ZyXEL Communications ZyXEL ZyWALL P1 User Manual
Page 12

ZyWALL P1 User’s Guide
Table of Contents
11
4.3.3 RIP Setup .................................................................................................74
4.3.4 Multicast ....................................................................................................75
4.4 Configuring LAN .................................................................................................75
4.5 Configuring Static DHCP ....................................................................................77
5.2 WAN Route Setup ..............................................................................................79
5.3 Configuring WAN Setup .....................................................................................80
5.3.1 Ethernet Encapsulation .............................................................................80
5.3.2 PPPoE Encapsulation ...............................................................................83
5.3.3 PPTP Encapsulation .................................................................................85
5.4.1 DYNDNS Wildcard ....................................................................................87
5.4.2 Configuring Dynamic DNS ........................................................................88
6.2.1 Packet Filtering Firewalls ..........................................................................91
6.2.2 Application-level Firewalls ........................................................................91
6.2.3 Stateful Inspection Firewalls .....................................................................92
6.3 Introduction to ZyXEL’s Firewall .........................................................................92
6.4 Denial of Service ................................................................................................93
6.4.1 Basics .......................................................................................................93
6.4.2 Types of DoS Attacks ...............................................................................94
6.4.2.1 ICMP Vulnerability ..........................................................................96
6.4.2.2 Illegal Commands (NetBIOS and SMTP) ........................................96
6.4.2.3 Traceroute .......................................................................................97
6.5.1 Stateful Inspection Process ......................................................................98
6.5.2 Stateful Inspection and the ZyWALL .........................................................99
6.5.3 TCP Security .............................................................................................99
6.5.4 UDP/ICMP Security ................................................................................100
6.5.5 Upper Layer Protocols ............................................................................100
6.7.1.1 When To Use Filtering ...................................................................101