Справочник Пользователя для ZyXEL Communications 5 Series

Скачать
Страница из 824
Chapter 13 Firewall Screens
ZyWALL 5/35/70 Series User’s Guide
252
13.1.1  What You Can Do Using the Firewall Screens
• Use the Default Rule screens (
) to configure general firewall 
settings when the ZyWALL is set to router mode or bridge mode.
• Use the Rule Summary screens (
) to configure firewall rules.
• Use the Anti-Probing screen (
ZyWALL’s interfaces will respond to Ping requests and whether or not the ZyWALL is to 
respond to probing for unused ports.
• Use the Threshold (
screen to configure DoS thresholds and 
actions to be taken when a threshold is reached
• Use the Service (
) screen to configure custom services for use in 
firewall rules or view the services that are predefined in the ZyWALL.
13.1.2  What You Need To Know About the ZyWALL Firewall
Packet Direction
Packets have source and destination address headers. You can set what the ZyWALL does 
with packets traveling in a specific direction (including going to/coming from a VPN tunnel) 
that do not match any of the firewall rules. See also 
Asymmetrical Routes
Asymmetrical routes only apply if you have another gateway on your LAN, the ZyWALL is in 
Router mode, and the firewall is enabled. If return traffic is routed through the LAN gateway 
(instead of the ZyWALL), then the ZyWALL may reset the ‘incomplete’ connection. When 
you enable asymmetrical routes, interface to same interface (for example WAN 1 to WAN 1, 
VPN to VPN and so on) traffic is not checked by the firewall. See 
Asymmetrical Routes and 
IP Alias on page 274
 for information on how to use IP alias instead of asymmetrical routes.
13.1.3  Before You Begin
Before you configure the firewall, you must first decide if the ZyWALL will act as a Router 
or a Bridge. When the ZyWALL is in Bridge mode, the firewall is transparent to your 
network. You do not have to reconfigure existing network configurations. 
13.2  Firewall Rules Example
Suppose that your company decides to block all of the LAN users from using IRC (Internet 
Relay Chat) through the Internet. To do this, you would configure a LAN to WAN firewall 
rule that blocks IRC traffic from any source IP address from going to any destination address. 
You do not need to specify a schedule since you need the firewall rule to always be in effect. 
The following figure shows the results of this rule.