User`s guide
ZYWALL 10/10 II/50 Internet Security Gateway
xxii List of Figures
Figure 9-17 Example 3: Menu 11.3 ..............................................................................................................9-21
Figure 9-18 Example 3: Menu 15.1.1.1 ........................................................................................................9-21
Figure 9-19 Example 3: Final Menu 15.1.1..................................................................................................9-22
Figure 9-20 Example 3: Menu 15.2 ..............................................................................................................9-22
Figure 9-21 NAT Example 4.........................................................................................................................9-23
Figure 9-22 Example 4: Menu 15.1.1.1 — Address Mapping Rule..............................................................9-24
Figure 9-23 Example 4: Menu 15.1.1 — Address Mapping Rules...............................................................9-24
Figure 10-1 ZyWALL Firewall Application .................................................................................................10-3
Figure 10-2 Three-Way Handshake ..............................................................................................................10-5
Figure 10-3 SYN Flood ................................................................................................................................10-5
Figure 10-4 Smurf Attack .............................................................................................................................10-6
Figure 10-5 Stateful Inspection.....................................................................................................................10-8
Figure 11-1 Menu 21 — Filter and Firewall Setup.......................................................................................11-1
Figure 11-2 Menu 21.2 — Firewall Setup ....................................................................................................11-2
Figure 11-3 Example Firewall Log...............................................................................................................11-2
Figure 12-1 Enabling the Firewall ................................................................................................................12-2
Figure 12-2 E-mail Screen............................................................................................................................12-3
Figure 12-3 E-mail Log ................................................................................................................................12-6
Figure 12-4 Attack Alert ...............................................................................................................................12-8
Figure 13-1 LAN to WAN Traffic.................................................................................................................13-3
Figure 13-2 WAN to LAN Traffic.................................................................................................................13-4
Figure 13-3 Firewall Rules Summary — First Screen..................................................................................13-5
Figure 13-4 Creating/Editing A Firewall Rule............................................................................................13-10
Figure 13-5 Adding/Editing Source and Destination Addresses.................................................................13-12
Figure 13-6 Timeout Screen .......................................................................................................................13-14
Figure 14-1 Custom Ports.............................................................................................................................14-1
Figure 14-2 Creating/Editing A Custom Port................................................................................................14-3