P-662H/HW-D Series User’s Guide
9.3 NAT General Setup .........................................................................................
160
9.4 Port Forwarding ................................................................................................
161
9.4.1 Default Server IP Address ......................................................................
162
9.4.2 Port Forwarding: Services and Port Numbers ........................................
9.4.3 Configuring Servers Behind Port Forwarding (Example) ........................
163
9.5 Configuring Port Forwarding ...........................................................................
9.5.1 Port Forwarding Rule Edit .......................................................................
164
9.6 Address Mapping ............................................................................................
165
9.6.1 Address Mapping Rule Edit ....................................................................
167
Chapter 10
Firewalls................................................................................................................
169
10.1 Firewall Overview ..........................................................................................
10.2 Types of Firewalls ..........................................................................................
10.2.1 Packet Filtering Firewalls ......................................................................
10.2.2 Application-level Firewalls ....................................................................
170
10.2.3 Stateful Inspection Firewalls ................................................................
10.3 Introduction to ZyXEL’s Firewall .....................................................................
10.3.1 Denial of Service Attacks ......................................................................
171
10.4 Denial of Service ............................................................................................
10.4.1 Basics ...................................................................................................
10.4.2 Types of DoS Attacks ...........................................................................
172
10.4.2.1 ICMP Vulnerability ......................................................................
174
10.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................
10.4.2.3 Traceroute ...................................................................................
175
10.5 Stateful Inspection ..........................................................................................
10.5.1 Stateful Inspection Process ..................................................................
176
10.5.2 Stateful Inspection and the ZyXEL Device ............................................
10.5.3 TCP Security .........................................................................................
177
10.5.4 UDP/ICMP Security ..............................................................................
10.5.5 Upper Layer Protocols ..........................................................................
178
10.6 Guidelines for Enhancing Security with Your Firewall ....................................
10.6.1 Security In General ...............................................................................
179
10.7 Packet Filtering Vs Firewall ............................................................................
10.7.1 Packet Filtering: ....................................................................................
180
10.7.1.1 When To Use Filtering .................................................................
10.7.2 Firewall .................................................................................................
10.7.2.1 When To Use The Firewall ..........................................................
Chapter 11
181
11.1 Access Methods .............................................................................................
11.2 Firewall Policies Overview ..............................................................................
Table of Contents
15