beautypg.com

ZyXEL Communications ZyXEL ZyWALL 2WE User Manual

Page 10

background image

ZyWALL 2 and ZyWALL 2WE

x

Table of Contents

12.5

General NAT Examples......................................................................................................12-17

12.6

Trigger Port Forwarding .....................................................................................................12-24

Firewall and Content Filters .........................................................................................................................IV

Chapter 13 Firewalls ..............................................................................................................................13-1

13.1

Introduction to Firewalls.......................................................................................................13-1

13.2

Types of Firewalls.................................................................................................................13-1

13.3

Introduction to ZyXEL’s Firewall ........................................................................................13-2

13.4

Denial of Service...................................................................................................................13-3

13.5

Stateful Inspection ................................................................................................................13-7

13.6

Guidelines For Enhancing Security With Your Firewall ....................................................13-11

13.7

Packet Filtering Vs Firewall ...............................................................................................13-12

Chapter 14 Introducing the ZyWALL Firewall ...................................................................................14-1

14.1

Introduction to the ZyWALL Firewall..................................................................................14-1

14.2

Remote Management and the Firewall .................................................................................14-1

14.3

Access Methods ....................................................................................................................14-1

14.4

Using ZyWALL SMT Menus ...............................................................................................14-1

Chapter 15 Firewall Configuration.......................................................................................................15-1

15.1

Introduction to Firewall Configuration .................................................................................15-1

15.2

Enabling the Firewall............................................................................................................15-1

15.3

Attack Alert...........................................................................................................................15-3

Chapter 16 Creating Custom Rules ......................................................................................................16-1

16.1

Introduction to Custom Rules ...............................................................................................16-1

16.2

Rule Logic Overview............................................................................................................16-2

16.3

Connection Direction Examples ...........................................................................................16-3

16.4

Rule Summary ......................................................................................................................16-5

16.5

Predefined Services...............................................................................................................16-7

16.6

Custom Ports.......................................................................................................................16-14