ZYWALL 10/50 Internet Security Gateway

10.5.4

UDP/ICMP Security .......................................................................................................

10-10

10.5.5

Upper Layer Protocols ....................................................................................................

10-11

10.6

Guidelines For Enhancing Security With Your Firewall ....................................................

10-11

10.6.1

Security In General .........................................................................................................

10-12

10.7

Packet Filtering Vs Firewall................................................................................................

10-12

10.7.1

Packet Filtering: ..............................................................................................................

10-13

10.7.2

Firewall ...........................................................................................................................

10-13

Chapter 11 Introducing the ZyWALL Firewall....................................................................................

11-1

11.1

Remote Management and the Firewall..................................................................................

11-1

11.2

Access Methods ....................................................................................................................

11-1

11.3

Using ZyWALL SMT Menus ...............................................................................................

11-1

11.3.1

Activating the Firewall......................................................................................................

11-1

11.3.2 Viewing the Firewall Log .................................................................................................

11-2

Chapter 12 Using the ZyWALL Web Configurator.............................................................................

12-1

12.1

Web Configurator Login and Main Menu Screens ...............................................................

12-1

12.2

Enabling the Firewall ............................................................................................................

12-2

12.3

E-mail....................................................................................................................................

12-2

12.3.1

Alerts.................................................................................................................................

12-2

12.3.2

Logs...................................................................................................................................

12-3

12.3.3

SMTP Error Messages ......................................................................................................

12-5

12.3.4

Example E-mail Log .........................................................................................................

12-5

12.4

Attack Alert...........................................................................................................................

12-6

12.4.1

Threshold Values ..............................................................................................................

12-6

12.4.2

Half-Open Sessions...........................................................................................................

12-7

Chapter 13 Creating Custom Rules ......................................................................................................

13-1

13.1

Rules Overview.....................................................................................................................

13-1

13.2

Rule Logic Overview ............................................................................................................

13-1

xii

Table of Contents