ZyWALL 10 Internet Security Gateway

Security Ramifications.....................................

16-2

Send Alerts When Attacked ............................

19-7

Server ....................................................................

3-1, 3-9, 4-2, 6-3, 6-4, 6-7, 6-9, 6-12, 6-13, 6- 14, 6-16, 6-17, 11-6, N, U, V

Service ......................................................

 

vii, 16-2

Service Type ...........................

3-9, 4-2, 17-4, 21-2

Services Supported.........................................

 

16-8

SMT...................................................................

 

2-4

SMT Menus at a Glance....................................

2-9

SMTP Error Messages....................................

 

15-6

Smurf.....................................................

 

13-6, 14-3

SNMP................................................................

 

8-1

About....................................................................

 

8-1

Configuring ..........................................................

 

8-1

Community ......................................................

 

8-1

Trap..................................................................

 

8-2

Trusted Host.....................................................

 

8-2

SNMP ( Simple Network Management Protocol) ...

......................................................................

 

1-2

Source & Destination Addresses

...................16-12

Source Address...................................

 

16-2, 16-11

SrcAdd ............................................................

 

19-9

Stateful Inspection........

1-1, 13-1, 13-2, 13-6, 13-7

Process ...............................................................

 

13-7

ZyWALL............................................................

 

13-8

Structure of this Manual

..................................

xxvii

SUA (Single User Account) .....................

See NAT

Subnet Mask ....3-2, 3-6, 3-10, 4-6, 4-8, 5-3, 16-13

Support Disk...................................................

 

xxviii

SYN Flood....................................

 

13-4, 13-5, 14-4

SYN-ACK ..............................................

 

13-5, 14-4

Syslog ...........................................................

 

19-12

Syslog IP Address.............................................

 

9-7

System Information ............................

 

9-1, 9-3, 9-4

System Maintenance9-1, 9-2, 9-3, 9-4, 9-5, 9-6, 9- 7, 9-11, 9-12, 10-2, 10-4, 10-5, 10-6, 10-7, 10-

8, 10-10, 11-1, 11-2, 11-3, 11-5

 

System Name..................................................

2-11

System Status ...................................................

9-1

System Timeout ..............................................

12-2

T

TCP Maximum Incomplete ..................

15-8, 15-11

TCP Security ...................................................

13-8

TCP/IP ...................................................................

3-1, 3-4, 3-6, 4-6, 4-9, 7-7, 7-8, 7-9, 7-12, 7-15, 12-1, 13-3, 13-4, N, Q, R, S, V

TCP/IP filter rule................................................

7-7

Teardrop ................................................

13-4, 14-4

telnet ...............................................................

12-1

Telnet Configuration........................................

12-1

Telnet Under NAT ...........................................

12-1

TFTP File Transfer..........................................

10-7

The Big Picture ...............................................

14-5

Three-Way Handshake ...................................

13-5

Threshold Values ............................................

15-7

Time and Date Setting ..........

1-3, 11-4, 11-5, 11-6

Time Zone.......................................................

11-6

Timeout....................

3-11, 3-12, 4-4, 16-14, 16-15

Trace.................................................................

9-5

Traceroute ......................................................

14-4

Troubleshhoting the Firewall...........................

21-3

Troubleshooting ..............................................

21-1

Internet Access...................................................

21-3

LAN Interface ....................................................

21-2

WAN Interface...................................................

21-2

 

U

UDP/ICMP Security ........................................

13-9

Unicast..............................................................

3-3

UNIX Syslog...............................................

9-6, 9-7

Upload Firmware.............................................

10-5

Upper Layer Protocols ...........................

13-8, 13-9

 

V

View Firewall Log............................................

14-4

VT100 ...............................................................

2-3

 

W

WAN DHCP ...........................................

9-11, 9-12

WAN Setup ...................................

2-12, 2-13, 21-2

WAN to LAN Rules .........................................

16-3

Web Configurator............................................

13-9

Welcome screen .............................................

15-1

www.zyxel.com ...................................................

vii

BB

Index