The threshold is applied separately to connections from different IP addresses.
•
Network Based
The threshold is applied to all connections matching the rules as a group.
Rule Actions
When a Threshold Rule is triggered, one of two responses is possible:
•
Audit
Leave the connection intact but log the event.
•
Protect
Drop the triggering connection.
Logging would be the preferred option if the appropriate triggering value cannot be determined
beforehand. Multiple actions for a given rule might consist of
Audit
for a given threshold while
the action might become
Protect
for a higher threshold.
Multiple Triggered Actions
When a rule is triggered then NetDefendOS will perform the associated rule actions that match
the condition that has occurred. If more than one action matches the condition then those
matching actions are applied in the order they appear in the user interface.
If several actions that have the same combination of Type and Grouping (see above for the
definition of these terms) are triggered at the same time, only the action with the highest
threshold value will be logged.
Exempted Connections
It should be noted that some advanced settings, known as
Before Rules
settings, can exempt
certain types of connections for remote management from examination by the NetDefendOS IP
rule set if they are enabled. These
Before Rules
settings will also exempt the connections from
threshold rules if they are enabled.
Threshold Rules and ZoneDefense
Threshold rules are used in the D-Link
ZoneDefense
feature to block the source of excessive
connection attempts from internal hosts. More information on this feature can be found in
.
Threshold Rule Blacklisting
If the
Protect
option is used, Threshold rules can be configured so that the source that triggered
the rule, is added automatically to a
Blacklist
of IP addresses or networks. If several
Protect
actions
with blacklisting enabled are triggered at the same time, only the first triggered blacklisting
action will be executed by NetDefendOS.
A host based action with blacklisting enabled will blacklist a single host when triggered. A
network based action with blacklisting enabled will blacklist the source network associated with
Chapter 10: Traffic Management
804
Summary of Contents for NetDefendOS
Page 30: ...Figure 1 3 Packet Flow Schematic Part III Chapter 1 NetDefendOS Overview 30 ...
Page 32: ...Chapter 1 NetDefendOS Overview 32 ...
Page 144: ...Chapter 2 Management and Maintenance 144 ...
Page 284: ...Chapter 3 Fundamentals 284 ...
Page 392: ...Chapter 4 Routing 392 ...
Page 419: ... Host 2001 DB8 1 MAC 00 90 12 13 14 15 5 Click OK Chapter 5 DHCP Services 419 ...
Page 420: ...Chapter 5 DHCP Services 420 ...
Page 573: ...Chapter 6 Security Mechanisms 573 ...
Page 607: ...Chapter 7 Address Translation 607 ...
Page 666: ...Chapter 8 User Authentication 666 ...
Page 775: ...Chapter 9 VPN 775 ...
Page 819: ...Chapter 10 Traffic Management 819 ...
Page 842: ...Chapter 11 High Availability 842 ...
Page 866: ...Default Enabled Chapter 13 Advanced Settings 866 ...
Page 879: ...Chapter 13 Advanced Settings 879 ...