UTStarcom UT-300R2 Network Card User Manual


 
Chapter 5 Advanced Configuration / Network Management
63
create a firewall policy to protect your network against the
following attack types and port scans:
Attacks Port Scans
Ping of Death Attack
Tear Drop Attack
IP Spoofing Attack
Smurf Attack
Land Attack
Fragmentation Scan
UDP Scan
ICMP Scan
TCP Session Scan
Xmas Scan
Null Scan
RST Scan
SYNACK Scan
FIN Scan
ACK Scan
You can also choose to
Enable
or
Disable
protection against
various denial-of-service type attacks with the
DOS Protection
option.
A "denial-of-service" attack is characterized by an explicit
attempt by attackers to prevent legitimate users of a service
from using that service. Examples include: attempts to "flood" a
network, thereby preventing legitimate network traffic, attempts
to disrupt connections between two machines, thereby
preventing access to a service, attempts to prevent a particular
individual from accessing a service, or, attempts to disrupt
service to a specific system or person.
The Service Filtering options allow you to block FTP, Telnet or
response to Pings from the external network. Check the
category you want to block to enable filtering of that type of
packet.
When you have selected the desired Firewall policies, click the
Apply
button to enforce the policies. Remember to save any
configuration changes.