Руководство Пользователя для ZyXEL p-660h-61
Prestige 660H Series User’s Guide
Firewalls
10-11
♦
The firewall performs stateful inspection. It takes into account the state of connections it
handles so that, for example, a legitimate incoming packet can be matched with the outbound
request for that packet and allowed in. Conversely, an incoming packet masquerading as a
response to a nonexistent outbound request can be blocked.
handles so that, for example, a legitimate incoming packet can be matched with the outbound
request for that packet and allowed in. Conversely, an incoming packet masquerading as a
response to a nonexistent outbound request can be blocked.
♦
The firewall uses session filtering, i.e., smart rules, that enhance the filtering process and
control the network session rather than control individual packets in a session.
control the network session rather than control individual packets in a session.
♦
The firewall provides e-mail service to notify you of routine reports and when alerts occur.
When To Use The Firewall
♦
To prevent DoS attacks and prevent hackers cracking your network.
♦
A range of source and destination IP addresses as well as port numbers can be specified within
one firewall rule making the firewall a better choice when complex rules are required.
one firewall rule making the firewall a better choice when complex rules are required.
♦
To selectively block/allow inbound or outbound traffic between inside host/networks and
outside host/networks. Remember that filters can not distinguish traffic originating from an
inside host or an outside host by IP address.
outside host/networks. Remember that filters can not distinguish traffic originating from an
inside host or an outside host by IP address.
♦
The firewall performs better than filtering if you need to check many rules.
♦
Use the firewall if you need routine e-mail reports about your system or need to be alerted
when attacks occur.
when attacks occur.
♦
The firewall can block specific URL traffic that might occur in the future. The URL can be
saved in an Access Control List (ACL) database.
saved in an Access Control List (ACL) database.