Table of Contents
10.4.2 Port Forwarding: Services and Port Numbers ........................................................
152
10.4.3 Configuring Servers Behind Port Forwarding (Example) .......................................
10.5 Configuring Port Forwarding ...........................................................................................
153
10.5.1 Port Forwarding Rule Edit .....................................................................................
154
Part IV: Security ...................................................................................
157
Chapter 11
Firewalls.................................................................................................................................
159
11.1
Firewall Overview ............................................................................................................
11.2
Types of Firewalls ............................................................................................................
11.2.1 Packet Filtering Firewalls .......................................................................................
11.2.2 Application-level Firewalls ......................................................................................
160
11.2.3 Stateful Inspection Firewalls ...................................................................................
11.3
Introduction to ZyXEL’s Firewall .......................................................................................
11.3.1 Denial of Service Attacks .......................................................................................
161
11.4
Denial of Service ..............................................................................................................
11.4.1 Basics .....................................................................................................................
11.4.2 Types of DoS Attacks .............................................................................................
162
11.5
Stateful Inspection ............................................................................................................
164
11.5.1 Stateful Inspection Process ....................................................................................
165
11.5.2 Stateful Inspection and the ZyXEL Device .............................................................
166
11.5.3 TCP Security ..........................................................................................................
11.5.4 UDP/ICMP Security ................................................................................................
167
11.5.5 Upper Layer Protocols ............................................................................................
11.6
Guidelines for Enhancing Security with Your Firewall ......................................................
168
11.6.1 Security In General .................................................................................................
11.7
Packet Filtering Vs Firewall ..............................................................................................
169
11.7.1 Packet Filtering: ......................................................................................................
11.7.2 Firewall ...................................................................................................................
11.8
Triangle Route .................................................................................................................
170
11.8.1 The “Triangle Route” Problem ................................................................................
11.8.2 The “Triangle Route” Solutions ...............................................................................
171
Chapter 12
Firewall Configuration ..........................................................................................................
173
12.1 Access Methods ..............................................................................................................
12.2 Firewall Policies Overview ...............................................................................................
12.3 Rule Logic Overview ........................................................................................................
174
12.3.1 Rule Checklist ........................................................................................................
12.3.2 Security Ramifications ............................................................................................
15
P-660HW-Tx v3 User’s Guide