ZYWALL 10/50 Internet Security Gateway

 

13.2.1

Rule Checklist ..................................................................................................................

13-1

13.2.2

Security Ramifications .....................................................................................................

13-2

13.2.3 Key Fields For Configuring Rules....................................................................................

13-2

13.3

Connection Direction............................................................................................................

13-3

13.3.1 LAN to WAN Rules .........................................................................................................

13-3

13.3.2 WAN to LAN Rules .........................................................................................................

13-4

13.4

Rule Summary......................................................................................................................

13-4

13.5

Predefined Services ..............................................................................................................

13-7

13.5.1

Creating/Editing Firewall Rules .....................................................................................

13-10

13.5.2 Source and Destination Addresses..................................................................................

13-11

13.6

Timeout ..............................................................................................................................

13-13

13.6.1 Factors Influencing Choices for Timeout Values ...........................................................

13-13

Chapter 14 Custom Ports......................................................................................................................

14-1

14.1

Introduction ..........................................................................................................................

14-1

14.2

Creating/Editing A Custom Port...........................................................................................

14-3

Chapter 15 Logs .....................................................................................................................................

15-1

15.1

Log Screen............................................................................................................................

15-1

Chapter 16 Example Firewall Rules.....................................................................................................

16-1

16.1

Examples ..............................................................................................................................

16-1

16.1.1 Example 1: Firewall Rule To Allow Web Service From The Internet .............................

16-1

16.1.2 Example 2: Small Office With Mail, FTP and Web Servers............................................

16-6

16.1.3 Example 3: DHCP Negotiation and Syslog Connection from the Internet.....................

16-12

Chapter 17 Content Filtering................................................................................................................

17-1

17.1

Categories.............................................................................................................................

17

 

Table of Contents

xiii