Prestige 662H/HW Series User’s Guide
Chapter 12
Time and Date.......................................................................................................
142
12.1
Configuring Time and Date ............................................................................
Chapter 13
Firewalls................................................................................................................
144
13.1
Firewall Overview ...........................................................................................
13.2
Types of Firewalls ..........................................................................................
13.2.1 Packet Filtering Firewalls ......................................................................
13.2.2 Application-level Firewalls ....................................................................
13.2.3 Stateful Inspection Firewalls ................................................................
145
13.3
Introduction to ZyXEL’s Firewall .....................................................................
13.3.1 Denial of Service Attacks ......................................................................
146
13.4
Denial of Service ............................................................................................
13.4.1 Basics ...................................................................................................
13.4.2 Types of DoS Attacks ...........................................................................
147
13.4.2.1 ICMP Vulnerability ......................................................................
149
13.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................
13.4.2.3 Traceroute ...................................................................................
150
13.5
Stateful Inspection ..........................................................................................
13.5.1 Stateful Inspection Process ..................................................................
151
13.5.2 Stateful Inspection and the Prestige .....................................................
152
13.5.3 TCP Security .........................................................................................
13.5.4 UDP/ICMP Security ..............................................................................
153
13.5.5 Upper Layer Protocols ..........................................................................
13.6
Guidelines for Enhancing Security with Your Firewall ....................................
154
13.6.1 Security In General ...............................................................................
13.7
Packet Filtering Vs Firewall ............................................................................
155
13.7.1 Packet Filtering: ....................................................................................
13.7.1.1 When To Use Filtering .................................................................
13.7.2 Firewall .................................................................................................
13.7.2.1 When To Use The Firewall ..........................................................
156
Chapter 14
158
14.1
Access Methods .............................................................................................
14.2
Firewall Policies Overview .............................................................................
14.3
Rule Logic Overview ......................................................................................
159
14.3.1 Rule Checklist .......................................................................................
14.3.2 Security Ramifications ..........................................................................
160
14.3.3 Key Fields For Configuring Rules .........................................................
14.3.3.1 Action ..........................................................................................
14.3.3.2 Service ........................................................................................
12