beautypg.com

ZyXEL Communications ADSL 2+ Gateway P-660HW-T1 User Manual

Page 13

background image

P-660H/HW/W-T Series User’ Guide

13

Table of Contents

7.4 Selecting the NAT Mode .................................................................................107
7.5 Configuring SUA Server Set ...........................................................................108
7.6 Configuring Address Mapping Rules ...............................................................110
7.7 Editing an Address Mapping Rule ................................................................... 111

Chapter 8
Dynamic DNS Setup............................................................................................. 1
14

8.1 Dynamic DNS Overview .................................................................................114

8.1.1 DYNDNS Wildcard ..................................................................................114

8.2 Configuring Dynamic DNS ..............................................................................114

Chapter 9
Time and Date.......................................................................................................
116

9.1 Configuring Time and Date .............................................................................116

Chapter 10
Firewalls................................................................................................................
118

10.1 Firewall Overview ..........................................................................................118
10.2 Types of Firewalls ..........................................................................................118

10.2.1 Packet Filtering Firewalls ......................................................................118
10.2.2 Application-level Firewalls ....................................................................119
10.2.3 Stateful Inspection Firewalls ................................................................119

10.3 Introduction to ZyXEL’s Firewall .....................................................................119

10.3.1 Denial of Service Attacks ......................................................................120

10.4 Denial of Service ............................................................................................120

10.4.1 Basics ...................................................................................................120
10.4.2 Types of DoS Attacks ...........................................................................121

10.4.2.1 ICMP Vulnerability ......................................................................123
10.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................123
10.4.2.3 Traceroute ...................................................................................124

10.5 Stateful Inspection ..........................................................................................124

10.5.1 Stateful Inspection Process ..................................................................125
10.5.2 Stateful Inspection and the Prestige .....................................................126
10.5.3 TCP Security .........................................................................................126
10.5.4 UDP/ICMP Security ..............................................................................127
10.5.5 Upper Layer Protocols ..........................................................................127

10.6 Guidelines for Enhancing Security with Your Firewall ....................................127

10.6.1 Security In General ...............................................................................128

10.7 Packet Filtering Vs Firewall ............................................................................129

10.7.1 Packet Filtering: ....................................................................................129

10.7.1.1 When To Use Filtering .................................................................129

10.7.2 Firewall .................................................................................................129

10.7.2.1 When To Use The Firewall ..........................................................129