ZyXEL Communications Internet Security Gateway ZyWALL 100 User Manual
Page 17

ZyWALL 100 Internet Security Gateway
List of Figures
xvii
Figure 12-25 Trigger Port Forwarding Process — Example...................................................................... 12-26
Figure 13-1 ZyWALL Firewall Application................................................................................................. 13-3
Figure 13-2 Three-Way Handshake ............................................................................................................. 13-5
Figure 13-3 SYN Flood................................................................................................................................ 13-5
Figure 13-4 Smurf Attack ............................................................................................................................ 13-6
Figure 13-5 Stateful Inspection.................................................................................................................... 13-8
Figure 14-1 Menu 21 — Filter and Firewall Setup ...................................................................................... 14-1
Figure 14-2 Menu 21.2 — Firewall Setup ................................................................................................... 14-2
Figure 14-3 Example Firewall Log .............................................................................................................. 14-2
Figure 15-1 Enabling the Firewall ............................................................................................................... 15-2
Figure 15-2 E-mail Screen ........................................................................................................................... 15-3
Figure 15-3 E-mail Log................................................................................................................................ 15-6
Figure 15-4 Attack Alert .............................................................................................................................. 15-8
Figure 16-1 LAN to WAN Traffic................................................................................................................ 16-4
Figure 16-2 WAN to LAN Traffic................................................................................................................ 16-4
Figure 16-3 Firewall Rules Summary — First Screen ................................................................................. 16-5
Figure 16-4 Creating/Editing A Firewall Rule ............................................................................................16-11
Figure 16-5 Adding/Editing Source and Destination Addresses ................................................................ 16-13
Figure 16-6 Creating/Editing A Custom Port............................................................................................. 16-15
Figure 16-7 Firewall Rule Configuration Screen ....................................................................................... 16-16
Figure 16-8 Firewall IP Config Screen ...................................................................................................... 16-17
Figure 16-9 Custom Port for Syslog .......................................................................................................... 16-18
Figure 16-10 Syslog Rule Configuration ................................................................................................... 16-19
Figure 16-11 Example 3: Rule Summary................................................................................................... 16-20
Figure 17-1 Log Screen................................................................................................................................ 17-1
Figure 19-1 Outgoing Packet Filtering Process ........................................................................................... 19-2
Figure 19-2 Filter Rule Process.................................................................................................................... 19-3