ZyXEL Communications NBG410W3G Series User Manual

Page of 430
Chapter 9 Firewall
NBG410W3G Series User’s Guide
170
By default, the ZyXEL Device drops packets traveling in the following directions.
9.4  Security Considerations
"
Incorrectly configuring the firewall may block valid access or introduce security 
risks to the ZyXEL Device and your protected network. Use caution when 
creating or deleting firewall rules and test your rules after you configure them.
Consider these security ramifications before creating a rule:
• WAN 1 to LAN These rules specify which computers connected to WAN 1 can access 
which computers or services on the LAN. For example, you may 
create rules to:
• Allow certain types of traffic, such as Lotus Notes database 
synchronization, from specific hosts on the Internet to specific 
hosts on the LAN.
• Allow public access to a Web server on your protected network. 
You could also block certain IP addresses from accessing it. 
"
You also need to configure NAT port forwarding 
(or full featured NAT address mapping rules) to 
allow computers on the WAN to access devices 
on the LAN. See 
an example.
• WAN to WAN
By default the ZyXEL Device stops computers connected to WAN1 or 
WAN2 from managing the ZyXEL Device or using the ZyXEL Device 
as a gateway to communicate with other computers on the WAN. You 
could configure one of these rules to allow a WAN computer to 
manage the ZyXEL Device.
"
You also need to configure the remote 
management settings to allow a WAN computer 
to manage the ZyXEL Device.