Page 121 / 275 Scroll up to view Page 116 - 120
Vigor2110 Series User’s Guide
114
as the Address Type.
From the
IP Group
drop down list, choose the one that you want to
apply. Or use the
IP Object
drop down list to choose the object that
you want.
Service Type
Click
Edit
to access into the following dialog to choose a suitable
service type.
To set the service type manually, please choose
User defined
as the
Service Type and type them in this dialog. In addition, if you want to
use the service type from defined groups or objects, please choose
Group and Objects
as the Service Type.
Protocol -
Specify the protocol(s) which this filter rule will apply to.
Source/Destination Port -
(=)
– when the first and last value are the same, it indicates one port;
when the first and last values are different, it indicates a range for the
port and available for this service type.
(!=)
– when the first and last value are the same,
it indicates all the
ports except the port defined here; when the first and
last values
are different, it indicates that all the ports except the range defined
here are available for this service type.
(>)
the port number greater than this value is available.
(<)
the port number less than this value is available for this profile.
Service Group/Object
- Use the drop down list to choose the one
that you want.
Page 122 / 275
Vigor2110 Series User’s Guide
115
Fragments
Specify the action for fragmented packets. And it is used for
Data
Filter
only.
Don’t care -
No action will be taken towards fragmented packets.
Unfragmented -
Apply the rule to unfragmented packets.
Fragmented -
Apply the rule to fragmented packets.
Too Short -
Apply the rule only to packets that are too short to contain
a complete header.
Filter
Specifies the action to be taken when packets match the rule.
Block Immediately -
Packets matching the rule will be dropped
immediately.
Pass Immediately -
Packets matching the rule will be passed
immediately.
Block If No Further Match -
A packet matching the rule, and that
does not match further rules, will be dropped.
Pass If No Further Match -
A packet matching the rule, and that
does not match further rules, will be passed through.
Branch to other Filter
Set
If the packet matches the filter rule, the next filter rule will branch
to the specified filter set. Select next filter rule to branch from the
drop-down menu. Be aware that the router will apply the
specified filter rule for ever and will not return to previous filter
rule any more.
Content Security
Management
All the packets/connections within the range configured in the
above conditions must follow the standard configured in the CSM
profile selected here. For detailed information, refer to the section
of CSM profile setup.
SysLog
For troubleshooting needs you can specify the filter log and/or CSM
log here. Check the corresponding box to enable the log function.
Then, the filter log and/or CSM log will be shown on Draytek Syslog
window.
Page 123 / 275
Vigor2110 Series User’s Guide
116
Example
As stated before, all the traffic will be separated and arbitrated using on of two IP filters: call
filter or data filter. You may preset 12 call filters and data filters in
Filter Setup
and even link
them in a serial manner. Each filter set is composed by 7 filter rules, which can be further
defined. After that, in
General Setup
you may specify one set for call filter and one set for
data filter to execute first.
Page 124 / 275
Vigor2110 Series User’s Guide
117
4.5.4 DoS Defense
As a sub-functionality of IP Filter/Firewall, there are 15 types of detect/ defense function in
the
DoS Defense
setup. The DoS Defense functionality is disabled for default.
Click
Firewall
and click
DoS Defense
to open the setup page.
Enable Dos Defense
Check the box to activate the DoS Defense Functionality.
Enable SYN flood
defense
Check the box to activate the SYN flood defense function. Once
detecting the Threshold of the TCP SYN packets from the Internet
has exceeded the defined value, the Vigor router will start to
randomly discard the subsequent TCP SYN packets for a period
defined in Timeout. The goal for this is prevent the TCP SYN
packets’ attempt to exhaust the limited-resource of Vigor router.
By default, the threshold and timeout values are set to 50 packets
per second and 10 seconds, respectively.
Enable UDP flood
defense
Check the box to activate the UDP flood defense function. Once
detecting the Threshold of the UDP packets from the Internet has
exceeded the defined value, the Vigor router will start to randomly
discard the subsequent UDP packets for a period defined in
Timeout. The default setting for threshold and timeout are 150
packets per second and 10 seconds, respectively.
Enable ICMP flood
defense
Check the box to activate the ICMP flood defense function. Similar
to the UDP flood defense function, once if the Threshold of ICMP
packets from Internet has exceeded the defined value, the router
will discard the ICMP echo requests coming from the Internet. The
default setting for threshold and timeout are 50 packets per second
and 10 seconds, respectively.
Page 125 / 275
Vigor2110 Series User’s Guide
118
Enable PortScan
detection
Port Scan attacks the Vigor router by sending lots of packets to
many ports in an attempt to find ignorant services would respond.
Check the box to activate the Port Scan detection. Whenever
detecting this malicious exploration behavior by monitoring the
port-scanning Threshold rate, the Vigor router will send out a
warning. By default, the Vigor router sets the threshold as 150
packets per second.
Block IP options
Check the box to activate the Block IP options function. The Vigor
router will ignore any IP packets with IP option field in the datagram
header. The reason for limitation is IP option appears to be a
vulnerability of the security for the LAN because it will carry
significant information, such as security, TCC (closed user group)
parameters, a series of Internet addresses, routing messages...etc. An
eavesdropper outside might learn the details of your private
networks.
Block Land
Check the box to enforce the Vigor router to defense the Land attacks.
The Land attack combines the SYN attack technology with IP
spoofing. A Land attack occurs when an attacker sends spoofed SYN
packets with the identical source and destination addresses, as well as
the port number to victims.
Block Smurf
Check the box to activate the Block Smurf function. The Vigor router
will ignore any broadcasting ICMP echo request.
Block trace router
Check the box to enforce the Vigor router not to forward any trace
route packets.
Block SYN fragment
Check the box to activate the Block SYN fragment function. The
Vigor router will drop any packets having SYN flag and more
fragment bit set.
Block Fraggle Attack
Check the box to activate the Block fraggle Attack function. Any
broadcast UDP packets received from the Internet is blocked.
Activating the DoS/DDoS defense functionality might block some
legal packets. For example, when you activate the fraggle attack
defense, all broadcast UDP packets coming from the Internet are
blocked. Therefore, the RIP packets from the Internet might be
dropped.
Block TCP flag scan
Check the box to activate the Block TCP flag scan function. Any TCP
packet with anomaly flag setting is dropped. Those scanning activities
include
no flag scan
,
FIN without ACK scan
,
SYN FINscan
,
Xmas
scan
and
full Xmas scan
.
Block Tear Drop
Check the box to activate the Block Tear Drop function. Many
machines may crash when receiving ICMP datagrams (packets) that
exceed the maximum length. To avoid this type of attack, the Vigor
router is designed to be capable of discarding any fragmented ICMP
packets with a length greater than 1024 octets.
Block Ping of Death
Check the box to activate the Block Ping of Death function. This
attack involves the perpetrator sending overlapping packets to the
target hosts so that those target hosts will hang once they
re-construct the packets. The Vigor routers will block any packets
realizing this attacking activity.
Block ICMP Fragment
Check the box to activate the Block ICMP fragment function. Any
ICMP packets with more fragment bit set are dropped.

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top