Instant Messenger (IM) and Peer-to-Peer (P2P) Application Blocking

As the popularity of all kinds of instant messenger application arises, communication cannot become much easier. Nevertheless, while some industry may leverage this as a great tool to connect with their customers, some industry may take reserve attitude in order to reduce employee misusage during office hour or prevent unknown security leak. It is similar situation for corporation towards peer-to-peer applications since file-sharing can be convenient but insecure at the same time. To address these needs, we provide IM and P2P blocking functionality.

Denial of Service (DoS) Defense

The DoS Defense functionality helps you to detect and mitigate the DoS attack. The attacks are usually categorized into two types, the flooding-type attacks and the vulnerability attacks. The flooding-type attacks will attempt to exhaust all your system's resource while the vulnerability attacks will try to paralyze the system by offending the vulnerabilities of the protocol or operation system.

The DoS Defense function enables the Vigor router to inspect every incoming packet based on the attack signature database. Any malicious packet that might duplicate itself to paralyze the host in the secure LAN will be strictly blocked and a Syslog message will be sent as warning, if you set up Syslog server.

Also the Vigor router monitors the traffic. Any abnormal traffic flow violating the pre-defined parameter, such as the number of thresholds, is identified as an attack and the Vigor router will activate its defense mechanism to mitigate in a real-time manner.

The below shows the attack types that DoS/DDoS defense function can detect:

1.

SYN flood attack

9. Smurf attack

2.

UDP flood attack

10.

SYN fragment

3.

ICMP flood attack

11.

ICMP fragment

4.

TCP Flag scan

12.

Tear drop attack

5.

Trace route

13.

Fraggle attack

6.

IP options

14.

Ping of Death attack

7.

Unknown protocol

15.

TCP/UDP port scan

8.

Land attack

 

 

Content Filtering

To provide an appropriate cyberspace to users, Vigor router equips with URL Content Filter not only to limit illegal traffic from/to the inappropriate web sites but also prohibit other web feature where malicious code may conceal.

Once a user type in or click on an URL with objectionable keywords, URL keyword blocking facility will decline the HTTP request to that web page thus can limit user’s access to the website. You may imagine URL Content Filter as a well-trained convenience-store clerk who won’t sell adult magazines to teenagers. At office, URL Content Filter can also provide a job-related only environment hence to increase the employee work efficiency. How can URL Content Filter work better than traditional firewall in the field of filtering? Because it checks the URL strings or some of HTTP data hiding in the payload of TCP packets while legacy firewall inspects packets based on the fields of TCP/IP headers only.

On the other hand, Vigor router can prevent user from accidentally downloading malicious codes from web pages. It’s very common that malicious codes conceal in the executable objects, such as ActiveX, Java Applet, compressed files, and other executable files. Once downloading these types of files from websites, you may risk bringing threat to your system. For example, an ActiveX control object is usually used for providing interactive web feature. If malicious code hides inside, it may occupy user’s system.

44

Vigor2800 Series User’s Guide

Page 48
Image 48
Draytek 2800 Series manual Denial of Service DoS Defense, Content Filtering

2800 Series specifications

The Draytek 2800 series is a robust solution in the realm of networking, catering primarily to small and medium-sized enterprises (SMEs). This series provides essential features for those looking to establish reliable and secure connectivity. With its advanced technology, it positions itself as an excellent choice for businesses needing to manage their network capabilities efficiently.

One of the standout features of the Draytek 2800 series is its support for various WAN connections. Businesses can opt for ADSL, ADSL2+, or Ethernet connections, allowing them flexibility depending on their internet service capabilities. This versatility ensures that users can select the most appropriate setup based on the local infrastructure.

In terms of security, the Draytek 2800 series is equipped with robust firewalls, including stateful packet inspection and DoS protection. This ensures that the network remains protected from potential threats. Additionally, it offers VPN capabilities, enabling secure remote access for employees working from different locations. The support for multiple VPN protocols, such as PPTP and L2TP, allows for secure and versatile connections.

The series also features an integrated, 4-port Ethernet switch, simplifying the task of connecting multiple devices within a local area network. This encourages seamless communication and data sharing among connected devices. Furthermore, the Draytek 2800 series supports Quality of Service (QoS) capabilities, which allows businesses to prioritize bandwidth for critical applications, ensuring that high-demand services such as VoIP and video conferencing operate smoothly without interruptions.

Another characteristic is its web-based management interface, which simplifies network administration. IT professionals can easily configure and monitor the router settings without needing extensive technical expertise. The series also supports dynamic DNS, which is crucial for businesses that require consistent access to their networks through domain names rather than constantly changing IP addresses.

Additionally, the Draytek 2800 series is designed for scalability, allowing businesses to expand their network as needed without significant overhauls. This flexibility ensures that the system can grow alongside the business.

In summary, the Draytek 2800 series combines advanced features, reliable performance, and enhanced security, making it a preferred choice for SMEs looking to build a solid networking foundation. Its flexibility, security features, and user-friendly management tools provide a comprehensive networking solution that meets the needs of modern businesses.