beautypg.com

Firewall configuration, 1 access methods, 2 firewall policies overview – ZyXEL Communications Prestige 2602R Series User Manual

Page 149: Chapter 13 firewall configuration, 1 access methods 13.2 firewall policies overview

background image

Prestige 2602R Series User’s Guide

Chapter 13 Firewall Configuration

149

C

H A P T E R

13

Firewall Configuration

This chapter shows you how to enable and configure the Prestige firewall.

13.1 Access Methods

The web configurator is, by far, the most comprehensive firewall configuration tool your
Prestige has to offer. For this reason, it is recommended that you configure your firewall using
the web configurator. SMT screens allow you to activate the firewall. CLI commands provide
limited configuration options and are only recommended for advanced users.

13.2 Firewall Policies Overview

Firewall rules are grouped based on the direction of travel of packets to which they apply:

By default, the Prestige’s stateful packet inspection allows packets traveling in the following
directions:

• LAN to LAN/ Router

This allows computers on the LAN to manage the Prestige and communicate between
networks or subnets connected to the LAN interface.

• LAN to WAN

By default, the Prestige’s stateful packet inspection blocks packets traveling in the following
directions:

• WAN to LAN
• WAN to WAN/ Router

This prevents computers on the WAN from using the Prestige as a gateway to
communicate with other computers on the WAN and/or managing the Prestige.

You may define additional rules and sets or modify existing ones but please exercise
extreme caution in doing so.

LAN to LAN/ Router

WAN to LAN

LAN to WAN

WAN to WAN/ Router