Prestige 662HW Series User’s Guide
11-6
Firewalls
Traceroute
Traceroute is a utility used to determine the path a packet takes between two endpoints. Sometimes
when a packet filter firewall is configured incorrectly an attacker can traceroute the firewall gaining
knowledge of the network topology inside the firewall.
4. Often, many DoS attacks also employ a technique known as "
IP Spoofing
" as part of their attack.
IP Spoofing may be used to break into systems, to hide the hacker's identity, or to magnify the
effect of the DoS attack. IP Spoofing is a technique used to gain unauthorized access to computers
by tricking a router or firewall into thinking that the communications are coming from within the
trusted network. To engage in IP spoofing, a hacker must modify the packet headers so that it
appears that the packets originate from a trusted host and should be allowed through the router or
firewall. The Prestige blocks all IP Spoofing attempts.
11.5 Stateful Inspection
With stateful inspection, fields of the packets are compared to packets that are already known to be
trusted. For example, if you access some outside service, the proxy server remembers things about
your original request, like the port number and source and destination addresses. This “remembering”
is called
saving the state.
When the outside system responds to your request, the firewall compares the
received packets with the saved state to determine if they are allowed in. The Prestige uses stateful
packet inspection to protect the private LAN from hackers and vandals on the Internet. By default, the
Prestige’s stateful inspection allows all communications to the Internet that originate from the LAN,
and blocks all traffic to the LAN that originates from the Internet. In summary, stateful inspection:
♦
Allows all sessions originating from the LAN (local network) to the WAN (Internet).
♦
Denies all sessions originating from the WAN to the LAN.
Figure 11-5 Stateful Inspection
The previous figure shows the Prestige’s default firewall rules in action as well as demonstrates how
stateful inspection works. User A can initiate a Telnet session from within the LAN and responses to
this request are allowed. However other Telnet traffic initiated from the WAN is blocked.
Содержание Prestige 662HW Series
Страница 26: ......
Страница 28: ......
Страница 36: ......
Страница 54: ......
Страница 56: ......
Страница 64: ......
Страница 84: ......
Страница 100: ......
Страница 116: ......
Страница 128: ......
Страница 150: ......
Страница 154: ......
Страница 162: ......
Страница 168: ......
Страница 194: ......
Страница 196: ......
Страница 200: ......
Страница 208: ......
Страница 214: ......
Страница 216: ......
Страница 229: ...Maintenance VIII P Pa ar rt t V VI II II I Maintenance This part covers the maintenance screens...
Страница 230: ......
Страница 242: ......
Страница 244: ......
Страница 252: ......
Страница 258: ......
Страница 262: ......
Страница 266: ......
Страница 272: ......
Страница 286: ......
Страница 290: ......
Страница 310: ......
Страница 328: ......
Страница 352: ......
Страница 358: ......
Страница 362: ......
Страница 374: ......
Страница 376: ......
Страница 394: ......
Страница 398: ......
Страница 400: ......
Страница 410: ......
Страница 444: ......
Страница 452: ......