- 31 -
number of ICMP packets per second that is allowed to enter the
network/firewall. Once the ICMP packets exceed this limit, the
activity will be logged in
Alarm
and an email alert is sent to the
Administrator. The default ICMP flood threshold is set to 1000
Pkts/Sec.
Detect UDP Flood
: Select this option to detect UDP flood attacks.
A UDP flood attack is similar to an ICMP flood attack. After
enabling this function, the System Administrator can enter the
number of UDP packets per second that is allow to enter the
network/firewall. Once the UDP packets exceed this limit, the
activity will be logged in
Alarm
and an email alert is sent to the
Administrator. The default UDP flood threshold is set to 1000
Pkts/Sec.
Detect Ping of Death Attack:
Select this option to detect the
attacks of tremendous trash data in PING packets that hackers
send to cause System malfunction This attack can cause network
speed to slow down, or even make it necessary to restart the
computer to get a normal operation.
Detect Tear Drop Attack:
Select this option to detect tear drop
attacks. These are packets that are segmented to small packets
with negative length. Some Systems treat the negative value as a
very large number, and copy enormous data into the System to
cause System damage, such as a shut down or a restart.
Detect IP Spoofing Attack:
Select this option to detect spoof
attacks. Hackers disguise themselves as trusted users of the
network in
Spoof attacks
. They use a fake identity to try to pass
through the Firewall System and invade the network.
Filter IP Source Route Option:
Each IP packet can carry an
optional field that specifies the replying address that can be different
from the source address specified in packet’s header. Hackers can
use this address field on disguised packets to invade internal
networks and send internal networks’ data back to them.
Detect Port Scan Attack:
Select this option to detect the port
scans hackers use to continuously scan networks on the Internet to
detect computers and vulnerable ports that are opened by those
computers.
Содержание DFL-300 - Security Appliance
Страница 1: ... 1 FIREWALL VPN ROUTER User s Manual Doc No 120602 01 ...
Страница 45: ... 45 ...
Страница 123: ...Step 3 Click OK to save modifications or click Cancel to cancel modifications 123 ...
Страница 144: ...When Disable appears in the drop down list no Virtual Server can be added 144 ...
Страница 172: ...Step 4 When the following screen appears the setup is completed 172 ...
Страница 174: ...Step 8 When the following screen appears the setup is completed 174 ...
Страница 177: ...Step 9 An Incoming FTP policy should now be created 177 ...
Страница 179: ...Step 8 Open all the services ANY Step 9 The setup is completed 179 ...