Secure Computing SG300 User Manual page 306

Snapgear gateway
Hide thumbs Also See for SG300:
Table of Contents

Advertisement

Commonly used interfaces are:
eth0
eth1
pppX
IPSecX
The firewall rules deny all packets arriving from the WAN port by default. There are a few
ports open to deal with traffic such as DHCP, VPN services and similar. Any traffic that
does not match the exceptions however is dropped.
There are also some specific rules to detect various attacks (smurf, teardrop, etc.).
When outbound traffic (from LAN to WAN) is blocked by custom rules configured in the
GUI, the resultant dropped packets are also logged.
The <prefix> for all these rules is varied according to their type.
Currently used prefixes for traffic arriving:
Default Deny
Invalid
Smurf
Spoof
SynFlood
Custom
Appendix B – System Log
the LAN port
the WAN/Internet port
e.g. ppp0 or ppp1, a PPP session
e.g. IPSec0, an IPSec interface
Packet didn't match any rule, drop it
Invalid packet format detected
Smurf attack detected
Invalid IP address detected
SynFlood attack detected
Custom rule dropped outbound packet
300

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SG300 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Sg530Sg570Sg575Sg580Sg550Sg560 ... Show all

Table of Contents