ZyXEL Communications Internet Security Gateway ZyWALL 2 Series User Manual

Page 609

Advertising
background image

ZyWALL 2 Series User’s Guide

Index

Q-3

Filter................................. 23-12, 24-1, 26-9, 30-1

Applying .......................................................... 30-17
Configuration ..................................................... 30-1
Configuring........................................................ 30-4
Example ........................................................... 30-13
Generic Filter Rule........................................... 30-11
Generic Rule .................................................... 30-11
NAT ................................................................. 30-16
Remote Node ................................................... 30-17

Structure

...........................................................

30-2

TCP/IP Rule....................................................... 30-7

Filters

Executing a Filter Rule ...................................... 30-2
IP Filter Logic Flow........................................... 30-9

Finger ............................................................... 8-6
Firewall ............................................................ 1-3

Access Methods ................................................. 11-1
Activating........................................................... 29-1
Address Type ................................................... 11-12
Alerts.................................................................. 11-5
Connection Direction ......................................... 11-3
Creating/Editing Rules....................................... 11-8
Custom Ports..................................See Custom Ports
Enabling............................................................. 11-1
Firewall Vs Filters............................................ 10-11
Guidelines For Enhancing Security.................. 10-11
Introduction........................................................ 10-2
LAN to WAN Rules........................................... 11-4
Policies............................................................... 11-1
Rule Checklist.................................................... 11-2
Rule Logic.......................................................... 11-2
Rule Security Ramifications .............................. 11-2
Services............................................................ 11-18
SMT Menus ....................................................... 29-1
Types.................................................................. 10-1
When To Use ................................................... 10-12

Firmware File

Maintenance..................................... 20-5, 20-7, 33-1

Flow Control .................................................. 21-1
Fragmentation Threshold ................................. 7-2
Frequency-Hopping Spread Spectrum ............ D-2
FTP..............4-3, 5-1, 8-5, 17-2, 17-21, 33-3, 35-3

File Upload ...................................................... 33-12
GUI-based Clients.............................................. 33-4
Restoring Files ................................................... 33-8

FTP File Transfer......................................... 33-11
FTP Restrictions ..........................17-2, 33-5, 35-3
FTP Server............................................ 1-6, 28-13
Full Feature............................................. See NAT
Full Network Management .............................. 1-5

G

Gateway IP Addr ........................................... 26-7
Gateway IP Address ............................. 25-2, 27-2
General Setup ..................................3-1, 4-1, 22-1
Global .............................................................. 8-1

H

Half-Open Sessions ..................................... 11-21
Hidden Menus................................................ 21-2
Host......................................................... 4-6, 22-3
Host IDs............................................................ I-1
HTTP ............... 8-6, 10-1, 10-3, 10-4, 37-9, 37-11
HyperTerminal.................................. 33-15, 33-17
HyperTerminal program ..................... 33-7, 33-10

I

i.e. ................................... See Syntax Conventions
IBSS................See Independent Basic Service Set
ICMP echo..................................................... 10-6
Idle Timeout .......................23-7, 23-8, 26-4, 26-5
IEEE 802.11.....................................................D-1

Deployment Issues............................................... E-1
Security Flaws ..................................................... E-1

IEEE 802.1x..................................................... E-1

Advantages .......................................................... E-1

IGMP ............................................................... 5-3
Incoming Protocol Filters .............................. 24-6
Independent Basic Service Set.........................D-2
Industry Canada ..................................................iv
Infrastructure Configuration ............................D-2
Initial Screen.................................................. 21-1
Inside ............................................................... 8-1
Inside Global Address...................................... 8-1

Advertising