Part iv: security – ZyXEL Communications 802.11g HomePlug AV ADSL2+ Gateway P-660HWP-Dx User Manual
Page 15

Table of Contents
P-660HWP-Dx User’s Guide
39
10.2.1 Packet Filtering Firewalls ....................................................................................... 157
10.2.2 Application-level Firewalls ...................................................................................... 158
10.2.3 Stateful Inspection Firewalls ................................................................................... 158
10.4.1 Basics ..................................................................................................................... 159
10.4.2 Types of DoS Attacks ............................................................................................. 160
10.5.1 Stateful Inspection Process .................................................................................... 163
10.5.2 Stateful Inspection and the P-660HWP-Dx ............................................................ 164
10.5.3 TCP Security .......................................................................................................... 164
10.5.4 UDP/ICMP Security ................................................................................................ 165
10.5.5 Upper Layer Protocols ........................................................................................... 165
11.1 Access Methods ............................................................................................................... 169
11.2 Firewall Policies Overview ............................................................................................... 169
11.3 Rule Logic Overview ........................................................................................................ 170
11.3.1 Rule Checklist ........................................................................................................ 170
11.3.2 Security Ramifications ............................................................................................ 170
11.3.3 Key Fields For Configuring Rules .......................................................................... 171
11.5 General Firewall Policy ................................................................................................. 172
11.6 Firewall Rules Summary ................................................................................................. 173
11.6.1 Configuring Firewall Rules ................................................................................... 175
11.6.2 Customized Services ............................................................................................. 178
11.6.3 Configuring a Customized Service ....................................................................... 178