
ZYWALL 10/50 Internet Security Gateway
10.5.4 | UDP/ICMP Security ....................................................................................................... | |
10.5.5 | Upper Layer Protocols .................................................................................................... | |
10.6 | Guidelines For Enhancing Security With Your Firewall .................................................... | |
10.6.1 | Security In General ......................................................................................................... | |
10.7 | Packet Filtering Vs Firewall................................................................................................ | |
10.7.1 | Packet Filtering: .............................................................................................................. | |
10.7.2 | Firewall ........................................................................................................................... | |
Chapter 11 Introducing the ZyWALL Firewall.................................................................................... | ||
11.1 | Remote Management and the Firewall.................................................................................. | |
11.2 | Access Methods .................................................................................................................... | |
11.3 | Using ZyWALL SMT Menus ............................................................................................... | |
11.3.1 | Activating the Firewall...................................................................................................... | |
11.3.2 Viewing the Firewall Log ................................................................................................. | ||
Chapter 12 Using the ZyWALL Web Configurator............................................................................. | ||
12.1 | Web Configurator Login and Main Menu Screens ............................................................... | |
12.2 | Enabling the Firewall ............................................................................................................ | |
12.3 | ||
12.3.1 | Alerts................................................................................................................................. | |
12.3.2 | Logs................................................................................................................................... | |
12.3.3 | SMTP Error Messages ...................................................................................................... | |
12.3.4 | Example | |
12.4 | Attack Alert........................................................................................................................... | |
12.4.1 | Threshold Values .............................................................................................................. | |
12.4.2 | ||
Chapter 13 Creating Custom Rules ...................................................................................................... | ||
13.1 | Rules Overview..................................................................................................................... | |
13.2 | Rule Logic Overview ............................................................................................................ |
xii | Table of Contents |