P-662H/HW-D Series User’s Guide
178
Chapter 10 Firewalls
A similar situation exists for ICMP, except that the ZyXEL Device is even more restrictive.
Specifically, only outgoing echoes will allow incoming echo replies, outgoing address mask
requests will allow incoming address mask replies, and outgoing timestamp requests will
allow incoming timestamp replies. No other ICMP packets are allowed in through the firewall,
simply because they are too dangerous and contain too little tracking information. For
instance, ICMP redirect packets are never allowed in, since they could be used to reroute
traffic through attacking machines.
10.5.5 Upper Layer Protocols
Some higher layer protocols (such as FTP and RealAudio) utilize multiple network
connections simultaneously. In general terms, they usually have a "control connection" which
is used for sending commands between endpoints, and then "data connections" which are used
for transmitting bulk information.
Consider the FTP protocol. A user on the LAN opens a control connection to a server on the
Internet and requests a file. At this point, the remote server will open a data connection from
the Internet. For FTP to work properly, this connection must be allowed to pass through even
though a connection from the Internet would normally be rejected.
In order to achieve this, the ZyXEL Device inspects the application-level FTP data.
Specifically, it searches for outgoing "PORT" commands, and when it sees these, it adds a
cache entry for the anticipated data connection. This can be done safely, since the PORT
command contains address and port information, which can be used to uniquely identify the
connection.
Any protocol that operates in this way must be supported on a case-by-case basis. You can use
the web configurator’s Custom Ports feature to do this.
10.6 Guidelines for Enhancing Security with Your Firewall
• Change the default password via CLI (Command Line Interpreter) or the web
configurator.
• Limit who can telnet into your router.
• Don't enable any local service (such as SNMP or NTP) that you don't use. Any enabled
service could present a potential security risk. A determined hacker might be able to find
creative ways to misuse the enabled services to access the firewall or the network.
• For local services that are enabled, protect against misuse. Protect by configuring the
services to communicate only with specific peers, and protect by configuring rules to
block packets for the services at specific interfaces.
• Protect against IP spoofing by making sure the firewall is active.
• Keep the firewall in a secured (locked) room.
Summary of Contents for 802.11g ADSL 2+ 4-Port Security Gateway HW-D Series
Page 2: ......
Page 10: ...P 662H HW D Series User s Guide 10 Customer Support ...
Page 24: ...P 662H HW D Series User s Guide 24 Table of Contents ...
Page 32: ...P 662H HW D Series User s Guide 32 List of Figures ...
Page 38: ...P 662H HW D Series User s Guide 38 List of Tables ...
Page 64: ...P 662H HW D Series User s Guide 64 Chapter 2 Introducing the Web Configurator ...
Page 84: ...P 662H HW D Series User s Guide 84 Chapter 4 Bandwidth Management Wizard ...
Page 108: ...P 662H HW D Series User s Guide 108 Chapter 5 WAN Setup ...
Page 122: ...P 662H HW D Series User s Guide 122 Chapter 6 LAN Setup ...
Page 156: ...P 662H HW D Series User s Guide 156 Chapter 8 DMZ ...
Page 202: ...P 662H HW D Series User s Guide 202 Chapter 11 Firewall Configuration ...
Page 210: ...P 662H HW D Series User s Guide 210 Chapter 12 Anti Virus Packet Scan ...
Page 214: ...P 662H HW D Series User s Guide 214 Chapter 13 Content Filtering ...
Page 232: ...P 662H HW D Series User s Guide 232 Chapter 14 Content Access Control ...
Page 238: ...P 662H HW D Series User s Guide 238 Chapter 15 Introduction to IPSec ...
Page 273: ...P 662H HW D Series User s Guide Chapter 17 Certificates 273 Figure 144 My Certificate Details ...
Page 292: ...P 662H HW D Series User s Guide 292 Chapter 18 Static Route ...
Page 304: ...P 662H HW D Series User s Guide 304 Chapter 19 Bandwidth Management ...
Page 308: ...P 662H HW D Series User s Guide 308 Chapter 20 Dynamic DNS Setup ...
Page 332: ...P 662H HW D Series User s Guide 332 Chapter 22 Universal Plug and Play UPnP ...
Page 338: ...P 662H HW D Series User s Guide 338 Chapter 23 System ...
Page 344: ...P 662H HW D Series User s Guide 344 Chapter 24 Logs ...
Page 350: ...P 662H HW D Series User s Guide 350 Chapter 25 Tools ...
Page 364: ...P 662H HW D Series User s Guide 364 Chapter 27 Troubleshooting ...
Page 368: ...P 662H HW D Series User s Guide 368 Product Specifications ...
Page 372: ...P 662H HW D Series User s Guide 372 Appendix C Wall mounting Instructions ...
Page 408: ...P 662H HW D Series User s Guide 408 Appendix F Wireless LANs ...
Page 420: ...P 662H HW D Series User s Guide 420 Appendix H Command Interpreter ...
Page 436: ...P 662H HW D Series User s Guide 436 Appendix L NetBIOS Filter Commands ...
Page 462: ...P 662H HW D Series User s Guide 462 Appendix M Internal SPTGEN ...
Page 484: ...P 662H HW D Series User s Guide 484 Appendix P Triangle Route ...