ZyXEL Communications ZYWALL10 User Manual

Page 14

Advertising
background image

ZyWALL 10 Internet Security Gateway

xiv

Table of Contents

14.1

SMT Menus...............................................................................................................................14-1

14.1.1

View Firewall Log ............................................................................................................14-2

14.1.2

Attack Types .....................................................................................................................14-2

14.2

The Big Picture - Filtering, Firewall and NAT .........................................................................14-5

14.3

Packet Filtering Vs Firewall......................................................................................................14-6

14.3.1

Packet Filtering: ................................................................................................................14-6

14.3.2

Firewall .............................................................................................................................14-7

Chapter 15 Introducing the ZyWALL Web Configurator..................................................................15-1

15.1

Web Configurator Login and Welcome Screens.......................................................................15-1

15.2

Enabling the Firewall ................................................................................................................15-3

15.3

E-mail........................................................................................................................................15-3

15.3.1

What are Alerts?................................................................................................................15-3

15.3.2

What are Logs? .................................................................................................................15-4

15.3.3

SMTP Error Messages ......................................................................................................15-6

15.3.4

Example E-mail Log .........................................................................................................15-6

15.4

Attack Alert...............................................................................................................................15-7

15.4.1

Threshold Values: .............................................................................................................15-7

15.4.2

Half-Open Sessions ...........................................................................................................15-8

Chapter 16 Creating Custom Rules ......................................................................................................16-1

16.1

Rules Overview.........................................................................................................................16-1

16.2

Rule Logic Overview ................................................................................................................16-1

16.2.1

Rule Checklist ...................................................................................................................16-1

16.2.2

Security Ramifications ......................................................................................................16-2

16.2.3

Key Fields For Configuring Rules ....................................................................................16-2

16.3

Connection Direction ................................................................................................................16-3

16.3.1

LAN to WAN Rules..........................................................................................................16-3

16.3.2

WAN to LAN Rules..........................................................................................................16-3

16.4

Rule Summary...........................................................................................................................16-4

16.5

Predefined Services...................................................................................................................16-7

16.5.1

Creating/Editing Firewall Rules......................................................................................16-10

16.5.2

Source and Destination Addresses ..................................................................................16-12

16.6

Timeout ...................................................................................................................................16-14

16.6.1

Factors Influencing Choices for Timeout Values............................................................16-14

Chapter 17 Custom Ports.......................................................................................................................17-1

Advertising