ZyXEL Communications 802.11g ADSL 2+ 4-Port Security Gateway HW-D Series User Manual
Page 15

P-662H/HW-D Series User’s Guide
Table of Contents
15
9.3 NAT General Setup .........................................................................................160
9.4 Port Forwarding ................................................................................................161
9.4.1 Default Server IP Address ......................................................................162
9.4.2 Port Forwarding: Services and Port Numbers ........................................162
9.4.3 Configuring Servers Behind Port Forwarding (Example) ........................163
10.2.1 Packet Filtering Firewalls ......................................................................169
10.2.2 Application-level Firewalls ....................................................................170
10.2.3 Stateful Inspection Firewalls ................................................................170
10.4.1 Basics ...................................................................................................171
10.4.2 Types of DoS Attacks ...........................................................................172
10.4.2.1 ICMP Vulnerability ......................................................................174
10.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................174
10.4.2.3 Traceroute ...................................................................................175
10.5.1 Stateful Inspection Process ..................................................................176
10.5.2 Stateful Inspection and the ZyXEL Device ............................................176
10.5.3 TCP Security .........................................................................................177
10.5.4 UDP/ICMP Security ..............................................................................177
10.5.5 Upper Layer Protocols ..........................................................................178
10.6 Guidelines for Enhancing Security with Your Firewall ....................................178
10.7.1.1 When To Use Filtering .................................................................180
10.7.2.1 When To Use The Firewall ..........................................................180