Asus SL1000 User Manual - Page 80

Configuring DoS Settings

Page 80 highlights

Chapter 9. Configuring Firewall/NAT Settings Internet Security Router User's Manual 5. Click on the button to create the new service. The new service will then be displayed in the service list table at the bottom half of the Service Configuration page. 9.6.2.4 Modify a Service To modify a service, follow the instructions below: 1. Open the Service List Configuration Page (see section 9.6.2.2 Access Service List Configuration Page). 2. Select the service from the service drop-down list or click on the icon of the service to be modified in the service list table. 3. Make desired changes to any or all of the following fields: service name, public port and protocol. Please see Table 9.5 for explanation of these fields. 4. Click on the button to modify this service. The new settings for this service will then be displayed in the service list table at the bottom half of the Service Configuration page. 9.6.2.5 Delete a Service To delete a service, follow the instructions below: 1. Open the Service List Configuration Page (see section 9.6.2.2 Access Service List Configuration Page). 2. Select the service from the service drop-down list or click on the icon of the service to be modified in the service list table. 3. Click on the button to delete this service. Note that the service deleted will be removed from the service list table located at the bottom half of the same configuration page. 9.6.2.6 View Configured Services To see a list of existing services, follow the instructions below: 1. Open the Service List Configuration Page (see section 9.6.2.2 Access Service List Configuration Page). 2. The service list table located at the bottom half of the Service Configuration page shows all the configured services. 9.6.3 Configuring DoS Settings The Internet Security Router has a proprietary Attack Defense Engine that protects internal networks from Denial of Service (DoS) attacks such as SYN flooding, IP smurfing, LAND, Ping of Death and all re-assembly attacks. It can drop ICMP redirects and IP loose/strict source routing packets. For example, a security device with the Internet Security Router Firewall provides protection from "WinNuke", a widely used program to remotely crash unprotected Windows systems in the Internet. The Internet Security Router Firewall also provides protection from a variety of common Internet attacks such as IP Spoofing, Ping of Death, Land Attack, Reassembly and SYN flooding. For a complete list of DoS protection provided by the Internet Security Router, please see Table 2.3. 9.6.3.1 DoS Protection Configuration Parameters Table 9.6 describes the configuration parameters available for DoS Protection. Table 9.6. DoS Protection Configuration Parameters Field SYN Flooding Description Check or un-check this option to enable or disable protection against SYN Flood attacks. This attack involves sending connection requests to a server, but never fully completing the connections. This will cause some computers 64

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167

Chapter 9. Configuring Firewall/NAT Settings
Internet Security Router User
s Manual
64
5. Click on the
button to create the new service. The new service will then be displayed in
the service list table at the bottom half of the Service Configuration page.
9.6.2.4
Modify a Service
To modify a service, follow the instructions below:
1.
Open the Service List Configuration Page (see section 9.6.2.2 Access Service List Configuration
Page).
2.
Select the service from the service drop-down list or click on the
icon of the service to be
modified in the service list table.
3.
Make desired changes to any or all of the following fields: service name, public port and protocol.
Please see Table 9.5 for explanation of these fields.
4. Click on the
button to modify this service. The new settings for this service will then be
displayed in the service list table at the bottom half of the Service Configuration page.
9.6.2.5
Delete a Service
To delete a service, follow the instructions below:
1.
Open the Service List Configuration Page (see section 9.6.2.2 Access Service List Configuration
Page).
2.
Select the service from the service drop-down list or click on the
icon of the service to be
modified in the service list table.
3. Click on the
button to delete this service. Note that the service deleted will be removed
from the service list table located at the bottom half of the same configuration page.
9.6.2.6
View Configured Services
To see a list of existing services, follow the instructions below:
1.
Open the Service List Configuration Page (see section 9.6.2.2 Access Service List Configuration
Page).
2.
The service list table located at the bottom half of the Service Configuration page shows all the
configured services.
9.6.3
Configuring DoS Settings
The Internet Security Router has a proprietary Attack Defense Engine that protects internal networks from
Denial of Service (DoS) attacks such as SYN flooding, IP smurfing, LAND, Ping of Death and all re-assembly
attacks. It can drop ICMP redirects and IP loose/strict source routing packets. For example, a security device
with the Internet Security Router Firewall provides protection from
WinNuke
, a widely used program to
remotely crash unprotected Windows systems in the Internet. The Internet Security Router Firewall also
provides protection from a variety of common Internet attacks such as IP Spoofing, Ping of Death, Land Attack,
Reassembly and SYN flooding. For a complete list of DoS protection provided by the Internet Security Router,
please see Table 2.3.
9.6.3.1
DoS Protection Configuration Parameters
Table 9.6 describes the configuration parameters available for DoS Protection.
Table 9.6. DoS Protection Configuration Parameters
Field
Description
SYN Flooding
Check or un-check this option to enable or disable protection against SYN
Flood attacks. This attack involves sending connection requests to a server,
but never fully completing the connections. This will cause some computers