P-660H-Tx v2 Support Notes
address and protocol. They also 'inspect' the session data to assure the
integrity of the connection and to adapt to dynamic protocols. The flexible
nature of Stateful Inspection firewalls generally provides the best speed and
transparency, however, they may lack the granular application level access
control or caching that some proxies support.
4. What kind of firewall is the P-660H-Tx v2?
1. The P-660H-Tx v2's firewall inspects packets contents and IP headers.
It is applicable to all protocols, which understands data in the packet is
intended for other layers, from network layer up to the application layer.
2. The P-660H-Tx v2's firewall performs stateful inspection. It takes into
account the state of connections it handles so that, for example, a
legitimate incoming packet can be matched with the outbound request
for that packet and allowed in. Conversely, an incoming packet
masquerading as a response to a nonexistent outbound request can be
blocked.
3. The P-660H-Tx v2's firewall uses session filtering, i.e., smart rules, that
enhance the filtering process and control the network session rather
than control individual packets in a session.
4. The P-660H-Tx v2's firewall is fast. It uses a hashing function to search
the matched session cache instead of going through every individual
rule for a packet.
5. The P-660H-Tx v2's firewall provides email service to notify you for
routine reports and when alerts occur.
5. Why do you need a firewall when your router has packet filtering and
NAT built-in?
With the spectacular growth of the Internet and online access, companies that
do business on the Internet face greater security threats. Although packet filter
and NAT restrict access to particular computers and networks, however, for
the other companies this security may be insufficient, because packets filters
typically cannot maintain session state. Thus, for greater security, a firewall is
considered.
6. What is Denials of Service (DoS) attack?
Denial of Service (DoS) attacks is aimed at devices and networks with a
connection to the Internet. Their goal is not to steal information, but to disable
a device or network so users no longer have access to network resources.
There are four types of DoS attacks:
20
All contents copyright © 2006 ZyXEL Communications Corporation.