Prestige 662HW Series User’s Guide
Chapter 13 Firewalls
152
temporary entries might be modified, in order to permit only packets that are valid for the
current state of the connection.
8
Any additional inbound or outbound packets that belong to the connection are inspected
to update the state table entry and to modify the temporary inbound access list entries as
required, and are forwarded through the interface.
9
When the connection terminates or times out, the connection's state table entry is deleted
and the connection's temporary inbound access list entries are deleted.
13.5.2 Stateful Inspection and the Prestige
Additional rules may be defined to extend or override the default rules. For example, a rule
may be created which will:
• Block all traffic of a certain type, such as IRC (Internet Relay Chat), from the LAN to the
Internet.
• Allow certain types of traffic from the Internet to specific hosts on the LAN.
• Allow access to a Web server to everyone but competitors.
• Restrict use of certain protocols, such as Telnet, to authorized users on the LAN.
These custom rules work by evaluating the network traffic’s Source IP address, Destination IP
address, IP protocol type, and comparing these to rules set by the administrator.
Below is a brief technical description of how these connections are tracked. Connections may
either be defined by the upper protocols (for instance, TCP), or by the Prestige itself (as with
the "virtual connections" created for UDP and ICMP).
13.5.3 TCP Security
The Prestige uses state information embedded in TCP packets. The first packet of any new
connection has its SYN flag set and its ACK flag cleared; these are "initiation" packets. All
packets that do not have this flag structure are called "subsequent" packets, since they
represent data that occurs later in the TCP stream.
If an initiation packet originates on the WAN, this means that someone is trying to make a
connection from the Internet into the LAN. Except in a few special cases (see "Upper Layer
Protocols" shown next), these packets are dropped and logged.
Note:
The ability to define firewall rules is a very powerful tool. Using custom
rules, it is possible to disable all firewall protection or block all access to the
Internet. Use extreme caution when creating or deleting firewall rules. Test
changes after creating them to make sure they work correctly.
Содержание P-662HW-63
Страница 6: ...Prestige 662HW Series User s Guide Customer Support 6...
Страница 7: ...Prestige 662HW Series User s Guide 7 Customer Support...
Страница 43: ...Prestige 662HW Series User s Guide 43 Introduction to DSL...
Страница 53: ...Prestige 662HW Series User s Guide 53 Chapter 1 Getting To Know Your Prestige...
Страница 59: ...Prestige 662HW Series User s Guide 59 Chapter 2 Introducing the Web Configurator...
Страница 77: ...Prestige 662HW Series User s Guide 77 Chapter 5 Password Setup...
Страница 89: ...Prestige 662HW Series User s Guide 89 Chapter 7 DMZ...
Страница 111: ...Prestige 662HW Series User s Guide 111 Chapter 8 Wireless LAN Setup...
Страница 127: ...Prestige 662HW Series User s Guide 127 Chapter 9 WAN Setup...
Страница 139: ...Prestige 662HW Series User s Guide 139 Chapter 10 Network Address Translation NAT Screens...
Страница 157: ...Prestige 662HW Series User s Guide 157 Chapter 13 Firewalls...
Страница 203: ...Prestige 662HW Series User s Guide 203 Chapter 16 Content Access Control...
Страница 211: ...Prestige 662HW Series User s Guide 211 Chapter 17 Anti Virus Packet Scan...
Страница 217: ...Prestige 662HW Series User s Guide 217 Chapter 18 Introduction to IPSec...
Страница 249: ...Prestige 662HW Series User s Guide 249 Chapter 20 Remote Management Configuration...
Страница 263: ...Prestige 662HW Series User s Guide 263 Chapter 21 Universal Plug and Play UPnP...
Страница 269: ...Prestige 662HW Series User s Guide 269 Chapter 22 Logs Screens...
Страница 295: ...Prestige 662HW Series User s Guide 295 Chapter 24 Maintenance...
Страница 301: ...Prestige 662HW Series User s Guide 301 Chapter 25 Introducing the SMT...
Страница 305: ...Prestige 662HW Series User s Guide 305 Chapter 26 Menu 1 General Setup...
Страница 319: ...Prestige 662HW Series User s Guide 319 Chapter 29 Wireless LAN Setup...
Страница 325: ...Prestige 662HW Series User s Guide 325 Chapter 30 Internet Access...
Страница 339: ...Prestige 662HW Series User s Guide 339 Chapter 32 Static Route Setup...
Страница 343: ...Prestige 662HW Series User s Guide 343 Chapter 33 Bridging Setup...
Страница 375: ...Prestige 662HW Series User s Guide 375 Chapter 36 Filter Configuration...
Страница 395: ...Prestige 662HW Series User s Guide 395 Chapter 39 System Information and Diagnosis...
Страница 411: ...Prestige 662HW Series User s Guide 411 Chapter 40 Firmware and Configuration File Maintenance...
Страница 417: ...Prestige 662HW Series User s Guide 417 Chapter 41 System Maintenance...
Страница 421: ...Prestige 662HW Series User s Guide 421 Chapter 42 Remote Management...
Страница 433: ...Prestige 662HW Series User s Guide 433 Chapter 44 Call Scheduling...
Страница 449: ...Prestige 662HW Series User s Guide 449 Chapter 46 SA Monitor...
Страница 453: ...Prestige 662HW Series User s Guide 453 Chapter 47 Internal SPTGEN...
Страница 459: ...Prestige 662HW Series User s Guide 459 Appendix A Pin Assignments Figure 290 Ethernet Cable Pin Assignments...
Страница 479: ...Prestige 662HW Series User s Guide 479 Appendix C IP Subnetting...
Страница 485: ...Prestige 662HW Series User s Guide 485 Appendix E Wireless LAN and IEEE 802 11...
Страница 492: ...Prestige 662HW Series User s Guide Appendix H Triangle Route 492...
Страница 493: ...Prestige 662HW Series User s Guide 493 Appendix H Triangle Route...
Страница 525: ...Prestige 662HW Series User s Guide 525 Appendix K Example Internal SPTGEN Screens...
Страница 527: ...Prestige 662HW Series User s Guide 527 Appendix L Command Interpreter...
Страница 529: ...Prestige 662HW Series User s Guide 529 Appendix M Firewall Commands...
Страница 533: ...Prestige 662HW Series User s Guide 533 Appendix N NetBIOS Filter Commands...
Страница 535: ...Prestige 662HW Series User s Guide 535 Appendix O Brute Force Password Guessing Protection...