P-2608HWL-Dx Series User’s Guide
Chapter 15 Firewalls
195
• Allow certain types of traffic from the Internet to specific hosts on the LAN.
• Allow access to a Web server to everyone but competitors.
• Restrict use of certain protocols, such as Telnet, to authorized users on the LAN.
These custom rules work by evaluating the network traffic’s Source IP address, Destination IP
address, IP protocol type, and comparing these to rules set by the administrator.
Note:
The ability to define firewall rules is a very powerful tool. Using custom rules, it
is possible to disable all firewall protection or block all access to the Internet.
Use extreme caution when creating or deleting firewall rules. Test changes
after creating them to make sure they work correctly.
Below is a brief technical description of how these connections are tracked. Connections may
either be defined by the upper protocols (for instance, TCP), or by the ZyXEL Device itself (as
with the "virtual connections" created for UDP and ICMP).
15.5.3 TCP Security
The ZyXEL Device uses state information embedded in TCP packets. The first packet of any
new connection has its SYN flag set and its ACK flag cleared; these are "initiation" packets.
All packets that do not have this flag structure are called "subsequent" packets, since they
represent data that occurs later in the TCP stream.
If an initiation packet originates on the WAN, this means that someone is trying to make a
connection from the Internet into the LAN. Except in a few special cases (see "Upper Layer
Protocols" shown next), these packets are dropped and logged.
If an initiation packet originates on the LAN, this means that someone is trying to make a
connection from the LAN to the Internet. Assuming that this is an acceptable part of the
security policy (as is the case with the default policy), the connection will be allowed. A cache
entry is added which includes connection information such as IP addresses, TCP ports,
sequence numbers, etc.
When the ZyXEL Device receives any subsequent packet (from the Internet or from the LAN),
its connection information is extracted and checked against the cache. A packet is only
allowed to pass through if it corresponds to a valid connection (that is, if it is a response to a
connection which originated on the LAN).
15.5.4 UDP/ICMP Security
UDP and ICMP do not themselves contain any connection information (such as sequence
numbers). However, at the very minimum, they contain an IP address pair (source and
destination). UDP also contains port pairs, and ICMP has type and code information. All of
this data can be analyzed in order to build "virtual connections" in the cache.
For instance, any UDP packet that originates on the LAN will create a cache entry. Its IP
address and port pairs will be stored. For a short period of time, UDP packets from the WAN
that have matching IP and UDP information will be allowed back in through the firewall.
Summary of Contents for P-2608HWL-D1
Page 2: ......
Page 24: ...P 2608HWL Dx Series User s Guide 24 Table of Contents ...
Page 32: ...P 2608HWL Dx Series User s Guide 32 List of Figures ...
Page 38: ...P 2608HWL Dx Series User s Guide 38 List of Tables ...
Page 44: ...P 2608HWL Dx Series User s Guide 44 Chapter 1 Getting To Know the ZyXEL Device ...
Page 66: ...P 2608HWL Dx Series User s Guide 66 Chapter 3 Internet and Wireless Setup Wizard ...
Page 72: ...P 2608HWL Dx Series User s Guide 72 Chapter 4 VoIP Wizard And Example ...
Page 78: ...P 2608HWL Dx Series User s Guide 78 Chapter 5 Bandwidth Management Wizard ...
Page 88: ...P 2608HWL Dx Series User s Guide 88 Chapter 6 Status Screens ...
Page 118: ...P 2608HWL Dx Series User s Guide 118 Chapter 8 LAN Setup ...
Page 138: ...P 2608HWL Dx Series User s Guide 138 Chapter 9 Wireless LAN ...
Page 166: ...P 2608HWL Dx Series User s Guide 166 Chapter 11 SIP ...
Page 176: ...P 2608HWL Dx Series User s Guide 176 Chapter 12 Phone ...
Page 184: ...P 2608HWL Dx Series User s Guide 184 Chapter 13 Phone Book ...
Page 220: ...P 2608HWL Dx Series User s Guide 220 Chapter 17 Content Filtering ...
Page 276: ...P 2608HWL Dx Series User s Guide 276 Chapter 20 Static Route ...
Page 288: ...P 2608HWL Dx Series User s Guide 288 Chapter 21 Bandwidth Management ...
Page 292: ...P 2608HWL Dx Series User s Guide 292 Chapter 22 Dynamic DNS Setup ...
Page 306: ...P 2608HWL Dx Series User s Guide 306 Chapter 23 Remote Management Configuration ...
Page 318: ...P 2608HWL Dx Series User s Guide 318 Chapter 24 Universal Plug and Play UPnP ...
Page 324: ...P 2608HWL Dx Series User s Guide 324 Chapter 25 System ...
Page 344: ...P 2608HWL Dx Series User s Guide 344 Chapter 27 Tools ...
Page 348: ...P 2608HWL Dx Series User s Guide 348 Chapter 28 Diagnostic ...
Page 360: ...P 2608HWL Dx Series User s Guide 360 Chapter 29 Troubleshooting ...
Page 378: ...P 2608HWL Dx Series User s Guide 378 Appendix B Setting up Your Computer s IP Address ...
Page 402: ...P 2608HWL Dx Series User s Guide 402 Appendix F Triangle Route ...
Page 440: ...P 2608HWL Dx Series User s Guide 440 Appendix H Internal SPTGEN ...