10.1 Overview
This chapter shows you how to enable and configure the Zyxel Device firewall. Use the firewall to protect
your Zyxel Device and network from attacks by hackers on the Internet and control access to it. By
default the firewall:
• allows traffic that originates from your LAN computers to go to all other networks.
• blocks traffic that originates on other networks from going to the LAN.
The following figure illustrates the default firewall action. User A can initiate an IM (Instant Messaging)
session from the LAN to the WAN (1). Return traffic for this session is also allowed (2). However other traffic
initiated from the WAN is blocked (3 and 4).
Figure 57 Default Firewall Action
A
10.1.1 What You Can Do in this Chapter
• Use the Firewall screen to configure the security level of the firewall on the Zyxel Device
on page
• Use the Protocol screen to add or remove predefined Internet services and configure firewall rules
(Section 10.3 on page
• Use the Access Control screen to view and configure incoming/outgoing filtering rules
on page
10.1.2 What You Need to Know
SYN Attack
A SYN attack floods a targeted system with a series of SYN packets. Each packet causes the targeted
system to issue a SYN-ACK response. While the targeted system waits for the ACK that follows the SYN-
LAN
128).
128).
130).
P-660HN-51 User's Guide
C
WAN
1
2
3
4
126
H A P T E R
Firewall
10
(Section 10.2
(Section 10.4