Page 96 / 131 Scroll up to view Page 91 - 95
C
ONFIGURATION
PARAMETERS
4-61
Page 97 / 131
C
ONFIGURING
THE
B
ARRICADE
4-62
Stateful Packet Inspection
This is called a “stateful” packet inspection because it examines the
contents of the packet to determine the state of the communications; i.e., it
ensures that the stated destination computer has previously requested the
current communication. This is a way of ensuring that all communications
are initiated by the recipient computer and are taking place only with
sources that are known and trusted from previous interactions. In addition
to being more rigorous in their inspection of packets, stateful inspection
firewalls also close off ports until connection to the specific port is
requested.
When particular types of traffic are checked, only the particular type of
traffic initiated from the internal LAN will be allowed. For example, if the
user only checks “FTP Service” in the Stateful Packet Inspection section,
all incoming traffic will be blocked except for FTP connections initiated
from the local LAN.
Stateful Packet Inspection allows you to select different application types
that are using dynamic port numbers. If you wish to use the Stateful Packet
Inspection (SPI) to block packets, click on the Yes radio button in the
“Enable SPI and Anti-DoS firewall protection” field and then check the
inspection type that you need, such as Packet Fragmentation, TCP
Connection, UDP Session, FTP Service, H.323 Service, or TFTP Service.
When hackers attempt to enter your network,
we can
alert
you by e-mail
Enter your email address. Specify your SMTP and POP3 servers, user
name, and password.
Page 98 / 131
C
ONFIGURATION
PARAMETERS
4-63
Connection
Policy
Enter the appropriate values for TCP/UDP sessions as described in the
following table.
Parameter
Defaults
Description
Fragmentation
half-open wait
10 sec
Configures the number of seconds that a
packet state structure remains active. When
the timeout value expires, the router drops
the unassembled packet, freeing that
structure for use by another packet.
TCP SYN
wait
30 sec
Defines how long the software will wait for a
TCP session to synchronize before dropping
the session.
TCP FIN
wait
5 sec
Specifies how long a TCP session will be
maintained after the firewall detects a FIN
packet.
TCP connection
idle timeout
3600
seconds
(1 hour)
The length of time for which a TCP session
will be managed if there is no activity.
UDP session idle
timeout
30 sec
The length of time for which a UDP session
will be managed if there is no activity.
H.323 data
channel
idle timeout
180 sec
The length of time for which an H.323
session will be managed if there is no activity.
Page 99 / 131
C
ONFIGURING
THE
B
ARRICADE
4-64
DoS
Criteria
and
Port
Scan
Criteria
Set up DoS and port scan criteria in the spaces provided (as shown below).
Note:
The firewall does not significantly affect system performance, so
we advise enabling the prevention features to protect your
network.
Parameter
Defaults
Description
Total incomplete
TCP/UDP sessions
HIGH
300
sessions
Defines the rate of new unestablished sessions
that will cause the software to
start
deleting
half-open sessions.
Total incomplete
TCP/UDP sessions
LOW
250
sessions
Defines the rate of new unestablished sessions
that will cause the software to
stop
deleting half-
open sessions.
Incomplete
TCP/UDP sessions
(per min) HIGH
250
sessions
Maximum number of allowed incomplete
TCP/UDP sessions per minute.
Incomplete
TCP/UDP sessions
(per min) LOW
200
sessions
Minimum number of allowed incomplete
TCP/UDP sessions per minute.
Maximum incomplete
TCP/UDP sessions
number from same
host
10
Maximum number of incomplete TCP/UDP
sessions from the same host.
Incomplete
TCP/UDP sessions
detect sensitive time
period
300
msec
Length of time before an incomplete
TCP/UDP session is detected as incomplete.
Maximum half-open
fragmentation packet
number from same
host
30
Maximum number of half-open fragmentation
packets from the same host.
Half-open
fragmentation detect
sensitive time period
10000
msec
Length of time before a half-open
fragmentation session is detected as half-open.
Flooding cracker
block time
300
second
Length of time from detecting a flood attack to
blocking the attack.
Page 100 / 131
C
ONFIGURATION
PARAMETERS
4-65
DMZ
If you have a client PC that cannot run an Internet application properly
from behind the firewall, you can open the client up to unrestricted
two-way Internet access. Enter the IP address of a DMZ (Demilitarized
Zone) host on this screen. Adding a client to the DMZ may expose your
local network to a variety of security risks, so only use this option as a last
resort.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top