ZyXEL Communications ZyWALL 2 Series Network Card User Manual


 
ZyWALL 2 Series User’s Guide
Table of Contents ix
10.3 Introduction to ZyXEL’s Firewall........................................................................................ 10-2
10.4 Denial of Service.................................................................................................................. 10-3
10.5 Stateful Inspection................................................................................................................ 10-7
10.6 Guidelines For Enhancing Security With Your Firewall ................................................... 10-11
10.7 Packet Filtering Vs Firewall............................................................................................... 10-11
Chapter 11 Firewall Screens ..................................................................................................................11-1
11.1 Access Methods ................................................................................................................... 11-1
11.2 Firewall Policies Overview.................................................................................................. 11-1
11.3 Rule Logic Overview........................................................................................................... 11-2
11.4 Connection Direction Examples........................................................................................... 11-3
11.5 Alerts.................................................................................................................................... 11-5
11.6 Configuring Firewall............................................................................................................11-5
11.7 Example Firewall Rule....................................................................................................... 11-13
11.8 Predefined Services............................................................................................................ 11-18
11.9 Configuring Attack Alert ................................................................................................... 11-20
Chapter 12 Content Filtering Screens.................................................................................................. 12-1
12.1 Introduction to Content Filtering.......................................................................................... 12-1
12.2 General Content Filter Configuration................................................................................... 12-1
12.3 Content Filtering with an External Server............................................................................ 12-4
12.4 Checking Content Filtering Activation ................................................................................ 12-5
12.5 Configuring for Registering and Categories......................................................................... 12-5
12.6 Configuring Customization................................................................................................ 12-14
VPN/IPSec ..................................................................................................................................................... VI
Chapter 13 Introduction to IPSec......................................................................................................... 13-1
13.1 VPN Overview..................................................................................................................... 13-1
13.2 IPSec Architecture ............................................................................................................... 13-3
13.3 Encapsulation....................................................................................................................... 13-4
13.4 IPSec and NAT .................................................................................................................... 13-5
Chapter 14 VPN Screens....................................................................................................................... 14-1
14.1 VPN/IPSec Overview........................................................................................................... 14-1
14.2 IPSec Algorithms ................................................................................................................. 14-1
14.3 My IP Address...................................................................................................................... 14-2
14.4 Secure Gateway Address...................................................................................................... 14-2
14.5 Summary Screen ..................................................................................................................14-3
14.6 Keep Alive ........................................................................................................................... 14-5
14.7 NAT Traversal ..................................................................................................................... 14-6
14.8 ID Type and Content............................................................................................................ 14-8
14.9 Pre-Shared Key ..................................................................................................................14-10
14.10 VPN Implementation.......................................................................................................... 14-10
14.11 Configuring Basic IKE VPN Rule Setup ........................................................................... 14-11
14.12 IKE Phases......................................................................................................................... 14-21