
Chapter 14 Firewalls
P-2602HWLNI User’s Guide
234
14.2.2 Application-level Firewalls
Application-level firewalls restrict access by serving as proxies for external servers. Since they
use programs written for specific Internet services, such as HTTP, FTP and telnet, they can
evaluate network packets for valid application-specific data. Application-level gateways have
a number of general advantages over the default mode of permitting application traffic directly
to internal hosts:
Information hiding prevents the names of internal systems from being made known via DNS
to outside systems, since the application gateway is the only host whose name must be made
known to outside systems.
Robust authentication and logging pre-authenticates application traffic before it reaches
internal hosts and causes it to be logged more effectively than if it were logged with standard
host logging. Filtering rules at the packet filtering router can be less complex than they would
be if the router needed to filter application traffic and direct it to a number of specific systems.
The router need only allow application traffic destined for the application gateway and reject
the rest.
14.2.3 Stateful Inspection Firewalls
Stateful inspection firewalls restrict access by screening data packets against defined access
rules. They make access control decisions based on IP address and protocol. They also
"inspect" the session data to assure the integrity of the connection and to adapt to dynamic
protocols. These firewalls generally provide the best speed and transparency, however, they
may lack the granular application level access control or caching that some proxies support.
See
for more information on stateful inspection.
Firewalls, of one type or another, have become an integral part of standard security solutions
for enterprises.
14.3 Introduction to ZyXEL’s Firewall
The ZyXEL Device firewall is a stateful inspection firewall and is designed to protect against
Denial of Service attacks when activated. The ZyXEL Device’s purpose is to allow a private
Local Area Network (LAN) to be securely connected to the Internet. The ZyXEL Device can
be used to prevent theft, destruction and modification of data, as well as log events, which may
be important to the security of your network. The ZyXEL Device also has packet filtering
capabilities.
The ZyXEL Device is installed between the LAN and the Internet. This allows it to act as a
secure gateway for all data passing between the Internet and the LAN.
The ZyXEL Device has one DSL/ISDN port and one Ethernet LAN port, which physically
separate the network into two areas.
• The DSL/ISDN port connects to the Internet.
• The LAN (Local Area Network) port attaches to a network of computers, which needs
security from the outside world. These computers will have access to Internet services
such as e-mail, FTP, and the World Wide Web. However, “inbound access” will not be
allowed unless you configure remote management or create a firewall rule to allow a
remote host to use a specific service.
Содержание P-2602HWLNI
Страница 2: ......
Страница 7: ...Safety Warnings P 2602HWLNI User s Guide 7...
Страница 8: ...Safety Warnings P 2602HWLNI User s Guide 8...
Страница 24: ...Table of Contents P 2602HWLNI User s Guide 24...
Страница 32: ...List of Figures P 2602HWLNI User s Guide 32...
Страница 38: ...List of Tables P 2602HWLNI User s Guide 38...
Страница 39: ...39 PART I Introduction Introducing the ZyXEL Device 41 Introducing the Web Configurator 49...
Страница 40: ...40...
Страница 60: ...Chapter 2 Introducing the Web Configurator P 2602HWLNI User s Guide 60...
Страница 62: ...62...
Страница 86: ...Chapter 5 Bandwidth Management Wizard P 2602HWLNI User s Guide 86...
Страница 98: ...Chapter 6 Status Screens P 2602HWLNI User s Guide 98...
Страница 99: ...99 PART III Network WAN Setup 101 LAN Setup 117 Wireless LAN 129 Network Address Translation NAT Screens 155...
Страница 100: ...100...
Страница 154: ...Chapter 9 Wireless LAN P 2602HWLNI User s Guide 154...
Страница 166: ...Chapter 10 Network Address Translation NAT Screens P 2602HWLNI User s Guide 166...
Страница 167: ...167 PART IV VoIP Voice 169 VoIP Trunking 211 Phone Usage 227...
Страница 168: ...168...
Страница 226: ...Chapter 12 VoIP Trunking P 2602HWLNI User s Guide 226...
Страница 230: ...Chapter 13 Phone Usage P 2602HWLNI User s Guide 230...
Страница 232: ...232...
Страница 264: ...Chapter 15 Firewall Configuration P 2602HWLNI User s Guide 264...
Страница 268: ...Chapter 16 Content Filtering P 2602HWLNI User s Guide 268...
Страница 274: ...Chapter 17 Introduction to IPSec P 2602HWLNI User s Guide 274...
Страница 309: ...Chapter 19 Certificates P 2602HWLNI User s Guide 309 Figure 173 My Certificate Details...
Страница 320: ...Chapter 19 Certificates P 2602HWLNI User s Guide 320 Figure 181 Trusted Remote Host Details...
Страница 326: ...326...
Страница 330: ...Chapter 20 Static Route P 2602HWLNI User s Guide 330...
Страница 338: ...Chapter 21 Bandwidth Management P 2602HWLNI User s Guide 338...
Страница 342: ...Chapter 22 Dynamic DNS Setup P 2602HWLNI User s Guide 342...
Страница 360: ...Chapter 23 Remote Management Configuration P 2602HWLNI User s Guide 360...
Страница 372: ...Chapter 24 Universal Plug and Play UPnP P 2602HWLNI User s Guide 372...
Страница 374: ...374...
Страница 380: ...Chapter 25 System P 2602HWLNI User s Guide 380...
Страница 406: ...Chapter 28 Troubleshooting P 2602HWLNI User s Guide 406...
Страница 422: ...Chapter 30 Diagnostic P 2602HWLNI User s Guide 422...
Страница 432: ...Chapter 31 Product Specifications P 2602HWLNI User s Guide 432...
Страница 434: ...434...
Страница 446: ...Appendix A Setting up Your Computer s IP Address P 2602HWLNI User s Guide 446...
Страница 482: ...Appendix F Legal Information P 2602HWLNI User s Guide 482...
Страница 488: ...Appendix G Customer Support P 2602HWLNI User s Guide 488...