P312 Broadband Security Gateway

7.6

Guidelines For Enhancing Security With Your Firewall

.......................................................... 7-11

7.6.1

 

Security In General...........................................................................................................

7-12

7.7

Packet Filtering Vs Firewall .....................................................................................................

7-12

7.7.1

 

Packet Filtering:................................................................................................................

7-13

7.7.2

 

Firewall.............................................................................................................................

7-13

Chapter 8 Introducing the ZyWALL Firewall.......................................................................................

8-1

8.1

Remote Management and the Firewall .......................................................................................

8-1

8.2

Access Methods..........................................................................................................................

8-1

8.3

Using ZyWALL SMT Menus.....................................................................................................

8-1

8.3.1

 

Activating the Firewall .......................................................................................................

8-1

8.3.2

 

Viewing the Firewall Log...................................................................................................

8-2

Chapter 9 Using the ZyWALL Web Configurator ................................................................................

9-1

9.1

Web Configurator Login and Main Menu Screens.....................................................................

9-1

9.2

Enabling the Firewall .................................................................................................................

9-3

9.3

E-mail .........................................................................................................................................

9-3

9.3.1

 

Alerts ..................................................................................................................................

9-3

9.3.2

 

Logs ....................................................................................................................................

9-4

9.3.3

 

SMTP Error Messages........................................................................................................

9-6

9.3.4

 

Example E-mail Log...........................................................................................................

9-6

9.4

Attack Alert ................................................................................................................................

9-7

9.4.1

 

Threshold Values................................................................................................................

9-7

9.4.2

 

Half-Open Sessions ............................................................................................................

9-8

Chapter 10 Creating Custom Rules......................................................................................................

10-1

10.1

 

Rules Overview ....................................................................................................................

10-1

10.2

 

Rule Logic Overview ...........................................................................................................

10-1

10.2.1

Rule Checklist ..................................................................................................................

10-1

10.2.2

Security Ramifications .....................................................................................................

10-2

 

 

 

 

 

xii

 

 

Table Of Contents