ZyXEL NBG-460N User Guide - Page 174

Security > Firewall > Services

Page 174 highlights

Chapter 13 Firewall Table 60 Security > Firewall > Services LABEL DESCRIPTION Do not respond to requests for unauthorized services Select this option to prevent hackers from finding the NBG-460N by probing for unused ports. If you select this option, the NBG-460N will not respond to port request(s) for unused ports, thus leaving the unused ports and the NBG-460N unseen. By default this option is not selected and the NBG-460N will reply with an ICMP Port Unreachable packet for a port probe on its unused UDP ports, and a TCP Reset packet for a port probe on its unused TCP ports. Firewall Rule # Active Service Name IP Schedule Log Modify Note that the probing packets must first traverse the NBG-460N's firewall mechanism before reaching this anti-probing mechanism. Therefore if the firewall mechanism blocks a probing packet, the NBG460N reacts based on the firewall policy, which by default, is to send a TCP reset packet for a blocked TCP packet. You can use the command "sys firewall tcprst rst [on|off]" to change this policy. When the firewall mechanism blocks a UDP packet, it drops the packet without sending a response packet. This is your firewall rule number. The ordering of your rules is important as rules are applied in turn. Use the Move button to rearrange the order of the rules. This icon is green when the rule is turned on. The icon is grey when the rule is turned off. This field displays the services and port numbers to which this firewall rule applies. This field displays the IP address(es) the rule applies to. This field displays the days the firewall rule is active. This field shows you whether a log will be created when packets match the rule (Match) or not (No). Click the Edit icon to modify an existing rule setting in the fields under the Add Firewall Rule screen. Click the Remove icon to delete a rule. Note that subsequent firewall rules move up by one when you take this action. Add Click the Add button to display the screen where you can configure a new firewall rule. Modify the number in the textbox to add the rule before a specific rule number. Move The Move button moves a rule to a different position. In the first text box enter the number of the rule you wish to move. In the second text box enter the number of the rule you wish to move the first rule to and click the Move button. Misc setting Bypass Triangle Select this check box to have the NBG-460N firewall ignore the use of Route triangle route topology on the network. Max NAT/ Type a number ranging from 1 to 16000 to limit the number of NAT/ Firewall Session firewall sessions that a host can create. Per User Apply Click Apply to save the settings. Reset Click Reset to start configuring this screen again. 174 NBG-460N User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370

Chapter 13 Firewall
NBG-460N User’s Guide
174
Do not respond
to requests for
unauthorized
services
Select this option to prevent hackers from finding the NBG-460N by
probing for unused ports. If you select this option, the NBG-460N will
not respond to port request(s) for unused ports, thus leaving the
unused ports and the NBG-460N unseen. By default this option is not
selected and the NBG-460N will reply with an ICMP Port Unreachable
packet for a port probe on its unused UDP ports, and a TCP Reset
packet for a port probe on its unused TCP ports.
Note that the probing packets must first traverse the NBG-460N's
firewall mechanism before reaching this anti-probing mechanism.
Therefore if the firewall mechanism blocks a probing packet, the NBG-
460N reacts based on the firewall policy, which by default, is to send a
TCP reset packet for a blocked TCP packet. You can use the command
"sys firewall tcprst rst [on|off]" to change this policy. When the firewall
mechanism blocks a UDP packet, it drops the packet without sending a
response packet.
Firewall Rule
#
This is your firewall rule number. The ordering of your rules is important
as rules are applied in turn. Use the
Move
button to rearrange the
order of the rules.
Active
This icon is green when the rule is turned on. The icon is grey when the
rule is turned off.
Service Name
This field displays the services and port numbers to which this firewall
rule applies.
IP
This field displays the IP address(es) the rule applies to.
Schedule
This field displays the days the firewall rule is active.
Log
This field shows you whether a log will be created when packets match
the rule (
Match
) or not (
No
).
Modify
Click the
Edit
icon to modify an existing rule setting in the fields under
the Add Firewall Rule screen
.
Click the
Remove
icon to delete a rule. Note that subsequent firewall
rules move up by one when you take this action.
Add
Click the
Add
button to display the screen where you can configure a
new firewall rule. Modify the number in the textbox to add the rule
before a specific rule number.
Move
The
Move
button moves a rule to a different position. In the first text
box enter the number of the rule you wish to move. In the second text
box enter the number of the rule you wish to move the first rule to and
click the
Move
button.
Misc setting
Bypass Triangle
Route
Select this check box to have the NBG-460N firewall ignore the use of
triangle route topology on the network.
Max NAT/
Firewall Session
Per User
Type a number ranging from 1 to 16000 to limit the number of NAT/
firewall sessions that a host can create.
Apply
Click
Apply
to save the settings.
Reset
Click
Reset
to start configuring this screen again.
Table 60
Security > Firewall > Services
LABEL
DESCRIPTION