ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual
Page 23

ZyWALL 5/35/70 Series User’s Guide
23
Table of Contents
42.2.1.1 SUA Address Mapping Set .........................................................561
42.2.1.2 User-Defined Address Mapping Sets ..........................................562
42.2.1.3 Ordering Your Rules ....................................................................563
42.3 Configuring a Server behind NAT ..................................................................565
42.4 General NAT Examples ..................................................................................568
42.4.1 Internet Access Only .............................................................................568
42.4.2 Example 2: Internet Access with an Default Server ..............................570
42.4.3 Example 3: Multiple Public IP Addresses With Inside Servers .............570
42.4.4 Example 4: NAT Unfriendly Application Programs ...............................574
42.5.1 Two Points To Remember About Trigger Ports .....................................575
44.1.1 The Filter Structure of the ZyWALL ......................................................581
44.2.1 Configuring a Filter Rule .......................................................................584
44.2.2 Configuring a TCP/IP Filter Rule ..........................................................585
44.2.3 Configuring a Generic Filter Rule .........................................................587
44.3 Example Filter ................................................................................................589
44.4 Filter Types and NAT ......................................................................................591
44.5 Firewall Versus Filters ....................................................................................591
44.6 Applying a Filter ............................................................................................592
44.6.1 Applying LAN Filters .............................................................................592
44.6.2 Applying DMZ Filters ............................................................................592
44.6.3 Applying Remote Node Filters ..............................................................593