Prestige 653HWI Series User’s Guide
12-2
Firewall
Configuration
12.3 Attack Alert
Attack alerts are real-time reports of DoS attacks. In the
Attack Alert
screen, shown later, you may choose
to generate an alert whenever an attack is detected. For DoS attacks, the Prestige uses thresholds to determine
when to drop sessions that do not become fully established. These thresholds apply globally to all sessions.
You can use the default threshold values, or you can change them to values more suitable to your security
requirements.
12.3.1 Alerts
Alerts are reports on events, such as attacks, that you may want to know about right away. You can choose to
generate an alert when an attack is detected in the
Attack Alert
screen
(Figure 12-2 -
select the
Generate
alert when attack detected
checkbox) or when a rule is matched in the
Rule Config
screen (see
Figure
13-4)
.
Configure the
Log Settings
screen to have the Prestige send an immediate e-mail message to you
when an event generates an alert. Refer to the chapter on logs for details.
12.3.2 Threshold Values
Tune these parameters when something is not working and after you have checked the firewall counters.
These default values should work fine for most small offices. Factors influencing choices for threshold
values are:
1. The maximum number of opened sessions.
2. The minimum capacity of server backlog in your LAN network.
3. The CPU power of servers in your LAN network.
4. Network
bandwidth.
5. Type of traffic for certain servers.
If your network is slower than average for any of these factors (especially if you have servers that are slow or
handle many tasks and are often busy), then the default values should be reduced.
You should make any changes to the threshold values before you continue configuring firewall rules.
12.3.3 Half-Open Sessions
An unusually high number of half-open sessions (either an absolute number or measured as the arrival rate)
could indicate that a Denial of Service attack is occurring. For TCP, "half-open" means that the session has
not reached the established state-the TCP three-way handshake has not yet been completed (see
Figure 11-2
).
For UDP, "half-open" means that the firewall has detected no return traffic.
Содержание Prestige 653HWI series
Страница 30: ......
Страница 62: ......
Страница 64: ......
Страница 88: ......
Страница 108: ...Prestige 653HWI Series User s Guide 7 20 WAN Setup Figure 7 10 Traffic Redirect LAN Setup...
Страница 112: ......
Страница 114: ......
Страница 134: ......
Страница 136: ......
Страница 156: ......
Страница 172: ......
Страница 184: ......
Страница 185: ...VPN IPSec V Part V VPN IPSec This part provides information about configuring VPN IPSec for secure communications...
Страница 186: ......
Страница 192: ......
Страница 200: ...Prestige 653HWI Series User s Guide 17 8 VPN Screens Figure 17 3 VPN IKE...
Страница 222: ......
Страница 242: ......
Страница 262: ......
Страница 263: ...Maintenance VIII Part VIII Maintenance This part covers the maintenance screens...
Страница 264: ......
Страница 266: ...Prestige 653HWI Series User s Guide 22 2 Maintenance Figure 22 1 System Status...
Страница 282: ......
Страница 292: ......
Страница 312: ......
Страница 338: ......
Страница 368: ......
Страница 408: ......
Страница 430: ......
Страница 434: ......
Страница 444: ......
Страница 450: ......
Страница 466: ......
Страница 474: ......
Страница 480: ......
Страница 491: ...Prestige 653HWI Series User s Guide Wireless LAN and IEEE 802 11 C 3 Diagram C 2 ESS Provides Campus Wide Coverage...
Страница 492: ......
Страница 497: ...Prestige 653HWI Series User s Guide PPPoE E 3 Diagram E 2 Prestige as a PPPoE Client...
Страница 498: ......
Страница 500: ......
Страница 540: ......
Страница 554: ......