General Setup - Draytek VigorPro 5300 User Manual

Unified security firewall
Hide thumbs Also See for VigorPro 5300:
Table of Contents

Advertisement

vulnerability attacks will try to paralyze the system by offending the vulnerabilities of the
protocol or operation system.
The DoS Defense function enables the Vigor router to inspect every incoming packet based
on the attack signature database. Any malicious packet that might duplicate itself to paralyze
the host in the secure LAN will be strictly blocked and a Syslog message will be sent as
warning, if you set up Syslog server.
Also the Vigor router monitors the traffic. Any abnormal traffic flow violating the pre-defined
parameter, such as the number of thresholds, is identified as an attack and the Vigor router
will activate its defense mechanism to mitigate in a real-time manner.
The below shows the attack types that DoS/DDoS defense function can detect:
1. SYN flood attack
2. UDP flood attack
3. ICMP flood attack
4. TCP Flag scan
5. Trace route
6. IP options
7. Unknown protocol
8. Land attack
A
n
t
i
-
V
A
n
t
i
-
V
Users might have much more confidence about the security in the network for data
transmission if the functions of anti-virus and anti-intrusion are activated. The VigorPro
router offers the mechanism of anti-virus and anti-intrusion. What you have to do is to set the
proper profiles and invoke them. The anti-virus profile and anti-intrusion configuration can
be set in Anti-Virus menu (refer to section 3.7) and Anti-Intrusion menu (refer to section 3.6).
However, the mechanism must be enabled either in Firewall>>General Setup or
Firewall>>Filter Setup web page. After you choose proper Anti-Virus profile and check
Anti-Intrusion box, the Anti-Virus and Anti-Intrusion LEDs on the front panel will light up.
Below shows the menu items for Firewall.
3
.
6
.
2
G
e
n
e
r
a
3
.
6
.
2
G
e
n
e
r
a
General Setup allows you to adjust settings of IP Filter and common options. Here you can
enable or disable the Call Filter or Data Filter. Under some circumstance, your filter set can
be linked to work in a serial manner. So here you assign the Start Filter Set only. Also you
can configure the Log Flag settings, Apply IP filter to VPN incoming packets, and Accept
incoming fragmented UDP packets.
Important: When some packet does not fit the rule configured in Filter Setup web page,
the filtering action configured in general setup web page will apply to that packet.
Click Firewall and click General Setup to open the general setup page.
VigorPro5300 Series User's Guide
i
r
u
s
a
n
d
A
n
t
i
-
I
n
t
r
i
r
u
s
a
n
d
A
n
t
i
-
I
n
t
r
l
S
e
t
u
p
l
S
e
t
u
p
9. Smurf attack
10. SYN fragment
11. ICMP fragment
12. Tear drop attack
13. Fraggle attack
14. Ping of Death attack
15. TCP/UDP port scan
u
s
i
o
n
u
s
i
o
n
79

Advertisement

Table of Contents
loading

Table of Contents