NETGEAR UTM25-100NAS - Prosecure Utm Appliance 25U No Sub Included Reference Manual page 135

Prosecure unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
2. Click the Attack Checks submenu tab. The Attack Checks screen displays.
Figure 5-11
3. Enter the settings as explained in
Table 5-4. Attack Checks Settings
Setting
WAN Security Checks
Respond To Ping On
Internet Ports
Enable Stealth Mode Select the Enable Stealth Mode checkbox (which is the default setting) to
Block TCP Flood
Firewall Protection
Table
5-4.
Description (or Subfield and Description)
Select the Respond To Ping On Internet Ports checkbox to enable the UTM to
respond to a ping from the Internet. A ping can be used as a diagnostic tool.
Keep this checkbox deselected unless you have a specific reason to enable the
UTM to respond to a ping from the Internet.
prevent the UTM from responding to port scans from the WAN, thus making it
less susceptible to discovery and attacks.
Select the Block TCP Flood checkbox to enable the UTM to drop all invalid
TCP packets and to protect the UTM from a SYN flood attack.
A SYN flood is a form of denial of service attack in which an attacker sends a
succession of SYN requests to a target system. When the system responds, the
attacker does not complete the connections, thus leaving the connection half-
open and flooding the server with SYN messages. No legitimate connections
can then be made. By default, the Block TCP Flood checkbox is deselected.
v1.0, September 2009
5-21

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure utm10Prosecure utm25

Table of Contents