ZyXEL Communications P-660HW-T v2 User Manual
Page 15

P-660HW-T v2 User’s Guide
Table of Contents
15
9.4.1 Basics .....................................................................................................139
9.4.2 Types of DoS Attacks .............................................................................140
9.4.2.1 ICMP Vulnerability ........................................................................142
9.4.2.2 Illegal Commands (NetBIOS and SMTP) ......................................142
9.4.2.3 Traceroute .....................................................................................143
9.5.1 Stateful Inspection Process ....................................................................144
9.5.2 Stateful Inspection and the ZyXEL Device ..............................................144
9.5.3 TCP Security ...........................................................................................145
9.5.4 UDP/ICMP Security ................................................................................145
9.5.5 Upper Layer Protocols ............................................................................146
9.6 Guidelines for Enhancing Security with Your Firewall ......................................146
9.7.1.1 When To Use Filtering ...................................................................148
9.7.2.1 When To Use The Firewall ............................................................148
10.1 Access Methods .............................................................................................149
10.2 Firewall Policies Overview ............................................................................149
10.3 Rule Logic Overview .....................................................................................150
10.3.1 Rule Checklist .......................................................................................150
10.3.2 Security Ramifications ..........................................................................150
10.3.3 Key Fields For Configuring Rules ........................................................151
10.5 General Firewall Policy ...............................................................................152
10.6 Firewall Rules Summary ...............................................................................153
10.6.1 Configuring Firewall Rules ..................................................................155
10.6.2 Customized Services ...........................................................................158
10.6.3 Configuring a Customized Service .....................................................159
10.7 Example Firewall Rule ...................................................................................159
10.8 Predefined Services .......................................................................................163
10.9 Anti-Probing ..................................................................................................165