ZyWALL 10 Internet Security Gateway
14.1 | SMT Menus............................................................................................................................... | ||
14.1.1 | View Firewall Log ............................................................................................................ | ||
14.1.2 | Attack Types ..................................................................................................................... | ||
14.2 | The Big Picture - Filtering, Firewall and NAT ......................................................................... | ||
14.3 | Packet Filtering Vs Firewall...................................................................................................... | ||
14.3.1 | Packet Filtering: ................................................................................................................ | ||
14.3.2 | Firewall ............................................................................................................................. | ||
Chapter 15 Introducing the ZyWALL Web Configurator.................................................................. | |||
15.1 | Web Configurator Login and Welcome Screens....................................................................... | ||
15.2 | Enabling the Firewall ................................................................................................................ | ||
15.3 | |||
15.3.1 | What are Alerts?................................................................................................................ | ||
15.3.2 | What are Logs? ................................................................................................................. | ||
15.3.3 | SMTP Error Messages ...................................................................................................... | ||
15.3.4 | Example | ||
15.4 | Attack Alert............................................................................................................................... | ||
15.4.1 | Threshold Values: ............................................................................................................. | ||
15.4.2 | |||
Chapter 16 Creating Custom Rules ...................................................................................................... | |||
16.1 | Rules Overview......................................................................................................................... | ||
16.2 | Rule Logic Overview ................................................................................................................ | ||
16.2.1 | Rule Checklist ................................................................................................................... | ||
16.2.2 | Security Ramifications ...................................................................................................... | ||
16.2.3 Key Fields For Configuring Rules .................................................................................... | |||
16.3 | Connection Direction ................................................................................................................ | ||
16.3.1 LAN to WAN Rules.......................................................................................................... | |||
16.3.2 WAN to LAN Rules.......................................................................................................... | |||
16.4 | Rule Summary........................................................................................................................... | ||
16.5 | Predefined Services................................................................................................................... | ||
16.5.1 | Creating/Editing Firewall Rules...................................................................................... | ||
16.5.2 Source and Destination Addresses .................................................................................. | |||
16.6 | Timeout ................................................................................................................................... | ||
16.6.1 Factors Influencing Choices for Timeout Values............................................................ | |||
Chapter 17 Custom Ports....................................................................................................................... |
xiv | Table of Contents |