Netgear FS728TPv2 FS728TP Software Administration Manual - Page 40

Denial of Service, Refresh, SIP=DIP, First Fragment, TCP Fragment, TCP Flag, L4 Port

Page 40 highlights

FS728TP Smart Switch Software Administration Manual Field Address Last Update Time Description Specifies all the existing Server Addresses. If no Server configuration exists, a message saying "No SNTP server exists" flashes on the screen. Specifies the local date and time (UTC) that the response from this server was used to update the system clock. Last Attempt Time Last Attempt Status Requests Failed Requests Specifies the local date and time (UTC) that this SNTP server was last queried. Specifies the status of the last SNTP request to this server. If no packet has been received from this server, a status of Other is displayed: • Other: None of the following enumeration values. • Success: The SNTP operation was successful and the system time was updated. • Request Timed Out: A directed SNTP request timed out without receiving a response from the SNTP server. • Bad Date Encoded: The time provided by the SNTP server is not valid. • Version Not Supported: The SNTP version supported by the server is not compatible with the version supported by the client. • Server Unsynchronized: The SNTP server is not synchronized with its peers. This is indicated via the 'leap indicator' field on the SNTP message. • Server Kiss Of Death: The SNTP server indicated that no further queries were to be sent to this server. This is indicated by a stratum field equal to 0 in a message received from a server. Specifies the number of SNTP requests made to this server since last agent reboot. Specifies the number of failed SNTP requests made to this server since last reboot. Click Refresh to refresh the page with the most current data from the switch. Denial of Service Use the Denial of Service (DoS) page to configure DoS control. The FS728TP Smart Switch software provides support for classifying and blocking specific types of DoS attacks. You can configure your system to monitor and block six types of attacks: • SIP=DIP: Source IP address = Destination IP address. • First Fragment: TCP Header size is smaller than the configured value. • TCP Fragment: IP Fragment Offset = 1. • TCP Flag: TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP Sequence Number = 0 or TCP Flags FIN, URG, and PSH set and TCP Sequence Number = 0 or TCP Flags SYN and FIN set. • L4 Port: Source TCP/UDP Port = Destination TCP/UDP Port. • ICMP: Limiting the size of ICMP Ping packets. 40 | Chapter 2: Configuring System Information

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

40
|
Chapter 2:
Configuring System Information
FS728TP Smart Switch Software Administration Manual
Click
Refresh
to refresh the page with the most current data from the switch.
Denial of Service
Use the Denial of Service (DoS) page to configure DoS control. The FS728TP Smart Switch
software provides support for classifying and blocking specific types of DoS attacks. You can
configure your system to monitor and block six types of attacks:
SIP=DIP
: Source IP address = Destination IP address.
First Fragment
: TCP Header size is smaller than the configured value.
TCP Fragment
: IP Fragment Offset = 1.
TCP Flag
: TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP
Sequence Number = 0 or TCP Flags FIN, URG, and PSH set and TCP Sequence
Number
=
0 or TCP Flags SYN and FIN set.
L4 Port
: Source TCP/UDP Port = Destination TCP/UDP Port.
ICMP
: Limiting the size of ICMP Ping packets.
Field
Description
Address
Specifies all the existing Server Addresses. If no Server configuration exists, a
message saying “No SNTP server exists” flashes on the screen.
Last Update Time
Specifies the local date and time (UTC) that the response from this server was
used to update the system clock.
Last Attempt Time
Specifies the local date and time (UTC) that this SNTP server was last queried.
Last Attempt Status
Specifies the status of the last SNTP request to this server. If no packet has been
received from this server, a status of Other is displayed:
Other
: None of the following enumeration values.
Success
: The SNTP operation was successful and the system time was
updated.
Request Timed Out
: A directed SNTP request timed out without receiving a
response from the SNTP server.
Bad Date Encoded
: The time provided by the SNTP server is not valid.
Version Not Supported
: The SNTP version supported by the server is not
compatible with the version supported by the client.
Server Unsynchronized
: The SNTP server is not synchronized with its
peers. This is indicated via the 'leap indicator' field on the SNTP message.
Server Kiss Of Death
: The SNTP server indicated that no further queries
were to be sent to this server. This is indicated by a stratum field equal to 0 in
a message received from a server.
Requests
Specifies the number of SNTP requests made to this server since last agent
reboot.
Failed Requests
Specifies the number of failed SNTP requests made to this server since last
reboot.