ZyXEL p-660hwp Manual Do Utilizador

Página de 402
 Chapter 10 Firewalls
P-660HWP-Dx User’s Guide
41
are allowed in. The P-660HWP-Dx uses stateful packet inspection to protect the private LAN 
from hackers and vandals on the Internet. By default, the P-660HWP-Dx’s stateful inspection 
allows all communications to the Internet that originate from the LAN, and blocks all traffic to 
the LAN that originates from the Internet. In summary, stateful inspection: 
• Allows all sessions originating from the LAN (local network) to the WAN (Internet).
• Denies all sessions originating from the WAN to the LAN.
Figure 96   Stateful Inspection
The previous figure shows the P-660HWP-Dx’s default firewall rules in action as well as 
demonstrates how stateful inspection works. User A can initiate a Telnet session from within 
the LAN and responses to this request are allowed. However other Telnet traffic initiated from 
the WAN is blocked.
10.5.1  Stateful Inspection Process
In this example, the following sequence of events occurs when a TCP packet leaves the LAN 
network through the firewall's WAN interface. The TCP packet is the first in a session, and the 
packet's application layer protocol is configured for a firewall rule inspection:
The packet travels from the firewall's LAN to the WAN.
The packet is evaluated against the interface's existing outbound access list, and the 
packet is permitted (a denied packet would simply be dropped at this point).
The packet is inspected by a firewall rule to determine and record information about the 
state of the packet's connection. This information is recorded in a new state table entry 
created for the new connection. If there is not a firewall rule for this packet and it is not 
an attack, then the settings in the Firewall General screen determine the action for this 
packet.
Based on the obtained state information, a firewall rule creates a temporary access list 
entry that is inserted at the beginning of the WAN interface's inbound extended access 
list. This temporary access list entry is designed to permit inbound packets of the same 
connection as the outbound packet just inspected.
The outbound packet is forwarded out through the interface.