ZyXEL Communications ZyXEL ZyWALL P1 User Manual

Page 13

Advertising
background image

ZyWALL P1 User’s Guide

12

Table of Contents

6.7.2 Firewall ...................................................................................................102

6.7.2.1 When To Use The Firewall ............................................................102

Chapter 7
Firewall Screens...................................................................................................
103

7.1 Access Methods ...............................................................................................103
7.2 Firewall Policies Overview ...............................................................................103
7.3 Rule Logic Overview ........................................................................................104

7.3.1 Rule Checklist .........................................................................................104
7.3.2 Security Ramifications ............................................................................104
7.3.3 Key Fields For Configuring Rules ...........................................................105

7.3.3.1 Action ............................................................................................105
7.3.3.2 Service ..........................................................................................105
7.3.3.3 Source Address .............................................................................105
7.3.3.4 Destination Address ......................................................................105

7.4 Connection Direction Examples .......................................................................105

7.4.1 LAN To WAN Rules ................................................................................106
7.4.2 WAN To LAN Rules ................................................................................106

7.5 Alerts ................................................................................................................106
7.6 Configuring Firewall .........................................................................................107

7.6.1 Rule Summary ........................................................................................107
7.6.2 Configuring Firewall Rules ......................................................................109
7.6.3 Configuring Custom Services .................................................................112

7.7 Example Firewall Rule .....................................................................................112
7.8 Predefined Services .........................................................................................116
7.9 Anti-Probing .....................................................................................................118
7.10 Configuring Attack Alert .................................................................................119

7.10.1 Threshold Values ..................................................................................120
7.10.2 Half-Open Sessions ..............................................................................120

7.10.2.1 TCP Maximum Incomplete and Blocking Time ...........................120

Chapter 8
Introduction to IPSec ...........................................................................................
123

8.1 VPN Overview ..................................................................................................123

8.1.1 IPSec ......................................................................................................123
8.1.2 Security Association ...............................................................................123
8.1.3 Other Terminology ..................................................................................123

8.1.3.1 Encryption .....................................................................................123
8.1.3.2 Data Confidentiality .......................................................................124
8.1.3.3 Data Integrity .................................................................................124
8.1.3.4 Data Origin Authentication ............................................................124

8.1.4 VPN Applications ....................................................................................124

8.1.4.1 Linking Two or More Private Networks Together ...........................124

Advertising