ZyXEL FSG1100HN User Guide - Page 72
What You Can Do, What You Need To Know, About the FSG1100HN Firewall - modem
View all ZyXEL FSG1100HN manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 72 highlights
Chapter 8 Firewall 8.1 What You Can Do • Use the Firewall Filter screen (73) to enable or disable the FSG1100HN's firewall. • Use the Firewall Filter Add screen (74) to add a filter to the FSG1100HN firewall. • Use the Firewall Denial of Service screen (75) to enable and configure Denial of Service Prevention. • Use the Firewall Content Filter screen (75) to restrict Web features, add keywords for blocking, and designate a trusted computer. 8.2 What You Need To Know The FSG1100HN's firewall feature physically separates the LAN and the WAN and acts as a secure gateway for all data passing between the networks. Content filtering allows you to block certain web features, such as cookies, and/or block access to specific Web sites. For example, you can configure one policy that blocks John Doe's access to arts and entertainment Web pages. 8.2.1 About the FSG1100HN Firewall The FSG1100HN firewall is a stateful inspection firewall and is designed to protect against Denial of Service attacks when activated (click the General tab under Firewall and then click the Enable Firewall check box). The FSG1100HN's purpose is to allow a private Local Area Network (LAN) to be securely connected to the Internet. The FSG1100HN can be used to prevent theft, destruction and modification of data, as well as log events, which may be important to the security of your network. The FSG1100HN is installed between the LAN and a broadband modem connecting to the Internet. This allows it to act as a secure gateway for all data passing between the Internet and the LAN. The FSG1100HN has one Ethernet WAN port and four Ethernet LAN ports, which are used to physically separate the network into two areas. The WAN (Wide Area Network) port attaches to the broadband (cable or DSL) modem to the Internet. The LAN (Local Area Network) port attaches to a network of computers, which needs security from the outside world. These computers will have access to Internet services such as e-mail, FTP and the World Wide Web. However, "inbound access" is not allowed (by default) unless the remote host is authorized to use a specific service. 72 FSG1100HN User's Guide