ZyXEL Communications P-793H User Manual page 14

G.shdsl.bis 4-port security gateway
Hide thumbs Also See for P-793H:
Table of Contents

Advertisement

P-793H User's Guide
Firewalls................................................................................................................ 119
8.1 Firewall Overview .............................................................................................119
8.2 Types of Firewalls ............................................................................................119
8.3 Introduction to ZyXEL's Firewall .......................................................................120
8.4 Denial of Service ..............................................................................................121
8.5 Stateful Inspection ............................................................................................125
8.6 Guidelines for Enhancing Security with Your Firewall ......................................128
8.7 Packet Filtering vs. Firewall .............................................................................129
Chapter 9
Firewall Configuration ......................................................................................... 131
9.1 Access Methods ...............................................................................................131
9.2 Firewall Policies Overview ...............................................................................131
9.3 Rule Logic Overview ........................................................................................132
14
7.6.1 Address Mapping Rule Edit ...................................................................116
8.2.1 Packet Filtering Firewalls ........................................................................119
8.2.2 Application-level Firewalls ......................................................................120
8.2.3 Stateful Inspection Firewalls ...................................................................120
8.3.1 Denial of Service Attacks ........................................................................121
8.4.1 Basics .....................................................................................................121
8.4.2 Types of DoS Attacks .............................................................................122
8.4.2.1 ICMP Vulnerability .........................................................................124
8.4.2.2 Illegal Commands (NetBIOS and SMTP) ......................................124
8.4.2.3 Traceroute .....................................................................................125
8.5.1 Stateful Inspection Process ....................................................................126
8.5.2 Stateful Inspection and the ZyXEL Device ..............................................126
8.5.3 TCP Security ...........................................................................................127
8.5.4 UDP/ICMP Security ................................................................................127
8.5.5 Upper Layer Protocols ............................................................................128
8.6.1 Security In General .................................................................................128
8.7.1 Packet Filtering .......................................................................................129
8.7.1.1 When To Use Filtering ...................................................................130
8.7.2 Firewall ...................................................................................................130
8.7.2.1 When To Use The Firewall ............................................................130
9.3.1 Rule Checklist .........................................................................................132
9.3.2 Security Ramifications ............................................................................132
9.3.3 Key Fields For Configuring Rules ...........................................................133
9.3.3.1 Action ............................................................................................133
9.3.3.2 Service ..........................................................................................133
9.3.3.3 Source Address .............................................................................133
9.3.3.4 Destination Address ......................................................................133
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents