ZyXEL p-660hwp Guia Do Utilizador

Página de 402
Chapter 11 Firewall Configuration
P-660HWP-Dx User’s Guide
64
The following table describes the labels in this screen.
11.10  DoS Thresholds 
For DoS attacks, the P-660HWP-Dx uses thresholds to determine when to drop sessions that 
do not become fully established. These thresholds apply globally to all sessions.
You can use the default threshold values, or you can change them to values more suitable to 
your security requirements.
Refer to 
 to configure thresholds. 
11.10.1  Threshold Values
Tune these parameters when something is not working and after you have checked the firewall 
counters. These default values should work fine for most small offices. Factors influencing 
choices for threshold values are:
• The maximum number of opened sessions.
• The minimum capacity of server backlog in your LAN network.
• The CPU power of servers in your LAN network.
• Network bandwidth. 
• Type of traffic for certain servers.
If your network is slower than average for any of these factors (especially if you have servers 
that are slow or handle many tasks and are often busy), then the default values should be 
reduced.
You should make any changes to the threshold values before you continue configuring 
firewall rules. 
Table 65   Firewall: Anti Probing
LABEL
DESCRIPTION
Respond to PING 
on
The P-660HWP-Dx does not respond to any incoming Ping requests when 
Disable is selected. 
Select LAN to reply to incoming LAN Ping requests.
Select WAN to reply to incoming WAN Ping requests. 
Otherwise select LAN & WAN to reply to both incoming LAN and WAN Ping 
requests. 
Do Not Respond 
to Requests for 
Unauthorized 
Services.
Select this option to prevent hackers from finding the P-660HWP-Dx by probing 
for unused ports. If you select this option, the P-660HWP-Dx will not respond to 
port request(s) for unused ports, thus leaving the unused ports and the P-
660HWP-Dx unseen. By default this option is not selected and the P-660HWP-Dx 
will reply with an ICMP Port Unreachable packet for a port probe on its unused 
UDP ports, and a TCP Reset packet for a port probe on its unused TCP ports. 
Note that the probing packets must first traverse the P-660HWP-Dx's firewall 
mechanism before reaching this anti-probing mechanism. Therefore if the firewall 
mechanism blocks a probing packet, the P-660HWP-Dx reacts based on the 
corresponding firewall policy to send a TCP reset packet for a blocked TCP 
packet or an ICMP port-unreachable packet for a blocked UDP packets or just 
drop the packets without sending a response packet.
Apply
Click Apply to save your changes to the P-660HWP-Dx.
Cancel
Click Cancel to begin configuring this screen afresh.