![Radware Alteon Скачать руководство пользователя страница 601](http://html.mh-extra.com/html/radware/alteon/alteon_application-manual_781134601.webp)
Document ID: RDWR-ALOS-V2900_AG1302
601
Chapter 21 – Advanced Denial of Service
Protection
This chapter describes the Advanced Denial of Service (DoS) protection features that can be used to
prevent a wide range of network attacks. The commands to execute these features are located in
the Security menu, and are enabled via a separately purchased license key.
Note:
If you purchased the Advanced DoS protection option, enable it by typing
/oper/swkey
and
entering its software key.
•
—Describes the rationale for providing Advanced DoS protection and how
it can assist traditional firewalls in preventing malicious network attacks.
•
IP Address Access Control Lists, page 602
—Describes how to setup blocking of large ranges of
IP addresses.
•
Protection Against Common Denial of Service Attacks, page 604
—Explains how to prevent
common DoS attacks from entering ports that are connected to unsafe networks.
•
Protocol-Based Rate Limiting, page 611
—Explains how to monitor and limit incoming UDP, ICMP
or TCP traffic within a configurable time window.
•
Protection Against UDP Blast Attacks, page 617
—Describes how to monitor and limit traffic on
UDP ports to a maximum number of connections per second.
•
TCP or UDP Pattern Matching, page 618
—Describes how to match on binary or ASCII patterns
embedded in IP packets, and combine them into pattern groups which can be applied to a filter
to deny traffic containing those patterns.
Background
The Advanced DoS feature set extends the Alteon functionality to act as an application-intelligent
firewall. You can use these features to perform deep inspection and blocking of malicious content.
For example, many newer viruses, worms, malicious code, applications with security bugs, and
cyber attacks have targeted application and protocol weaknesses by tunneling through a firewall
over HTTP port 80, or by encapsulating attacks into SSL tunnels. Such packets can pass undetected
through standard network firewalls, which are configured only to open or close access to HTTP port
80. Many of the attacks (such as nullscan, xmascan, scan SYNFIN) are created with purposely
malformed packets that include illegal fields in the IP headers.
Security Inspection Workflow
A typical Alteon workflow to handle security inspection is as follows:
1. Alteon is configured with a predefined set of rules.
To increase the performance of the inspection, complex pattern inspection rules can be defined
with an offset value so that the inspection engine can go directly to the location to be inspected.
A virus pattern often is a combination of multiple patterns within the IP payload. Alteon can be
configured to inspect multiple patterns and locate them at different offsets within the payload.
2. Packets enter Alteon.
3. Alteon inspects the packet by comparing the rules to the content of the packet.
Содержание Alteon
Страница 2: ...Alteon Application Switch Operating System Application Guide 2 Document ID RDWR ALOS V2900_AG1302 ...
Страница 42: ...Alteon Application Switch Operating System Application Guide Preface 42 Document ID RDWR ALOS V2900_AG1302 ...
Страница 582: ...Alteon Application Switch Operating System Application Guide High Availability 582 Document ID RDWR ALOS V2900_AG1302 ...