ZyXEL UAG715 User Guide - Page 240

Default Firewall Behavior, To-Device Rules

Page 240 highlights

Chapter 21 Firewall Default Firewall Behavior Firewall rules are grouped based on the direction of travel of packets to which they apply. Here is the default firewall behavior for traffic going through the UAG in various directions. Note: Intra-zone traffic (such as LAN to LAN traffic or WAN to WAN traffic) can also be blocked by the zone configuration. See Section 12.3 on page 179 for details. Table 92 Default Firewall Behavior FROM ZONE TO ZONE From any to Device From LAN1 to any (other than the UAG) From LAN2 to any (other than the UAG) From DMZ to WAN From IPSec VPN to any (other than the UAG) From SSL VPN to any (other than the UAG) From LAN1 to Device From LAN2 to Device From DMZ to Device From WAN to Device From IPSec VPN to Device From SSL VPN to Device From any to any BEHAVIOR DHCP traffic from any interface to the UAG is allowed. Traffic from the LAN1 to any of the networks connected to the UAG is allowed. Traffic from the LAN2 to any of the networks connected to the UAG is allowed. Traffic from the DMZ to the WAN is allowed. Traffic from the IPSec VPN zone to any of the networks connected to the UAG is allowed. Traffic from the SSL VPN zone to any of the networks connected to the UAG is allowed. Traffic from the LAN1 to the UAG itself is allowed. Traffic from the LAN2 to the UAG itself is allowed. DNS and NetBIOS traffic from the DMZ to the UAG itself is allowed. The default services listed in To-Device Rules on page 240 are allowed from the WAN to the UAG itself. All other WAN to UAG traffic is dropped. Traffic from the IPSec VPN zone to the UAG itself is allowed. Traffic from the SSL VPN zone to the UAG itself is allowed. Traffic that does not match any firewall rule is dropped. This includes traffic from the DMZ or WAN to any of the networks behind the UAG and traffic other than DNS and NetBIOS from the DMZ to the UAG. This also includes traffic to or from interfaces or VPN tunnels that are not assigned to a zone (extra-zone traffic). To-Device Rules Rules with Device as the To Zone apply to traffic going to the UAG itself. By default: • The firewall allows only LAN, or WAN computers to access or manage the UAG. • The UAG allows DHCP traffic from any interface to the UAG. • The UAG drops most packets from the DMZ zone to the UAG itself and generates a log except for DNS and NetBIOS traffic. • The UAG drops most packets from the WAN zone to the UAG itself and generates a log except for AH, ESP, GRE, HTTPS, IKE, NATT. When you configure a firewall rule for packets destined for the UAG itself, make sure it does not conflict with your service control rule. See Chapter 39 on page 427 for more information about service control (remote management). The UAG checks the firewall rules before the service control rules for traffic destined for the UAG. A From Any To Device direction rule applies to traffic from an interface which is not in a zone. 240 UAG715 User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542

Chapter 21 Firewall
UAG715 User’s Guide
240
Default Firewall Behavior
Firewall rules are grouped based on the direction of travel of packets to which they apply. Here is
the default firewall behavior for traffic going through the UAG in various directions.
Note: Intra-zone traffic (such as LAN to LAN traffic or WAN to WAN traffic) can also be
blocked by the zone configuration. See
Section 12.3 on page 179
for details.
To-Device Rules
Rules with
Device
as the
To Zone
apply to traffic going to the UAG itself. By default:
The firewall allows only LAN, or WAN computers to access or manage the UAG.
The UAG allows DHCP traffic from any interface to the UAG.
The UAG drops most packets from the DMZ zone to the UAG itself and generates a log except for
DNS and NetBIOS traffic.
The UAG drops most packets from the WAN zone to the UAG itself and generates a log except for
AH, ESP, GRE, HTTPS, IKE, NATT.
When you configure a firewall rule for packets destined for the UAG itself, make sure it does not
conflict with your service control rule. See
Chapter 39 on page 427
for more information about
service control (remote management). The UAG checks the firewall rules before the service control
rules for traffic destined for the UAG.
A
From Any To Device
direction rule applies to traffic from an interface which is not in a zone.
Table 92
Default Firewall Behavior
FROM ZONE TO ZONE
BEHAVIOR
From any to Device
DHCP traffic from any interface to the UAG is allowed.
From LAN1 to any (other than
the UAG)
Traffic from the LAN1 to any of the networks connected to the UAG is allowed.
From LAN2 to any (other than
the UAG)
Traffic from the LAN2 to any of the networks connected to the UAG is allowed.
From DMZ to WAN
Traffic from the DMZ to the WAN is allowed.
From IPSec VPN to any (other
than the UAG)
Traffic from the IPSec VPN zone to any of the networks connected to the UAG
is allowed.
From SSL VPN to any (other
than the UAG)
Traffic from the SSL VPN zone to any of the networks connected to the UAG is
allowed.
From LAN1 to Device
Traffic from the LAN1 to the UAG itself is allowed.
From LAN2 to Device
Traffic from the LAN2 to the UAG itself is allowed.
From DMZ to Device
DNS and NetBIOS traffic from the DMZ to the UAG itself is allowed.
From WAN to Device
The default services listed in
To-Device Rules on page 240
are allowed from
the WAN to the UAG itself. All other WAN to UAG traffic is dropped.
From IPSec VPN to Device
Traffic from the IPSec VPN zone to the UAG itself is allowed.
From SSL VPN to Device
Traffic from the SSL VPN zone to the UAG itself is allowed.
From any to any
Traffic that does not match any firewall rule is dropped. This includes traffic
from the DMZ or WAN to any of the networks behind the UAG and traffic other
than DNS and NetBIOS from the DMZ to the UAG.
This also includes traffic to or from interfaces or VPN tunnels that are not
assigned to a zone (extra-zone traffic).