ZyXEL Communications Prestige 2602H Series User Manual
Page 16

Prestige 2602H/HW Series User’s Guide
16
Table of Contents
13.2.1 Packet Filtering Firewalls ......................................................................167
13.2.2 Application-level Firewalls ....................................................................167
13.2.3 Stateful Inspection Firewalls ................................................................168
13.4.1 Basics ...................................................................................................169
13.4.2 Types of DoS Attacks ...........................................................................170
13.4.2.1 ICMP Vulnerability ......................................................................172
13.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................172
13.4.2.3 Traceroute ...................................................................................173
13.5.1 Stateful Inspection Process ..................................................................174
13.5.2 Stateful Inspection and the Prestige .....................................................175
13.5.3 TCP Security .........................................................................................175
13.5.4 UDP/ICMP Security ..............................................................................176
13.5.5 Upper Layer Protocols ..........................................................................176
13.6 Guidelines for Enhancing Security with Your Firewall ....................................176
13.7.1.1 When To Use Filtering .................................................................178
13.7.2.1 When To Use The Firewall ..........................................................178