8
Setting Up the Nokia IP45 Security Platform Security Policy
176
Nokia IP45 Security Platform User’s Guide v4.0
You can set the SynDefender by using the command-line interface. For more information about
SynDefender commands, see the
Nokia IP45 Security Platform CLI Reference Guide Version
4.0.
Port Scan
An attacker can perform a port scan to determine whether ports are open and vulnerable to an
attack. This is most commonly done by attempting to access a port and waiting for a response.
The response indicates whether or not the port is open.
Table 42
TCP - fields for SynDefender
Field
Action
Action
Choose the action to be taken when a packet is smaller than the
Minimal MTU Size threshold.
Options:
•
Block: blocks the packet
•
None: no action is required
Default value: None
Track
Specify whether to issue logs for packets that are smaller than the
Minimal MTU Size threshold.
Options:
•
Log: issues logs
•
None: does not issue logs
Default value: Log
Log Mode
When more than 5 incomplete TCP handshakes are detected
within 10 seconds, an attack is made. We can set the mode
whether to log per attack or for each unfinished handshake.
Options:
•
Log per attack: logs every attack
•
Log each unfinished handshakes: logs each unfinished
handshake
•
None:does not log
Maximum
Time for
Completing
the
Handshake
Allows to fine tune the amount of time (in seconds) after which a
TCP handshake is considered incomplete.
Protect
external
interfaces only
Specifies whether SynDefender should be enabled for all the
firewall interfaces, or for external (WAN) interfaces only.