![ZyXEL Communications G-2000 Plus V2 Скачать руководство пользователя страница 142](http://html1.mh-extra.com/html/zyxel-communications/g-2000-plus-v2/g-2000-plus-v2_user-manual_945995142.webp)
ZyXEL G-2000 Plus v2 User’s Guide
142
Chapter 10 Firewalls
10.5.3 TCP Security
The ZyXEL device uses state information embedded in TCP packets. The first packet of any
new connection has its SYN flag set and its ACK flag cleared; these are "initiation" packets.
All packets that do not have this flag structure are called "subsequent" packets, since they
represent data that occurs later in the TCP stream.
If an initiation packet originates on the WAN, this means that someone is trying to make a
connection from the Internet into the LAN. Except in a few special cases (See “Upper Layer
Protocols” on page 142 shown next), these packets are dropped and logged.
If an initiation packet originates on the LAN, this means that someone is trying to make a
connection from the LAN to the Internet. Assuming that this is an acceptable part of the
security policy (as is the case with the default policy), the connection will be allowed. A cache
entry is added which includes connection information such as IP addresses, TCP ports,
sequence numbers, etc.
When the ZyXEL device receives any subsequent packet (from the Internet or from the LAN),
its connection information is extracted and checked against the cache. A packet is only
allowed to pass through if it corresponds to a valid connection (that is, if it is a response to a
connection which originated on the LAN).
10.5.4 UDP/ICMP Security
UDP and ICMP do not themselves contain any connection information (such as sequence
numbers). However, at the very minimum, they contain an IP address pair (source and
destination). UDP also contains port pairs, and ICMP has type and code information. All of
this data can be analyzed in order to build "virtual connections" in the cache.
For instance, any UDP packet that originates on the LAN will create a cache entry. Its IP
address and port pairs will be stored. For a short period of time, UDP packets from the WAN
that have matching IP and UDP information will be allowed back in through the firewall.
A similar situation exists for ICMP, except that the ZyXEL device is even more restrictive.
Specifically, only outgoing echoes will allow incoming echo replies, outgoing address mask
requests will allow incoming address mask replies, and outgoing timestamp requests will
allow incoming timestamp replies. No other ICMP packets are allowed in through the firewall,
simply because they are too dangerous and contain too little tracking information. For
instance, ICMP redirect packets are never allowed in, since they could be used to reroute
traffic through attacking machines.
10.5.5 Upper Layer Protocols
Some higher layer protocols (such as FTP and RealAudio) utilize multiple network
connections simultaneously. In general terms, they usually have a "control connection" which
is used for sending commands between endpoints, and then "data connections" which are used
for transmitting bulk information.
Содержание G-2000 Plus V2
Страница 1: ...ZyXEL G 2000 Plus v2 4 port Wireless Router User s Guide Version 3 60 Edition 1 2 2006...
Страница 2: ......
Страница 10: ...ZyXEL G 2000 Plus v2 User s Guide 10 Customer Support...
Страница 24: ...ZyXEL G 2000 Plus v2 User s Guide 24 Table of Contents...
Страница 50: ...ZyXEL G 2000 Plus v2 User s Guide 50 Chapter 2 Introducing the Web Configurator...
Страница 66: ...ZyXEL G 2000 Plus v2 User s Guide 66 Chapter 3 Wizard Setup...
Страница 100: ...ZyXEL G 2000 Plus v2 User s Guide 100 Chapter 6 Wireless LAN...
Страница 112: ...ZyXEL G 2000 Plus v2 User s Guide 112 Chapter 7 WAN...
Страница 153: ...ZyXEL G 2000 Plus v2 User s Guide Chapter 11 Firewall Screens 153 Figure 59 Creating Editing A Firewall Rule...
Страница 158: ...ZyXEL G 2000 Plus v2 User s Guide 158 Chapter 11 Firewall Screens Figure 64 My Service Rule Configuration...
Страница 162: ...ZyXEL G 2000 Plus v2 User s Guide 162 Chapter 11 Firewall Screens...
Страница 166: ...ZyXEL G 2000 Plus v2 User s Guide 166 Chapter 12 Content Filtering...
Страница 178: ...ZyXEL G 2000 Plus v2 User s Guide 178 Chapter 13 Remote Management Screens...
Страница 188: ...ZyXEL G 2000 Plus v2 User s Guide 188 Chapter 14 UPnP...
Страница 198: ...ZyXEL G 2000 Plus v2 User s Guide 198 Chapter 15 Internal RADIUS Server...
Страница 205: ...ZyXEL G 2000 Plus v2 User s Guide Chapter 16 Certificates 205 Figure 84 My Certificate Create...
Страница 219: ...ZyXEL G 2000 Plus v2 User s Guide Chapter 17 Log Screens 219 Figure 90 Log Settings...
Страница 234: ...ZyXEL G 2000 Plus v2 User s Guide 234 Chapter 18 Maintenance Figure 105 Restart Screen...
Страница 262: ...ZyXEL G 2000 Plus v2 User s Guide 262 Chapter 23 Internet Access...
Страница 272: ...ZyXEL G 2000 Plus v2 User s Guide 272 Chapter 24 Remote Node Configuration...
Страница 322: ...ZyXEL G 2000 Plus v2 User s Guide 322 Chapter 31 System Security...
Страница 334: ...ZyXEL G 2000 Plus v2 User s Guide 334 Chapter 32 System Information and Diagnosis...
Страница 346: ...ZyXEL G 2000 Plus v2 User s Guide 346 Chapter 33 Firmware and Configuration File Maintenance...
Страница 354: ...ZyXEL G 2000 Plus v2 User s Guide 354 Chapter 34 System Maintenance and Information...
Страница 368: ...ZyXEL G 2000 Plus v2 User s Guide 368...
Страница 380: ...ZyXEL G 2000 Plus v2 User s Guide 380...
Страница 384: ...ZyXEL G 2000 Plus v2 User s Guide 384...
Страница 392: ...ZyXEL G 2000 Plus v2 User s Guide 392...
Страница 394: ...ZyXEL G 2000 Plus v2 User s Guide 394...
Страница 415: ...ZyXEL G 2000 Plus v2 User s Guide 415 Figure 232 Sequences for PEAP MS CHAP V2 Authentication...
Страница 416: ...ZyXEL G 2000 Plus v2 User s Guide 416...
Страница 426: ...ZyXEL G 2000 Plus v2 User s Guide 426...