
ZyWALL 100 Internet Security Gateway
x Table of Contents
16.2 Rule Logic Overview............................................................................................................16-2
16.3 Connection Direction Examples ...........................................................................................16-3
16.4 Rule Summary ......................................................................................................................16-5
16.5 Predefined Services...............................................................................................................16-7
16.6 Custom Ports.......................................................................................................................16-14
16.7 Creating/Editing A Custom Port.........................................................................................16-14
16.8 Example Firewall Rule .......................................................................................................16-16
Chapter 17 Logs......................................................................................................................................17-1
17.1 Log Screen ............................................................................................................................17-1
Chapter 18 Content Filtering ................................................................................................................18-1
18.1 Categories .............................................................................................................................18-1
18.2 List Update............................................................................................................................18-1
18.3 Exempt Computers................................................................................................................18-1
18.4 Customizing..........................................................................................................................18-2
18.5 Keywords..............................................................................................................................18-2
18.6 Logs ......................................................................................................................................18-2
Advanced Management.................................................................................................................................IV
Chapter 19 Filter Configuration ...........................................................................................................19-1
19.1 About Filtering......................................................................................................................19-1
19.2 Configuring a Filter Set ........................................................................................................19-4
19.3 Example Filter.....................................................................................................................19-13
19.4 Filter Types and NAT .........................................................................................................19-16
19.5 Firewall ...............................................................................................................................19-16
19.6 Applying a Filter and Factory Defaults...............................................................................19-17
Chapter 20 SNMP Configuration..........................................................................................................20-1
20.1 About SNMP.........................................................................................................................20-1
20.2 Supported MIBs....................................................................................................................20-3
Komentáře k této Příručce