P-2608HWL-Dx Series User’s Guide
Chapter 15 Firewalls
195
• Allow certain types of traffic from the Internet to specific hosts on the LAN.
• Allow access to a Web server to everyone but competitors.
• Restrict use of certain protocols, such as Telnet, to authorized users on the LAN.
These custom rules work by evaluating the network traffic’s Source IP address, Destination IP
address, IP protocol type, and comparing these to rules set by the administrator.
Note:
The ability to define firewall rules is a very powerful tool. Using custom rules, it
is possible to disable all firewall protection or block all access to the Internet.
Use extreme caution when creating or deleting firewall rules. Test changes
after creating them to make sure they work correctly.
Below is a brief technical description of how these connections are tracked. Connections may
either be defined by the upper protocols (for instance, TCP), or by the ZyXEL Device itself (as
with the "virtual connections" created for UDP and ICMP).
15.5.3 TCP Security
The ZyXEL Device uses state information embedded in TCP packets. The first packet of any
new connection has its SYN flag set and its ACK flag cleared; these are "initiation" packets.
All packets that do not have this flag structure are called "subsequent" packets, since they
represent data that occurs later in the TCP stream.
If an initiation packet originates on the WAN, this means that someone is trying to make a
connection from the Internet into the LAN. Except in a few special cases (see "Upper Layer
Protocols" shown next), these packets are dropped and logged.
If an initiation packet originates on the LAN, this means that someone is trying to make a
connection from the LAN to the Internet. Assuming that this is an acceptable part of the
security policy (as is the case with the default policy), the connection will be allowed. A cache
entry is added which includes connection information such as IP addresses, TCP ports,
sequence numbers, etc.
When the ZyXEL Device receives any subsequent packet (from the Internet or from the LAN),
its connection information is extracted and checked against the cache. A packet is only
allowed to pass through if it corresponds to a valid connection (that is, if it is a response to a
connection which originated on the LAN).
15.5.4 UDP/ICMP Security
UDP and ICMP do not themselves contain any connection information (such as sequence
numbers). However, at the very minimum, they contain an IP address pair (source and
destination). UDP also contains port pairs, and ICMP has type and code information. All of
this data can be analyzed in order to build "virtual connections" in the cache.
For instance, any UDP packet that originates on the LAN will create a cache entry. Its IP
address and port pairs will be stored. For a short period of time, UDP packets from the WAN
that have matching IP and UDP information will be allowed back in through the firewall.
Содержание P-2608HWL-D1
Страница 1: ...P 2608HWL Dx Series 802 11g Wireless ADSL2 VoIP IAD User s Guide Version 3 40 10 2006 Edition 1 ...
Страница 2: ......
Страница 7: ...P 2608HWL Dx Series User s Guide Safety Warnings 7 This product is recyclable Dispose of it properly ...
Страница 24: ...P 2608HWL Dx Series User s Guide 24 Table of Contents ...
Страница 32: ...P 2608HWL Dx Series User s Guide 32 List of Figures ...
Страница 38: ...P 2608HWL Dx Series User s Guide 38 List of Tables ...
Страница 44: ...P 2608HWL Dx Series User s Guide 44 Chapter 1 Getting To Know the ZyXEL Device ...
Страница 66: ...P 2608HWL Dx Series User s Guide 66 Chapter 3 Internet and Wireless Setup Wizard ...
Страница 72: ...P 2608HWL Dx Series User s Guide 72 Chapter 4 VoIP Wizard And Example ...
Страница 78: ...P 2608HWL Dx Series User s Guide 78 Chapter 5 Bandwidth Management Wizard ...
Страница 88: ...P 2608HWL Dx Series User s Guide 88 Chapter 6 Status Screens ...
Страница 118: ...P 2608HWL Dx Series User s Guide 118 Chapter 8 LAN Setup ...
Страница 138: ...P 2608HWL Dx Series User s Guide 138 Chapter 9 Wireless LAN ...
Страница 166: ...P 2608HWL Dx Series User s Guide 166 Chapter 11 SIP ...
Страница 176: ...P 2608HWL Dx Series User s Guide 176 Chapter 12 Phone ...
Страница 184: ...P 2608HWL Dx Series User s Guide 184 Chapter 13 Phone Book ...
Страница 206: ...P 2608HWL Dx Series User s Guide 206 Chapter 16 Firewall Configuration Figure 107 Firewall Edit Rule ...
Страница 220: ...P 2608HWL Dx Series User s Guide 220 Chapter 17 Content Filtering ...
Страница 257: ...P 2608HWL Dx Series User s Guide Chapter 19 Certificates 257 Figure 138 My Certificate Details ...
Страница 268: ...P 2608HWL Dx Series User s Guide 268 Chapter 19 Certificates Figure 146 Trusted Remote Host Details ...
Страница 276: ...P 2608HWL Dx Series User s Guide 276 Chapter 20 Static Route ...
Страница 288: ...P 2608HWL Dx Series User s Guide 288 Chapter 21 Bandwidth Management ...
Страница 292: ...P 2608HWL Dx Series User s Guide 292 Chapter 22 Dynamic DNS Setup ...
Страница 306: ...P 2608HWL Dx Series User s Guide 306 Chapter 23 Remote Management Configuration ...
Страница 318: ...P 2608HWL Dx Series User s Guide 318 Chapter 24 Universal Plug and Play UPnP ...
Страница 324: ...P 2608HWL Dx Series User s Guide 324 Chapter 25 System ...
Страница 344: ...P 2608HWL Dx Series User s Guide 344 Chapter 27 Tools ...
Страница 348: ...P 2608HWL Dx Series User s Guide 348 Chapter 28 Diagnostic ...
Страница 360: ...P 2608HWL Dx Series User s Guide 360 Chapter 29 Troubleshooting ...
Страница 378: ...P 2608HWL Dx Series User s Guide 378 Appendix B Setting up Your Computer s IP Address ...
Страница 402: ...P 2608HWL Dx Series User s Guide 402 Appendix F Triangle Route ...
Страница 440: ...P 2608HWL Dx Series User s Guide 440 Appendix H Internal SPTGEN ...