802.11g Wireless 4-port Router User's Guide

Table Of Contents
ZyAIR G-2000 Plus User’s Guide
Table of Contents 14
14.5.4 UDP/ICMP Security ..............................................................................187
14.5.5 Upper Layer Protocols ..........................................................................188
14.6 Guidelines For Enhancing Security With Your Firewall ..................................188
14.7 Packet Filtering Vs Firewall ............................................................................188
14.7.1 Packet Filtering: ....................................................................................189
14.7.1.1 When To Use Filtering .................................................................189
14.7.2 Firewall .................................................................................................189
14.7.2.1 When To Use The Firewall ..........................................................189
Chapter 15
Firewall Screens................................................................................................... 192
15.1 Access Methods .............................................................................................192
15.2 Firewall Policies Overview .............................................................................192
15.3 Rule Logic Overview ......................................................................................193
15.3.1 Rule Checklist .......................................................................................193
15.3.2 Security Ramifications ..........................................................................194
15.3.3 Key Fields For Configuring Rules .........................................................194
15.3.3.1 Action ..........................................................................................194
15.3.3.2 Service ........................................................................................194
15.3.3.3 Source Address ...........................................................................194
15.3.3.4 Destination Address ....................................................................194
15.4 Connection Direction Examples .....................................................................195
15.4.1 LAN to WAN Rules ...............................................................................195
15.4.2 WAN to LAN Rules ...............................................................................195
15.5 Alerts ..............................................................................................................196
15.6 Configuring Firewall .......................................................................................196
15.6.1 Rule Summary ......................................................................................197
15.6.2 Configuring Firewall Rules ....................................................................199
15.6.3 Configuring Custom Services ...............................................................202
15.7 Example Firewall Rule ...................................................................................203
15.8 Predefined Services .......................................................................................206
Chapter 16
Content Filtering ................................................................................................. 210
16.1 Introduction to Content Filtering .....................................................................210
16.2 Restrict Web Features ...................................................................................210
16.3 Days and Times .............................................................................................210
16.4 Configure Content Filtering ............................................................................210
Chapter 17
Certificates............................................................................................................ 214
17.1 Certificates Overview .....................................................................................214
17.1.1 Advantages of Certificates ....................................................................215