D-Link DFL-800-AV-12 User Manual - Page 202

Blacklisting Hosts and Networks, Certain NetDefendOS modules

Page 202 highlights

6.7. Blacklisting Hosts and Networks Chapter 6. Security Mechanisms 6.7. Blacklisting Hosts and Networks NetDefendOS implements a Blacklist of host or network IP addresses which can be utilized to protect against traffic coming from specific Internet sources. Certain NetDefendOS modules, specifically the Intrusion Detection and Prevention (IDP) module, as well as Threshold Rules, can make use of the Blacklist when certain conditions are encountered, such as traffic triggering a Threshold Limit rule. Adding a host or network to the Blacklist can be enabled in IDP and in Threshold Rules by specifying the Protect action for when a rule is triggered. Once enabled there are three Blacklisting options: Time to Block Host/Network in seconds Block only this Service Exempt already established connections from Blacklisting The host or network which is the source of the traffic will stay on the blacklist for the specified time and then be removed. If the same source triggers another entry to the blacklist then the blocking time is renewed to its original, full value (in other words, it is not cumulative). By default Blacklisting blocks all Services for the triggering host. If there are established connections that have the same source as this new Blacklist entry then they won't be dropped if this option is set. IP addresses or networks are added to the list and the traffic from these sources is then blocked for a period of time. The Blacklist is maintained even if the D-Link Firewall shuts down or reboots. Whitelisting To ensure that "good" Internet traffic sources are not blacklisted under any circumstances, a Whitelist is also maintained by NetDefendOS. Tip It is advisable to add the D-Link Firewall itself to the Whitelist as well as the IP addresses of the management workstation. It is important to understand that although whitelisting prevents a source of network traffic being blacklisted, it still doesn't mechanisms such as Threshold Rules from dropping or denying connections from that source. All whitelisting does is prevent a source being added to a blacklist if that is the action a rule has specified. For further details on usage see Section 6.5.7, "IDP Actions", Section 10.2.8, "Threshold Rule Blacklisting" and Section 10.2, "Threshold Rules". Note Content filtering blacklisting is a separate subject and uses a separate logical list (see Section 6.3, "Web Content Filtering"). 202

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

6.7. Blacklisting Hosts and Networks
NetDefendOS implements a
Blacklist
of host or network IP addresses which can be utilized to
protect against traffic coming from specific Internet sources.
Certain NetDefendOS modules, specifically the Intrusion Detection and Prevention (IDP) module,
as well as Threshold Rules, can make use of the Blacklist when certain conditions are encountered,
such as traffic triggering a Threshold Limit rule.
Adding a host or network to the Blacklist can be enabled in IDP and in Threshold Rules by
specifying the
Protect
action for when a rule is triggered. Once enabled there are three Blacklisting
options:
Time to Block Host/Network in
seconds
The host or network which is the source of the traffic will
stay on the blacklist for the specified time and then be
removed. If the same source triggers another entry to the
blacklist then the blocking time is renewed to its original, full
value (in other words, it is not cumulative).
Block only this Service
By default Blacklisting blocks all Services for the triggering
host.
Exempt already established
connections from Blacklisting
If there are established connections that have the same source
as this new Blacklist entry then they won't be dropped if this
option is set.
IP addresses or networks are added to the list and the traffic from these sources is then blocked for a
period of time. The Blacklist is maintained even if the D-Link Firewall shuts down or reboots.
Whitelisting
To ensure that "good" Internet traffic sources are not blacklisted under any circumstances, a
Whitelist
is also maintained by NetDefendOS.
Tip
It is advisable to add the D-Link Firewall itself to the Whitelist as well as the IP
addresses of the management workstation.
It is important to understand that although whitelisting prevents a source of network traffic being
blacklisted, it still doesn't mechanisms such as Threshold Rules from dropping or denying
connections from that source. All whitelisting does is prevent a source being added to a blacklist if
that is the action a rule has specified.
For further details on usage see Section 6.5.7, “IDP Actions”, Section 10.2.8, “Threshold Rule
Blacklisting” and Section 10.2, “Threshold Rules”.
Note
Content filtering blacklisting is a separate subject and uses a separate logical list (see
Section 6.3, “Web Content Filtering”).
6.7. Blacklisting Hosts and Networks
Chapter 6. Security Mechanisms
202