ZyXEL Communications ZyWALL 5 User Manual page 15

Internet security appliance
Hide thumbs Also See for ZyWALL 5:
Table of Contents

Advertisement

ZyWALL 5 Internet Security Appliance
Figure 8-2 IP Alias................................................................................................................................8-4
Figure 8-3 Port Roles............................................................................................................................8-5
Figure 8-4 Port Roles Change Complete ..............................................................................................8-6
Figure 8-5 DMZ Public Address Example ...........................................................................................8-6
Figure 8-6 DMZ Private and Public Address Example ........................................................................8-7
Figure 9-1 ZyWALL Firewall Application ..........................................................................................9-2
Figure 9-2 Three-Way Handshake........................................................................................................9-4
Figure 9-3 SYN Flood ..........................................................................................................................9-4
Figure 9-4 Smurf Attack .......................................................................................................................9-5
Figure 9-5 Stateful Inspection ..............................................................................................................9-6
Figure 10-1 LAN to WAN Traffic......................................................................................................10-4
Figure 10-2 WAN to LAN Traffic......................................................................................................10-4
Figure 10-3 Default Rule (Router Mode) ...........................................................................................10-5
Figure 10-4 Default Rule (Bridge Mode) ...........................................................................................10-6
Figure 10-5 Rule Summary ................................................................................................................10-7
Figure 10-6 Creating/Editing A Firewall Rule ...................................................................................10-9
Figure 10-7 Creating/Editing A Custom Service..............................................................................10-11
Figure 10-8 Rule Summary ..............................................................................................................10-12
Figure 10-9 Rule Edit Example ........................................................................................................10-12
Figure 10-10 Edit Custom Service Example ....................................................................................10-13
Figure 10-11 My Service Rule Configuration ..................................................................................10-14
Figure 10-12 My Service Example Rule Summary..........................................................................10-15
Figure 10-13 Anti-Probing ...............................................................................................................10-18
Figure 10-14 Firewall Threshold ......................................................................................................10-20
Figure 11-1 Content Filter : General...................................................................................................11-2
Figure 11-2 Content Filtering Lookup Procedure...............................................................................11-4
Figure 11-3 Content Filter : Categories ..............................................................................................11-5
Figure 11-4 Content Filter : Customization ......................................................................................11-12
Figure 12-1 Encryption and Decryption .............................................................................................12-1
Figure 12-2 IPSec Architecture ..........................................................................................................12-2
Figure 12-3 Transport and Tunnel Mode IPSec Encapsulation..........................................................12-3
Figure 13-1 IPSec Summary Fields ....................................................................................................13-3
Figure 13-2 VPN Rules ......................................................................................................................13-3
Figure 13-3 NAT Router Between IPSec Routers..............................................................................13-5
Figure 13-4 VPN Host using Intranet DNS Server Example .............................................................13-6
Figure 13-5 Edit VPN Rule ................................................................................................................13-9
Figure 13-6 Two Phases to Set Up the IPSec SA .............................................................................13-15
Figure 13-7 Edit VPN Rule: Advanced ............................................................................................13-17
Figure 13-8 VPN Manual Setup .......................................................................................................13-20
Figure 13-9 SA Monitor ...................................................................................................................13-23
Figure 13-10 Global Setting .............................................................................................................13-24
Figure 13-11 Telecommuters Sharing One VPN Rule Example ......................................................13-25
Figure 13-12 Telecommuters Using Unique VPN Rules Example ..................................................13-26
Figure 14-1 Certificate Configuration Overview................................................................................14-2
Figure 14-2 My Certificates................................................................................................................14-3
Figure 14-3 My Certificate Import .....................................................................................................14-6
Figure 14-4 My Certificate Create......................................................................................................14-7
Figure 14-5 My Certificate Details...................................................................................................14-10
Figure 14-6 Trusted CAs ..................................................................................................................14-13
Figure 14-7 Trusted CA Import ........................................................................................................14-14
Figure 14-8 Trusted CA Details........................................................................................................14-16
List of Figures
xv

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents