
TABLE OF CONTENTS
iii
Create runtime program..........................................................................................................................................3–22
Update All................................................................................................................................................................3–23
Firewall Advanced ......................................................................................................................................................3–24
Overview..................................................................................................................................................................3–24
Masquerading (SNAT).............................................................................................................................................3–25
Firewall Rules..........................................................................................................................................................3–26
Create Firewall Rules..............................................................................................................................................3–27
Action ...................................................................................................................................................................3–27
Logging.................................................................................................................................................................3–27
Source Zone.........................................................................................................................................................3–28
Destination Zone..................................................................................................................................................3–28
Protocol................................................................................................................................................................3–28
Source Ports ........................................................................................................................................................3–28
Destination Ports..................................................................................................................................................3–28
Common Rules........................................................................................................................................................3–29
DNS......................................................................................................................................................................3–29
Client Email (POP3, IMAP, SMTP)......................................................................................................................3–30
FTP.......................................................................................................................................................................3–31
ICQ/IM..................................................................................................................................................................3–32
Laplink™ ..............................................................................................................................................................3–33
MSN™ Messenger...............................................................................................................................................3–34
PCAnywhere™.....................................................................................................................................................3–36
Ping and Traceroute.............................................................................................................................................3–37
PPTP....................................................................................................................................................................3–38
Telnet ...................................................................................................................................................................3–40
VNC......................................................................................................................................................................3–41
Yahoo™ Chat.......................................................................................................................................................3–42
Web Access (browsing) .......................................................................................................................................3–43
Apply Configuration.................................................................................................................................................3–45
Stop Firewall............................................................................................................................................................3–45
Check Firewall.........................................................................................................................................................3–45
Backup.....................................................................................................................................................................3–45
Restore....................................................................................................................................................................3–45
Firewall Basic (Templates).........................................................................................................................................3–46
Template 1, High Security.......................................................................................................................................3–46
Template 2, High – Medium Security......................................................................................................................3–46
Template 3, Medium Security..................................................................................................................................3–46
Template 4, Medium – Low Security.......................................................................................................................3–47
Template 5, Low Security........................................................................................................................................3–47
Network Configuration................................................................................................................................................3–48