ZyXEL Communications Internet Security Gateway ZyWALL 2 Series User Manual

Page 9

Advertising
background image

ZyWALL 2 Series User’s Guide

Table of Contents

ix

10.3

Introduction to ZyXEL’s Firewall........................................................................................ 10-2

10.4

Denial of Service.................................................................................................................. 10-3

10.5

Stateful Inspection................................................................................................................ 10-7

10.6

Guidelines For Enhancing Security With Your Firewall ................................................... 10-11

10.7

Packet Filtering Vs Firewall............................................................................................... 10-11

Chapter 11 Firewall Screens ..................................................................................................................11-1

11.1

Access Methods ................................................................................................................... 11-1

11.2

Firewall Policies Overview .................................................................................................. 11-1

11.3

Rule Logic Overview ........................................................................................................... 11-2

11.4

Connection Direction Examples........................................................................................... 11-3

11.5

Alerts.................................................................................................................................... 11-5

11.6

Configuring Firewall............................................................................................................ 11-5

11.7

Example Firewall Rule....................................................................................................... 11-13

11.8

Predefined Services............................................................................................................ 11-18

11.9

Configuring Attack Alert ................................................................................................... 11-20

Chapter 12 Content Filtering Screens.................................................................................................. 12-1

12.1

Introduction to Content Filtering.......................................................................................... 12-1

12.2

General Content Filter Configuration................................................................................... 12-1

12.3

Content Filtering with an External Server............................................................................ 12-4

12.4

Checking Content Filtering Activation ................................................................................ 12-5

12.5

Configuring for Registering and Categories......................................................................... 12-5

12.6

Configuring Customization ................................................................................................ 12-14

VPN/IPSec ..................................................................................................................................................... VI

Chapter 13 Introduction to IPSec......................................................................................................... 13-1

13.1

VPN Overview ..................................................................................................................... 13-1

13.2

IPSec Architecture ............................................................................................................... 13-3

13.3

Encapsulation ....................................................................................................................... 13-4

13.4

IPSec and NAT .................................................................................................................... 13-5

Chapter 14 VPN Screens ....................................................................................................................... 14-1

14.1

VPN/IPSec Overview........................................................................................................... 14-1

14.2

IPSec Algorithms ................................................................................................................. 14-1

14.3

My IP Address...................................................................................................................... 14-2

14.4

Secure Gateway Address...................................................................................................... 14-2

14.5

Summary Screen .................................................................................................................. 14-3

14.6

Keep Alive ........................................................................................................................... 14-5

14.7

NAT Traversal ..................................................................................................................... 14-6

14.8

ID Type and Content............................................................................................................ 14-8

14.9

Pre-Shared Key .................................................................................................................. 14-10

14.10

VPN Implementation.......................................................................................................... 14-10

14.11

Configuring Basic IKE VPN Rule Setup ........................................................................... 14-11

14.12

IKE Phases ......................................................................................................................... 14-21

Advertising