Chapter 5 Advanced Configuration / Network Management

63

create a firewall policy to protect your network against the following attack types and port scans:

Attacks

Port Scans

 

 

 

 

Ping of Death Attack

Fragmentation Scan

Null Scan

Tear Drop Attack

UDP Scan

RST Scan

IP Spoofing Attack

ICMP Scan

SYNACK Scan

Smurf Attack

TCP Session Scan

FIN Scan

Land Attack

Xmas Scan

ACK Scan

 

 

 

You can also choose to Enable or Disable protection against various denial-of-service type attacks with the DOS Protection option.

A"denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. Examples include: attempts to "flood" a network, thereby preventing legitimate network traffic, attempts to disrupt connections between two machines, thereby preventing access to a service, attempts to prevent a particular individual from accessing a service, or, attempts to disrupt service to a specific system or person.

The Service Filtering options allow you to block FTP, Telnet or response to Pings from the external network. Check the category you want to block to enable filtering of that type of packet.

When you have selected the desired Firewall policies, click the Apply button to enforce the policies. Remember to save any configuration changes.

Page 65
Image 65
UTStarcom UT-300R2 manual Attacks Port Scans