ZyXEL Communications 50 Network Card User Manual


 
P312 Broadband Security Gateway
xii Table Of Contents
7.6 Guidelines For Enhancing Security With Your Firewall.......................................................... 7-11
7.6.1 Security In General........................................................................................................... 7-12
7.7 Packet Filtering Vs Firewall..................................................................................................... 7-12
7.7.1 Packet Filtering:................................................................................................................ 7-13
7.7.2 Firewall............................................................................................................................. 7-13
Chapter 8 Introducing the ZyWALL Firewall.......................................................................................8-1
8.1 Remote Management and the Firewall....................................................................................... 8-1
8.2 Access Methods.......................................................................................................................... 8-1
8.3 Using ZyWALL SMT Menus..................................................................................................... 8-1
8.3.1 Activating the Firewall....................................................................................................... 8-1
8.3.2 Viewing the Firewall Log................................................................................................... 8-2
Chapter 9 Using the ZyWALL Web Configurator ................................................................................9-1
9.1 Web Configurator Login and Main Menu Screens..................................................................... 9-1
9.2 Enabling the Firewall ................................................................................................................. 9-3
9.3 E-mail......................................................................................................................................... 9-3
9.3.1 Alerts ..................................................................................................................................9-3
9.3.2 Logs....................................................................................................................................9-4
9.3.3 SMTP Error Messages........................................................................................................ 9-6
9.3.4 Example E-mail Log........................................................................................................... 9-6
9.4 Attack Alert ................................................................................................................................ 9-7
9.4.1 Threshold Values................................................................................................................9-7
9.4.2 Half-Open Sessions ............................................................................................................ 9-8
Chapter 10 Creating Custom Rules...................................................................................................... 10-1
10.1 Rules Overview ....................................................................................................................10-1
10.2 Rule Logic Overview ........................................................................................................... 10-1
10.2.1 Rule Checklist .................................................................................................................. 10-1
10.2.2 Security Ramifications ..................................................................................................... 10-2