Netgear GS716Tv2 GS716Tv2/GS724Tv3 Software Admin Manual - Page 45

Denial of Service, Refresh, SIP=DIP, First Fragment, TCP Fragment, TCP Flag, L4 Port

Page 45 highlights

GS716Tv2 and GS724Tv3 Software Administration Manual Table 2-6. SNTP Server Status Fields (continued) Field Requests Failed Requests Description Specifies the number of SNTP requests made to this server since last agent reboot. Specifies the number of failed SNTP requests made to this server since last reboot. 2. Click Refresh to refresh the page with the most current data from the switch. Denial of Service Use the Denial of Service (DoS) page to configure DoS control. The GS716T/GS724T software provides support for classifying and blocking specific types of DoS attacks. You can configure your system to monitor and block six types of attacks: • SIP=DIP: Source IP address = Destination IP address. • First Fragment: TCP Header size is smaller than the configured value. • TCP Fragment: IP Fragment Offset = 1. • TCP Flag: TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP Sequence Number = 0 or TCP Flags FIN, URG, and PSH set and TCP Sequence Number = 0 or TCP Flags SYN and FIN set. • L4 Port: Source TCP/UDP Port = Destination TCP/UDP Port. • ICMP: Limiting the size of ICMP Ping packets. To access the Denial of Service page: Configuring System Information v1.0, July 2009 2-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

GS716Tv2 and GS724Tv3 Software Administration Manual
Configuring System Information
2-13
v1.0, July 2009
2.
Click
Refresh
to refresh the page with the most current data from the switch.
Denial of Service
Use the Denial of Service (DoS) page to configure DoS control. The GS716T/GS724T software
provides support for classifying and blocking specific types of DoS attacks. You can configure
your system to monitor and block six types of attacks:
SIP=DIP
: Source IP address = Destination IP address.
First Fragment
: TCP Header size is smaller than the configured value.
TCP Fragment
: IP Fragment Offset = 1.
TCP Flag
: TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP
Sequence Number = 0 or TCP Flags FIN, URG, and PSH set and TCP Sequence Number
=
0
or TCP Flags SYN and FIN set.
L4 Port
: Source TCP/UDP Port = Destination TCP/UDP Port.
ICMP
: Limiting the size of ICMP Ping packets.
To access the
Denial of Service
page:
Requests
Specifies the number of SNTP requests made to this server since last
agent reboot.
Failed Requests
Specifies the number of failed SNTP requests made to this server since
last reboot.
Table
2-6. SNTP Server Status Fields (continued)
Field
Description