ZyXEL P-660H-T1 v2 User Guide - Page 14

Firewalls, Firewall Configuration

Page 14 highlights

Table of Contents Chapter 8 Firewalls...111 8.1 Firewall Overview ...111 8.2 Types of Firewalls ...111 8.2.1 Packet Filtering Firewalls 111 8.2.2 Application-level Firewalls 112 8.2.3 Stateful Inspection Firewalls 112 8.3 Introduction to ZyXEL's Firewall 112 8.3.1 Denial of Service Attacks 113 8.4 Denial of Service ...113 8.4.1 Basics ...113 8.4.2 Types of DoS Attacks 114 8.5 Stateful Inspection ...116 8.5.1 Stateful Inspection Process 117 8.5.2 Stateful Inspection and the ZyXEL Device 118 8.5.3 TCP Security ...118 8.5.4 UDP/ICMP Security 119 8.5.5 Upper Layer Protocols 119 8.6 Guidelines for Enhancing Security with Your Firewall 120 8.6.1 Security In General 120 8.7 Packet Filtering Vs Firewall 121 8.7.1 Packet Filtering: ...121 8.7.2 Firewall ...121 Chapter 9 Firewall Configuration ...123 9.1 Access Methods ...123 9.2 Firewall Policies Overview 123 9.3 Rule Logic Overview ...124 9.3.1 Rule Checklist ...124 9.3.2 Security Ramifications 124 9.3.3 Key Fields For Configuring Rules 125 9.4 Connection Direction ...125 9.4.1 LAN to WAN Rules 126 9.4.2 Alerts ...126 9.5 General Firewall Policy 126 9.6 Firewall Rules Summary 127 9.6.1 Configuring Firewall Rules 129 9.6.2 Customized Services 132 9.6.3 Configuring a Customized Service 132 9.7 Example Firewall Rule ...133 9.8 Predefined Services ...137 9.9 Anti-Probing ...139 14 P-660H-Tx v2 User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312

Table of Contents
P-660H-Tx v2 User’s Guide
14
Chapter
8
Firewalls
.................................................................................................................................
111
8.1 Firewall Overview
..............................................................................................................
111
8.2 Types of Firewalls
...............................................................................................................
111
8.2.1 Packet Filtering Firewalls
..........................................................................................
111
8.2.2 Application-level Firewalls
.........................................................................................
112
8.2.3 Stateful Inspection Firewalls
......................................................................................
112
8.3 Introduction to ZyXEL’s Firewall
.........................................................................................
112
8.3.1 Denial of Service Attacks
..........................................................................................
113
8.4 Denial of Service
................................................................................................................
113
8.4.1 Basics
........................................................................................................................
113
8.4.2 Types of DoS Attacks
................................................................................................
114
8.5 Stateful Inspection
..............................................................................................................
116
8.5.1 Stateful Inspection Process
.......................................................................................
117
8.5.2 Stateful Inspection and the ZyXEL Device
................................................................
118
8.5.3 TCP Security
.............................................................................................................
118
8.5.4 UDP/ICMP Security
...................................................................................................
119
8.5.5 Upper Layer Protocols
..............................................................................................
119
8.6 Guidelines for Enhancing Security with Your Firewall
.......................................................
120
8.6.1 Security In General
..................................................................................................
120
8.7 Packet Filtering Vs Firewall
...............................................................................................
121
8.7.1 Packet Filtering:
.......................................................................................................
121
8.7.2 Firewall
.....................................................................................................................
121
Chapter
9
Firewall Configuration
..........................................................................................................
123
9.1 Access Methods
................................................................................................................
123
9.2 Firewall Policies Overview
.................................................................................................
123
9.3 Rule Logic Overview
..........................................................................................................
124
9.3.1 Rule Checklist
..........................................................................................................
124
9.3.2 Security Ramifications
..............................................................................................
124
9.3.3 Key Fields For Configuring Rules
...........................................................................
125
9.4 Connection Direction
.........................................................................................................
125
9.4.1 LAN to WAN Rules
...................................................................................................
126
9.4.2 Alerts
........................................................................................................................
126
9.5 General Firewall Policy
...................................................................................................
126
9.6 Firewall Rules Summary
...................................................................................................
127
9.6.1 Configuring Firewall Rules
.....................................................................................
129
9.6.2 Customized Services
..............................................................................................
132
9.6.3 Configuring a Customized Service
.........................................................................
132
9.7 Example Firewall Rule
.......................................................................................................
133
9.8 Predefined Services
..........................................................................................................
137
9.9 Anti-Probing
.......................................................................................................................
139