ZyWALL 10 Internet Security Gateway

14.1

SMT Menus...............................................................................................................................

14-1

14.1.1

View Firewall Log ............................................................................................................

14-2

14.1.2

Attack Types .....................................................................................................................

14-2

14.2

The Big Picture - Filtering, Firewall and NAT .........................................................................

14-5

14.3

Packet Filtering Vs Firewall......................................................................................................

14-6

14.3.1

Packet Filtering: ................................................................................................................

14-6

14.3.2

Firewall .............................................................................................................................

14-7

Chapter 15 Introducing the ZyWALL Web Configurator..................................................................

15-1

15.1

Web Configurator Login and Welcome Screens.......................................................................

15-1

15.2

Enabling the Firewall ................................................................................................................

15-3

15.3

E-mail........................................................................................................................................

15-3

15.3.1

What are Alerts?................................................................................................................

15-3

15.3.2

What are Logs? .................................................................................................................

15-4

15.3.3

SMTP Error Messages ......................................................................................................

15-6

15.3.4

Example E-mail Log .........................................................................................................

15-6

15.4

Attack Alert...............................................................................................................................

15-7

15.4.1

Threshold Values: .............................................................................................................

15-7

15.4.2

Half-Open Sessions...........................................................................................................

15-8

Chapter 16 Creating Custom Rules ......................................................................................................

16-1

16.1

Rules Overview.........................................................................................................................

16-1

16.2

Rule Logic Overview ................................................................................................................

16-1

16.2.1

Rule Checklist ...................................................................................................................

16-1

16.2.2

Security Ramifications ......................................................................................................

16-2

16.2.3 Key Fields For Configuring Rules ....................................................................................

16-2

16.3

Connection Direction ................................................................................................................

16-3

16.3.1 LAN to WAN Rules..........................................................................................................

16-3

16.3.2 WAN to LAN Rules..........................................................................................................

16-3

16.4

Rule Summary...........................................................................................................................

16-4

16.5

Predefined Services...................................................................................................................

16-7

16.5.1

Creating/Editing Firewall Rules......................................................................................

16-10

16.5.2 Source and Destination Addresses ..................................................................................

16-12

16.6

Timeout ...................................................................................................................................

16-14

16.6.1 Factors Influencing Choices for Timeout Values............................................................

16-14

Chapter 17 Custom Ports.......................................................................................................................

17-1

xiv

Table of Contents