ZyWALL P1 User’s Guide
Chapter 6 Firewalls
99
temporary entries might be modified, in order to permit only packets that are valid for the
current state of the connection.
8
Any additional inbound or outbound packets that belong to the connection are inspected
to update the state table entry and to modify the temporary inbound access list entries as
required, and are forwarded through the interface.
9
When the connection terminates or times out, the connection's state table entry is deleted
and the connection's temporary inbound access list entries are deleted.
6.5.2 Stateful Inspection and the ZyWALL
Additional rules may be defined to extend or override the default rules. For example, a rule
may be created which will:
1
Block all traffic of a certain type, such as IRC (Internet Relay Chat), from the LAN to the
Internet.
2
Allow certain types of traffic from the Internet to specific hosts on the LAN.
3
Allow access to a Web server to everyone but competitors.
4
Restrict use of certain protocols, such as Telnet, to authorized users on the LAN.
These custom rules work by evaluating the network traffic’s Source IP address, Destination IP
address, IP protocol type, and comparing these to rules set by the administrator.
Note:
The ability to define firewall rules is a very powerful tool. Using custom rules, it
is possible to disable all firewall protection or block all access to the Internet.
Use extreme caution when creating or deleting firewall rules. Test changes
after creating them to make sure they work correctly.
Below is a brief technical description of how these connections are tracked. Connections may
either be defined by the upper protocols (for instance, TCP), or by the ZyWALL itself (as with
the "virtual connections" created for UDP and ICMP).
6.5.3 TCP Security
The ZyWALL uses state information embedded in TCP packets. The first packet of any new
connection has its SYN flag set and its ACK flag cleared; these are "initiation" packets. All
packets that do not have this flag structure are called "subsequent" packets, since they
represent data that occurs later in the TCP stream.
If an initiation packet originates on the WAN, this means that someone is trying to make a
connection from the Internet into the LAN. Except in a few special cases (see
), these packets are dropped and logged.
Summary of Contents for ZyXEL ZyWALL P1
Page 1: ...ZyWALL P1 Internet Security Appliance User s Guide Version 3 64 8 2005...
Page 9: ...ZyWALL P1 User s Guide 8 Customer Support...
Page 25: ...ZyWALL P1 User s Guide 24 List of Figures...
Page 39: ...ZyWALL P1 User s Guide 38 Chapter 1 Getting to Know Your ZyWALL...
Page 51: ...ZyWALL P1 User s Guide 50 Chapter 2 Introducing the Web Configurator...
Page 72: ...ZyWALL P1 User s Guide Chapter 3 Wizard Setup 71 Figure 22 VPN Wizard Complete...
Page 73: ...ZyWALL P1 User s Guide 72 Chapter 3 Wizard Setup...
Page 91: ...ZyWALL P1 User s Guide 90 Chapter 5 WAN Screens...
Page 129: ...ZyWALL P1 User s Guide 128 Chapter 8 Introduction to IPSec...
Page 151: ...ZyWALL P1 User s Guide 150 Chapter 9 VPN Screens...
Page 191: ...ZyWALL P1 User s Guide 190 Chapter 12 Static Route...
Page 215: ...ZyWALL P1 User s Guide 214 Chapter 13 Remote Management...
Page 248: ...ZyWALL P1 User s Guide Chapter 16 Maintenance 247 Figure 134 Restart Screen...
Page 249: ...ZyWALL P1 User s Guide 248 Chapter 16 Maintenance...
Page 269: ...ZyWALL P1 User s Guide 268 Chapter 18 Troubleshooting...
Page 289: ...ZyWALL P1 User s Guide 288 Appendix B IP Subnetting...
Page 295: ...ZyWALL P1 User s Guide 294 Appendix D PPTP...
Page 299: ...ZyWALL P1 User s Guide 298 Appendix E Triangle Route...
Page 329: ...ZyWALL P1 User s Guide 328 Appendix H Importing Certificates...
Page 331: ...ZyWALL P1 User s Guide 330 Appendix I Command Interpreter...
Page 337: ...ZyWALL P1 User s Guide 336 Appendix J Firewall Commands...
Page 341: ...ZyWALL P1 User s Guide 340 Appendix K NetBIOS Filter Commands...
Page 347: ...ZyWALL P1 User s Guide 346 Appendix M Brute Force Password Guessing Protection...