Billion Electric Company BIPAC-7500G user manual Intrusion Detection, Block Duration

Page 65
Intrusion Detection

Billion BIPAC-7500G–802.11g ADSL VPN Firewall Router with 3DES Accelerator

Intrusion Detection

The router’s Intrusion Detection System (IDS) is used to detect hacker attacks and intrusion attempts from the Internet. If the IDS function of the firewall is enabled, inbound packets are filtered and blocked depending on whether they are detected as possible hacker attacks, intrusion attempts or other connections that the router determines to be suspicious.

Blacklist: If the router detects a possible attack, the source IP or destination IP address will be added to the Blacklist. Any further attempts using this IP address will be blocked for the time period specified as the Block Duration. The default setting for this function is false (disabled). Some attack types are denied immediately without using the Blacklist function, such as Land attack and Echo/CharGen scan.

Block Duration:

DoS Attack Block Duration: This is the duration for blocking hosts that attempt a possible Denial of Service (DoS) attack. Possible DoS attacks this attempts to block include Ascend Kill and WinNuke. Default value is 1800 seconds.

Scan Attack Block Duration: This is the duration for blocking hosts that attempt a possible Scan attack. Scan attack types include X’mas scan, IMAP SYN/FIN scan and similar attempts. Default value is 86400 seconds.

Victim Protection Block Duration: This is the duration for blocking Smurf attacks. Default value is 600 seconds.

Victim Protection: If enabled, IDS will block Smurf attack attempts. Default is false.

Max TCP Open Handshaking Count: This is a threshold value to decide whether a SYN Flood attempt is occurring or not. Default value is 100 TCP SYN per seconds.

