ZyXEL Communications ZyWALL 2 Series Network Card User Manual


 
ZyWALL 2 Series User’s Guide
Index Q-3
Filter................................. 23-12, 24-1, 26-9, 30-1
Applying .......................................................... 30-17
Configuration..................................................... 30-1
Configuring........................................................ 30-4
Example........................................................... 30-13
Generic Filter Rule........................................... 30-11
Generic Rule.................................................... 30-11
NAT................................................................. 30-16
Remote Node ................................................... 30-17
Structure...........................................................30-2
TCP/IP Rule....................................................... 30-7
Filters
Executing a Filter Rule ...................................... 30-2
IP Filter Logic Flow........................................... 30-9
Finger............................................................... 8-6
Firewall ............................................................1-3
Access Methods................................................. 11-1
Activating........................................................... 29-1
Address Type................................................... 11-12
Alerts.................................................................. 11-5
Connection Direction......................................... 11-3
Creating/Editing Rules....................................... 11-8
Custom Ports..................................See Custom Ports
Enabling............................................................. 11-1
Firewall Vs Filters............................................ 10-11
Guidelines For Enhancing Security.................. 10-11
Introduction........................................................ 10-2
LAN to WAN Rules........................................... 11-4
Policies............................................................... 11-1
Rule Checklist.................................................... 11-2
Rule Logic.......................................................... 11-2
Rule Security Ramifications .............................. 11-2
Services............................................................ 11-18
SMT Menus ....................................................... 29-1
Types.................................................................. 10-1
When To Use................................................... 10-12
Firmware File
Maintenance.....................................20-5, 20-7, 33-1
Flow Control.................................................. 21-1
Fragmentation Threshold................................. 7-2
Frequency-Hopping Spread Spectrum ............ D-2
FTP..............4-3, 5-1, 8-5, 17-2, 17-21, 33-3, 35-3
File Upload ...................................................... 33-12
GUI-based Clients.............................................. 33-4
Restoring Files................................................... 33-8
FTP File Transfer......................................... 33-11
FTP Restrictions ..........................17-2, 33-5, 35-3
FTP Server............................................ 1-6, 28-13
Full Feature.............................................See NAT
Full Network Management.............................. 1-5
G
Gateway IP Addr ........................................... 26-7
Gateway IP Address ............................. 25-2, 27-2
General Setup ..................................3-1, 4-1, 22-1
Global .............................................................. 8-1
H
Half-Open Sessions ..................................... 11-21
Hidden Menus................................................ 21-2
Host......................................................... 4-6, 22-3
Host IDs............................................................ I-1
HTTP ...............8-6, 10-1, 10-3, 10-4, 37-9, 37-11
HyperTerminal.................................. 33-15, 33-17
HyperTerminal program ..................... 33-7, 33-10
I
i.e. ................................... See Syntax Conventions
IBSS................See Independent Basic Service Set
ICMP echo..................................................... 10-6
Idle Timeout .......................23-7, 23-8, 26-4, 26-5
IEEE 802.11.....................................................D-1
Deployment Issues...............................................E-1
Security Flaws ..................................................... E-1
IEEE 802.1x.....................................................E-1
Advantages ..........................................................E-1
IGMP ............................................................... 5-3
Incoming Protocol Filters .............................. 24-6
Independent Basic Service Set.........................D-2
Industry Canada..................................................iv
Infrastructure Configuration ............................D-2
Initial Screen.................................................. 21-1
Inside ............................................................... 8-1
Inside Global Address...................................... 8-1