ZyWALL 10 Internet Security Gateway

E-mail tab ........................................................

15-4

Encapsulation

 

PPP over Ethernet....................................................

A

Ethernet Encapsulation3-8, 4-1, 4-5, 4-6, 4-10, 6-

12, 6-14

 

Example E-mail Log ........................................

15-6

Examples ........................................................

19-1

F

 

Factory Default................................................

2-13

Filename Conventions.....................................

10-1

Filter .................................................

2-14, 4-9, 7-1

About....................................................................

7-1

Applying.............................................................

7-16

Configuring ..........................................................

7-4

Example..............................................................

7-13

Filter log...............................................................

9-7

Generic Filter Rule .............................................

7-11

NAT ...................................................................

7-15

Structure...............................................................

7-2

Filters

 

Executing a Filter Rule.........................................

7-2

Logic Flow of an IP Filter ..................................

7-10

Firewall

 

Address Type ................................................

16-13

Alerts..................................................................

15-3

Connection Direction .........................................

16-3

Creating/Editing Rules .....................................

16-10

E-mail.................................................................

15-3

Guidelines For Enhancing Security....................

13-9

Logs....................................................................

15-4

Policies ...............................................................

16-1

Rule Logic..........................................................

16-1

Rule Precedence .................................................

16-4

Services ..............................................................

16-7

SMT Log ............................................................

14-2

SMT Menus........................................................

14-1

Types..................................................................

13-1

Vs Filters ............................................................

14-6

Web Configurator...............................................

15-1

When To Use......................................................

14-7

Flow Control ......................................................

2-3

Front Panel LEDs..............................................

2-1

FTP File Transfer ............................................

10-9

FTP Server..............................................

1-3, 6-18

 

G

 

 

General Setup...................................................

 

2-9

 

H

 

 

Half-Open Sessions ........................................

15-8

Hidden Menus...................................................

 

2-5

HTTP.....................

6-14, 13-1, 13-3, 13-4, Q, T, W

HyperTerminal program ..................................

10-3

 

I

 

 

IANA .................................................................

 

3-2

ICMP echo .............................................

13-6, 14-3

idle timeout .......................................................

 

4-3

IGMP (Internet Group Multicast Protocol)

.........3-3

Initial Screen .....................................................

 

2-4

Installation Requirements .................................

2-3

Internet access..................................................

 

3-1

Internet Access Setup...............

3-8, 3-9, 6-5, 21-2

Internet Assigned Numbers Authority .... See IANA

Internet Control Message Protocol (ICMP)13-6,

14-3

 

IP address..................................................

3-2, 3-6

IP Address Assignment.............................

4-6, 4-8

IP Alias Setup ...................................................

3-7

IP Multicast ................................................

1-2, 3-3

Internet Group Management Protocol (IGMP) .... 1-2

IP Network Number...........................................

3-2

IP Pool .......................................................

3-1, 3-6

IP Ports ...........................................................

13-4

IP Spoofing ..............................

13-4, 13-6, 14-2, V

IP Static Route ....................................

5-1, 5-2, 5-3

K

Key Fields For Configuring Rules ...................

16-2

 

L

LAN Setup ..............................

2-13, 2-14, 3-4, 3-5

LAN to WAN Rules .........................................

16-3

LAND ............................................

13-4, 13-5, 14-2

Local Network

 

Z

Index