Cisco SA520-K9 Administration Guide - Page 118

Configuring Attack Checks, Configuring Firewall Rules to Control Inbound

Page 118 highlights

Firewall Configuration Using Other Tools to Prevent Attacks, Restrict Access, and Control Inbound Traffic 4 Configuring Attack Checks Use this page to specify how you want to protect your network against common types of attacks including discovery, flooding, and echo storms. STEP 1 Click Firewall > Attacks. The Attack Checks window opens. STEP 2 In the WAN Security Checks area, check the box for each feature that you want to enable: • Block Ping to WAN interface: Check this box to prevent attackers from discovering your network through ICMP Echo (ping) requests. Cisco recommends that you uncheck this box only if you need to allow the security appliance to respond to pings for diagnostic purposes. This setting is overridden in these cases: - A firewall rule that directs ping requests to a particular computer on the LAN. See Configuring Firewall Rules to Control Inbound and Outbound Traffic, page 103. - WAN Mode settings that ping specified IP addresses for failure detection. See Configuring Auto-Rollover, Load Balancing, and Failure Detection, page 57. • Enable Stealth Mode: Check this box to prevent the security appliance from responding to port scans from the WAN. In Stealth Mode, your network is less susceptible to discovery and attacks. • Block TCP Flood: Check this box to drop all invalid TCP packets. This feature protects your network from a SYN flood attack, in which an attacker sends a succession of SYN (synchronize) requests to a target system. STEP 3 In the LAN Security Checks section, check the Block UDP Flood box to prevent the security appliance from accepting more than 25 simultaneous, active UDP connections from a single computer on the LAN. STEP 4 In the ICSA Settings area, enter the following information: • Block ICMP Notification: Check this box to silently block without sending an ICMP notification to the sender. Some protocols, such as MTU Path Discovery, require ICMP notifications. • Block Fragmented Packets: Check this box to block fragmented packets from ANY to ANY. • Block Multicast Packets: Check this box to block multicast packets. Cisco SA500 Series Security Appliances Administration Guide 118

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Firewall Configuration
Using Other Tools to Prevent Attacks, Restrict Access, and Control Inbound Traffic
Cisco SA500 Series Security Appliances Administration Guide
118
4
Configuring Attack Checks
Use this page to specify how you want to protect your network against common
types of attacks including discovery, flooding, and echo storms.
STEP 1
Click
Firewall
> Attacks
. The
Attack Checks
window opens.
STEP 2
In the
WAN Security Checks
area, check the box for each feature that you want to
enable:
Block Ping to WAN interface:
Check this box to prevent attackers from
discovering your network through ICMP Echo (ping) requests. Cisco
recommends that you uncheck this box only if you need to allow the security
appliance to respond to pings for diagnostic purposes.
This setting is overridden in these cases:
-
A firewall rule that directs ping requests to a particular computer on the
LAN. See
Configuring Firewall Rules to Control Inbound and
Outbound Traffic, page 103
.
-
WAN Mode settings that ping specified IP addresses for failure
detection. See
Configuring Auto-Rollover, Load Balancing, and Failure
Detection, page 57
.
Enable Stealth Mode:
Check this box to prevent the security appliance from
responding to port scans from the WAN. In Stealth Mode, your network is
less susceptible to discovery and attacks.
Block TCP Flood:
Check this box to drop all invalid TCP packets. This
feature protects your network from a SYN flood attack, in which an attacker
sends a succession of SYN (synchronize) requests to a target system.
STEP
3
In the
LAN Security Checks
section, check the
Block UDP Flood
box to prevent
the security appliance from accepting more than 25 simultaneous, active UDP
connections from a single computer on the LAN.
STEP 4
In the
ICSA Settings
area, enter the following information:
Block ICMP Notification:
Check this box to silently block without sending an
ICMP notification to the sender. Some protocols, such as MTU Path
Discovery, require ICMP notifications.
Block Fragmented Packets:
Check this box to block fragmented packets
from ANY to ANY.
Block Multicast Packets:
Check this box to block multicast packets.