ZyXEL Communications Internet Security Gateway ZyWALL 2 Series User Manual
Page 9

ZyWALL 2 Series User’s Guide
Table of Contents
ix
10.3
Introduction to ZyXEL’s Firewall........................................................................................ 10-2
10.4
Denial of Service.................................................................................................................. 10-3
10.5
Stateful Inspection................................................................................................................ 10-7
10.6
Guidelines For Enhancing Security With Your Firewall ................................................... 10-11
10.7
Packet Filtering Vs Firewall............................................................................................... 10-11
Chapter 11 Firewall Screens ..................................................................................................................11-1
11.1
Access Methods ................................................................................................................... 11-1
11.2
Firewall Policies Overview .................................................................................................. 11-1
11.3
Rule Logic Overview ........................................................................................................... 11-2
11.4
Connection Direction Examples........................................................................................... 11-3
11.5
Alerts.................................................................................................................................... 11-5
11.6
Configuring Firewall............................................................................................................ 11-5
11.7
Example Firewall Rule....................................................................................................... 11-13
11.8
Predefined Services............................................................................................................ 11-18
11.9
Configuring Attack Alert ................................................................................................... 11-20
Chapter 12 Content Filtering Screens.................................................................................................. 12-1
12.1
Introduction to Content Filtering.......................................................................................... 12-1
12.2
General Content Filter Configuration................................................................................... 12-1
12.3
Content Filtering with an External Server............................................................................ 12-4
12.4
Checking Content Filtering Activation ................................................................................ 12-5
12.5
Configuring for Registering and Categories......................................................................... 12-5
12.6
Configuring Customization ................................................................................................ 12-14
VPN/IPSec ..................................................................................................................................................... VI
Chapter 13 Introduction to IPSec......................................................................................................... 13-1
13.1
VPN Overview ..................................................................................................................... 13-1
13.2
IPSec Architecture ............................................................................................................... 13-3
13.3
Encapsulation ....................................................................................................................... 13-4
13.4
IPSec and NAT .................................................................................................................... 13-5
Chapter 14 VPN Screens ....................................................................................................................... 14-1
14.1
VPN/IPSec Overview........................................................................................................... 14-1
14.2
IPSec Algorithms ................................................................................................................. 14-1
14.3
My IP Address...................................................................................................................... 14-2
14.4
Secure Gateway Address...................................................................................................... 14-2
14.5
Summary Screen .................................................................................................................. 14-3
14.6
Keep Alive ........................................................................................................................... 14-5
14.7
NAT Traversal ..................................................................................................................... 14-6
14.8
ID Type and Content............................................................................................................ 14-8
14.9
Pre-Shared Key .................................................................................................................. 14-10
14.10
VPN Implementation.......................................................................................................... 14-10
14.11
Configuring Basic IKE VPN Rule Setup ........................................................................... 14-11
14.12
IKE Phases ......................................................................................................................... 14-21