Table of Contents
P-662H/HW-D Series User’s Guide
15
10.2 Types of Firewalls ............................................................................................................ 157
10.2.1 Packet Filtering Firewalls ....................................................................................... 157
10.2.2 Application-level Firewalls ...................................................................................... 158
10.2.3 Stateful Inspection Firewalls .................................................................................. 158
10.3 Introduction to ZyXEL’s Firewall ...................................................................................... 158
10.3.1 Denial of Service Attacks ....................................................................................... 159
10.4 Denial of Service .............................................................................................................159
10.4.1 Basics .....................................................................................................................159
10.4.2 Types of DoS Attacks ............................................................................................. 160
10.5 Stateful Inspection ...........................................................................................................162
10.5.1 Stateful Inspection Process .................................................................................... 163
10.5.2 Stateful Inspection and the ZyXEL Device ............................................................. 164
10.5.3 TCP Security .......................................................................................................... 164
10.5.4 UDP/ICMP Security ................................................................................................ 165
10.5.5 Upper Layer Protocols ........................................................................................... 165
10.6 Guidelines for Enhancing Security with Your Firewall ..................................................... 166
10.6.1 Security In General ................................................................................................ 166
10.7 Packet Filtering Vs Firewall .............................................................................................167
10.7.1 Packet Filtering: ..................................................................................................... 167
10.7.2 Firewall ................................................................................................................... 167
Chapter 11
Firewall Configuration..........................................................................................................169
11.1 Access Methods ...............................................................................................................169
11.2 Firewall Policies Overview ...............................................................................................169
11.3 Rule Logic Overview ........................................................................................................ 170
11.3.1 Security Ramifications ............................................................................................ 170
11.3.2 Key Fields For Configuring Rules ...........................................................................171
11.4 Connection Direction ........................................................................................................171
11.4.1 LAN to WAN Rules ................................................................................................. 172
11.4.2 Alerts ......................................................................................................................172
11.5 General Firewall Policy .................................................................................................172
11.6 Firewall Rules Summary ................................................................................................. 173
11.6.1 Configuring Firewall Rules ...................................................................................175
11.6.2 Customized Services ............................................................................................. 178
11.6.3 Configuring A Customized Service ........................................................................ 178
11.7 Example Firewall Rule .....................................................................................................179
11.8 Predefined Services ......................................................................................................... 183
11.9 Anti-Probing ..................................................................................................................... 185
11.10 DoS Thresholds ............................................................................................................ 186
11.10.1 Threshold Values .................................................................................................. 186
11.10.2 Half-Open Sessions .............................................................................................187
11.10.3 Configuring Firewall Thresholds ........................................................................... 187