
Table of Contents
P-662H/HW-D Series User’s Guide 15
10.2 Types of Firewalls ............................................................................................................ 157
10.2.1 Packet Filtering Firewalls ....................................................................................... 157
10.2.2 Application-level Firewalls ...................................................................................... 158
10.2.3 Stateful Inspection Firewalls ..................................................................................158
10.3 Introduction to ZyXEL’s Firewall ...................................................................................... 158
10.3.1 Denial of Service Attacks ....................................................................................... 159
10.4 Denial of Service ............................................................................................................. 159
10.4.1 Basics .....................................................................................................................159
10.4.2 Types of DoS Attacks ............................................................................................. 160
10.5 Stateful Inspection ...........................................................................................................162
10.5.1 Stateful Inspection Process ....................................................................................163
10.5.2 Stateful Inspection and the ZyXEL Device ............................................................. 164
10.5.3 TCP Security .......................................................................................................... 164
10.5.4 UDP/ICMP Security ................................................................................................ 165
10.5.5 Upper Layer Protocols ...........................................................................................165
10.6 Guidelines for Enhancing Security with Your Firewall ..................................................... 166
10.6.1 Security In General ................................................................................................ 166
10.7 Packet Filtering Vs Firewall .............................................................................................167
10.7.1 Packet Filtering: ..................................................................................................... 167
10.7.2 Firewall ................................................................................................................... 167
Chapter 11
Firewall Configuration..........................................................................................................169
11.1 Access Methods ...............................................................................................................169
11.2 Firewall Policies Overview ...............................................................................................169
11.3 Rule Logic Overview ........................................................................................................170
11.3.1 Security Ramifications ............................................................................................ 170
11.3.2 Key Fields For Configuring Rules ........................................................................... 171
11.4 Connection Direction ........................................................................................................ 171
11.4.1 LAN to WAN Rules ................................................................................................. 172
11.4.2 Alerts ...................................................................................................................... 172
11.5 General Firewall Policy .................................................................................................172
11.6 Firewall Rules Summary ................................................................................................. 173
11.6.1 Configuring Firewall Rules ................................................................................... 175
11.6.2 Customized Services .............................................................................................178
11.6.3 Configuring A Customized Service ........................................................................ 178
11.7 Example Firewall Rule .....................................................................................................179
11.8 Predefined Services .........................................................................................................183
11.9 Anti-Probing ..................................................................................................................... 185
11.10 DoS Thresholds ............................................................................................................ 186
11.10.1 Threshold Values .................................................................................................. 186
11.10.2 Half-Open Sessions .............................................................................................187
11.10.3 Configuring Firewall Thresholds ........................................................................... 187