
P312 Broadband Security Gateway
7.6 | Guidelines For Enhancing Security With Your Firewall | .......................................................... | ||
7.6.1 |
| Security In General........................................................................................................... | ||
7.7 | Packet Filtering Vs Firewall ..................................................................................................... | |||
7.7.1 |
| Packet Filtering:................................................................................................................ | ||
7.7.2 |
| Firewall............................................................................................................................. | ||
Chapter 8 Introducing the ZyWALL Firewall....................................................................................... | ||||
8.1 | Remote Management and the Firewall ....................................................................................... | |||
8.2 | Access Methods.......................................................................................................................... | |||
8.3 | Using ZyWALL SMT Menus..................................................................................................... | |||
8.3.1 |
| Activating the Firewall ....................................................................................................... | ||
8.3.2 |
| Viewing the Firewall Log................................................................................................... | ||
Chapter 9 Using the ZyWALL Web Configurator ................................................................................ | ||||
9.1 | Web Configurator Login and Main Menu Screens..................................................................... | |||
9.2 | Enabling the Firewall ................................................................................................................. | |||
9.3 | ||||
9.3.1 |
| Alerts .................................................................................................................................. | ||
9.3.2 |
| Logs .................................................................................................................................... | ||
9.3.3 |
| SMTP Error Messages........................................................................................................ | ||
9.3.4 |
| Example | ||
9.4 | Attack Alert ................................................................................................................................ | |||
9.4.1 |
| Threshold Values................................................................................................................ | ||
9.4.2 |
| |||
Chapter 10 Creating Custom Rules...................................................................................................... | ||||
10.1 |
| Rules Overview .................................................................................................................... | ||
10.2 |
| Rule Logic Overview ........................................................................................................... | ||
10.2.1 | Rule Checklist .................................................................................................................. | |||
10.2.2 | Security Ramifications ..................................................................................................... | |||
|
|
|
|
|
xii |
|
| Table Of Contents |