Chapter 5 Configuration Basics
ZyWALL USG 50-H User’s Guide
87
To-ZyWALL firewall rules control access to the ZyWALL. Configure to-ZyWALL firewall
rules for remote management. By default, the firewall allows HTTP management access from
the LAN zones and HTTPS management access from the LAN and WAN zones. The
ZyWALL drops packets from the WAN or DMZ zone to the ZyWALL itself, except for VPN
traffic.
Example:
Suppose you have a SIP proxy server connected to the DMZ zone for VoIP calls.
You could configure a firewall rule to allow VoIP sessions from the SIP proxy server on DMZ
to LAN1 so VoIP users on LAN1 can receive calls.
1
Create a VoIP service object for UDP port 5060 traffic (
Object > Service
).
2
Create an address object for the VoIP server (
Object > Address
).
3
Click
Firewall
to go to the firewall configuration.
4
Select from the
DMZ
zone to the
LAN1
zone, and add a firewall rule using the items
you have configured.
• You don’t need to specify the schedule or the user.
• In the
Source
field, select the address object of the VoIP server.
• You don’t need to specify the destination address.
• Leave the
Access
field set to
Allow
and the
Log
field set to
No
.
"
The ZyWALL checks the firewall rules in order. Make sure each rule is in the
correct place in the sequence.
5.4.12 Application Patrol
Use application patrol to control which individuals can use which services through the
ZyWALL (and when they can do so). You can also specify allowed amounts of bandwidth and
priorities.
Example:
Suppose you want to allow vice president Bob to use BitTorrent and block
everyone else from using it.
1
Create a user account for Bob (
User/Group
).
2
Click
AppPatrol/BWM > Peer to Peer
to go to the application patrol configuration
screen. Click the BitTorrent application patrol entry’s
Edit
icon.
• Set the default policy’s access to
Drop
.
• Add another policy.
• Select the user account that you created for Bob.
• You can leave the source, destination and log settings at the default.
MENU ITEM(S)
Firewall
PREREQUISITES
Zones, schedules, users, user groups, addresses (source, destination), address
groups (source, destination), services, service groups
MENU ITEM(S)
AppPatrol
PREREQUISITES
Zones, Schedules, users, user groups, addresses (source, destination), address
groups (source, destination). These are only used as criteria in exceptions and
conditions.
Summary of Contents for ZyWall USG 50-H Series
Page 2: ......
Page 10: ...Safety Warnings ZyWALL USG 50 H User s Guide 10...
Page 28: ...Table of Contents ZyWALL USG 50 H User s Guide 28...
Page 30: ...30...
Page 34: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 50 H User s Guide 34...
Page 40: ...Chapter 2 Features and Applications ZyWALL USG 50 H User s Guide 40...
Page 92: ...Chapter 5 Configuration Basics ZyWALL USG 50 H User s Guide 92...
Page 130: ...Chapter 6 Tutorials ZyWALL USG 50 H User s Guide 130...
Page 146: ...146...
Page 208: ...Chapter 8 Interface ZyWALL USG 50 H User s Guide 208 Figure 161 Network Interface Bridge Add...
Page 224: ...Chapter 9 Trunks ZyWALL USG 50 H User s Guide 224...
Page 250: ...Chapter 12 Zones ZyWALL USG 50 H User s Guide 250...
Page 280: ...Chapter 16 ALG ZyWALL USG 50 H User s Guide 280...
Page 286: ...Chapter 17 IP MAC Binding ZyWALL USG 50 H User s Guide 286...
Page 287: ...287 PART III Firewall Firewall 289...
Page 288: ...288...
Page 304: ...Chapter 18 Firewall ZyWALL USG 50 H User s Guide 304...
Page 306: ...306...
Page 356: ...Chapter 21 SSL User Screens ZyWALL USG 50 H User s Guide 356...
Page 358: ...Chapter 22 SSL User Application Screens ZyWALL USG 50 H User s Guide 358...
Page 368: ...Chapter 24 L2TP VPN ZyWALL USG 50 H User s Guide 368...
Page 394: ...Chapter 25 L2TP VPN Example ZyWALL USG 50 H User s Guide 394...
Page 395: ...395 PART V Application Patrol Application Patrol BWM 397...
Page 396: ...396...
Page 421: ...421 PART VI Anti X ADP 423...
Page 422: ...422...
Page 429: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 429 Figure 359 Profiles Traffic Anomaly...
Page 432: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 432 Figure 360 Profiles Protocol Anomaly...
Page 440: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 440...
Page 442: ...442...
Page 462: ...Chapter 29 Addresses ZyWALL USG 50 H User s Guide 462...
Page 474: ...Chapter 31 Schedules ZyWALL USG 50 H User s Guide 474...
Page 484: ...Chapter 32 AAA Server ZyWALL USG 50 H User s Guide 484...
Page 506: ...Chapter 34 Certificates ZyWALL USG 50 H User s Guide 506...
Page 510: ...Chapter 35 SSL Application ZyWALL USG 50 H User s Guide 510...
Page 511: ...511 PART VIII System System 513...
Page 512: ...512...
Page 552: ...552...
Page 584: ...Chapter 40 Diagnostics ZyWALL USG 50 H User s Guide 584...
Page 586: ...Chapter 41 Reboot ZyWALL USG 50 H User s Guide 586...
Page 596: ...Chapter 43 Product Specifications ZyWALL USG 50 H User s Guide 596...
Page 598: ...598...
Page 636: ...Appendix A Log Descriptions ZyWALL USG 50 H User s Guide 636...
Page 640: ...Appendix B Common Services ZyWALL USG 50 H User s Guide 640...
Page 646: ...Appendix C Importing Certificates ZyWALL USG 50 H User s Guide 646...