ZyWALL 2 and ZyWALL 2WE

12.5

General NAT Examples......................................................................................................

12-17

12.6

Trigger Port Forwarding .....................................................................................................

12-24

Firewall and Content Filters.........................................................................................................................

IV

Chapter 13 Firewalls ..............................................................................................................................

13-1

13.1

Introduction to Firewalls.......................................................................................................

13-1

13.2

Types of Firewalls.................................................................................................................

13-1

13.3

Introduction to ZyXEL’s Firewall ........................................................................................

13-2

13.4

Denial of Service...................................................................................................................

13-3

13.5

Stateful Inspection ................................................................................................................

13-7

13.6

Guidelines For Enhancing Security With Your Firewall ....................................................

13-11

13.7

Packet Filtering Vs Firewall ...............................................................................................

13-12

Chapter 14 Introducing the ZyWALL Firewall ...................................................................................

14-1

14.1

Introduction to the ZyWALL Firewall..................................................................................

14-1

14.2

Remote Management and the Firewall .................................................................................

14-1

14.3

Access Methods ....................................................................................................................

14-1

14.4

Using ZyWALL SMT Menus ...............................................................................................

14-1

Chapter 15 Firewall Configuration.......................................................................................................

15-1

15.1

Introduction to Firewall Configuration .................................................................................

15-1

15.2

Enabling the Firewall............................................................................................................

15-1

15.3

Attack Alert...........................................................................................................................

15-3

Chapter 16 Creating Custom Rules ......................................................................................................

16-1

16.1

Introduction to Custom Rules ...............................................................................................

16-1

16.2

Rule Logic Overview............................................................................................................

16-2

16.3

Connection Direction Examples ...........................................................................................

16-3

16.4

Rule Summary ......................................................................................................................

16-5

16.5

Predefined Services...............................................................................................................

16-7

16.6

Custom Ports.......................................................................................................................

16-14

x

Table of Contents