P-660H/HW/W-T Series User’ Guide

7.4 Selecting the NAT Mode .................................................................................

107

7.5 Configuring SUA Server Set ...........................................................................

108

7.6 Configuring Address Mapping Rules ...............................................................

110

7.7 Editing an Address Mapping Rule ...................................................................

111

Chapter 8

 

Dynamic DNS Setup.............................................................................................

114

8.1 Dynamic DNS Overview .................................................................................

114

8.1.1 DYNDNS Wildcard ..................................................................................

114

8.2 Configuring Dynamic DNS ..............................................................................

114

Chapter 9

 

Time and Date.......................................................................................................

116

9.1 Configuring Time and Date .............................................................................

116

Chapter 10

 

Firewalls................................................................................................................

118

10.1 Firewall Overview ..........................................................................................

118

10.2 Types of Firewalls ..........................................................................................

118

10.2.1 Packet Filtering Firewalls ......................................................................

118

10.2.2 Application-level Firewalls ....................................................................

119

10.2.3 Stateful Inspection Firewalls ................................................................

119

10.3 Introduction to ZyXEL’s Firewall .....................................................................

119

10.3.1 Denial of Service Attacks ......................................................................

120

10.4 Denial of Service ............................................................................................

120

10.4.1 Basics ...................................................................................................

120

10.4.2 Types of DoS Attacks ...........................................................................

121

10.4.2.1 ICMP Vulnerability ......................................................................

123

10.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................

123

10.4.2.3 Traceroute ...................................................................................

124

10.5 Stateful Inspection ..........................................................................................

124

10.5.1 Stateful Inspection Process ..................................................................

125

10.5.2 Stateful Inspection and the Prestige .....................................................

126

10.5.3 TCP Security .........................................................................................

126

10.5.4 UDP/ICMP Security ..............................................................................

127

10.5.5 Upper Layer Protocols ..........................................................................

127

10.6 Guidelines for Enhancing Security with Your Firewall ....................................

127

10.6.1 Security In General ...............................................................................

128

10.7 Packet Filtering Vs Firewall ............................................................................

129

10.7.1 Packet Filtering: ....................................................................................

129

10.7.1.1 When To Use Filtering .................................................................

129

10.7.2 Firewall .................................................................................................

129

10.7.2.1 When To Use The Firewall ..........................................................

129

13

Table of Contents