beautypg.com

Firewall configuration, 1 access methods, 2 firewall policies overview – ZyXEL Communications 660HW Series User Manual

Page 145: Chapter 13 firewall configuration, 1 access methods 13.2 firewall policies overview

background image

Prestige 660H/HW Series User’s Guide

Chapter 13 Firewall Configuration

144

C

H A P T E R

13

Firewall Configuration

This chapter shows you how to enable and configure the Prestige firewall.

13.1 Access Methods

The web configurator is, by far, the most comprehensive firewall configuration tool your
Prestige has to offer. For this reason, it is recommended that you configure your firewall using
the web configurator. SMT screens allow you to activate the firewall. CLI commands provide
limited configuration options and are only recommended for advanced users.

13.2 Firewall Policies Overview

Firewall rules are grouped based on the direction of travel of packets to which they apply:

LAN to LAN/ Router

WAN to LAN

LAN to WAN

WAN to WAN/ Router

Note: The LAN includes both the LAN port and the WLAN.

By default, the Prestige’s stateful packet inspection allows packets traveling in the following
directions:

• LAN to LAN/ Router

This allows computers on the LAN to manage the Prestige and communicate between
networks or subnets connected to the LAN interface.

• LAN to WAN

By default, the Prestige’s stateful packet inspection blocks packets traveling in the following
directions:

• WAN to LAN
• WAN to WAN/ Router

This prevents computers on the WAN from using the Prestige as a gateway to
communicate with other computers on the WAN and/or managing the Prestige.

You may define additional rules and sets or modify existing ones but please exercise
extreme caution in doing so.

This manual is related to the following products: