Secure Computing SG570 Uživatelský manuál Strana 306

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 341
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 305
Commonly used interfaces are:
eth0 the LAN port
eth1 the WAN/Internet port
pppX e.g. ppp0 or ppp1, a PPP session
IPSecX e.g. IPSec0, an IPSec interface
The firewall rules deny all packets arriving from the WAN port by default. There are a few
ports open to deal with traffic such as DHCP, VPN services and similar. Any traffic that
does not match the exceptions however is dropped.
There are also some specific rules to detect various attacks (smurf, teardrop, etc.).
When outbound traffic (from LAN to WAN) is blocked by custom rules configured in the
GUI, the resultant dropped packets are also logged.
The <prefix> for all these rules is varied according to their type.
Currently used prefixes for traffic arriving:
Default Deny Packet didn't match any rule, drop it
Invalid Invalid packet format detected
Smurf Smurf attack detected
Spoof Invalid IP address detected
SynFlood SynFlood attack detected
Custom Custom rule dropped outbound packet
300
Appendix B – System Log
Zobrazit stránku 305
1 2 ... 301 302 303 304 305 306 307 308 309 310 311 ... 340 341

Komentáře k této Příručce

Žádné komentáře