ZyXEL Communications G.SHDSL.bis 4-port Security Gateway P-793H User Manual
Page 14

P-793H User’s Guide
14
Table of Contents
8.2.1 Packet Filtering Firewalls ........................................................................119
8.2.2 Application-level Firewalls ......................................................................120
8.2.3 Stateful Inspection Firewalls ...................................................................120
8.4.1 Basics .....................................................................................................121
8.4.2 Types of DoS Attacks .............................................................................122
8.4.2.1 ICMP Vulnerability .........................................................................124
8.4.2.2 Illegal Commands (NetBIOS and SMTP) ......................................124
8.4.2.3 Traceroute .....................................................................................125
8.5.1 Stateful Inspection Process ....................................................................126
8.5.2 Stateful Inspection and the ZyXEL Device ..............................................126
8.5.3 TCP Security ...........................................................................................127
8.5.4 UDP/ICMP Security ................................................................................127
8.5.5 Upper Layer Protocols ............................................................................128
8.6 Guidelines for Enhancing Security with Your Firewall ......................................128
8.7.1.1 When To Use Filtering ...................................................................130
8.7.2.1 When To Use The Firewall ............................................................130
9.1 Access Methods ...............................................................................................131
9.2 Firewall Policies Overview ...............................................................................131
9.3 Rule Logic Overview ........................................................................................132
9.3.1 Rule Checklist .........................................................................................132
9.3.2 Security Ramifications ............................................................................132
9.3.3 Key Fields For Configuring Rules ...........................................................133