ZyXEL Communications 10 Network Router User Manual


 
ZYWALL 10/50 Internet Security Gateway
xii Table of Contents
10.5.4 UDP/ICMP Security .......................................................................................................10-10
10.5.5 Upper Layer Protocols ....................................................................................................10-11
10.6 Guidelines For Enhancing Security With Your Firewall ....................................................10-11
10.6.1 Security In General .........................................................................................................10-12
10.7 Packet Filtering Vs Firewall................................................................................................10-12
10.7.1 Packet Filtering: ..............................................................................................................10-13
10.7.2 Firewall ...........................................................................................................................10-13
Chapter 11 Introducing the ZyWALL Firewall....................................................................................11-1
11.1 Remote Management and the Firewall..................................................................................11-1
11.2 Access Methods ....................................................................................................................11-1
11.3 Using ZyWALL SMT Menus ...............................................................................................11-1
11.3.1 Activating the Firewall......................................................................................................11-1
11.3.2 Viewing the Firewall Log .................................................................................................11-2
Chapter 12 Using the ZyWALL Web Configurator.............................................................................12-1
12.1 Web Configurator Login and Main Menu Screens ...............................................................12-1
12.2 Enabling the Firewall ............................................................................................................12-2
12.3 E-mail....................................................................................................................................12-2
12.3.1 Alerts.................................................................................................................................12-2
12.3.2 Logs...................................................................................................................................12-3
12.3.3 SMTP Error Messages ......................................................................................................12-5
12.3.4 Example E-mail Log .........................................................................................................12-5
12.4 Attack Alert...........................................................................................................................12-6
12.4.1 Threshold Values ..............................................................................................................12-6
12.4.2 Half-Open Sessions...........................................................................................................12-7
Chapter 13 Creating Custom Rules ......................................................................................................13-1
13.1 Rules Overview.....................................................................................................................13-1
13.2 Rule Logic Overview ............................................................................................................13-1