ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual

2.Click the Attack Checks submenu tab. The Attack Checks screen displays.

Figure 5-11

3.Enter the settings as explained in Table 5-4.

Table 5-4. Attack Checks Settings

Setting

Description (or Subfield and Description)

 

 

WAN Security Checks

 

 

Respond To Ping On

Select the Respond To Ping On Internet Ports checkbox to enable the UTM to

Internet Ports

respond to a ping from the Internet. A ping can be used as a diagnostic tool.

 

Keep this checkbox deselected unless you have a specific reason to enable the

 

UTM to respond to a ping from the Internet.

 

 

Enable Stealth Mode

Select the Enable Stealth Mode checkbox (which is the default setting) to

 

prevent the UTM from responding to port scans from the WAN, thus making it

 

less susceptible to discovery and attacks.

 

 

Block TCP Flood

Select the Block TCP Flood checkbox to enable the UTM to drop all invalid

 

TCP packets and to protect the UTM from a SYN flood attack.

 

A SYN flood is a form of denial of service attack in which an attacker sends a

 

succession of SYN requests to a target system. When the system responds, the

 

attacker does not complete the connections, thus leaving the connection half-

 

open and flooding the server with SYN messages. No legitimate connections

 

can then be made. By default, the Block TCP Flood checkbox is deselected.

Firewall Protection

5-21

v1.0, September 2009

Page 135
Image 135
NETGEAR UTM25-100NAS, UTM10EW-100NAS, UTM25EW-100NAS manual Attack Checks Settings