ZyWALL 2 Series User’s Guide
Filter................................. | |||
Applying .......................................................... |
| ||
Configuration ..................................................... | |||
Configuring........................................................ | |||
Example ........................................................... |
| ||
Generic Filter Rule........................................... | |||
Generic Rule .................................................... | |||
NAT ................................................................. |
| ||
Remote Node ................................................... | |||
Structure ........................................................... |
| ||
TCP/IP Rule....................................................... | |||
Filters |
|
|
|
Executing a Filter Rule ...................................... | |||
IP Filter Logic Flow........................................... | |||
Finger ............................................................... |
| ||
Firewall ............................................................ |
| ||
Access Methods ................................................. | |||
Activating........................................................... |
| ||
Address Type ................................................... | |||
Alerts.................................................................. |
| ||
Connection Direction ......................................... | |||
Creating/Editing Rules....................................... | |||
Custom Ports.................................. | See Custom Ports | ||
Enabling............................................................. |
| ||
Firewall Vs Filters............................................ | |||
Guidelines For Enhancing Security.................. | |||
Introduction........................................................ | |||
LAN to WAN Rules........................................... | |||
Policies............................................................... |
| ||
Rule Checklist.................................................... | |||
Rule Logic.......................................................... |
| ||
Rule Security Ramifications .............................. | |||
Services............................................................ |
| ||
SMT Menus ....................................................... | |||
Types.................................................................. |
| ||
When To Use ................................................... | |||
Firmware File |
|
| |
Maintenance..................................... | |||
Flow Control .................................................. | |||
Fragmentation Threshold ................................. | |||
............ | |||
FTP.............. | |||
File Upload | ...................................................... | ||
Restoring Files ................................................... |
FTP File Transfer......................................... | |
FTP Restrictions .......................... | |
FTP Server............................................ | |
Full Feature............................................. | See NAT |
Full Network Management .............................. |
| G |
Gateway IP Addr ........................................... | |
Gateway IP Address ............................. | |
General Setup .................................. | |
Global .............................................................. |
| H |
|
Hidden Menus................................................ | ||
Host......................................................... | ||
Host IDs............................................................ | ||
HTTP ............... | ||
HyperTerminal.................................. | ||
HyperTerminal program ..................... |
| I |
|
|
i.e. ................................... | See Syntax Conventions | ||
IBSS................ | See Independent Basic Service Set | ||
ICMP echo..................................................... |
| ||
Idle Timeout ....................... | |||
IEEE 802.11..................................................... |
| ||
Deployment Issues............................................... | |||
Security Flaws ..................................................... | |||
IEEE 802.1x..................................................... |
| ||
Advantages .......................................................... |
| ||
IGMP ............................................................... |
| ||
Incoming Protocol Filters | .............................. | ||
Independent Basic Service Set......................... | |||
Industry Canada.................................................. | iv | ||
Infrastructure Configuration ............................ | |||
Initial Screen.................................................. |
| ||
Inside ............................................................... |
| ||
Inside Global Address...................................... |
Index |