D-Link DBG-2000 Product Manual 1 - Page 90

Allow ICMP traffic

Page 90 highlights

Number of signatures loaded It displays the number of signatures loaded. DBG-2000 User Guide Attack Checks Attacks can be malicious security breaches or unintentional network issues that render the gateway unusable. Attack checks allow you to manage WAN security threats, such as continual ping requests and discovery via ARP scans. You can enable TCP and UDP flood attack checks to manage extreme usage of WAN resources. Additionally, you can block certain Denial-of-Service (DoS) attacks. These attacks, if uninhibited, can use up processing power and bandwidth and can prevent normal regular network services. You can also configure ICMP packet flooding, SYN traffic flooding, and Echo storm thresholds to suspect traffic from the offending source temporarily. Note: You can edit this section only when the "Use profile configuration" field is disabled. The fields available on this page are as follows: Field Stealth mode Block TCP flood Allow ICMP traffic Filter check mode Block UDP flood Description WAN security checks If this option is enabled, the gateway will not respond to port scans from the WAN. This makes it less susceptible to discovery and attacks. If this option is enabled, the gateway drops all invalid TCP packets and gets protected from the TCP flood attack. If this option is enabled, the WAN host can ping traffic to the WAN interface. TCP filter check If this option is enabled, the gateway drops invalid TCP packets (FIN, RST, and ACK) going with SNAT while the connection is closed. Some of the other packets, like TCP OUTOF-WINDOW, are also considered to be invalid. Disable this option while taking performance, as enabling this option will affect the throughput. LAN security checks If this option is enabled, the gateway will not accept more than the configured value in Acce pt UDP connections, indicating simultaneous, active UDP connections from a single computer on the LAN. 90

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130

Number of signatures loaded
It displays the number of signatures loaded.
Attack Checks
Attacks can be malicious security breaches or unintentional network issues that render the gateway unusable. Attack checks allow you to
manage WAN security threats, such as continual ping requests and discovery via ARP scans. You can enable TCP and UDP flood attack checks
to manage extreme usage of WAN resources.
Additionally, you can block certain Denial-of-Service (DoS) attacks. These attacks, if uninhibited, can use up processing power and bandwidth
and can prevent normal regular network services. You can also configure ICMP packet flooding, SYN traffic flooding, and Echo storm thresholds
to suspect traffic from the offending source temporarily.
: You can edit this section only when the “Use profile configuration” field is disabled.
Note
The fields available on this page are as follows:
Field
Description
WAN security checks
Stealth mode
If this option is enabled, the gateway will not respond to port scans from the WAN. This
makes it less susceptible to discovery and attacks.
Block TCP flood
If this option is enabled, the gateway drops all invalid TCP packets and gets protected from
the TCP flood attack.
Allow ICMP traffic
If this option is enabled, the WAN host can ping traffic to the WAN interface.
TCP filter check
Filter check mode
If this option is enabled, the gateway drops invalid TCP packets (FIN, RST, and ACK)
going with SNAT while the connection is closed. Some of the other packets, like TCP OUT-
OF-WINDOW, are also considered to be invalid. Disable this option while taking
performance, as enabling this option will affect the throughput.
LAN security checks
Block UDP flood
If this option is enabled, the gateway will not accept more than the configured value in
Acce
, indicating simultaneous, active UDP connections from a single
pt UDP connections
computer on the LAN.
DBG-2000 User Guide
90