ZyXEL g-2000 plusv2 Guia Do Utilizador
ZyXEL G-2000 Plus v2 User’s Guide
14
Table of Contents
8.5.1 Configuring Address Mapping ...............................................................123
10.2.1 Packet Filtering Firewalls ......................................................................133
10.2.2 Application-level Firewalls ....................................................................133
10.2.3 Stateful Inspection Firewalls .................................................................134
10.2.2 Application-level Firewalls ....................................................................133
10.2.3 Stateful Inspection Firewalls .................................................................134
10.3 Introduction to ZyXEL’s Firewall .....................................................................134
10.4 Denial of Service ............................................................................................135
10.4 Denial of Service ............................................................................................135
10.4.1 Basics ...................................................................................................135
10.4.2 Types of DoS Attacks ...........................................................................136
10.4.2 Types of DoS Attacks ...........................................................................136
10.5.1 Stateful Inspection Process ..................................................................140
10.5.2 Stateful Inspection and the ZyXEL device ............................................141
10.5.3 TCP Security .........................................................................................142
10.5.4 UDP/ICMP Security ..............................................................................142
10.5.5 Upper Layer Protocols ..........................................................................142
10.5.2 Stateful Inspection and the ZyXEL device ............................................141
10.5.3 TCP Security .........................................................................................142
10.5.4 UDP/ICMP Security ..............................................................................142
10.5.5 Upper Layer Protocols ..........................................................................142
11.1 Access Methods .............................................................................................145
11.2 Firewall Policies Overview ..............................................................................145
11.3 Rule Logic Overview ......................................................................................146
11.2 Firewall Policies Overview ..............................................................................145
11.3 Rule Logic Overview ......................................................................................146