ZyXEL Communications ZyXEL ZyWALL P1 User Manual
Page 13

ZyWALL P1 User’s Guide
12
Table of Contents
6.7.2.1 When To Use The Firewall ............................................................102
7.1 Access Methods ...............................................................................................103
7.2 Firewall Policies Overview ...............................................................................103
7.3 Rule Logic Overview ........................................................................................104
7.3.1 Rule Checklist .........................................................................................104
7.3.2 Security Ramifications ............................................................................104
7.3.3 Key Fields For Configuring Rules ...........................................................105
7.5 Alerts ................................................................................................................106
7.6 Configuring Firewall .........................................................................................107
7.6.1 Rule Summary ........................................................................................107
7.6.2 Configuring Firewall Rules ......................................................................109
7.6.3 Configuring Custom Services .................................................................112
7.7 Example Firewall Rule .....................................................................................112
7.8 Predefined Services .........................................................................................116
7.9 Anti-Probing .....................................................................................................118
7.10 Configuring Attack Alert .................................................................................119
7.10.2.1 TCP Maximum Incomplete and Blocking Time ...........................120
8.1.3.1 Encryption .....................................................................................123
8.1.3.2 Data Confidentiality .......................................................................124
8.1.3.3 Data Integrity .................................................................................124
8.1.3.4 Data Origin Authentication ............................................................124
8.1.4.1 Linking Two or More Private Networks Together ...........................124