4 modify a service, 5 delete a service, 6 view configured services – Asus SL1000 User Manual

Page 80: 3 configuring dos settings, 1 dos protection configuration parameters

Advertising
background image

Chapter 9. Configuring Firewall/NAT Settings

Internet Security Router User

’s Manual

64

5. Click on the

button to create the new service. The new service will then be displayed in

the service list table at the bottom half of the Service Configuration page.

9.6.2.4

Modify a Service

To modify a service, follow the instructions below:

1. Open the Service List Configuration Page (see section 9.6.2.2 Access Service List Configuration

Page).

2. Select the service from the service drop-down list or click on the

icon of the service to be

modified in the service list table.

3. Make desired changes to any or all of the following fields: service name, public port and protocol.

Please see Table 9.5 for explanation of these fields.

4. Click on the

button to modify this service. The new settings for this service will then be

displayed in the service list table at the bottom half of the Service Configuration page.

9.6.2.5

Delete a Service

To delete a service, follow the instructions below:

1. Open the Service List Configuration Page (see section 9.6.2.2 Access Service List Configuration

Page).

2. Select the service from the service drop-down list or click on the

icon of the service to be

modified in the service list table.

3. Click on the

button to delete this service. Note that the service deleted will be removed

from the service list table located at the bottom half of the same configuration page.

9.6.2.6

View Configured Services

To see a list of existing services, follow the instructions below:

1. Open the Service List Configuration Page (see section 9.6.2.2 Access Service List Configuration

Page).

2. The service list table located at the bottom half of the Service Configuration page shows all the

configured services.

9.6.3

Configuring DoS Settings

The Internet Security Router has a proprietary Attack Defense Engine that protects internal networks from
Denial of Service (DoS) attacks such as SYN flooding, IP smurfing, LAND, Ping of Death and all re-assembly
attacks. It can drop ICMP redirects and IP loose/strict source routing packets. For example, a security device
with the Internet Security Router Firewall provides protection from

“WinNuke”, a widely used program to

remotely crash unprotected Windows systems in the Internet. The Internet Security Router Firewall also
provides protection from a variety of common Internet attacks such as IP Spoofing, Ping of Death, Land Attack,
Reassembly and SYN flooding. For a complete list of DoS protection provided by the Internet Security Router,
please see Table 2.3.

9.6.3.1

DoS Protection Configuration Parameters

Table 9.6 describes the configuration parameters available for DoS Protection.

Table 9.6. DoS Protection Configuration Parameters

Field

Description

SYN Flooding

Check or un-check this option to enable or disable protection against SYN
Flood attacks. This attack involves sending connection requests to a server,
but never fully completing the connections. This will cause some computers

Advertising