Symantec 360R Administration Guide - Page 115

Preventing attacks, How intrusion detection and prevention works

Page 115 highlights

8 Chapter Preventing attacks This chapter includes the following topics: ■ How intrusion detection and prevention works ■ Setting protection preferences ■ Enabling advanced protection settings The Symantec Gateway Security 300 series appliance provides intrusion detection and prevention services (IDS and IPS). The IDS and IPS functions are enabled by default, and provide atomic packet protection. You may disable IDS and IPS functionality at any time. Note: An atomic IDS and IPS signature is defined as a signature based on a single IP packet. How intrusion detection and prevention works The appliance defends against and logs fragmentation attacks, IP option attacks, buffer overflow attacks, port scans, oversize packet spoof, and flood attacks. Any traffic arriving on the inside or outside the unit with an uncommon set of IP options settings is blocked. IDS/IPS logs events which are identified in the Status screen. WAN-side IDS/IPS logging is enabled by default. If IDS logging is disabled, the appliance still blocks any connection attempt to an unauthorized service for inbound connections. However, when the Trojan horse lookup service is disabled, and only an access denied message is logged. The number of log messages that are tracked depends on the attack type. Unlimited management login attempts are logged. Attack logging is limited to

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

Chapter
8
Preventing attacks
This chapter includes the following topics:
How intrusion detection and prevention works
Setting protection preferences
Enabling advanced protection settings
The Symantec Gateway Security 300 series appliance provides intrusion
detection and prevention services (IDS and IPS). The IDS and IPS functions are
enabled by default, and provide atomic packet protection. You may disable IDS
and IPS functionality at any time.
Note:
An atomic IDS and IPS signature is defined as a signature based on a single
IP packet.
How intrusion detection and prevention works
The appliance defends against and logs fragmentation attacks, IP option
attacks, buffer overflow attacks, port scans, oversize packet spoof, and flood
attacks.
Any traffic arriving on the inside or outside the unit with an uncommon set of IP
options settings is blocked.
IDS/IPS logs events which are identified in the Status screen. WAN-side IDS/IPS
logging is enabled by default. If IDS logging is disabled, the appliance still blocks
any connection attempt to an unauthorized service for inbound connections.
However, when the Trojan horse lookup service is disabled, and only an access
denied message is logged.
The number of log messages that are tracked depends on the attack type.
Unlimited management login attempts are logged. Attack logging is limited to