| ZYWALL 10/50 Internet Security Gateway |
| |
13.2.1 | Rule Checklist .................................................................................................................. | ||
13.2.2 | Security Ramifications ..................................................................................................... | ||
13.2.3 Key Fields For Configuring Rules.................................................................................... | |||
13.3 | Connection Direction............................................................................................................ | ||
13.3.1 LAN to WAN Rules ......................................................................................................... | |||
13.3.2 WAN to LAN Rules ......................................................................................................... | |||
13.4 | Rule Summary...................................................................................................................... | ||
13.5 | Predefined Services .............................................................................................................. | ||
13.5.1 | Creating/Editing Firewall Rules ..................................................................................... | ||
13.5.2 Source and Destination Addresses.................................................................................. | |||
13.6 | Timeout .............................................................................................................................. | ||
13.6.1 Factors Influencing Choices for Timeout Values ........................................................... | |||
Chapter 14 Custom Ports...................................................................................................................... | |||
14.1 | Introduction .......................................................................................................................... | ||
14.2 | Creating/Editing A Custom Port........................................................................................... | ||
Chapter 15 Logs ..................................................................................................................................... | |||
15.1 | Log Screen............................................................................................................................ | ||
Chapter 16 Example Firewall Rules..................................................................................................... | |||
16.1 | Examples .............................................................................................................................. | ||
16.1.1 Example 1: Firewall Rule To Allow Web Service From The Internet ............................. | |||
16.1.2 Example 2: Small Office With Mail, FTP and Web Servers............................................ | |||
16.1.3 Example 3: DHCP Negotiation and Syslog Connection from the Internet..................... | |||
Chapter 17 Content Filtering................................................................................................................ | |||
17.1 | Categories............................................................................................................................. | 17 |
|
Table of Contents | xiii |