NETGEAR UTM5-100NAS Network Hardware User Manual


 
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
5-28 Firewall Protection
v1.0, January 2010
2. Click the Attack Checks submenu tab. The Attack Checks screen displays.
3. Enter the settings as explained in Table 5-4.
Figure 5-16
Table 5-4. Attack Checks Settings
Setting Description (or Subfield and Description)
WAN Security Checks
Respond To Ping On
Internet Ports
Select the Respond To Ping On Internet Ports checkbox to enable the UTM to
respond to a ping from the Internet. A ping can be used as a diagnostic tool.
Keep this checkbox deselected unless you have a specific reason to enable the
UTM to respond to a ping from the Internet.
Enable Stealth Mode Select the Enable Stealth Mode checkbox (which is the default setting) to
prevent the UTM from responding to port scans from the WAN, thus making it
less susceptible to discovery and attacks.
Block TCP Flood Select the Block TCP Flood checkbox to enable the UTM to drop all invalid
TCP packets and to protect the UTM from a SYN flood attack.
A SYN flood is a form of denial of service attack in which an attacker sends a
succession of SYN requests to a target system. When the system responds, the
attacker does not complete the connections, thus leaving the connection half-
open and flooding the server with SYN messages. No legitimate connections
can then be made. By default, the Block TCP Flood checkbox is deselected.