61

Chapter 4: Configuration

Image 65
Contents 802.11g ADSL VPN Firewall Router with 3DES Accelerator User’s Manual Version Release 1.10eBIPAC-7500G Page CHAPTER 2 INSTALLING THE ROUTER Table of ContentsCHAPTER 3 BASIC INSTALLATION CHAPTER 4 CONFIGURATIONCONTACT INFORMATION CHAPTER 5 TROUBLESHOOTINGAPPENDIX A PRODUCT SUPPORT AND S AVE C ONFIGURATION TO F LASHWireless Ethernet 802.11g FeaturesFast Ethernet Switch Quick Installation WizardNetwork Address Translation NAT Universal Plug and Play UPnP and UPnP NAT TraversalFirewall Domain Name System DNS relayFirmware Upgradeable Dynamic Host Configuration Protocol DHCP client and serverStatic and RIP1/2 Routing Simple Network Management Protocol SNMPFigure 1.1 Application Diagram BIPAC-7500G ADSL Router ApplicationImportant note for using the BIPAC-7500G ADSL Router Chapter 2 Installing the RouterPackage Contents Meaning The Front LEDs1 PWR 2 SYS 3 LAN port 4 LAN port 5 LAN port 6 LAN port 7 WLAN 10 MAIL 11 PPP 13 ADSLThe Rear Ports RESET PWR Power SwitchPort LINE CONSOLE LANCabling Connecting your router Chapter 3 Basic InstallationFor Windows XP Configuring PCs in Windows2. Double-click Local Area Connection. See Figure 4. Select Internet Protocol TCP/IP and click Properties. See FigureDouble-click Local Area “LAN” Connection . See For WindowsIn the LAN Area Connection Status window, click Properties . See Figure3. Click Properties 5. Then select the DNS Configuration tab. See FigureFor Windows 98 / ME 2. Select TCP/IP Protocol and click Properties. See For Windows NT4.03. Select the Obtain an IP address from a DHCP server Figure 3.12 TCP / IPUsername and Password Factory Default SettingsLAN Device IP Settings ISP setting in WAN sitePPPoE PPPoA RFC1483 Bridged RFC1483 Routed IPoA Information from your ISPFigure 3.14 User namd & Password Prompt Widonw Configuring with your Web BrowserQuick Start Chapter 4 ConfigurationSave Config to FLASH ARP Table StatusRIP Routing Table Routing TableRouting Table Leased Table DHCP TableExpired Table Permanent TablePPTP Status IPSec Status Email Status L2TP StatusUPnP Portmap Error LoggingEvent Log Quick Start Click Start to begin scanning for encapsulation types offered by your ISP. If the scan is successful you will then be presented with a list of supported options LAN Local Area Network ConfigurationEthernet LAN, WAN, System, Firewall, VPN, QoS, Virtual Server and AdvancedESSID Broadcast WirelessWPA Pre-Shared Key Wireless SecurityPage Port Setting DHCP Server the requesting PC in the LAN your Local Area Network WAN Wide Area Network RFC 1483 Routed Connections PPPoE Connections Connection Advanced Options PPPoEdiscovered the DNS server IP address, it automatically gives the address to the local DNS relay so that a connection can be established All Ip Pppoe RFC 1483 Bridged ConnectionsPPPoA Routed Connections Advanced Options PPPoA Chapter 4 Configuration IPoA Routed Connections Page ADSL Time Zone SystemRemote Access Firmware Upgrade Backup / Restore Restart Router User Management Firewall and Access Control URL Filter To block PCs on your local network from unwanted websites General Settings Packet Filter Table 1 Pre-defined Port Filter Port FiltersAddress Filters Click Port Filters Configuring Packet Filter4. Click Add TCP Filter Click DeleteClick Add TCP Filter Input HTTP port number Select “Allow”HTTP inbound & outbound application Block Duration Intrusion DetectionIntrusion Name Detect Parameter Blacklist Table 2 Hacker attack types recognized by the IDSType of Block Duration Drop PacketMAC Address Filter URL Filter Restrict URL Features Log information can be seen in the Status - Event Log after enabling Firewall LogPPTP VPN Virtual Private NetworksRemote Access PPTP Connection Click Apply after changing settings LAN to LAN PPTP Connection Click Apply after changing settings Click Create to configure a new IPSec VPN connection IPSecLocal Configure a new VPN ConnectionRemote ProposalMD5 A one-way hashing algorithm that produces a 128−bit hash Advanced Option L2TP Remote Access L2TP Connection MD5 A one-way hashing algorithm that produces a 128−bit hash LAN to LAN L2TP Connection IPSec Enable for enhancing your LT2P VPN security Configuring PPTP VPN in the Office Example Configuring a Remote Access PPTP VPN Dial-in ConnectionFunction DescriptionAuto stateful Key Length Mode Idle TimeConfiguring the PPTP VPN in the Office Example Configuring a Remote Access PPTP VPN Dial-out Connectionstateful Mode Idle TimeExample Configuring a LAN-to-LAN PPTP VPN Connection Configuring PPTP VPN in the Head Office Configuring PPTP VPN in the Branch Office Table 3 Network Configuration and Security Plan Example Configuring a IPSec LAN-to-LAN PPTP VPN Connection192.168.0.0/24 69.1.121.30 192.168.1.0/24 69.1.121.3 12345678 Tunnel mode ESPMD5 with AESWAN side Configuring IPSec VPN in the Head OfficeIP address of the head office router in Configuring IPSec VPN in the Branch Office QoS Quality of Service High PrioritizationIP Throttling Port Number Protocol Virtual Server “Port Forwarding”Table 4 Well-know and registered Ports POP3 Post Office Protocol Version TCP or UDP, however you can specify other protocols using the drop-down Protocol menu. Setting the protocol to “all” will cause all incoming connection attempts using all protocols on all port numbers to be forwarded to the specified IP address Static Routing AdvancedDynamic DNS Check Emails Embedded Web Server Device ManagementSNMP Universal Plug and Play UPnPSNMP V1 and From RFC 1213 MIB-II SNMP Version SNMPv2c and SNMPv3From RFC1650 EtherLike-MIB From RFC 1493 Bridge MIBFrom RFC 1473 PPP/IP MIB From RFC 1472 PPP/Security MIBFrom RFC 1474 PPP/Bridge MIB From RFC1573 IfMIBSave Configuration to Flash Logout Problems starting up the router Chapter 5 TroubleshootingProblems with the WAN Interface ProblemCan’t ping any PCs on the LAN Problems with the LAN InterfaceFrequent loss of ADSL linesync disconnections WORLDWIDE APPENDIX A Product Support and Contact InformationContact Billion AUSTRALIA