Prestige 792H User’s Guide
Firewall
8-7
The only legal NetBIOS commands are the following - all others are illegal.
Table 8-3 Legal NetBIOS Commands
MESSAGE:
REQUEST:
POSITIVE:
NEGATIVE:
RETARGET:
KEEPALIVE:
All SMTP commands are illegal except for those displayed in the following tables.
Table 8-4 Legal SMTP Commands
AUTH DATA EHLO ETRN EXPN HELO HELP MAIL NOOP
QUIT RCPT RSET SAML SEND SOML
TURN VRFY
Traceroute
Traceroute is a utility used to determine the path a packet takes between two endpoints. Sometimes when a
packet filter firewall is configured incorrectly an attacker can traceroute the firewall gaining knowledge of
the network topology inside the firewall.
4. Often, many DoS attacks also employ a technique known as "
IP Spoofing
" as part of their attack. IP
Spoofing may be used to break into systems, to hide the hacker's identity, or to magnify the effect of the
DoS attack. IP Spoofing is a technique used to gain unauthorized access to computers by tricking a
router or firewall into thinking that the communications are coming from within the trusted network. To
engage in IP spoofing, a hacker must modify the packet headers so that it appears that the packets
originate from a trusted host and should be allowed through the router or firewall. The Prestige blocks all
IP Spoofing attempts.
8.5 Stateful
Inspection
With stateful inspection, fields of the packets are compared to packets that are already known to be trusted.
For example, if you access some outside service, the proxy server remembers things about your original
request, like the port number and source and destination addresses. This “remembering” is called
saving the
state.
When the outside system responds to your request, the firewall compares the received packets with the
saved state to determine if they are allowed in. The Prestige uses stateful packet inspection to protect the
private LAN from hackers and vandals on the Internet. By default, the Prestige’s stateful inspection allows
all communications to the Internet that originate from the LAN, and blocks all traffic to the LAN that
originates from the Internet. In summary, stateful inspection:
Summary of Contents for Prestige 792H
Page 1: ...Prestige 792H G SHDSL 4 port Security Gateway User s Guide Version 3 40 BZ 0 March 2004...
Page 8: ......
Page 32: ......
Page 34: ......
Page 40: ......
Page 46: ......
Page 66: ......
Page 86: ...Prestige 792H User s Guide 5 14 WAN Setup Figure 5 6 Advanced WAN Backup...
Page 94: ......
Page 108: ......
Page 112: ......
Page 134: ......
Page 164: ......
Page 178: ...Prestige 792H User s Guide 14 8 VPN Screens Figure 14 3 VPN IKE...
Page 206: ......
Page 210: ......
Page 220: ......
Page 221: ...Maintenance VI Part VI Maintenance This part covers the maintenance screens...
Page 222: ......
Page 234: ......
Page 236: ......
Page 246: ......
Page 268: ......
Page 270: ......
Page 282: ......
Page 286: ......
Page 312: ......
Page 334: ......
Page 348: ......
Page 370: ......
Page 380: ......
Page 388: ......
Page 390: ......
Page 406: ......
Page 410: ......
Page 415: ...XI Part XI Appendices and Index This section provides some Appendices and an Index...
Page 416: ......
Page 420: ......
Page 424: ......
Page 426: ......
Page 430: ......