
ZyWALL 5 Internet Security Appliance
viii Table of Content
6.10 Configuring 802.1X ....................................................................................................... 6-8
6.11 Authentication Server..................................................................................................... 6-9
6.12 Configuring Local User Database .................................................................................. 6-9
6.13 Configuring RADIUS .................................................................................................. 6-11
WAN and DMZ ................................................................................................................................... III
Chapter 7 WAN Screens................................................................................................................ 7-1
7.1 WAN Overview.................................................................................................................. 7-1
7.2 TCP/IP Priority (Metric)..................................................................................................... 7-1
7.3 Configuring Route .............................................................................................................. 7-1
7.4 Configuring WAN Setup .................................................................................................... 7-2
7.5 Traffic Redirect ................................................................................................................7-10
7.6 Configuring Traffic Redirect ............................................................................................ 7-11
7.7 Configuring Dial Backup.................................................................................................. 7-12
7.8 Advanced Modem Setup .................................................................................................. 7-16
7.9 Configuring Advanced Modem Setup .............................................................................. 7-16
7.10 Dynamic DNS .............................................................................................................. 7-18
7.11 Configuring Dynamic DNS.......................................................................................... 7-18
Chapter 8 DMZ Screens................................................................................................................ 8-1
8.1 DMZ Overview .................................................................................................................. 8-1
8.2 Configuring DMZ............................................................................................................... 8-1
8.3 Configuring IP Alias........................................................................................................... 8-3
8.4 Configuring Port Roles....................................................................................................... 8-5
8.5 DMZ Public IP Address Example ...................................................................................... 8-6
8.6 DMZ Private and Public IP Address Example ................................................................... 8-6
Firewall and Content Filtering .......................................................................................................... IV
Chapter 9 Firewalls........................................................................................................................ 9-1
9.1 Firewall Overview .............................................................................................................. 9-1
9.2 Types of Firewalls ..............................................................................................................9-1
9.3 Introduction to ZyXEL’s Firewall...................................................................................... 9-2
9.4 Denial of Service ................................................................................................................ 9-3
9.5 Stateful Inspection .............................................................................................................. 9-6
9.6 Guidelines for Enhancing Security with Your Firewall ..................................................... 9-9
9.7 Packet Filtering Versus Firewall ........................................................................................ 9-9
Chapter 10 Firewall Screens ....................................................................................................... 10-1
10.1 Access Methods ........................................................................................................... 10-1
10.2 Firewall Policies Overview .......................................................................................... 10-1
10.3 Rule Logic Overview ................................................................................................... 10-2
10.4 Connection Direction Examples................................................................................... 10-3
10.5 Alerts............................................................................................................................ 10-4
10.6 Configuring Firewall .................................................................................................... 10-4
10.7 Example Firewall Rule............................................................................................... 10-11
10.8 Predefined Services .................................................................................................... 10-15
10.9 Anti-Probing............................................................................................................... 10-17
10.10 Configuring Attack Alert ........................................................................................... 10-18
Chapter 11 Content Filtering Screens........................................................................................ 11-1
11.1 Content Filtering Overview.......................................................................................... 11-1
11.2 General Content Filter Configuration .......................................................................... 11-1
11.3 Content Filtering with an External Server.................................................................... 11-4
11.4 Checking Content Filtering Activation ........................................................................ 11-4
11.5 Configuring for Registering and Categories ................................................................ 11-5
11.6 Configuring Customization ........................................................................................ 11-11