UTStarcom UT-300R2 User Manual

Page 65

Advertising
background image

Chapter 5 Advanced Configuration / Network Management

63

create a firewall policy to protect your network against the
following attack types and port scans:

Attacks

Port Scans

Ping of Death Attack
Tear Drop Attack
IP Spoofing Attack
Smurf Attack
Land Attack

Fragmentation Scan
UDP Scan
ICMP Scan
TCP Session Scan
Xmas Scan

Null Scan
RST Scan
SYNACK Scan
FIN Scan
ACK Scan

You can also choose to

Enable

or

Disable

protection against

various denial-of-service type attacks with the

DOS Protection

option.

A "denial-of-service" attack is characterized by an explicit
attempt by attackers to prevent legitimate users of a service
from using that service. Examples include: attempts to "flood" a
network, thereby preventing legitimate network traffic, attempts
to disrupt connections between two machines, thereby
preventing access to a service, attempts to prevent a particular
individual from accessing a service, or, attempts to disrupt
service to a specific system or person.

The Service Filtering options allow you to block FTP, Telnet or
response to Pings from the external network. Check the
category you want to block to enable filtering of that type of
packet.

When you have selected the desired Firewall policies, click the

Apply

button to enforce the policies. Remember to save any

configuration changes.

Advertising