Network address translation - NAT
Overview
iMG/RG Software Reference Manual (IPNetwork Functions)
4-134
•
Use Victim Protection status (true or false)
•
DOS attack block duration (in seconds)
•
Scan attack block duration (in seconds)
•
Victim protection block duration (in seconds)
•
Maximum TCP open handshaking count allowed (per second)
•
Maximum ping count allowed (per second)
•
Maximum ICMP count allowed (per second)
Example
--> firewall show IDS
Firewall IDS:
IDS Enabled: false
Use Blacklist: false
Use Victim Protection: false
Dos Attack Block Duration: 1800
Scan Attack Block Duration: 86400
Malicious Attack Block Duration: 86400
Victim Protection Block Duration: 600
Scan Detection Threshold: 5
Scan Detection Period: 10
Port Flood Detection Threshold: 10
Host Flood Detection Threshold: 20
FloodDetectPeriod : 10
Max TCP Open Handshaking Count: 5
Max PING Count: 15
Max ICMP Count: 100
See also
security show IDS
4.4
Network address translation - NAT
4.4.1
Overview
Basic NAT is a router function (described in
RFC 1631
) that determines how to translate network IP addresses.
As data packets are received on the device’s interfaces, data in their protocol headers is compared to criteria
established in NAT rules through global pools and reserved mappings. The criteria includes ranges of source or
destination addresses. If the packet meets the criteria of one of the rules, the packet header undergoes the
translation specified by the mapping and the revised packet is forwarded. If the packet does not meet the crite-
ria, it is discarded. ISOS supports both
static
and
dynamic
versions of NAT: