ZyWALL 2 Series User’s Guide

10.3

Introduction to ZyXEL’s Firewall........................................................................................

10-2

10.4

Denial of Service..................................................................................................................

10-3

10.5

Stateful Inspection................................................................................................................

10-7

10.6

Guidelines For Enhancing Security With Your Firewall ...................................................

10-11

10.7

Packet Filtering Vs Firewall...............................................................................................

10-11

Chapter 11 Firewall Screens ..................................................................................................................

11-1

11.1

Access Methods ...................................................................................................................

11-1

11.2

Firewall Policies Overview ..................................................................................................

11-1

11.3

Rule Logic Overview ...........................................................................................................

11-2

11.4

Connection Direction Examples...........................................................................................

11-3

11.5

Alerts....................................................................................................................................

11-5

11.6

Configuring Firewall............................................................................................................

11-5

11.7

Example Firewall Rule.......................................................................................................

11-13

11.8

Predefined Services............................................................................................................

11-18

11.9

Configuring Attack Alert ...................................................................................................

11-20

Chapter 12 Content Filtering Screens..................................................................................................

12-1

12.1

Introduction to Content Filtering..........................................................................................

12-1

12.2

General Content Filter Configuration...................................................................................

12-1

12.3

Content Filtering with an External Server............................................................................

12-4

12.4

Checking Content Filtering Activation ................................................................................

12-5

12.5

Configuring for Registering and Categories.........................................................................

12-5

12.6

Configuring Customization ................................................................................................

12-14

VPN/IPSec

.....................................................................................................................................................

VI

Chapter 13 Introduction to IPSec.........................................................................................................

13-1

13.1

VPN Overview .....................................................................................................................

13-1

13.2

IPSec Architecture ...............................................................................................................

13-3

13.3

Encapsulation .......................................................................................................................

13-4

13.4

IPSec and NAT ....................................................................................................................

13-5

Chapter 14 VPN Screens.......................................................................................................................

14-1

14.1

VPN/IPSec Overview...........................................................................................................

14-1

14.2

IPSec Algorithms .................................................................................................................

14-1

14.3

My IP Address......................................................................................................................

14-2

14.4

Secure Gateway Address......................................................................................................

14-2

14.5

Summary Screen ..................................................................................................................

14-3

14.6

Keep Alive ...........................................................................................................................

14-5

14.7

NAT Traversal .....................................................................................................................

14-6

14.8

ID Type and Content............................................................................................................

14-8

14.9

Pre-Shared Key ..................................................................................................................

14-10

14.10

VPN Implementation..........................................................................................................

14-10

14.11

Configuring Basic IKE VPN Rule Setup ...........................................................................

14-11

14.12

IKE Phases .........................................................................................................................

14-21

Table of Contents

ix