D-Link DFL-2500 User Guide - Page 66

SYN flood protection SYN Relay, Application Layer Gateway ALG

Page 66 highlights

8.2. Services 47 a good idea, since it may cause the protected network vulnerable to many types of attacks, e.g. DoS (Denial of Service) in particular. To solve this problem, D-Link firewalls can be configured to pass an ICMP error message only if it is related to an existing connection of a service. SYN flood protection (SYN Relay) A mechanism called "SYN Relay" can be enabled in the firewall to protect the destination addresses used by a service from SYN flooding. The SYN flood attack is launched by sending TCP connection requests faster than a machine can process them. The attacker sends SYN request to a server with spoofed source address, which will never reply to the server's SYN/ACK. Each SYN request fills in a new TCP connection into the server's connection table; when all the connections in the table are waiting for relies and the table is full, the server will not accept any new coming request. The requests from legitimate users are then ignored. The "SYN Relay" mechanism counters the attacks by hiding the protected sever behind the firewall. The firewall receives SYN request and makes sure that the connection is valid (that is, the SYN/ACK can be replied from the source) before sending a SYN packet to the server. If after a certain time, no ACK is received by the firewall, the connection is aborted. Application Layer Gateway (ALG) An application layer gateway can be specified to handle different services. More information can be found in 18 Application Layer Gateway (ALG). For an ALG enabled service, the maximum numbers of sessions that are permitted by using this service can be defined. D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

8.2. Services
47
a good idea, since it may cause the protected network vulnerable to many
types of attacks, e.g. DoS (Denial of Service) in particular.
To solve this problem, D-Link firewalls can be configured to pass an ICMP
error message only if it is related to an existing connection of a service.
SYN flood protection (SYN Relay)
A mechanism called ”SYN Relay” can be enabled in the firewall to protect
the destination addresses used by a service from SYN flooding.
The SYN flood attack is launched by sending TCP connection requests
faster than a machine can process them. The attacker sends SYN request
to a server with spoofed source address, which will never reply to the
server’s SYN/ACK. Each SYN request fills in a new TCP connection into
the server’s connection table; when all the connections in the table are
waiting for relies and the table is full, the server will not accept any new
coming request. The requests from legitimate users are then ignored.
The ”SYN Relay” mechanism counters the attacks by hiding the protected
sever behind the firewall. The firewall receives SYN request and makes sure
that the connection is valid (that is, the SYN/ACK can be replied from the
source) before sending a SYN packet to the server. If after a certain time,
no ACK is received by the firewall, the connection is aborted.
Application Layer Gateway (ALG)
An application layer gateway can be specified to handle different services.
More information can be found in
18 Application Layer Gateway (ALG)
.
For an ALG enabled service, the maximum numbers of sessions that are
permitted by using this service can be defined.
D-Link Firewalls User’s Guide