
RX3042H User's Manual
Getting to Know RX3042H
5
ACL is a very appropriate measure for providing isolation of one
subnet from another. It can be used as the first line of defense in
the network to block inbound packets of specific types from ever
reaching the protected network.
The RX3042H Firewallʼs ACL methodology supports:
• Filtering based on destination and source IP address, port
number and protocol
• Use of the wild card for composing filter rules
• Filter Rule priorities
2.3.2.3 Defense against DoS Attacks
The RX3042H Firewall has an Attack Defense Engine that protects
internal networks from known types of Internet attacks. It provides
automatic protection from Denial of Service (DoS) attacks such
as SYN flooding, IP smurfing, LAND, Ping of Death and all re-
assembly attacks. For example, the RX3042H Firewall provides
protection from “WinNuke”, a widely used program to remotely
crash unprotected Windows systems in the Internet. The RX3042H
Firewall also provides protection from a variety of common Internet
attacks such as IP Spoofing, Ping of Death, Land Attack, and
Reassembly attacks.
The type of attack protections provided by the RX3042H is listed in
Table 2.1.
Table 2.1. DoS Attacks
Type of Attack
Name of Attacks
Re-assembly Attacks
Bonk, Boink, Teardrop ( New Tear),
Overdrop, Opntear, Syndrop, Jolt, IP
fragmentation overlap.
ICMP Attacks
Ping of Death, Smurf, Twinge
Flooders
Logging only for ICMP Flooder, UDP
Flooder, SYN Flooder
Port Scans
Logging only for TCP SYN Scan,
Attacking packets dropped: TCP
XMAS Scan, TCP Null Scan, TCP
Stealth Scan
Protection with PF Rules
Echo-Chargen, Ascend Kill
Miscellaneous Attacks
IP Spoofing, LAND, Targa, Winnuke
Summary of Contents for RX3042H
Page 1: ...RX3042H User s Manual Revision 0 8 May 12 2005 ...
Page 2: ...2 ...
Page 34: ......
Page 74: ......
Page 126: ......