NetComm NB712 manual DoS Protection

Page 108

14.16.15 DoS Protection

DoS protection parameters can be configured in dos_protection menu. Move the cursor to dos_protection and press enter.

>>syn_flood icmp_flood udp_flood ping_death land_attack ip_spoff smurf_attack fraggle_attack

Enable protection SYN flood attack Enable protection ICMP flood attack Enable protection UDP flood attack Enable protection ping of death attack Enable protection land attack

Enable protection IP spoofing attack Enable protection smurf attack Enable protection fraggle attack

A SYN flood attack attempts to slow your network by requesting new connections but not completing the process to open the connection. Once the buffer for these pending connections is full a server will not accept any more connections and will be unresponsive.

ICMP Flood: A sender transmits a volume of ICMP request packets to cause all CPU resources to be consumed serving the phony requests.

UDP Flood: A sender transmits a volume of requests for UDP diagnostic services which cause all CPU resources to be consumed serving the phony requests.

A ping of death attack attempts to crash your system by sending a fragmented packet, when reconstructed is larger than the maximum allowable size. Other known variants of the ping of death include teardrop, bonk and nestea.

A land attack is an attempt to slow your network down by sending a packet with identical source and destination addresses originating from your network.

IP Spoofing is a method of masking the identity of an intrusion by making it appeared that the traffic came from a different computer. This is used by intruders to keep their anonymity and can be used in a Denial of Service attack.

A smurf attack involves two systems. The attacker sends a packet containing a ICMP echo request (ping) to the network address of one system. This system is known as the amplifier. The return address of the ping has been faked (spoofed) to appear to come from a machine on another network (the victim). The victim is then flooded with responses to the ping. As many responses are generated for only one attack, the attacker is able use many amplifiers on the same victim.

108

NB712 / NB714 User Guide

 

YML829 Rev1

Image 108
Contents Page Contents NB714 User Guide Features Package ContentsIntroduction Specification RoutingBridging SecurityIndicators ATM QoSAAL5 Encapsulation WAN InterfaceApplication Physical/ElectricalMemory Product InformationFirewall Types of Firewall Packet FilteringThere are three types of firewall Denial of Service Attack Circuit GatewayApplication Gateway Ping of death SYN FloodIcmp Flood UDP FloodVlan Virtual Local Area Network Frame SpecificationApplications VID uniquely identifies the Vlan to which the frame belongsGetting to know the router Front PanelLED status Rear Panel LAN 1,2,3,4Connecting your G.SHDSL Modem Router Check the Terminal Access ProgramDetermine Connection Setting Check the Ethernet Adapter in PCBridge EoA Route EoA IPoA PPPoA Install the Shdsl Router PPPoECross-over Ethernet cables can be used Port router with network topologyConfiguration via Web Browser Router, which will lose any previous configuration Basic Setup System error or disconnectionClick Basic for basic installation Bridge Mode LAN ParametersEnter Host Name WAN1 Parameters Enter VPI Enter VCI Click LLC Click NextRouting Mode Click Next to setup WAN1 parameters Dhcp ClientLAN IP Type Dhcp Server IP typeIP Address Subnet MaskTrigger Dhcp Service DNS ServerDhcp relay RelayPPPoE or PPPoA AAL5 EncapProtocol For more information, refer to the section on NAT/DMZPassword Password ConfirmUsername Idle TimeEprom IPoA or EoA GatewayEprom Advanced Setup Annex Type Link TypeData rate Data RateShdsl SNR margin Margin range is from 0 toMargin, the better the line connection Reconnect for better line connectionWAN QoS Quality of Service UBR Unspecified Bit RateCBR Constant Bit Rate PCR Peak Cell Rate in kbpsBridge Eprom Vlan Pvid PacketsRIP Mode RouteAuto RIP Summary Press ModifyAuthentication required RIP VersionPoison Reverse NAT/DMZ Multi-DMZ Multi-NATVirtual Start IP Address Count Global Start IP AddressVirtual Server Firewall Basic Firewall SecurityAutomatic Firewall Security Advanced Firewall Security Click Advanced Firewall Security and then press FinishSYN Attack Connections and will be unresponsiveAddresses originating from your network Ping of death attack attempts to crash your system byDirection DescriptionSrc. IP Address Dest. IP AddressFiltering Rule for Smtp connection Filtering rule will be configured as followUpdate Filtering Rule Filtering ResultWhen the rule is ordered as ABC Rule Order10.0.0.0 172.16.6.0 Permit 10.1.99.0 172.16.0.0 Deny Any IP QoS NB714 User Guide Administration Security NB712 / NB714 User Guide Snmp MIBSnmp status CommunityVersion Community Time Sync Click on Time SyncSntp service Time ServerTime Zone Utility System Info Restore Configuration Backup Configuration10.2 Config Tool Lose all the configured parametersUpgrade Logout To logout the router, press logoutRestart Status You can monitor the followingLAN-to-LAN connection with bridge Mode CO sideLAN Parameters WAN1 Parameters Enter IP 192.168.1.1 Enter Subnet MaskEnter Gateway 192.168.1.1 Enter Host Name Enter VPI Enter VCI EncapCPE Side Host Name Enter SohoVCI32 EncapLLC LAN to LAN Connection with Routing Mode Dhcp ServiceClick Route and CO Side then press Next IP Address 192.168.20.1 Subnet Mask 255.255.255.0 Host NameClick Next to setup the IP parameters WAN ParametersClick Route and CPE Side then press Next IP Address 192.168.10.1 Subnet Mask 255.255.255.0 Host Name192.168.30.2 Useradmin Password Serial ConsoleTelnet Baudrate 9600 Data Bits Parity Check Stop Bits Flow-controlOperation Interface Window structure Menu Driven Interface Commands To choose another parametersCtrl + C To quit the configuring item Ctrl + Q For help Menu Tree 14.7 Configuration Ping Packet internet groper command Admin Done via utility commandUtility Exit Quit systemStatus Show SystemConfig ScriptReboot AdministrationWrite PingUser Profile Snmp Edit Community Entry List ShowSupervisor Password and ID Move the cursor to service and press enter SntpMove the cursor to sntp and press enter Move the cursor to timeserver1 and press enterMove the cursor to list and review the setting Setup UtilityExit ModeShdsl 14.16.3 WAN Bridge After enter add menu, the screen will prompt as followVlan Move the cursor to vlan and press enter14.16.6 802.11Q Vlan Follow the following steps to configure 802.11q VlanFor each VLAN, Vlan ID is a unique number among 1~4095 Generic command can setup RIP mode and auto summery mode You can review the list of RIP parameters via list commandRoute Screen will display the following14.16.8 LAN IP share14.16.10 NAT You can configure NAT parameters in nat menuMapping 14.16.11 PAT After key in enter, the screen will prompt as belowYou can enable the demilitarized zone via active command firewall security level can configure via level command14.16.12 DMZ FirewallActive DoS Protection IPQoS You can view the Dhcp configuration via list command DhcpDefault DNS proxyHost name Appendix a Cable Information RJ-45 Network Ports10Mbps 100MbpsStraight and crossover cable configuration Straight-Through CablingCross-Over Cabling Shdsl Line Connector Console Cable No connectionRxD O TxDAppendix B Registration and Warranty Information Contact InformationProduct Warranty