Netgear FVS336G-100NAS Reference Manual - Page 73

Block UDP flood., Disable Ping Reply on LAN Ports, Disable DNS Proxy, VPN Pass through., Attack Checks

Page 73 highlights

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual - Block UDP flood. A UDP flood is a form of denial of service attack that can be initiated when one machine sends a large number of UDP packets to random ports on a remote host. As a result, the distant host will (1) check for the application listening at that port, (2) see that no application is listening at that port, and (3) reply with an ICMP Destination Unreachable packet. When the victimized system is flooded, it is forced to send many ICMP packets, eventually making it unreachable by other clients. The attacker may also spoof the IP address of the UDP packets, ensuring that the excessive ICMP return packets do not reach him, thus making the attacker's network location anonymous. If flood checking is enabled, the VPN firewall will not accept more than 20 simultaneous, active UDP connections from a single computer on the LAN. - Disable Ping Reply on LAN Ports. To prevent the VPN firewall from responding to Ping requests from the LAN, click this checkbox. - Disable DNS Proxy. Whether DNS Proxy is enabled or disabled in the DHCP server configuration (see "Configuring the LAN Setup Options" on page 3-2), the VPN firewall will service DNS requests sent to its own LAN IP address. To disable this service, check this checkbox. • VPN Pass through. When the VPN firewall is in NAT mode, all packets going to the Remote VPN Gateway are first filtered through NAT and then encrypted per the VPN policy. For example, if a VPN Client or Gateway on the LAN side of this VPN firewall wants to connect to another VPN endpoint on the WAN (placing this VPN firewall between two VPN end points), encrypted packets are sent to this VPN firewall. Since this VPN firewall filters the encrypted packets through NAT, the packets become invalid unless VPN pass through is enabled. When VPN pass through is enabled, the VPN tunnel will pass the VPN traffic without any filtering. Tunnels can be: - IPsec - PPTP - L2TP To enable the appropriate Attack Checks for your environment: 1. Select Security > Firewall Rules from the main menu. 2. Click the Attack Checks tab. The Attack Checks screen is displayed. Firewall Protection and Content Filtering v1.0, October 2007 4-11

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
Firewall Protection and Content Filtering
4-11
v1.0, October 2007
Block UDP flood.
A UDP flood is a form of denial of service attack that can be initiated
when one machine sends a large number of UDP packets to random ports on a remote
host. As a result, the distant host will (1) check for the application listening at that port, (2)
see that no application is listening at that port, and (3) reply with an ICMP Destination
Unreachable packet.
When the victimized system is flooded, it is forced to send many ICMP packets,
eventually making it unreachable by other clients. The attacker may also spoof the IP
address of the UDP packets, ensuring that the excessive ICMP return packets do not reach
him, thus making the attacker’s network location anonymous.
If flood checking is enabled, the VPN firewall will not accept more than 20 simultaneous,
active UDP connections from a single computer on the LAN.
Disable Ping Reply on LAN Ports
. To prevent the VPN firewall from responding to Ping
requests from the LAN, click this checkbox.
Disable DNS Proxy
. Whether DNS Proxy is enabled or disabled in the DHCP server
configuration (see
“Configuring the LAN Setup Options” on page 3-2
), the VPN firewall
will service DNS requests sent to its own LAN IP address. To disable this service, check
this checkbox.
VPN Pass through.
When the VPN firewall is in NAT mode, all packets going to the Remote
VPN Gateway are first filtered through NAT and then encrypted per the VPN policy.
For example, if a VPN Client or Gateway on the LAN side of this VPN firewall wants to
connect to another VPN endpoint on the WAN (placing this VPN firewall between two VPN
end points), encrypted packets are sent to this VPN firewall. Since this VPN firewall filters the
encrypted packets through NAT, the packets become invalid unless VPN pass through is
enabled.
When VPN pass through is enabled, the VPN tunnel will pass the VPN traffic without any
filtering. Tunnels can be:
IPsec
PPTP
L2TP
To enable the appropriate Attack Checks for your environment:
1.
Select Security > Firewall Rules
from the main menu.
2.
Click the
Attack Checks
tab. The
Attack Checks
screen is displayed.