Prestige 652 ADSL Security Router

Chapter 5 Remote Node Configuration .....................................................................................................

5-1

5.1

Remote Node Setup ...................................................................................................................

5-1

5.2

Remote Node Setup ...................................................................................................................

5-6

5.3

Remote Node Filter....................................................................................................................

5-8

Chapter 6 Remote Node TCP/IP Configuration........................................................................................

6-1

6.1

TCP/IP Configuration ................................................................................................................

6-1

Chapter 7 Bridging Setup ...........................................................................................................................

7-1

7.1

Bridging in General....................................................................................................................

7-1

7.2

Bridge Ethernet Setup................................................................................................................

7-1

Chapter 8 Network Address Translation (NAT)........................................................................................

8-1

8.1

Introduction................................................................................................................................

8-1

8.2

Using NAT.................................................................................................................................

8-6

8.3

NAT Setup .................................................................................................................................

8-8

8.4

NAT Server Sets – Port Forwarding ........................................................................................

8-16

8.5

General NAT Examples...........................................................................................................

8-20

FIREWALL AND CONTENT FILTERS........................................................................................................

III

Chapter 9 Firewalls......................................................................................................................................

9-1

9.1

What Is a Firewall? ....................................................................................................................

9-1

9.2

Types of Firewalls......................................................................................................................

9-1

9.3

Introduction to ZyXEL’s Firewall .............................................................................................

9-2

9.4

Denial of Service .......................................................................................................................

9-3

9.5

Stateful Inspection .....................................................................................................................

9-7

9.6

Guidelines For Enhancing Security With Your Firewall .........................................................

9-11

9.7

Packet Filtering Vs Firewall ....................................................................................................

9-12

Chapter 10 Introducing the Prestige Firewall.........................................................................................

10-1

10.1

Remote Management and the Firewall ....................................................................................

10-1

10.2

Access Methods .......................................................................................................................

10-1

10.3

Using Prestige SMT Menus .....................................................................................................

10-1

Chapter 11 Using the Prestige Web Configurator...................................................................................

11-1

11.1

Web Configurator Login and Main Menu Screens ..................................................................

11-1

11.2

Enabling the Firewall...............................................................................................................

11-2

11.3

E-mail ......................................................................................................................................

11-2

11.4

Attack Alert..............................................................................................................................

11-6

Chapter 12 Creating Custom Rules .........................................................................................................

12-1

12.1

Rules Overview........................................................................................................................

12-1

12.2

Rule Logic Overview...............................................................................................................

12-1

12.3

Connection Direction...............................................................................................................

12-3

12.4

Rule Summary .........................................................................................................................

12-4

12.5

Predefined Services..................................................................................................................

12-6

12.6

Timeout..................................................................................................................................

12-13

Chapter 13 Customized Services ..............................................................................................................

13-1

viii

Table of Contents