P-660H/HW/W-T Series User’ Guide
7.4 Selecting the NAT Mode .................................................................................
107
7.5 Configuring SUA Server Set ...........................................................................
108
7.6 Configuring Address Mapping Rules ...............................................................
110
7.7 Editing an Address Mapping Rule ...................................................................
111
Chapter 8
Dynamic DNS Setup.............................................................................................
114
8.1 Dynamic DNS Overview .................................................................................
8.1.1 DYNDNS Wildcard ..................................................................................
8.2 Configuring Dynamic DNS ..............................................................................
Chapter 9
Time and Date.......................................................................................................
116
9.1 Configuring Time and Date .............................................................................
Chapter 10
Firewalls................................................................................................................
118
10.1 Firewall Overview ..........................................................................................
10.2 Types of Firewalls ..........................................................................................
10.2.1 Packet Filtering Firewalls ......................................................................
10.2.2 Application-level Firewalls ....................................................................
119
10.2.3 Stateful Inspection Firewalls ................................................................
10.3 Introduction to ZyXEL’s Firewall .....................................................................
10.3.1 Denial of Service Attacks ......................................................................
120
10.4 Denial of Service ............................................................................................
10.4.1 Basics ...................................................................................................
10.4.2 Types of DoS Attacks ...........................................................................
121
10.4.2.1 ICMP Vulnerability ......................................................................
123
10.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................
10.4.2.3 Traceroute ...................................................................................
124
10.5 Stateful Inspection ..........................................................................................
10.5.1 Stateful Inspection Process ..................................................................
125
10.5.2 Stateful Inspection and the Prestige .....................................................
126
10.5.3 TCP Security .........................................................................................
10.5.4 UDP/ICMP Security ..............................................................................
127
10.5.5 Upper Layer Protocols ..........................................................................
10.6 Guidelines for Enhancing Security with Your Firewall ....................................
10.6.1 Security In General ...............................................................................
128
10.7 Packet Filtering Vs Firewall ............................................................................
129
10.7.1 Packet Filtering: ....................................................................................
10.7.1.1 When To Use Filtering .................................................................
10.7.2 Firewall .................................................................................................
10.7.2.1 When To Use The Firewall ..........................................................
13
Table of Contents