ZyXEL GS-105I User Guide - Page 205

DoS Settings

Page 205 highlights

Chapter 16 Firewall Table 80 Access Control: Add/Edit (continued) LABEL DESCRIPTION Select Destination Device Destination IP Address IP Type Select Service Select the destination device to which the ACL rule applies. If you select Specific IP Address, enter the destiniation IP address in the field below. Enter the destination IP address. Select whether your IP type is IPv4 or IPv6. Select the transport layer protocol that defines your customized port from the drop-down list box. The specific protocol rule sets you add in the Security > Firewall > Protocol > Add screen display in this list. Protocol If you want to configure a customized protocol, select Specific Service. This field is displayed only when you select Specific Service in Select Service. Custom Source Port Choose the IP port (TCP/UDP, TCP, UDP, ICMP, or ICMPv6) that defines your customized port from the drop-down list box. This field is displayed only when you select Specific Service in Select Service and have either TCP or UDP in the Protocol field. Custom Destination Port Enter a single port number or the range of port numbers of the source. This field is displayed only when you select Specific Service in Select Service and have either TCP or UDP in the Protocol field. TCP flag Enter a single port number or the range of port numbers of the destination. This field is displayed only when you select Specific Service in Select Service and have TCP in the Protocol field. Type Select one of the following TCP flags: SYN (Synchronize), ACK (Acknowledge), URG (Urgent), PSH (Push), RST (Reset), or FIN (Finished). This field is displayed only when you select Specific Service in Select Service and ICMPv6 in the protocol field. Policy Direction Enable Rate Limit From the drop-down list box, select which ICMPv6 type you would like to use. Use the drop-down list box to select whether to discard (DROP), deny and send an ICMP destination-unreachable message to the sender of (REJECT) or allow the passage of (ACCEPT) packets that match this rule. Use the drop-down list box to select the direction of traffic to which this rule applies. Select this check box to set a limit on the upstream/downstream transmission rate for the specified protocol. Scheduler Rules Cancel OK Specify how many packets per minute or second the transmission rate is. Select a schedule rule for this ACL rule form the drop-down list box. You can configure a new schedule rule by click Add New Rule. This will bring you to the Security > Scheduler Rules screen. Click Cancel to exit this screen without saving. Click OK to save your changes. 16.5 DoS Settings DoS (Denial of Service) attacks can flood your Internet connection with invalid packets and connection requests, using so much bandwidth and so many resources that Internet access becomes unavailable. Use the DoS screen to activate protection against DoS attacks. Click Security > Firewall > DoS to display the following screen. PX7511-B0 User's Guide 205

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339

Chapter 16 Firewall
PX7511-B0 User’s Guide
205
16.5
DoS Settings
DoS (Denial of Service) attacks can flood your Internet connection with invalid packets and connection
requests, using so much bandwidth and so many resources that Internet access becomes unavailable.
Use the
DoS
screen to activate protection against DoS attacks. Click
Security > Firewall > DoS
to display
the following screen.
Select
Destination
Device
Select the destination device to which the ACL rule applies. If you select
Specific IP Address
,
enter the destiniation IP address in the field below.
Destination IP
Address
Enter the destination IP address.
IP Type
Select whether your IP type is
IPv4
or
IPv6
.
Select Service
Select the transport layer protocol that defines your customized port from the drop-down list
box. The specific protocol rule sets you add in the
Security > Firewall > Protocol > Add
screen
display in this list.
If you want to configure a customized protocol, select
Specific Service
.
Protocol
This field is displayed only when you select
Specific Service
in
Select Service
.
Choose the IP port (
TCP/UDP
,
TCP
,
UDP
,
ICMP
, or
ICMPv6
) that defines your customized port from
the drop-down list box.
Custom Source
Port
This field is displayed only when you select
Specific Service
in
Select Service
and have either
TCP
or
UDP
in the
Protocol
field.
Enter a single port number or the range of port numbers of the source.
Custom
Destination Port
This field is displayed only when you select
Specific Service
in
Select Service
and have either
TCP
or
UDP
in the
Protocol
field.
Enter a single port number or the range of port numbers of the destination.
TCP flag
This field is displayed only when you select
Specific Service
in
Select Service
and have
TCP
in the
Protocol
field.
Select one of the following TCP flags:
SYN
(Synchronize),
ACK
(Acknowledge),
URG
(Urgent),
PSH
(Push),
RST
(Reset), or
FIN
(Finished).
Type
This field is displayed only when you select
Specific Service
in
Select Service
and
ICMPv6
in the
protocol field.
From the drop-down list box, select which ICMPv6 type you would like to use.
Policy
Use the drop-down list box to select whether to discard (
DROP
), deny and send an ICMP
destination-unreachable message to the sender of (
REJECT
) or allow the passage of (
ACCEPT
)
packets that match this rule.
Direction
Use the drop-down list box to select the direction of traffic to which this rule applies.
Enable Rate
Limit
Select this check box to set a limit on the upstream/downstream transmission rate for the
specified protocol.
Specify how many packets per minute or second the transmission rate is.
Scheduler Rules
Select a schedule rule for this ACL rule form the drop-down list box. You can configure a new
schedule rule by click
Add New Rule
. This will bring you to the
Security > Scheduler Rules
screen.
Cancel
Click
Cancel
to exit this screen without saving.
OK
Click
OK
to save your changes.
Table 80
Access Control: Add/Edit (continued)
LABEL
DESCRIPTION