SmartDefense
Nokia IP45 Security Platform User’s Guide v4.0
171
±
Welchia
—the Welchia worm uses the MS DCOM vulnerability or a WebDAV vulnerability.
After infecting a computer, the worm begins searching for other live computers to infect. It
does so by sending a specific ping packet to a target and waiting for the reply that signals
that the target is alive. This flood of pings may disrupt network connectivity.
Note
To select values for Welchia, expand the IP and ICMP tree, click Welchia and select the
values from the drop-down list by using the information provided in
Table 37
.
Table 36
Fields for Network Quota
Field
Action
Action
Choose the action to be taken when the number of network
connections from the same source reaches the Max. Connections/
Second per Source IP threshold.
Options:
•
Block: blocks all new connections from the source. Existing
connections will not be blocked
•
None: no action is required
Default value: Block
Track
Specify whether to log the connections from a specific source that
exceed the Max. Connections/Second per Source IP threshold.
Options:
•
Log: logs the connections
•
None: does not log the connections
Default value: Log
Max.
Connections/
Second from
Same Source
IP
Type the maximum number of network connections allowed per
second from source IP address.
Default value: 100
Set a lower threshold for stronger protection against DoS attacks.
Note
Setting this value too low can lead to false alarms.