Chapter 12 Firewall
NBG4604 User’s Guide
134
12.6
Services Screen
If an outside user attempts to probe an unsupported port on your NBG4604, an
ICMP response packet is automatically returned. This allows the outside user to
know the NBG4604 exists. Use this screen to prevent the ICMP response packet
from being sent. This keeps outsiders from discovering your NBG4604 when
unsupported ports are probed.
You can also use this screen to enable service blocking, enter/delete/modify the
services you want to block and the date/time you want to block them.
Click
Security
>
Firewall
>
Services
. The screen appears as shown next.
Figure 81
Security > Firewall > Services
The following table describes the labels in this screen.
Table 54
Security > Firewall > Services
LABEL
DESCRIPTION
ICMP
Internet Control Message Protocol is a message control and error-
reporting protocol between a host server and a gateway to the Internet.
ICMP uses Internet Protocol (IP) datagrams, but the messages are
processed by the TCP/IP software and directly apparent to the
application user.
Respond to Ping
on
The NBG4604 will not respond to any incoming Ping requests when
Disable
is selected. Select
LAN
to reply to incoming LAN Ping requests.
Select
WAN
to reply to incoming WAN Ping requests. Otherwise select
LAN & WAN
to reply to all incoming LAN and WAN Ping requests.
Do not respond
to requests for
unauthorized
services
Select this option to prevent hackers from finding the NBG4604 by
probing for unused ports. If you select this option, the NBG4604 will not
respond to port request(s) for unused ports, thus leaving the unused
ports and the NBG4604 unseen. By default this option is not selected
and the NBG4604 will reply with an ICMP Port Unreachable packet for a
port probe on its unused UDP ports, and a TCP Reset packet for a port
probe on its unused TCP ports.
Note that the probing packets must first traverse the NBG4604's firewall
mechanism before reaching this anti-probing mechanism. Therefore if
the firewall mechanism blocks a probing packet, the NBG4604 reacts
based on the firewall policy, which by default, is to send a TCP reset
packet for a blocked TCP packet. You can use the command "sys firewall
tcprst rst [on|off]" to change this policy. When the firewall mechanism
blocks a UDP packet, it drops the packet without sending a response
packet.