Page 151 / 324 Scroll up to view Page 146 - 150
P-660HN-TxA User’s Guide
151
C
HAPTER
10
Firewall
10.1
Overview
This chapter shows you how to enable the ZyXEL Device firewall. Use the firewall
to protect your ZyXEL Device and network from attacks by hackers on the Internet
and control access to it. By default the firewall:
allows traffic that originates from your LAN computers to go to all other
networks.
blocks traffic that originates on other networks from going to the LAN.
blocks SYN and port scanner attacks.
By default, the ZyXEL Device blocks DDOS, LAND and Ping of Death attacks
whether the firewall is enabled or disabled.
10.1.1
What You Can Do in the Firewall Screens
Use the
Firewall
screen (
Section 10.2 on page 153
) to enable firewall and/or SPI
on the ZyXEL Device.
10.1.2
What You Need to Know About Firewall
SYN Attack
A SYN attack floods a targeted system with a series of SYN packets. Each packet
causes the targeted system to issue a SYN-ACK response. While the targeted
system waits for the ACK that follows the SYN-ACK, it queues up all outstanding
SYN-ACK responses on a backlog queue. SYN-ACKs are moved off the queue only
when an ACK comes back or when an internal timer terminates the three-way
handshake. Once the queue is full, the system will ignore all incoming SYN
requests, making the system unavailable for legitimate users.
DoS
Denials of Service (DoS) attacks are aimed at devices and networks with a
connection to the Internet. Their goal is not to steal information, but to disable a
Page 152 / 324
Chapter 10 Firewall
P-660HN-TxA User’s Guide
152
device or network so users no longer have access to network resources. The
ZyXEL Device is pre-configured to automatically detect and thwart all known DoS
attacks.
DDoS
A DDoS attack is one in which multiple compromised systems attack a single
target, thereby causing denial of service for users of the targeted system.
LAND Attack
In a LAND attack, hackers flood SYN packets into the network with a spoofed
source IP address of the target system. This makes it appear as if the host
computer sent the packets to itself, making the system unavailable while the
target system tries to respond to itself.
Ping of Death
Ping of Death uses a "ping" utility to create and send an IP packet that exceeds
the maximum 65,536 bytes of data allowed by the IP specification. This may
cause systems to crash, hang or reboot.
SPI
Stateful Packet Inspection (SPI) tracks each connection crossing the firewall and
makes sure it is valid. Filtering decisions are based not only on rules but also
context. For example, traffic from the WAN may only be allowed to cross the
firewall in response to a request from the LAN.
Page 153 / 324
Chapter 10 Firewall
P-660HN-TxA User’s Guide
153
10.2
The Firewall Screen
Use this screen to enable firewall and/or SPI. Click
Advanced Setup > Firewall
to display the following screen.
Figure 73
Advanced Setup > Firewall
The following table describes the labels in this screen.
Enabling SPI blocks all traffic initiated from the WAN side,
including the DMZ, virtual server and ACL on the WAN side.
Table 49
Advanced > Firewall
LABEL
DESCRIPTION
Firewall
Use this field to enable or disable firewall on your ZyXEL Device.
SPI
Use this field to enable or disable SPI on your ZyXEL Device.
SAVE
Click this to save your changes.
CANCEL
Click this to restore your previously saved settings.
Page 154 / 324
Chapter 10 Firewall
P-660HN-TxA User’s Guide
154
Page 155 / 324
P-660HN-TxA User’s Guide
155
C
HAPTER
11
Filters
11.1
Overview
This chapter introduces three types of filters supported by the ZyXEL Device. You
can configure rules to restrict traffic by IP addresses, MAC addresses, application
types and/or URLs.
11.1.1
What You Can Do in the Filter Screens
Use the
URL Filter
screen (
Section 11.2 on page 156
) to block access to web
sites.
Use the
Application Filter
screen (
Section 11.3 on page 157
) to allow or deny
traffic from certain types of applications.
Use the
IP/MAC Filter
screen (
Section 11.4 on page 158
) to create IP/MAC
filter rules.
11.1.2
What You Need to Know About Filtering
URL
The URL (Uniform Resource Locator) identifies and helps locates resources on a
network. On the Internet the URL is the web address that you type in the address
bar of your Internet browser, for example “http://www.zyxel.com”.
IP/MAC Filter Structure
An IP/MAC filter set consists of one or more filter rules. The ZyXEL Device allows
you to configure up to twelve filter sets with six rules in each set, for a total of 72
filter rules in the system.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top