ZyWALL 10 Internet Security Gateway

A

Action for Matched Packets

.......................... 16-11

Activate The Firewall ......................................

19-3

Alert Schedule ................................................

15-5

Application-level Firewalls ..............................

13-1

AT command ..................................................

10-1

Attack

 

 

Reasons ..............................................................

18-2

Attack Alert ........................

15-7, 15-8, 15-9, 15-10

Attack Types...................................................

14-3

Reason................................................................

14-5

Authentication............................................

4-3, 4-4

B

BackOrifice ..........................................................

N

backup............................................................

10-2

Big Picture

 

Filtering, Firewall and NAT...............................

14-5

Blocking Time......................................

15-8, 15-11

Boot commands..............................................

11-8

Broadband Access Security Gateway ...i, xxvii, 1-1

Brute Force Hacking............................................

N

Budget Management .............................

11-2, 11-3

C

 

Cable Modem ...................................

2-2, 2-3, 13-2

Call Control.....................................................

11-2

Call History ............................................

11-3, 11-4

Call-Trigerring Packet.....................................

9-10

CDR..................................................................

9-7

CHAP ...............................................................

4-4

CLI Commands....................................................

G

Command Interpreter Mode ...........................

11-1

Configuring A POP Custom Port ....................

19-8

Console Port...................................

2-2, 9-3, 9-5, E

Content Filtering .............................................

20-1

Categories ..........................................................

20-1

Customizing .......................................................

20-5

Days and Times..................................................

20-1

 

 

Index

Exempting Computers ........................................

20-4

Filter List ............................................................

20-1

Keywords............................................................

20-6

Log Records........................................................

20-7

Restrict Web Features.........................................

20-1

Update List .........................................................

20-3

Custom Ports

 

 

Creating/Editing..................................................

17-3

Introduction ........................................................

17-1

Customer Support ..............................................

viii

Customized Services.......................................

17-2

 

D

 

DDNS

 

 

Configuration......................................................

2-11

Default Permit Log ..........................................

16-6

Denial of Service .................

13-2, 13-3, 14-1, 15-8

Denial of Services

 

 

Thresholds ........................................................

15-10

DestAdd ........................................................

19-10

Destination Address ............................

16-2, 16-11

DHCP (Dynamic Host Configuration Protocol) .......

..............................................................

1-2, 3-1

DHCP Ethernet Setup .......................................

3-4

DHCP Negotiation.........................................

19-12

Diagnostic .......................................................

9-10

DNS...................................................................

3-1

Domain Name .......................

3-1, 6-14, 9-3, 9-4, P

DoS

 

 

Basics..................................................................

13-3

Types ..................................................................

13-4

DoS (Denial of Service).....................................

1-1

Dynamic DNS........................................

2-10, 2-11

DYNDNS Wildcard ..........................................

2-10

 

E

 

EG 2 - Internet Rule Summary ......................

19-12

EG 2 - Local Network Rule Summary............

19-10

EG 3 - Rule Summary ...................................

19-14

E-mail Alerts....................................................

15-5

E-mail Screen..................................................

19-4

Index

Y