ZyAIR G-2000 Plus User’s Guide
14.5.4 UDP/ICMP Security ..............................................................................
187
14.5.5 Upper Layer Protocols ..........................................................................
188
14.6
Guidelines For Enhancing Security With Your Firewall ..................................
14.7
Packet Filtering Vs Firewall ............................................................................
14.7.1 Packet Filtering: ....................................................................................
189
14.7.1.1 When To Use Filtering .................................................................
14.7.2 Firewall .................................................................................................
14.7.2.1 When To Use The Firewall ..........................................................
Chapter 15
Firewall Screens...................................................................................................
192
15.1
Access Methods .............................................................................................
15.2
Firewall Policies Overview .............................................................................
15.3
Rule Logic Overview ......................................................................................
193
15.3.1 Rule Checklist .......................................................................................
15.3.2 Security Ramifications ..........................................................................
194
15.3.3 Key Fields For Configuring Rules .........................................................
15.3.3.1 Action ..........................................................................................
15.3.3.2 Service ........................................................................................
15.3.3.3 Source Address ...........................................................................
15.3.3.4 Destination Address ....................................................................
15.4
Connection Direction Examples .....................................................................
195
15.4.1 LAN to WAN Rules ...............................................................................
15.4.2 WAN to LAN Rules ...............................................................................
15.5
Alerts ..............................................................................................................
196
15.6
Configuring Firewall .......................................................................................
15.6.1 Rule Summary ......................................................................................
197
15.6.2 Configuring Firewall Rules ....................................................................
199
15.6.3 Configuring Custom Services ...............................................................
202
15.7
Example Firewall Rule ...................................................................................
203
15.8
Predefined Services .......................................................................................
206
Chapter 16
210
16.1
Introduction to Content Filtering .....................................................................
16.2
Restrict Web Features ...................................................................................
16.3
Days and Times .............................................................................................
16.4
Configure Content Filtering ............................................................................
Chapter 17
Certificates............................................................................................................
214
17.1
Certificates Overview .....................................................................................
17.1.1 Advantages of Certificates ....................................................................
215
Table of Contents
14