Part v: security – ZyXEL Communications P-2602HWLNI User Manual
Page 17

Table of Contents
P-2602HWLNI User’s Guide
17
13.3.3 Call Forwarding ...................................................................................................... 228
13.3.4 Follow Me ............................................................................................................... 228
13.3.5 Call Pickup ............................................................................................................. 229
14.2.1 Packet Filtering Firewalls ....................................................................................... 233
14.2.2 Application-level Firewalls ...................................................................................... 234
14.2.3 Stateful Inspection Firewalls .................................................................................. 234
14.4.1 Basics ..................................................................................................................... 235
14.4.2 Types of DoS Attacks ............................................................................................. 236
14.5.1 Stateful Inspection Process .................................................................................... 239
14.5.2 Stateful Inspection on Your ZyXEL Device ............................................................. 240
14.5.3 TCP Security .......................................................................................................... 240
14.5.4 UDP/ICMP Security ................................................................................................ 241
14.5.5 Upper Layer Protocols ........................................................................................... 241
15.1 Access Methods .............................................................................................................. 245
15.2 General Firewall Policy Overview ................................................................................... 245
15.3 Rule Logic Overview ....................................................................................................... 246
15.3.1 Rule Checklist ........................................................................................................ 246
15.3.2 Security Ramifications ............................................................................................ 246
15.3.3 Key Fields For Configuring Rules .......................................................................... 247