Chapter 2. Getting to Know | RX3141 User’s Manual |
2.3.2Firewall Features
The firewall as implemented in RX3141 provides the following features to protect your network from being attacked and to prevent your network from being used as the springboard for attacks.
fStateful Packet Inspection
fPacket Filtering (ACL)
fDefense against Denial of Service Attacks
fLog
2.3.2.1Stateful Packet Inspection
The RX3141 Firewall uses “stateful packet inspection” that extracts
2.3.2.2Packet Filtering – ACL (Access Control List)
ACL rule is one of the basic building blocks for network security. Firewall monitors each individual packet, decodes the header information of inbound and outbound traffic and then either blocks the packet from passing or allows it to pass based on the contents of the source address, destination address, source port, destination port, and protocol defined in the ACL rules.
ACL is a very appropriate measure for providing isolation of one subnet from another. It can be used as the first line of defense in the network to block inbound packets of specific types from ever reaching the protected network.
The RX3141 Firewall’s ACL methodology supports:
fFiltering based on destination and source IP address, port number and protocol
fUse of the wild card for composing filter rules
fFilter Rule priorities
2.3.2.3Defense against DoS Attacks
The RX3141 Firewall has an Attack Defense Engine that protects internal networks from known types of Internet attacks. It provides automatic protection from Denial of Service (DoS) attacks such as SYN flooding, IP smurfing, LAND, Ping of Death and all
The type of attack protections/detections provided by the RX3141 is listed in Table 2.1.
4