ZyXEL Communications ZYWALL10 User Manual

Page 21

Advertising
background image

ZyWALL 10 Internet Security Gateway

List of Figures

xxi

Figure 12-1 Telnet Configuration on a TCP/IP Network ............................................................................. 12-1

Figure 13-1 ZyWALL Firewall Application ................................................................................................ 13-3

Figure 13-2 Three-Way Handshake ............................................................................................................. 13-5

Figure 13-3 SYN Flood................................................................................................................................ 13-5

Figure 13-4 Smurf Attack ............................................................................................................................ 13-6

Figure 13-5 Stateful Inspection .................................................................................................................... 13-7

Figure 14-1 SMT Main Menu ...................................................................................................................... 14-1

Figure 14-2 Menu 21 — Filter and Firewall Setup ...................................................................................... 14-1

Figure 14-3 Menu 21.2 — Firewall Setup ................................................................................................... 14-2

Figure 14-4 View Firewall Log .................................................................................................................... 14-4

Figure 14-5 Big Picture — Filtering, Firewall and NAT.............................................................................. 14-6

Figure 15-1 Login screen as seen in Netscape ............................................................................................. 15-1

Figure 15-2 ZyWALL Web Configurator Welcome Screen ......................................................................... 15-2

Figure 15-3 Enabling the Firewall ............................................................................................................... 15-3

Figure 15-4 E-mail Screen ........................................................................................................................... 15-4

Figure 15-5 E-mail Log................................................................................................................................ 15-7

Figure 15-6 Attack Alert .............................................................................................................................. 15-9

Figure 16-1 LAN to WAN Traffic................................................................................................................ 16-3

Figure 16-2 WAN to LAN Traffic................................................................................................................ 16-4

Figure 16-3 Firewall Rules Summary — First Screen ................................................................................. 16-5

Figure 16-4 Creating/Editing A Firewall Rule........................................................................................... 16-10

Figure 16-5 Adding/Editing Source and Destination Addresses................................................................ 16-12

Figure 16-6 Timeout Screen....................................................................................................................... 16-14

Figure 17-1 Custom Ports ............................................................................................................................ 17-1

Figure 17-2 Creating/Editing A Custom Port .............................................................................................. 17-3

Figure 18-1 Log Screen................................................................................................................................ 18-1

Figure 19-1 Activate The Firewall ............................................................................................................... 19-2

Advertising