ZyXEL ZYWALL USG 100 User Guide - Page 45

Protecting Your Network, 3.1 Firewall, Firewall - nat configuration

Page 45 highlights

CHAPTER 3 Protecting Your Network These sections cover configuring the ZyWALL to protect your network. • Firewall on page 45 • User-aware Access Control on page 46 • Endpoint Security (EPS) on page 47 • Device and Service Registration on page 47 • Anti-Virus Policy Configuration on page 48 • IDP Profile Configuration on page 50 • ADP Profile Configuration on page 51 • Content Filter Profile Configuration on page 54 • Viewing Content Filter Reports on page 56 • Anti-Spam Policy Configuration on page 60 3.1 Firewall The firewall controls the travel of traffic between or within zones for services using static port numbers. Use application patrol to control services using flexible/dynamic port numbers (see Section 5.7 on page 113 for an example). The firewall can also control traffic for NAT (DNAT) and policy routes (SNAT). Firewall rules can use schedule, user, user groups, address, address group, service, and service group objects. To-ZyWALL firewall rules control access to the ZyWALL itself including management access. By default the firewall allows various types of management from the LAN, HTTPS from the WAN and no management from the DMZ. The firewall also limits the number of user sessions. This example shows the ZyWALL's default firewall behavior for WAN to LAN traffic and how stateful inspection works. A LAN user can initiate a Telnet session from within the LAN zone and the firewall allows the response. However, the firewall blocks Telnet traffic initiated from the WAN zone and destined for the LAN zone. The firewall allows VPN traffic between any of the networks. Figure 26 Default Firewall Action LAN WAN ZyWALL USG100-PLUS User's Guide 45

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

ZyWALL USG100-PLUS User’s Guide
45
C
HAPTER
3
Protecting Your Network
These sections cover configuring the ZyWALL to protect your network.
Firewall on page 45
User-aware Access Control on page 46
Endpoint Security (EPS) on page 47
Device and Service Registration on page 47
Anti-Virus Policy Configuration on page 48
IDP Profile Configuration on page 50
ADP Profile Configuration on page 51
Content Filter Profile Configuration on page 54
Viewing Content Filter Reports on page 56
Anti-Spam Policy Configuration on page 60
3.1
Firewall
The firewall controls the travel of traffic between or within zones for services using static port
numbers. Use application patrol to control services using flexible/dynamic port numbers (see
Section 5.7 on page 113
for an example). The firewall can also control traffic for NAT (DNAT) and
policy routes (SNAT). Firewall rules can use schedule, user, user groups, address, address group,
service, and service group objects. To-ZyWALL firewall rules control access to the ZyWALL itself
including management access. By default the firewall allows various types of management from the
LAN, HTTPS from the WAN and no management from the DMZ. The firewall also limits the number
of user sessions.
This example shows the ZyWALL’s default firewall behavior for WAN to LAN traffic and how stateful
inspection works. A LAN user can initiate a Telnet session from within the LAN zone and the firewall
allows the response. However, the firewall blocks Telnet traffic initiated from the WAN zone and
destined for the LAN zone. The firewall allows VPN traffic between any of the networks.
Figure 26
Default Firewall Action
LAN
WAN