Motorola WiNG 5.7.1 System Reference Manual page 634

Table of Contents

Advertisement

8 - 10 WiNG 5.7.1 Access Point System Reference Guide
15. Refer to the
General
Enable Proxy ARP
DHCP Broadcast to
Unicast
L2 Stateful Packet
Inspection
IPMAC Conflict Enable
IPMAC Conflict Logging
IPMAC Conflict Action
IPMAC Routing Conflict
Enable
IPMAC Routing Conflict
Logging
IPMAC Routing Conflict
Action
DNS Snoop Entry
Timeout
IP TCP Adjust MSS
TCP MSS Clamping
Max Fragments/
Datagram
Max Defragmentations/
Host
Min Length Required
Virtual Defragmentation
field to enable or disable the following firewall parameters:
Select the radio button to allow the Firewall Policy to use Proxy ARP responses for this
policy on behalf of another device. Proxy ARP allows the firewall to handle ARP routing
requests for devices behind the firewall. This feature is enabled by default.
Select the radio button to enable the conversion of broadcast DHCP offers to unicast.
Converting DHCP broadcast traffic to unicast traffic can help reduce network traffic
loads.This feature is disabled by default.
Select the radio button to enable stateful packet inspection for routed interfaces within
the Layer 2 Firewall. This feature is enabled by default.
Select this option to log and act upon detected IPMAC conflicts. These occur when
removing a device from the network and attaching another using the same IP address.
When enabled, use the drop-down menu to set the logging level (Error, Warning,
Notification, Information or Debug) if an attack is detected. The default setting is
Warning.
Use the drop-down menu to set the action taken when an attack is detected. Options
include Log Only, Drop Only or Log and Drop. The default setting is Log and Drop.
Select this option to enable IPMAC Routing Conflict detection. This is also known as a
Hole-196 attack in the network. This feature helps to detect if the client is sending routed
packets to the correct MAC address.
Select enable logging for IPMAC Routing Conflict detection. This feature is enabled by
default and set to Warning.
Use the drop-down menu to set the action taken when an attack is detected. Options
include Log Only, Drop Only or Log and Drop. The default setting is Log and Drop.
Select this option and set a timeout, in seconds, for DNS Snoop Entry. DNS Snoop Entry
stores information such as Client to IP Address and Client to Default Gateway(s) and uses
this information to detect if the client is sending routed packets to a wrong MAC address.
Select this option and adjust the value for the maximum segment size (MSS) for TCP
segments on the router. Set a value between 472 bytes and 1,460 bytes to adjust the MSS
segment size. The default value is 472 bytes.
Select this option to enable TCP MSS Clamping. TCP MSS Clamping allows configuration
for the maximum segment size of packets at a global level.
Set the maximum number of fragments (from 2 - 8,129) allowed in a datagram before it is
dropped. The default value is 140 fragments.
Set the maximum number of defragmentations, from 1 - 16,384 allowed per host before it
is dropped. The default value is 8.
Select this option and set a minimum length, from 8 bytes - 1,500 bytes, to enforce a
minimum packet size before being subject to fragment based attack prevention.
Select this option to enable IP Virtual Defragmentation, this helps prevent IP fragments
based attacks, such as tiny fragments or large number of IP fragments.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents