ZyWALL 10 Internet Security Gateway

Figure 12-1 Telnet Configuration on a TCP/IP Network .............................................................................

12-1

Figure 13-1 ZyWALL Firewall Application ................................................................................................

13-3

Figure 13-2 Three-Way Handshake .............................................................................................................

13-5

Figure 13-3 SYN Flood................................................................................................................................

13-5

Figure 13-4 Smurf Attack ............................................................................................................................

13-6

Figure 13-5 Stateful Inspection....................................................................................................................

13-7

Figure 14-1 SMT Main Menu ......................................................................................................................

14-1

Figure 14-2 Menu 21 — Filter and Firewall Setup ......................................................................................

14-1

Figure 14-3 Menu 21.2 — Firewall Setup ...................................................................................................

14-2

Figure 14-4 View Firewall Log....................................................................................................................

14-4

Figure 14-5 Big Picture — Filtering, Firewall and NAT..............................................................................

14-6

Figure 15-1 Login screen as seen in Netscape .............................................................................................

15-1

Figure 15-2 ZyWALL Web Configurator Welcome Screen .........................................................................

15-2

Figure 15-3 Enabling the Firewall ...............................................................................................................

15-3

Figure 15-4 E-mail Screen ...........................................................................................................................

15-4

Figure 15-5 E-mail Log................................................................................................................................

15-7

Figure 15-6 Attack Alert ..............................................................................................................................

15-9

Figure 16-1 LAN to WAN Traffic................................................................................................................

16-3

Figure 16-2 WAN to LAN Traffic................................................................................................................

16-4

Figure 16-3 Firewall Rules Summary — First Screen .................................................................................

16-5

Figure 16-4 Creating/Editing A Firewall Rule...........................................................................................

16-10

Figure 16-5 Adding/Editing Source and Destination Addresses................................................................

16-12

Figure 16-6 Timeout Screen.......................................................................................................................

16-14

Figure 17-1 Custom Ports ............................................................................................................................

17-1

Figure 17-2 Creating/Editing A Custom Port ..............................................................................................

17-3

Figure 18-1 Log Screen................................................................................................................................

18-1

Figure 19-1 Activate The Firewall...............................................................................................................

19-2

List of Figures

xxi