Atlantis Land A02-RA ME01 manual Block Hacker Attack

Page 36

Atlantis Land I-STORM ADSL ROUTER

Active: Choose “Yes” to enable the rule, or choose “No” to disable the rule.

Packet Type: Specify the packet type (TCP, UDP, ICMP or any) that the rule will be applied to.

Select TCP if you want to scope for the connection-based application service on the remote server using the port number. Or select UDP if you want to scope for the connectionless application service on the remote server using the port number.

Log: Choose “Yes” if you want to generate logs when the filer rule is applied to a packet.

Action When Matched: If any packet matches this filter rule, forward or drop this packet.

Source IP Address: Enter the incoming or outgoing packet’s source IP address.

Source IP Mask: Enter the incoming or outgoing packet’s source IP Subnet Mask.

Source Port: Check the TCP or UDP packet’s source port number(s).

Destination IP Address: Enter the incoming or outgoing packet’s destination IP address.

Destination IP Mask: Enter the incoming or outgoing packet’s destination IP Subnet Mask.

Destination Port: Check the TCP or UDP packet’s destination port number(s).

If the DHCP server option is enabled, you have to be very careful in assigning the IP addresses of filtered private IP range in order to avoid conflicts. Because you do not know which PC in LAN is assigned to which IP address. The easy way is that the filtered IP address is assigned to the specific PC that you do not want this PC to access outside resource such as Internet. You configure the filtered IP address manually to this PC, but it is still in the same subnet with the router.

Block Hacker Attack

The I-STORM ADSL ROUTER can automatically detect and block the DoS (Denial of Service) attack if user enables this function. This kind of attack is not to achieve the confidential data of this network; instead, it aims to crush specific equipment or the entire network. If this happens, the users will not be able to access the network resources. There are nine hacker patterns implemented in total, including

30

Image 36
Contents Storm Adsl Router With Firewall Built-in Page Copyright Table of Content Atlantis Land I-STORM Adsl RouterIntroduction RoubleshootingPage Introduction An Overview of I-STORM Adsl RouterPackage Contents Storm Adsl Router FeaturesIntroduction Storm Adsl Router Application Using I-STORM Adsl Router Front LEDsRear Ports CablingConfiguration Before ConfigurationConfiguring PC in Windows 95/98/ME Configuring PC in Windows NT4.0 ConfigurationConfiguring PC in Windows Configuration Configuring PC in Windows XP Configuration Factory Default Settings Web Configurator Password BlankDevice IP Network settings in LAN site IP Address Router/Bridge Mode PasswordLAN and WAN Port Addresses Configuring with Web Browser in Router Mode Information from ISPPPPoE PPTP-to-PPPoA1 LAN IP Address Dhcp Server2 WAN ISPAuthentication Protocol Default at Auto Atlantis Land I-STORM Adsl Router PPPoEConfiguration PPPoA Atlantis Land I-STORM Adsl Router RFC1483 Configuration IPoA PPTP-to-PPPoA RelayingDNS Password SystemUpgrade Time ZoneFactory Setting RebootFirewall Packet FilterConfiguration Block Hacker Attack Block WAN Request/URL Filter 5 VPN Virtual Server Remote Config AdvancedDynamic Routing Static RoutingRouter/Bridge Mode Status System StatusDevice Info System LogsSecurity Logs Dhcp TableConfiguring with Web Browser in Bridge Mode Help/ Logout1 LAN 2 WAN System Upgrade Factory Setting Advanced Status Device Info Changing Password HelpFirmware Upgrade Problems Starting Up the I-STORM Adsl Router Problems with the WAN InterfaceProblems with the LAN Interface Problem Corrective ActionProblems Connecting to a Remote Node or ISP LED Indicators Input PowerPower Consumption Physical DimensionProduct Support