ZyAIR G-2000 Plus User’s Guide

14.5.4 UDP/ICMP Security ..............................................................................

187

14.5.5 Upper Layer Protocols ..........................................................................

188

14.6

Guidelines For Enhancing Security With Your Firewall ..................................

188

14.7

Packet Filtering Vs Firewall ............................................................................

188

14.7.1 Packet Filtering: ....................................................................................

189

 

14.7.1.1 When To Use Filtering .................................................................

189

14.7.2 Firewall .................................................................................................

189

 

14.7.2.1 When To Use The Firewall ..........................................................

189

Chapter 15

 

 

Firewall Screens...................................................................................................

192

15.1

Access Methods .............................................................................................

192

15.2

Firewall Policies Overview .............................................................................

192

15.3

Rule Logic Overview ......................................................................................

193

15.3.1 Rule Checklist .......................................................................................

193

15.3.2 Security Ramifications ..........................................................................

194

15.3.3 Key Fields For Configuring Rules .........................................................

194

 

15.3.3.1 Action ..........................................................................................

194

 

15.3.3.2 Service ........................................................................................

194

 

15.3.3.3 Source Address ...........................................................................

194

 

15.3.3.4 Destination Address ....................................................................

194

15.4

Connection Direction Examples .....................................................................

195

15.4.1 LAN to WAN Rules ...............................................................................

195

15.4.2 WAN to LAN Rules ...............................................................................

195

15.5

Alerts ..............................................................................................................

196

15.6

Configuring Firewall .......................................................................................

196

15.6.1 Rule Summary ......................................................................................

197

15.6.2 Configuring Firewall Rules ....................................................................

199

15.6.3 Configuring Custom Services ...............................................................

202

15.7

Example Firewall Rule ...................................................................................

203

15.8

Predefined Services .......................................................................................

206

Chapter 16

 

 

Content Filtering .................................................................................................

210

16.1

Introduction to Content Filtering .....................................................................

210

16.2

Restrict Web Features ...................................................................................

210

16.3

Days and Times .............................................................................................

210

16.4

Configure Content Filtering ............................................................................

210

Chapter 17

 

 

Certificates............................................................................................................

214

17.1

Certificates Overview .....................................................................................

214

17.1.1 Advantages of Certificates ....................................................................

215

Table of Contents

14