ZyWALL P1 User’s Guide
Chapter 6 Firewalls
97
All SMTP commands are illegal except for those displayed in the following tables.
6.4.2.3 Traceroute
Traceroute is a utility used to determine the path a packet takes between two endpoints.
Sometimes when a packet filter firewall is configured incorrectly an attacker can traceroute
the firewall gaining knowledge of the network topology inside the firewall.
Often, many DoS attacks also employ a technique known as "
IP Spoofing
" as part of their
attack. IP Spoofing may be used to break into systems, to hide the hacker's identity, or to
magnify the effect of the DoS attack. IP Spoofing is a technique used to gain unauthorized
access to computers by tricking a router or firewall into thinking that the communications are
coming from within the trusted network. To engage in IP spoofing, a hacker must modify the
packet headers so that it appears that the packets originate from a trusted host and should be
allowed through the router or firewall. The ZyWALL blocks all IP Spoofing attempts.
6.5 Stateful Inspection
With stateful inspection, fields of the packets are compared to packets that are already known
to be trusted. For example, if you access some outside service, the proxy server remembers
things about your original request, like the port number and source and destination addresses.
This remembering is called
saving the state.
When the outside system responds to your
request, the firewall compares the received packets with the saved state to determine if they
are allowed in. The ZyWALL uses stateful packet inspection to protect the private LAN from
hackers and vandals on the Internet. By default, the ZyWALL’s stateful inspection allows all
communications to the Internet that originate from the LAN, and blocks all traffic to the LAN
that originates from the Internet. In summary, stateful inspection:
• Allows all sessions originating from the LAN (local network) to the WAN (Internet).
• Denies all sessions originating from the WAN to the LAN.
Table 29
Legal SMTP Commands
AUTH
DATA
EHLO
ETRN
EXPN
HELO
HELP
NOOP
QUIT
RCPT
RSET
SAML
SEND
SOML TURN
VRFY
Summary of Contents for ZyXEL ZyWALL P1
Page 1: ...ZyWALL P1 Internet Security Appliance User s Guide Version 3 64 8 2005...
Page 9: ...ZyWALL P1 User s Guide 8 Customer Support...
Page 25: ...ZyWALL P1 User s Guide 24 List of Figures...
Page 39: ...ZyWALL P1 User s Guide 38 Chapter 1 Getting to Know Your ZyWALL...
Page 51: ...ZyWALL P1 User s Guide 50 Chapter 2 Introducing the Web Configurator...
Page 72: ...ZyWALL P1 User s Guide Chapter 3 Wizard Setup 71 Figure 22 VPN Wizard Complete...
Page 73: ...ZyWALL P1 User s Guide 72 Chapter 3 Wizard Setup...
Page 91: ...ZyWALL P1 User s Guide 90 Chapter 5 WAN Screens...
Page 129: ...ZyWALL P1 User s Guide 128 Chapter 8 Introduction to IPSec...
Page 151: ...ZyWALL P1 User s Guide 150 Chapter 9 VPN Screens...
Page 191: ...ZyWALL P1 User s Guide 190 Chapter 12 Static Route...
Page 215: ...ZyWALL P1 User s Guide 214 Chapter 13 Remote Management...
Page 248: ...ZyWALL P1 User s Guide Chapter 16 Maintenance 247 Figure 134 Restart Screen...
Page 249: ...ZyWALL P1 User s Guide 248 Chapter 16 Maintenance...
Page 269: ...ZyWALL P1 User s Guide 268 Chapter 18 Troubleshooting...
Page 289: ...ZyWALL P1 User s Guide 288 Appendix B IP Subnetting...
Page 295: ...ZyWALL P1 User s Guide 294 Appendix D PPTP...
Page 299: ...ZyWALL P1 User s Guide 298 Appendix E Triangle Route...
Page 329: ...ZyWALL P1 User s Guide 328 Appendix H Importing Certificates...
Page 331: ...ZyWALL P1 User s Guide 330 Appendix I Command Interpreter...
Page 337: ...ZyWALL P1 User s Guide 336 Appendix J Firewall Commands...
Page 341: ...ZyWALL P1 User s Guide 340 Appendix K NetBIOS Filter Commands...
Page 347: ...ZyWALL P1 User s Guide 346 Appendix M Brute Force Password Guessing Protection...