
P-660H/HW/W-T Series User’ Guide
119
Chapter 10 Firewalls
10.2.2 Application-level Firewalls
Application-level firewalls restrict access by serving as proxies for external servers. Since they
use programs written for specific Internet services, such as HTTP, FTP and telnet, they can
evaluate network packets for valid application-specific data. Application-level gateways have
a number of general advantages over the default mode of permitting application traffic directly
to internal hosts:
Information hiding prevents the names of internal systems from being made known via DNS
to outside systems, since the application gateway is the only host whose name must be made
known to outside systems.
Robust authentication and logging pre-authenticates application traffic before it reaches
internal hosts and causes it to be logged more effectively than if it were logged with standard
host logging. Filtering rules at the packet filtering router can be less complex than they would
be if the router needed to filter application traffic and direct it to a number of specific systems.
The router need only allow application traffic destined for the application gateway and reject
the rest.
10.2.3 Stateful Inspection Firewalls
Stateful inspection firewalls restrict access by screening data packets against defined access
rules. They make access control decisions based on IP address and protocol. They also
"inspect" the session data to assure the integrity of the connection and to adapt to dynamic
protocols. These firewalls generally provide the best speed and transparency, however, they
may lack the granular application level access control or caching that some proxies support.
See
for more information on stateful inspection.
Firewalls, of one type or another, have become an integral part of standard security solutions
for enterprises.
10.3 Introduction to ZyXEL’s Firewall
The Prestige firewall is a stateful inspection firewall and is designed to protect against Denial
of Service attacks when activated (in SMT menu 21.2 or in the web configurator). The
Prestige’s purpose is to allow a private Local Area Network (LAN) to be securely connected
to the Internet. The Prestige can be used to prevent theft, destruction and modification of data,
as well as log events, which may be important to the security of your network. The Prestige
also has packet filtering capabilities.
The Prestige is installed between the LAN and the Internet. This allows it to act as a secure
gateway for all data passing between the Internet and the LAN.
The Prestige has one DSL/ISDN port and one Ethernet LAN port, which physically separate
the network into two areas.
• The DSL/ISDN port connects to the Internet.
Summary of Contents for P-660H - VERSION 3.40
Page 1: ...P 660H HW W T Series ADSL 2 Gateway User s Guide Version 3 40 6 2005...
Page 9: ...P 660H HW W T Series User Guide 9 Customer Support...
Page 31: ...P 660H HW W T Series User Guide 31 List of Figures...
Page 37: ...P 660H HW W T Series User Guide 37 List of Tables...
Page 41: ...P 660H HW W T Series User Guide 41 Introduction to DSL...
Page 61: ...P 660H HW W T Series User Guide 61 Chapter 3 Wizard Setup for Internet Access...
Page 89: ...P 660H HW W T Series User Guide 89 Chapter 5 Wireless LAN...
Page 131: ...P 660H HW W T Series User Guide 131 Chapter 10 Firewalls...
Page 161: ...P 660H HW W T Series User Guide 161 Chapter 13 Remote Management Configuration...
Page 175: ...P 660H HW W T Series User Guide 175 Chapter 14 Universal Plug and Play UPnP...
Page 181: ...P 660H HW W T Series User Guide 181 Chapter 15 Logs Screens...
Page 195: ...P 660H HW W T Series User Guide 195 Chapter 16 Media Bandwidth Management Advanced Setup...
Page 207: ...P 660H HW W T Series User Guide 207 Chapter 17 Maintenance...
Page 217: ...P 660H HW W T Series User Guide 217 Chapter 19 Menu 1 General Setup...
Page 221: ...P 660H HW W T Series User Guide 221 Chapter 20 Menu 2 WAN Backup Setup...
Page 225: ...P 660H HW W T Series User Guide 225 Chapter 21 Menu 3 LAN Setup...
Page 229: ...P 660H HW W T Series User Guide 229 Chapter 22 Wireless LAN Setup...
Page 235: ...P 660H HW W T Series User Guide 235 Chapter 23 Internet Access...
Page 249: ...P 660H HW W T Series User Guide 249 Chapter 25 Static Route Setup...
Page 253: ...P 660H HW W T Series User Guide 253 Chapter 26 Bridging Setup...
Page 269: ...P 660H HW W T Series User Guide 269 Chapter 27 Network Address Translation NAT...
Page 285: ...P 660H HW W T Series User Guide 285 Chapter 29 Filter Configuration...
Page 305: ...P 660H HW W T Series User Guide 305 Chapter 32 System Information and Diagnosis...
Page 317: ...P 660H HW W T Series User Guide 317 Chapter 33 Firmware and Configuration File Maintenance...
Page 323: ...P 660H HW W T Series User Guide 323 Chapter 34 System Maintenance...
Page 327: ...P 660H HW W T Series User Guide 327 Chapter 35 Remote Management...
Page 337: ...P 660H HW W T Series User Guide 337 Chapter 36 IP Policy Routing...
Page 341: ...P 660H HW W T Series User Guide 341 Chapter 37 Call Scheduling...
Page 357: ...P 660H HW W T Series User Guide 357 Appendix A...
Page 359: ...P 660H HW W T Series User Guide 359 Appendix B...
Page 383: ...P 660H HW W T Series User Guide 383 Appendix D...
Page 387: ...P 660H HW W T Series User Guide 387 Appendix F...
Page 393: ...P 660H HW W T Series User Guide 393 Appendix G...
Page 397: ...P 660H HW W T Series User Guide 397 Appendix H...
Page 400: ...P 660H HW W T Series User Guide Appendix I 400...
Page 401: ...P 660H HW W T Series User Guide 401 Appendix I...
Page 455: ...P 660H HW W T Series User Guide 455 Appendix M...