
Configuring Firewall Settings
Field
Blacklist Status:
Blacklist Period(min):
Attack Protection:
DOS Protection:
Max Half open TCP Conn.:
Description
If you want the device to maintain and use a black list, click Enable. Click Disable if you do not want to maintain a list.
Specifies the number of minutes that a computer’s IP address will remain on the black list.
Select Enable to use the
IP Spoofing – Sending packets over the WAN interface using an internal LAN IP address as the source address.
Tear Drop – Sending packets that contain over- lapping fragments.
Smurf and Fraggle – Sending packets that use the WAN or LAN IP broadcast address as the source address.
Land Attack – Sending packets that use the same address as the source and destination address.
Ping of Death – Illegal IP packets length.
Click the Enable radio button to use the following denial of service protections:
SYN DoS, ICMP DoS and
Sets the percentage of concurrent IP sessions that can be in the
If the percentage is exceeded, then the
Max ICMP Conn.:
Sets the percentage of concurrent IP sessions that can be used for ICMP messages.
If the percentage is exceeded, older ICMP IP sessions will be replaced by new sessions as
EN/LZT 108 6492 R2 - October 2003 | 79 |