ZyWALL P1 User’s Guide
98
Chapter 6 Firewalls
Figure 34
Stateful Inspection
The previous figure shows the ZyWALL’s default firewall rules in action as well as
demonstrates how stateful inspection works. User A can initiate a Telnet session from within
the LAN and responses to this request are allowed. However other Telnet traffic initiated from
the WAN is blocked.
6.5.1 Stateful Inspection Process
In this example, the following sequence of events occurs when a TCP packet leaves the LAN
network through the firewall's WAN interface. The TCP packet is the first in a session, and the
packet's application layer protocol is configured for a firewall rule inspection:
1
The packet travels from the firewall's LAN to the WAN.
2
The packet is evaluated against the interface's existing outbound access list, and the
packet is permitted (a denied packet would simply be dropped at this point).
3
The firewall inspects packets to determine and record information about the state of the
packet's connection. This information is recorded in a new state table entry created for the
new connection. If there is not a firewall rule for this packet and it is not an attack, then
the
setting in the
Firewall Default Rule
screen determines the action for this packet.
4
Based on the obtained state information, a firewall rule creates a temporary access list
entry that is inserted at the beginning of the WAN interface's inbound extended access
list. This temporary access list entry is designed to permit inbound packets of the same
connection as the outbound packet just inspected.
5
The outbound packet is forwarded out through the interface.
6
Later, an inbound packet reaches the interface. This packet is part of the connection
previously established with the outbound packet. The inbound packet is evaluated against
the inbound access list, and is permitted because of the temporary access list entry
previously created.
7
The packet is inspected by a firewall rule, and the connection's state table entry is updated
as necessary. Based on the updated state information, the inbound extended access list
Summary of Contents for ZyXEL ZyWALL P1
Page 1: ...ZyWALL P1 Internet Security Appliance User s Guide Version 3 64 8 2005...
Page 9: ...ZyWALL P1 User s Guide 8 Customer Support...
Page 25: ...ZyWALL P1 User s Guide 24 List of Figures...
Page 39: ...ZyWALL P1 User s Guide 38 Chapter 1 Getting to Know Your ZyWALL...
Page 51: ...ZyWALL P1 User s Guide 50 Chapter 2 Introducing the Web Configurator...
Page 72: ...ZyWALL P1 User s Guide Chapter 3 Wizard Setup 71 Figure 22 VPN Wizard Complete...
Page 73: ...ZyWALL P1 User s Guide 72 Chapter 3 Wizard Setup...
Page 91: ...ZyWALL P1 User s Guide 90 Chapter 5 WAN Screens...
Page 129: ...ZyWALL P1 User s Guide 128 Chapter 8 Introduction to IPSec...
Page 151: ...ZyWALL P1 User s Guide 150 Chapter 9 VPN Screens...
Page 191: ...ZyWALL P1 User s Guide 190 Chapter 12 Static Route...
Page 215: ...ZyWALL P1 User s Guide 214 Chapter 13 Remote Management...
Page 248: ...ZyWALL P1 User s Guide Chapter 16 Maintenance 247 Figure 134 Restart Screen...
Page 249: ...ZyWALL P1 User s Guide 248 Chapter 16 Maintenance...
Page 269: ...ZyWALL P1 User s Guide 268 Chapter 18 Troubleshooting...
Page 289: ...ZyWALL P1 User s Guide 288 Appendix B IP Subnetting...
Page 295: ...ZyWALL P1 User s Guide 294 Appendix D PPTP...
Page 299: ...ZyWALL P1 User s Guide 298 Appendix E Triangle Route...
Page 329: ...ZyWALL P1 User s Guide 328 Appendix H Importing Certificates...
Page 331: ...ZyWALL P1 User s Guide 330 Appendix I Command Interpreter...
Page 337: ...ZyWALL P1 User s Guide 336 Appendix J Firewall Commands...
Page 341: ...ZyWALL P1 User s Guide 340 Appendix K NetBIOS Filter Commands...
Page 347: ...ZyWALL P1 User s Guide 346 Appendix M Brute Force Password Guessing Protection...