Chapter 18 Firewall
ZyWALL USG 50-H User’s Guide
291
• The firewall allows HTTP management access from the LAN zones and HTTPS
management access from the LAN and WAN zones.
• The ZyWALL drops most packets from the WAN zone to the ZyWALL itself, except for
ESP/AH/IKE/NATT/HTTPS services for VPN tunnels, and generates a log.
• The ZyWALL drops most packets from the DMZ zone to the ZyWALL itself, except for
DNS and NetBIOS traffic, and generates a log.
When you configure a firewall rule for packets destined for the ZyWALL itself, make sure it
does not conflict with your service control rule. See
for more
information about service control (remote management). The ZyWALL checks the firewall
rules before the service control rules for traffic destined for the ZyWALL.
You can configure a To-ZyWALL firewall rule (with
From Any To ZyWALL
direction) for
traffic from an interface which is not in a zone.
Global Firewall Rules
Firewall rules with
from any and/
or
to any
as the packet direction are called global firewall
rules. The global firewall rules are the only firewall rules that apply to an interface or VPN
tunnel that is not included in a zone. The
from any
rules apply to traffic coming from the
interface and the
to any
rules apply to traffic going to the interface.
Firewall Rule Criteria
The ZyWALL checks the schedule, user name (user’s login name on the ZyWALL), source IP
address, destination IP address and IP protocol type of network traffic against the firewall
rules (in the order you list them). When the traffic matches a rule, the ZyWALL takes the
action specified in the rule.
User Specific Firewall Rules
You can specify users or user groups in firewall rules. For example, to allow a specific user
from any computer to access a zone by logging in to the ZyWALL, you can set up a rule based
on the user name only. If you also apply a schedule to the firewall rule, the user can only
access the network at the scheduled time. A user-aware firewall rule is activated whenever the
user logs in to the ZyWALL and will be disabled after the user logs out of the ZyWALL.
Firewall and Application Patrol
To use a service, make sure both the firewall and application patrol allow the service’s packets
to go through the ZyWALL. The ZyWALL checks the firewall rules before the application
patrol rules for traffic going through the ZyWALL.
Firewall and VPN Traffic
After you create a VPN tunnel and add it to a zone, you can set the firewall rules applied to
VPN traffic. If you add a VPN tunnel to an existing zone (the LAN1 zone for example), you
can configure a new LAN to LAN firewall rule or use intra-zone traffic blocking to allow or
block VPN traffic transmitting between the VPN tunnel and other interfaces in the LAN zone.
If you add the VPN tunnel to a new zone (the VPN zone for example), you can configure rules
for VPN traffic between the VPN zone and other zones or
From VPN To-ZyWALL
rules for
VPN traffic destined for the ZyWALL.
Summary of Contents for ZyWall USG 50-H Series
Page 2: ......
Page 10: ...Safety Warnings ZyWALL USG 50 H User s Guide 10...
Page 28: ...Table of Contents ZyWALL USG 50 H User s Guide 28...
Page 30: ...30...
Page 34: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 50 H User s Guide 34...
Page 40: ...Chapter 2 Features and Applications ZyWALL USG 50 H User s Guide 40...
Page 92: ...Chapter 5 Configuration Basics ZyWALL USG 50 H User s Guide 92...
Page 130: ...Chapter 6 Tutorials ZyWALL USG 50 H User s Guide 130...
Page 146: ...146...
Page 208: ...Chapter 8 Interface ZyWALL USG 50 H User s Guide 208 Figure 161 Network Interface Bridge Add...
Page 224: ...Chapter 9 Trunks ZyWALL USG 50 H User s Guide 224...
Page 250: ...Chapter 12 Zones ZyWALL USG 50 H User s Guide 250...
Page 280: ...Chapter 16 ALG ZyWALL USG 50 H User s Guide 280...
Page 286: ...Chapter 17 IP MAC Binding ZyWALL USG 50 H User s Guide 286...
Page 287: ...287 PART III Firewall Firewall 289...
Page 288: ...288...
Page 304: ...Chapter 18 Firewall ZyWALL USG 50 H User s Guide 304...
Page 306: ...306...
Page 356: ...Chapter 21 SSL User Screens ZyWALL USG 50 H User s Guide 356...
Page 358: ...Chapter 22 SSL User Application Screens ZyWALL USG 50 H User s Guide 358...
Page 368: ...Chapter 24 L2TP VPN ZyWALL USG 50 H User s Guide 368...
Page 394: ...Chapter 25 L2TP VPN Example ZyWALL USG 50 H User s Guide 394...
Page 395: ...395 PART V Application Patrol Application Patrol BWM 397...
Page 396: ...396...
Page 421: ...421 PART VI Anti X ADP 423...
Page 422: ...422...
Page 429: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 429 Figure 359 Profiles Traffic Anomaly...
Page 432: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 432 Figure 360 Profiles Protocol Anomaly...
Page 440: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 440...
Page 442: ...442...
Page 462: ...Chapter 29 Addresses ZyWALL USG 50 H User s Guide 462...
Page 474: ...Chapter 31 Schedules ZyWALL USG 50 H User s Guide 474...
Page 484: ...Chapter 32 AAA Server ZyWALL USG 50 H User s Guide 484...
Page 506: ...Chapter 34 Certificates ZyWALL USG 50 H User s Guide 506...
Page 510: ...Chapter 35 SSL Application ZyWALL USG 50 H User s Guide 510...
Page 511: ...511 PART VIII System System 513...
Page 512: ...512...
Page 552: ...552...
Page 584: ...Chapter 40 Diagnostics ZyWALL USG 50 H User s Guide 584...
Page 586: ...Chapter 41 Reboot ZyWALL USG 50 H User s Guide 586...
Page 596: ...Chapter 43 Product Specifications ZyWALL USG 50 H User s Guide 596...
Page 598: ...598...
Page 636: ...Appendix A Log Descriptions ZyWALL USG 50 H User s Guide 636...
Page 640: ...Appendix B Common Services ZyWALL USG 50 H User s Guide 640...
Page 646: ...Appendix C Importing Certificates ZyWALL USG 50 H User s Guide 646...