ZyWALL 2 and ZyWALL 2WE

Figure 13-3 SYN Flood................................................................................................................................

13-5

Figure 13-4 Smurf Attack ............................................................................................................................

13-6

Figure 13-5 Stateful Inspection....................................................................................................................

13-8

Figure 14-1 Menu 21: Filter and Firewall Setup..........................................................................................

14-1

Figure 14-2 Menu 21.2: Firewall Setup .......................................................................................................

14-2

Figure 15-1 Enabling the Firewall ...............................................................................................................

15-2

Figure 15-2 Attack Alert ..............................................................................................................................

15-5

Figure 16-1 LAN to WAN Traffic................................................................................................................

16-4

Figure 16-2 WAN to LAN Traffic................................................................................................................

16-4

Figure 16-3 Firewall Rules Summary: First Screen.....................................................................................

16-5

Figure 16-4 Creating/Editing A Firewall Rule ............................................................................................

16-11

Figure 16-5 Adding/Editing Source and Destination Addresses ................................................................

16-13

Figure 16-6 Creating/Editing A Custom Port.............................................................................................

16-14

Figure 16-7 Firewall Rule Configuration Screen Example........................................................................

16-16

Figure 16-8 Firewall IP Config Screen Example .......................................................................................

16-17

Figure 16-9 Custom Port Example.............................................................................................................

16-18

Figure 16-10 Rule Configuration Example................................................................................................

16-19

Figure 16-11 Rule Summary Example.......................................................................................................

16-20

Figure 17-1Content Filter.............................................................................................................................

17-2

Figure 18-1 View Log ..................................................................................................................................

18-2

Figure 18-2 Log Settings..............................................................................................................................

18-4

Figure 18-3 Reports .....................................................................................................................................

18-7

Figure 18-4 Web Site Hits Report Example .................................................................................................

18-9

Figure 18-5 Protocol/Port Report Example................................................................................................

18-10

Figure 18-6 LAN IP Address Report Example............................................................................................

18-11

Figure 19-1 Outgoing Packet Filtering Process ...........................................................................................

19-2

Figure 19-2 Filter Rule Process....................................................................................................................

19-3

List of Figures

xix