Netgear FVG318v1 FVG318 Reference Manual - Page 71

Attack Checks, Apply

Page 71 highlights

ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual . Note: For security, NETGEAR strongly recommends that you avoid using the Default DMZ Server feature. When a computer is designated as the Default DMZ Server, it loses much of the protection of the firewall, and is exposed to many exploits from the Internet. If compromised, the computer can be used to attack your network. Attack Checks The Attack Check screen allows you to specify if the router should be protected against common attacks from the LAN and WAN networks. The various types of attack checks are defined below. To access the Attack Check screen: 1. Select Security > Firewall Rules and click the Attack Checks tab. The Attack Checks screen will display. 2. Select the Attack Check types you want to enable. Descriptions of the various Attack Check types are described in the following table. 3. Click Apply to save your settings. Attack Check Type WAN Security Checks Respond to Ping On Internet Port Enable Stealth Mode Block TCP Flood LAN Security Checks Block UDP Flood Description To configure the router to respond to an ICMP Echo (ping) packet coming in from the WAN side, check this box. This setting is usually used as a diagnostic tool for connectivity problems. It is recommended that the option be disabled at other times to prevent hackers from easily discovering the router via a ping. If Stealth Mode is enabled, the router will not respond to port scans from the WAN, which makes it less susceptible to discovery and attacks. If this option is enabled, the router will drop all invalid TCP packets and be protected protect from a SYN flood attack. If this option is enabled, the router will not accept more than 20 simultaneous, active UDP connections from a single computer on the LAN. Firewall Protection and Content Filtering v1.0, September 2007 4-11

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176

ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
Firewall Protection and Content Filtering
4-11
v1.0, September 2007
.
Attack Checks
The Attack Check screen allows you to specify if the router should be protected against common
attacks from the LAN and WAN networks. The various types of attack checks are defined below.
To access the Attack Check screen:
1.
Select Security > Firewall Rules and click the
Attack Checks
tab. The Attack Checks screen
will display.
2.
Select the Attack Check types you want to enable. Descriptions of the various Attack Check
types are described in the following table.
3.
Click
Apply
to save your settings.
Note:
For security, NETGEAR strongly recommends that you avoid using the Default
DMZ Server feature. When a computer is designated as the Default DMZ Server, it
loses much of the protection of the firewall, and is exposed to many exploits from
the Internet. If compromised, the computer can be used to attack your network.
Attack Check Type
Description
WAN Security Checks
Respond to Ping On
Internet Port
To configure the router to respond to an ICMP Echo (ping) packet coming
in from the WAN side, check this box. This setting is usually used as a
diagnostic tool for connectivity problems. It is recommended that the
option be disabled at other times to prevent hackers from easily
discovering the router via a ping.
Enable Stealth Mode
If Stealth Mode is enabled, the router will not respond to port scans from
the WAN, which makes it less susceptible to discovery and attacks.
Block TCP Flood
If this option is enabled, the router will drop all invalid TCP packets and be
protected protect from a SYN flood attack.
LAN Security Checks
Block UDP Flood
If this option is enabled, the router will not accept more than 20
simultaneous, active UDP connections from a single computer on the
LAN.