................................................................................................16-3
16.3.1
LAN to WAN Rules..........................................................................................................16-3
16.3.2
WAN to LAN Rules..........................................................................................................16-3
16.4
Rule Summary...........................................................................................................................16-4
16.5
Predefined Services...................................................................................................................16-7
16.5.1
16.5.2
16.6
Timeout ...................................................................................................................................16-14
16.6.1
Chapter 17 Custom Ports.......................................................................................................................17-1
xiv
Table of Contents