Brocade Mobility RFS Controller System Reference Guide (Supporting software release 5.5.0.0 and later) User Manual

Page 585

Advertising
background image

Brocade Mobility RFS Controller System Reference Guide

573

53-1003099-01

10

3. Refer to the General field to enable or disable the following firewall configuration parameters:

Enable Proxy ARP

Select this check box to allow the Firewall Policy to use Proxy ARP responses for this policy on behalf of
another device. Proxy ARP allows the firewall to handle ARP routing requests for devices behind the
firewall. This feature is enabled by default.

DHCP Broadcast to
Unicast

Select this check box to enable the conversion of broadcast DHCP offers to unicast. Converting DHCP
broadcast traffic to unicast traffic can help reduce network traffic loads. This feature is disabled by
default.

L2 Stateful Packet
Inspection

Select the check box to enable stateful packet inspection for RF Domain manager routed interfaces
within the Layer 2 firewall. This feature is disabled by default.

IPMAC Conflict Enable

When multiple devices on the network have the same IP or MAC address this can create routing issues for
traffic being passed through the firewall. To avoid these issues, enable Conflict Detection to enable IP and
MAC conflict detection. This feature is disabled by default.

IPMAC Conflict
Logging

Select this option to enable logging for IP and MAC address conflict detection. This feature is disabled by
default.

IPMAC Conflict Action

Use the drop-down menu to set the action taken when an attack is detected. Options include Log Only,
Drop Only or Log and Drop. The default setting is Log and Drop.

IPMAC Routing
Conflict Enable

Select this option to enable IPMAC Routing Conflict detection. This is also known as a Hole-196 attack in
the network. This feature helps to detect if the client is sending routed packets to the correct
router-mac-address.

IPMAC Routing
Conflict Logging

Select enable logging for IPMAC Routing Conflict detection. This feature is disabled by default.

IPMAC Routing
Conflict Action

Use the drop-down menu to set the action taken when an attack is detected. Options include Log Only,
Drop Only or Log and Drop. The default setting is Log and Drop.

DNS Snoop Entry
Timeout

Select this option and set a timeout, in seconds, for DNS Snoop Entry. DNS Snoop Entry stores
information such as Client to IP Address and Client to Default Gateway(s) and uses this information to
detect if the client is sending routed packets to a wrong MAC address.

IP TCP Adjust MSS

Select this option and adjust the value for the maximum segment size (MSS) for TCP segments on the
router. Set a value between 472 bytes and 1,460 bytes to adjust the MSS segment size. The default value
is 472 bytes.

TCP Adjust MSS

Select this option to enable TCP MSS Clamping. TCP MSS Clamping allows for the configuration of the
maximum segment size of packets at a global level.

Max
Fragments/Datagram

Set a value for the maximum number of fragments (between 2 and 8,129) allowed in a datagram before
it is dropped. The default value is 140 fragments.

Max
Defragmentations/Ho
st

Set a value for the maximum number of defragmentations, between 1 and 16,384 allowed per host
before it is dropped. The default value is 8.

Min Length Required

Select this option and set a minimum length, between 8 bytes and 1,500 bytes, to enforce a minimum
packet size before being subject to fragment based attack prevention.

IPv4 Virtual
Defragmentation

Select this option to enable IPv4 Virtual Defragmentation, this helps prevent IPv4 fragments based
attacks such as tiny fragments or large number of ipv4 fragments.

Advertising