ZyXEL Communications 660HW Series User Manual
Page 12

Prestige 660H/HW Series User’s Guide
11
9.4 SIP ALG ...........................................................................................................119
9.5 Selecting the NAT Mode ..................................................................................120
9.6 Configuring SUA Server ...................................................................................120
9.7 Configuring Address Mapping ..........................................................................122
9.8 Editing an Address Mapping Rule ....................................................................123
12.2.1 Packet Filtering Firewalls ......................................................................130
12.2.2 Application-level Firewalls ....................................................................130
12.2.3 Stateful Inspection Firewalls ................................................................131
12.4.1 Basics ...................................................................................................132
12.4.2 Types of DoS Attacks ...........................................................................133
12.4.2.1 ICMP Vulnerability ......................................................................135
12.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................135
12.4.2.3 Traceroute ...................................................................................136
12.5.1 Stateful Inspection Process ..................................................................137
12.5.2 Stateful Inspection and the Prestige .....................................................138
12.5.3 TCP Security .........................................................................................138
12.5.4 UDP/ICMP Security ..............................................................................139
12.5.5 Upper Layer Protocols ..........................................................................139
12.6 Guidelines for Enhancing Security with Your Firewall ....................................139
12.7.1.1 When To Use Filtering .................................................................141