Firewall Tab
The following table lists the attacks for which the gateway firewall filters continuously check.
Attack | Description and Action Taken |
Excessive Session Detection | When enabled, the firewall will detect applications on the |
| local network that are creating excessive sessions out to |
| the Internet. This activity is likely due to a virus or “worm” |
| infected computer (for example, Blaster Worm). When the |
| event is detected, the gateway displays a HURL warning |
| page. |
TCP/UDP Port Scan | A port scan is a series of messages sent by someone |
| attempting to break into a computer to learn which |
| computer network services, each associated with a well- |
| known port number (such as UDP and TCP), the computer |
| provides. When enabled, the firewall detects UDP and TCP |
| port scans, and drops the packet. |
Invalid Source/Destination IP | When enabled, the firewall will verify IP addresses by |
address | checking for the following: |
| IP source address is broadcast or multicast — drop |
| packet. |
| TCP destination IP address is not unicast — drop packet. |
| IP source and destination address are the same — drop |
| packet. |
| Invalid IP source received from private/home network — |
| drop packet. |
Packet Flood (SYN/UDP/ICMP/ | When enabled, the firewall will check for SYN, UDP, ICMP, |
Other) | and other types of packet floods on the local and Internet |
| facing interfaces and stop the flood. |
Invalid TCP Flag Attacks (NULL/ | When enabled, the firewall will scan inbound and |
XMAS/Other) | outbound packets for invalid TCP Flag settings, and drop |
| the packet to prevent SYN/FIN, NULL, and XMAS attacks. |
Invalid ICMP Detection | The firewall checks for invalid ICMP/code types, and drops |
| the packet. |
Miscellaneous | The firewall checks for the following: |
| Unknown IP protocol — drop packet. |
| Port 0 attack detected — drop packet. |
| TCP SYN packet — drop packet. |
| Not a start session packet — drop packet. |
| ICMP destination unreachable — terminate session. |
To disable attack detection for a specific port:
•Open a Web browser and access the 2Wire gateway user interface by entering http://gateway.2wire.net.
•Click the Firewall tab.
56