ZyWALL 2 Series User’s Guide

Filter.................................

23-12, 24-1, 26-9, 30-1

Applying ..........................................................

 

30-17

Configuration .....................................................

30-1

Configuring........................................................

30-4

Example ...........................................................

 

30-13

Generic Filter Rule...........................................

30-11

Generic Rule ....................................................

30-11

NAT .................................................................

 

30-16

Remote Node ...................................................

30-17

Structure ...........................................................

 

30-2

TCP/IP Rule.......................................................

30-7

Filters

 

 

 

Executing a Filter Rule ......................................

30-2

IP Filter Logic Flow...........................................

30-9

Finger ...............................................................

 

8-6

Firewall ............................................................

 

1-3

Access Methods .................................................

11-1

Activating...........................................................

 

29-1

Address Type ...................................................

11-12

Alerts..................................................................

 

11-5

Connection Direction .........................................

11-3

Creating/Editing Rules.......................................

11-8

Custom Ports..................................

See Custom Ports

Enabling.............................................................

 

11-1

Firewall Vs Filters............................................

10-11

Guidelines For Enhancing Security..................

10-11

Introduction........................................................

10-2

LAN to WAN Rules...........................................

11-4

Policies...............................................................

 

11-1

Rule Checklist....................................................

11-2

Rule Logic..........................................................

 

11-2

Rule Security Ramifications ..............................

11-2

Services............................................................

 

11-18

SMT Menus .......................................................

29-1

Types..................................................................

 

10-1

When To Use ...................................................

10-12

Firmware File

 

 

Maintenance.....................................

20-5,20-7,33-1

Flow Control ..................................................

21-1

Fragmentation Threshold .................................

7-2

Frequency-Hopping Spread Spectrum

............ D-2

FTP..............

4-3, 5-1, 8-5, 17-2, 17-21, 33-3, 35-3

File Upload

......................................................

33-12

GUI-based Clients..............................................

33-4

Restoring Files ...................................................

33-8

FTP File Transfer.........................................

33-11

FTP Restrictions ..........................

17-2, 33-5, 35-3

FTP Server............................................

1-6, 28-13

Full Feature.............................................

See NAT

Full Network Management ..............................

1-5

 

G

Gateway IP Addr ...........................................

26-7

Gateway IP Address .............................

25-2, 27-2

General Setup ..................................

3-1, 4-1, 22-1

Global ..............................................................

8-1

 

H

 

Half-Open Sessions .....................................

11-21

Hidden Menus................................................

21-2

Host.........................................................

4-6, 22-3

Host IDs............................................................

I-1

HTTP ...............

8-6, 10-1, 10-3, 10-4, 37-9, 37-11

HyperTerminal..................................

33-15, 33-17

HyperTerminal program .....................

33-7, 33-10

 

I

 

 

i.e. ...................................

See Syntax Conventions

IBSS................

See Independent Basic Service Set

ICMP echo.....................................................

 

10-6

Idle Timeout .......................

23-7, 23-8, 26-4, 26-5

IEEE 802.11.....................................................

 

D-1

Deployment Issues...............................................

E-1

Security Flaws .....................................................

E-1

IEEE 802.1x.....................................................

 

E-1

Advantages ..........................................................

 

E-1

IGMP ...............................................................

 

5-3

Incoming Protocol Filters

..............................

24-6

Independent Basic Service Set.........................

D-2

Industry Canada..................................................

iv

Infrastructure Configuration ............................

D-2

Initial Screen..................................................

 

21-1

Inside ...............................................................

 

8-1

Inside Global Address......................................

8-1

Index

Q-3