ZyWALL 5 Internet Security Appliance
Figure 8-2 IP Alias................................................................................................................................8-4
Figure 8-3 Port Roles............................................................................................................................8-5
Figure 9-3 SYN Flood ..........................................................................................................................9-4
Figure 9-4 Smurf Attack .......................................................................................................................9-5
Figure 10-5 Rule Summary ................................................................................................................10-7
Figure 10-8 Rule Summary ..............................................................................................................10-12
Figure 10-13 Anti-Probing ...............................................................................................................10-18
Figure 13-2 VPN Rules ......................................................................................................................13-3
Figure 13-5 Edit VPN Rule ................................................................................................................13-9
Figure 13-9 SA Monitor ...................................................................................................................13-23
Figure 13-10 Global Setting .............................................................................................................13-24
Figure 14-2 My Certificates................................................................................................................14-3
Figure 14-6 Trusted CAs ..................................................................................................................14-13
List of Figures
xv