Prestige 653HWI Series User’s Guide
Firewalls
11-13
Packet filtering only checks the header portion of an IP packet.
When To Use Filtering
1. To block/allow LAN packets by their MAC addresses.
2. To block/allow special IP packets which are neither TCP nor UDP, nor ICMP packets.
3. To block/allow both inbound (WAN to LAN) and outbound (LAN to WAN) traffic between the specific
inside host/network "A" and outside host/network "B". If the filter blocks the traffic from A to B, it also
blocks the traffic from B to A. Filters cannot distinguish traffic originating from an inside host or an
outside host by IP address.
4. To block/allow IP trace route.
11.7.2 Firewall
The firewall inspects packet contents as well as their source and destination addresses. Firewalls of this
type employ an inspection module, applicable to all protocols, that understands data in the packet is
intended for other layers, from the network layer (IP headers) up to the application layer.
The firewall performs stateful inspection. It takes into account the state of connections it handles so that,
for example, a legitimate incoming packet can be matched with the outbound request for that packet and
allowed in. Conversely, an incoming packet masquerading as a response to a nonexistent outbound
request can be blocked.
The firewall uses session filtering, i.e., smart rules, that enhance the filtering process and control the
network session rather than control individual packets in a session.
The firewall provides e-mail service to notify you of routine reports and when alerts occur.
When To Use The Firewall
1. To prevent DoS attacks and prevent hackers cracking your network.
2. A range of source and destination IP addresses as well as port numbers can be specified within one
firewall rule making the firewall a better choice when complex rules are required.
3. To selectively block/allow inbound or outbound traffic between inside host/networks and outside
host/networks. Remember that filters cannot distinguish traffic originating from an inside host or an
outside host by IP address.
4. The firewall performs better than filtering if you need to check many rules.
5. Use the firewall if you need routine e-mail reports about your system or need to be alerted when attacks
occur.
Summary of Contents for Prestige 653HWI series
Page 30: ......
Page 62: ......
Page 64: ......
Page 88: ......
Page 108: ...Prestige 653HWI Series User s Guide 7 20 WAN Setup Figure 7 10 Traffic Redirect LAN Setup...
Page 112: ......
Page 114: ......
Page 134: ......
Page 136: ......
Page 156: ......
Page 172: ......
Page 184: ......
Page 186: ......
Page 192: ......
Page 200: ...Prestige 653HWI Series User s Guide 17 8 VPN Screens Figure 17 3 VPN IKE...
Page 222: ......
Page 242: ......
Page 262: ......
Page 263: ...Maintenance VIII Part VIII Maintenance This part covers the maintenance screens...
Page 264: ......
Page 266: ...Prestige 653HWI Series User s Guide 22 2 Maintenance Figure 22 1 System Status...
Page 282: ......
Page 292: ......
Page 312: ......
Page 338: ......
Page 368: ......
Page 408: ......
Page 430: ......
Page 434: ......
Page 444: ......
Page 450: ......
Page 466: ......
Page 474: ......
Page 480: ......
Page 492: ......
Page 497: ...Prestige 653HWI Series User s Guide PPPoE E 3 Diagram E 2 Prestige as a PPPoE Client...
Page 498: ......
Page 500: ......
Page 540: ......
Page 554: ......