Check Point UTM-1 Edge User Manual page 425

Internet security appliance
Hide thumbs Also See for UTM-1 Edge:
Table of Contents

Advertisement

FTP Bounce
When connecting to an FTP server, the client sends a PORT command specifying the IP
address and port to which the FTP server should connect and send data. An FTP Bounce
attack is when an attacker sends a PORT command specifying the IP address of a third
party instead of the attacker's own IP address. The FTP server then sends data to the victim
machine.
You can configure how FTP bounce attacks should be handled.
Table 87: FTP Bounce Fields
In this field...
Do this...
Action
Specify what action to take when an FTP Bounce attack occurs, by selecting
one of the following:
Track
Specify whether to log FTP Bounce attacks, by selecting one of the
following:
Chapter 13: Using SmartDefense
Block. Block the attack. This is the default.
None. No action.
Log. Log the attack. This is the default.
None. Do not log the attack.
SmartDefense Categories
411

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the UTM-1 Edge and is the answer not in the manual?

Table of Contents

Save PDF