Page 151 / 421 Scroll up to view Page 146 - 150
149
P
ART
IV
Security
Firewalls
(151)
Content Filtering
(171)
Packet Filter
(177)
Certificates
(185)
Page 152 / 421
150
Page 153 / 421
P-660HN-FxZ Series User’s Guide
151
C
HAPTER
9
Firewalls
9.1
Overview
This chapter shows you how to enable and configure the ZyXEL Device firewall. Use these
screens to enable and configure the firewall that protects your ZyXEL Device and network
from attacks by hackers on the Internet and control access to it. By default the firewall:
allows traffic that originates from your LAN computers to go to all other networks.
blocks traffic that originates on other networks from going to the LAN.
The following figure illustrates the default firewall action. User
A
can initiate an IM (Instant
Messaging) session from the LAN to the WAN (1). Return traffic for this session is also
allowed (2). However other traffic initiated from the WAN is blocked (3 and 4).
Figure 79
Default Firewall Action
9.1.1
What You Can Do in the Firewall Screens
Use the
General
screen (
Section 9.2 on page 156
) to enable firewall and/or triangle route
on the ZyXEL Device, and set the default action that the firewall takes on packets that do
not match any of the firewall rules.
Use the
Rules
screen (
Section 9.3 on page 157
) to view the configured firewall rules and
add, edit or remove a firewall rule.
Use the
Threshold
screen (
Section 9.4 on page 163
) to set the thresholds that the ZyXEL
Device uses to determine when to start dropping sessions that do not become fully
established (half-open sessions).
WAN
LAN
3
4
1
2
A
Page 154 / 421
Chapter 9 Firewalls
P-660HN-FxZ Series User’s Guide
152
9.1.2
What You Need to Know About Firewall
DoS
Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the
Internet. Their goal is not to steal information, but to disable a device or network so users no
longer have access to network resources. The ZyXEL Device is pre-configured to
automatically detect and thwart all known DoS attacks.
Anti-Probing
If an outside user attempts to probe an unsupported port on your ZyXEL Device, an ICMP
response packet is automatically returned. This allows the outside user to know the ZyXEL
Device exists. The ZyXEL Device supports anti-probing, which prevents the ICMP response
packet from being sent. This keeps outsiders from discovering your ZyXEL Device when
unsupported ports are probed.
ICMP
Internet Control Message Protocol (ICMP) is a message control and error-reporting protocol
between a host server and a gateway to the Internet. ICMP uses Internet Protocol (IP)
datagrams, but the messages are processed by the TCP/IP software and directly apparent to the
application user.
DoS Thresholds
For DoS attacks, the ZyXEL Device uses thresholds to determine when to drop sessions that
do not become fully established. These thresholds apply globally to all sessions. You can use
the default threshold values, or you can change them to values more suitable to your security
requirements.
Finding Out More
See
Section 9.1.3 on page 152
for an example of setting up a firewall.
See
Section 9.5 on page 166
for advanced technical information on firewall.
9.1.3
Firewall Rule Setup Example
The following Internet firewall rule example allows a hypothetical “MyService” connection
from the Internet.
1
Click
Security > Firewall
>
Rules
.
2
Select
WAN to LAN
in the
Packet Direction
field.
Page 155 / 421
Chapter 9 Firewalls
P-660HN-FxZ Series User’s Guide
153
Figure 80
Firewall Example: Rules
3
In the
Rules
screen, select the index number after that you want to add the rule. For
example, if you select “6”, your new rule becomes number 7 and the previous rule 7 (if
there is one) becomes rule 8.
4
Click
Add
to display the firewall rule configuration screen.
5
In the
Edit Rule
screen, click the
Edit
Customized Services
link to open the
Customized Service
screen.
6
Click an index number to display the
Customized Services Config
screen and configure
the screen as follows and click
Apply
.
Figure 81
Edit Custom Port Example
7
Select
Any
in the
Destination Address List
box and then click
Delete
.
8
Configure the destination address screen as follows and click
Add
.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top