ZyXEL Prestige 792H SDSL Router 91-004-342004B Manual Do Utilizador

Códigos do produto
91-004-342004B
Página de 428
Prestige 792H G.SHDSL Router 
Firewalls  
8-7 
The only legal NetBIOS commands are the following - all others are illegal. 
Table 8-3 Legal NetBIOS Commands 
MESSAGE: 
REQUEST: 
POSITIVE: 
NEGATIVE: 
RETARGET: 
KEEPALIVE: 
All SMTP commands are illegal except for those displayed in the following tables. 
Table 8-4 Legal SMTP Commands 
AUTH DATA EHLO ETRN EXPN HELO HELP  MAIL  NOOP 
QUIT RCPT RSET SAML SEND SOML 
 
TURN VRFY  
 
Traceroute 
Traceroute is a utility used to determine the path a packet takes between two endpoints. Sometimes when a 
packet filter firewall is configured incorrectly an attacker can traceroute the firewall gaining knowledge of 
the network topology inside the firewall. 
4.  Often, many DoS attacks also employ a technique known as "IP Spoofing" as part of their attack. IP 
Spoofing may be used to break into systems, to hide the hacker's identity, or to magnify the effect of the 
DoS attack. IP Spoofing is a technique used to gain unauthorized access to computers by tricking a 
router or firewall into thinking that the communications are coming from within the trusted network. To 
engage in IP spoofing, a hacker must modify the packet headers so that it appears that the packets 
originate from a trusted host and should be allowed through the router or firewall. The Prestige blocks all 
IP Spoofing attempts. 
8.5 Stateful 
Inspection 
With stateful inspection, fields of the packets are compared to packets that are already known to be trusted. 
For example, if you access some outside service, the proxy server remembers things about your original 
request, like the port number and source and destination addresses. This “remembering” is called saving the 
state.
 When the outside system responds to your request, the firewall compares the received packets with the 
saved state to determine if they are allowed in. The Prestige uses stateful packet inspection to protect the 
private LAN from hackers and vandals on the Internet. By default, the Prestige’s stateful inspection allows 
all communications to the Internet that originate from the LAN, and blocks all traffic to the LAN that 
originates from the Internet. In summary, stateful inspection: