User`s guide

ZYWALL 10/10 II/50 Internet Security Gateway
List of Figures xxiii
Figure 15-1 Log Screen................................................................................................................................ 15-1
Figure 16-1 Activate the Firewall ................................................................................................................ 16-2
Figure 16-2 Example 1: E-Mail Screen........................................................................................................ 16-3
Figure 16-3 Example 1: Configuring a Rule................................................................................................ 16-4
Figure 16-4 Example 1: Destination Address for Traffic Originating from the Internet .............................. 16-5
Figure 16-5 Example 1: Rule Summary Screen........................................................................................... 16-6
Figure 16-6 Send Alerts When Attacked...................................................................................................... 16-7
Figure 16-7 Configuring A POP Custom Port.............................................................................................. 16-8
Figure 16-8 Example 2: Local Network Rule 1 Configuration.................................................................... 16-9
Figure 16-9 Example 2: Local Network Rule Summary............................................................................ 16-10
Figure 16-10 Example: Internet to Local Network Rule Summary ............................................................16-11
Figure 16-11 Custom Port for Syslog......................................................................................................... 16-12
Figure 16-12 Syslog Rule Configuration ................................................................................................... 16-13
Figure 16-13 Example 3: Rule Summary................................................................................................... 16-14
Figure 18-1 Outgoing Packet Filtering Process ........................................................................................... 18-2
Figure 18-2 Filter Rule Process.................................................................................................................... 18-3
Figure 18-3 Menu 21 — Filter and Firewall Setup...................................................................................... 18-4
Figure 18-4 Menu 21.1 Filter Set Configuration..................................................................................... 18-5
Figure 18-5 NetBIOS_WAN Filter Rules Summary ....................................................................................18-5
Figure 18-6 Menu 21.1.1.1 — TCP/IP Filter Rule....................................................................................... 18-8
Figure 18-7 Executing an IP Filter..............................................................................................................18-11
Figure 18-8 Menu 21.4.1.1 — Generic Filter Rule.................................................................................... 18-12
Figure 18-9 Telnet Filter Example ............................................................................................................. 18-14
Figure 18-10 Example Filter — Menu 21.1.3.1......................................................................................... 18-15
Figure 18-11 Example Filter Rules Summary — Menu 21.1.3.................................................................. 18-16
Figure 18-12 Protocol and Device Filter Sets ............................................................................................ 18-17
Figure 18-13 Filtering LAN Traffic ........................................................................................................... 18-18