P-660HW-T v2 User’s Guide
Chapter 9 Firewalls
145
• Allow certain types of traffic from the Internet to specific hosts on the LAN.
• Allow access to a Web server to everyone but competitors.
• Restrict use of certain protocols, such as Telnet, to authorized users on the LAN.
These custom rules work by evaluating the network traffic’s Source IP address, Destination IP
address, IP protocol type, and comparing these to rules set by the administrator.
Note:
The ability to define firewall rules is a very powerful tool. Using custom rules, it
is possible to disable all firewall protection or block all access to the Internet.
Use extreme caution when creating or deleting firewall rules. Test changes
after creating them to make sure they work correctly.
Below is a brief technical description of how these connections are tracked. Connections may
either be defined by the upper protocols (for instance, TCP), or by the ZyXEL Device itself (as
with the "virtual connections" created for UDP and ICMP).
9.5.3 TCP Security
The ZyXEL Device uses state information embedded in TCP packets. The first packet of any
new connection has its SYN flag set and its ACK flag cleared; these are "initiation" packets.
All packets that do not have this flag structure are called "subsequent" packets, since they
represent data that occurs later in the TCP stream.
If an initiation packet originates on the WAN, this means that someone is trying to make a
connection from the Internet into the LAN. Except in a few special cases (see "Upper Layer
Protocols" shown next), these packets are dropped and logged.
If an initiation packet originates on the LAN, this means that someone is trying to make a
connection from the LAN to the Internet. Assuming that this is an acceptable part of the
security policy (as is the case with the default policy), the connection will be allowed. A cache
entry is added which includes connection information such as IP addresses, TCP ports,
sequence numbers, etc.
When the ZyXEL Device receives any subsequent packet (from the Internet or from the LAN),
its connection information is extracted and checked against the cache. A packet is only
allowed to pass through if it corresponds to a valid connection (that is, if it is a response to a
connection which originated on the LAN).
9.5.4 UDP/ICMP Security
UDP and ICMP do not themselves contain any connection information (such as sequence
numbers). However, at the very minimum, they contain an IP address pair (source and
destination). UDP also contains port pairs, and ICMP has type and code information. All of
this data can be analyzed in order to build "virtual connections" in the cache.
For instance, any UDP packet that originates on the LAN will create a cache entry. Its IP
address and port pairs will be stored. For a short period of time, UDP packets from the WAN
that have matching IP and UDP information will be allowed back in through the firewall.
Содержание P-660HW-T - V2
Страница 1: ...P 660HW T v2 802 11g Wireless ADSL 2 4 port Gateway User s Guide Version 3 40 Edition 1 12 2006...
Страница 2: ......
Страница 7: ...P 660HW T v2 User s Guide Safety Warnings 7 This product is recyclable Dispose of it properly...
Страница 26: ...P 660HW T v2 User s Guide 26 List of Figures...
Страница 40: ...P 660HW T v2 User s Guide 40 Chapter 1 Getting To Know Your ZyXEL Device...
Страница 53: ...P 660HW T v2 User s Guide Chapter 2 Introducing the Web Configurator 53 Figure 13 System General...
Страница 54: ...P 660HW T v2 User s Guide 54 Chapter 2 Introducing the Web Configurator...
Страница 74: ...P 660HW T v2 User s Guide 74 Chapter 4 Bandwidth Management Wizard...
Страница 92: ...P 660HW T v2 User s Guide 92 Chapter 5 WAN Setup...
Страница 124: ...P 660HW T v2 User s Guide 124 Chapter 7 LAN Setup...
Страница 156: ...P 660HW T v2 User s Guide 156 Chapter 10 Firewall Configuration Figure 85 Firewall Edit Rule...
Страница 170: ...P 660HW T v2 User s Guide 170 Chapter 10 Firewall Configuration...
Страница 174: ...P 660HW T v2 User s Guide 174 Chapter 11 Content Filtering...
Страница 178: ...P 660HW T v2 User s Guide 178 Chapter 12 Static Route...
Страница 190: ...P 660HW T v2 User s Guide 190 Chapter 13 Bandwidth Management...
Страница 194: ...P 660HW T v2 User s Guide 194 Chapter 14 Dynamic DNS Setup...
Страница 206: ...P 660HW T v2 User s Guide 206 Chapter 15 Remote Management Configuration...
Страница 218: ...P 660HW T v2 User s Guide 218 Chapter 16 Universal Plug and Play UPnP...
Страница 224: ...P 660HW T v2 User s Guide 224 Chapter 17 System...
Страница 244: ...P 660HW T v2 User s Guide 244 Chapter 18 Logs...
Страница 250: ...P 660HW T v2 User s Guide 250 Chapter 19 Tools...
Страница 256: ...P 660HW T v2 User s Guide 256 Chapter 21 Troubleshooting...
Страница 260: ...P 660HW T v2 User s Guide 260 Appendix A Product Specifications...
Страница 280: ...P 660HW T v2 User s Guide 280 Appendix D Wall mounting Instructions...
Страница 308: ...P 660HW T v2 User s Guide 308 Appendix G Command Interpreter...
Страница 320: ...P 660HW T v2 User s Guide 320 Appendix J Splitters and Microfilters...
Страница 334: ...P 660HW T v2 User s Guide 334 Appendix K Wireless LANs...
Страница 342: ...P 660HW T v2 User s Guide 342 Appendix L Pop up Windows JavaScripts and Java Permissions Figure 195 Java Sun...