Firewall

6

 

Configuring Attack Protection

 

 

 

 

 

Configuring Attack Protection

Use the Attack Protection page to specify how to protect your network against common types of attacks including discovery, flooding, and echo storms.

STEP 1 Click Firewall > Attack Protection.

STEP 2 In the WAN Security Checks area, enter the following information:

Block Ping WAN Interface: Check this box to prevent attackers from discovering your network through ICMP Echo (ping) requests. We recommend that you disable this feature only if you need to allow the security appliance to respond to pings for diagnostic purposes.

Stealth Mode: Check this box to prevent the security appliance from responding to incoming connection requests from the WAN ports. In Stealth Mode, the security appliance does not respond to blocked inbound connection requests, and your network is less susceptible to discovery and attacks.

Block TCP Flood: Check this box to drop all invalid TCP packets. This feature protects your network from a SYN flood attack, in which an attacker sends a succession of SYN (synchronize) requests to a target system. It blocks all TCP SYN flood attacks (more than 200 simultaneous TCP packets per second) from the WAN ports.

STEP 3 In the LAN Security Checks section, enter the following information:

Block UDP Flood: Check this box to limit the number of simultaneous, active UDP connections from a single computer on the LAN. If you enable this feature, also enter the number of connections to allow per host per second. The default value is 500, and the valid range is from 100 to 10,000. When this limit is reached, the security appliance considers it a UDP flood attack and drops all connections from the host.

STEP 4 In the Firewall Settings area, enter the following information:

Block ICMP Notification: Check this box to silently block without sending an ICMP notification to the sender. Some protocols, such as MTU Path Discovery, require ICMP notifications.

Block Fragmented Packets: Check this box to block fragmented packets from Any zone to Any zone.

Cisco ISA500 Series Integrated Security Appliances Administration Guide

287

Page 287
Image 287
Casio ISA550WBUN3K9 manual Configuring Attack Protection, Click Firewall Attack Protection