Firewall configuration, 1 access methods, 2 firewall policies overview – ZyXEL Communications Prestige 2602R Series User Manual
Page 149: Chapter 13 firewall configuration, 1 access methods 13.2 firewall policies overview
Prestige 2602R Series User’s Guide
Chapter 13 Firewall Configuration
149
C
H A P T E R
13
Firewall Configuration
This chapter shows you how to enable and configure the Prestige firewall.
13.1 Access Methods
The web configurator is, by far, the most comprehensive firewall configuration tool your
Prestige has to offer. For this reason, it is recommended that you configure your firewall using
the web configurator. SMT screens allow you to activate the firewall. CLI commands provide
limited configuration options and are only recommended for advanced users.
13.2 Firewall Policies Overview
Firewall rules are grouped based on the direction of travel of packets to which they apply:
By default, the Prestige’s stateful packet inspection allows packets traveling in the following
directions:
• LAN to LAN/ Router
This allows computers on the LAN to manage the Prestige and communicate between
networks or subnets connected to the LAN interface.
• LAN to WAN
By default, the Prestige’s stateful packet inspection blocks packets traveling in the following
directions:
• WAN to LAN
• WAN to WAN/ Router
This prevents computers on the WAN from using the Prestige as a gateway to
communicate with other computers on the WAN and/or managing the Prestige.
You may define additional rules and sets or modify existing ones but please exercise
extreme caution in doing so.
•
LAN to LAN/ Router
•
WAN to LAN
•
LAN to WAN
•
WAN to WAN/ Router