Table of Contents
P-660HW-Dx User’s Guide
14
7.6.2 WMM QoS Priorities ................................................................................................. 122
7.6.3 Services . .................................................................................................................. 123
7.7 QoS Screen ..................................................... .................................................................. 125
7.7.1 ToS (Type of Service) and WMM QoS ..................................................................... 125
7.7.2 Application Priority Configuration ............................................................................. 127
Chapter 8
Network Address Translation (NAT) Screens.....................................................................129
8.1 NAT Overview ................................................................................................................... 129
8.1.1 NAT Definitions ............................ ............................................................................ 129
8.1.2 What NAT Does ............................... ........................................................................ 130
8.1.3 How NAT Works ....................................................................................................... 130
8.1.4 NAT Application ........................................................................................................ 130
8.1.5 NAT Mapping Types ................................................................................................. 131
8.2 SUA (Single User Account) Versus NAT ................................................................... ........132
8.3 SIP ALG ............................................................................................................... ..............132
8.4 NAT General Setup ........................................................................................................... 133
8.5 Port Forwarding ...................................................... ........................................................... 133
8.5.1 Default Server IP Address ........................................................................................ 134
8.5.2 Port Forwarding: Services and Port Numbers .......................................................... 134
8.5.3 Configuring Servers Behind Port Forwarding (Example) ........... ..............................135
8.6 Configuring Port Forwarding ............................................................................................. 135
8.6.1 Port Forwarding Rule Edit ............................................... ........................................ 136
8.7 Address Mapping ......................................................................................................... .....137
8.7.1 Address Mapping Rule Edit ..................................................................................... 139
Part IV: Security ...................................................................................141Chapter 9
Firewalls.................................................................................................................................143
9.1 Firewall Overview ..................... ........................................................................................ 143
9.2 Types of Firewalls .............................................................................................................. 143
9.2.1 Packet Filtering Firewalls .................... ..................................................................... 143
9.2.2 Application-level Firewalls ........................................................................................ 144
9.2.3 Stateful Inspection Firewalls ..................................................................................... 144
9.3 Introduction to ZyXEL’s Firewall ................................................ ........................................1 44
9.3.1 Denial of Service Attacks ............. ............................................................................ 145
9.4 Denial of Service ............................................................................................................... 145
9.4.1 Basics ....................................................................................................................... 145
9.4.2 Types of DoS Attacks ............................................................................................... 146
9.5 Stateful Inspection ........................................ ..................................................................... 148