4 - Configuring the SAGEM F@st™ 1500 ADSL router
5) DoS Criteria and Port Scan Criteria
Set up DoS and port scan criteria in the spaces provided (as shown below).
Note: The firewall does not significantly affect system performance, so we advise enabling the prevention features to protect your network.
Parameter | Defaults | Description |
|
|
|
Total incomplete | 300 sessions | Defines the rate of new unestablished sessions that will cause |
TCP/UDP sessions |
| the software to start deleting |
HIGH |
|
|
Total incomplete | 250 sessions | Defines the rate of new unestablished sessions that will cause |
TCP/UDP sessions |
| the software to stop deleting halfopen sessions. |
LOW |
|
|
Incomplete | 250 sessions | Maximum number of allowed incomplete TCP/UDP sessions |
TCP/UDP sessions |
| per minute. |
(per min) HIGH |
|
|
Incomplete | 200 sessions | Minimum number of allowed incomplete TCP/UDP sessions per |
TCP/UDP sessions |
| minute. |
(per min) LOW |
|
|
Maximum | 10 | Maximum number of incomplete TCP/UDP sessions from the |
incomplete |
| same host. |
TCP/UDP sessions |
|
|
number from same |
|
|
host |
|
|
Incomplete | 300 msec | Length of time before an incomplete TCP/UDP session is |
TCP/UDP sessions |
| detected as incomplete. |
detect sensitive |
|
|
time period |
|
|
Maximum half open | 30 | Maximum number of half open fragmentation packets from the |
fragmentation |
| same host. |
packet number |
|
|
from same host |
|
|
10000 msec | Length of time before a | |
fragmentation |
| detected as |
detect sensitive |
|
|
time period |
|
|
Flooding cracker | 300 second | Length of time from detecting a flood attack to blocking the |
block time |
| attack. |
SAGEM F@st™ 1500 Reference Manual -
Page