Descriptions of Other Options

When configuring a signature set, you can also configure other protocol-related options. The available options may vary by different protocol types. This section describes options for specific protocols in detail.


DNS

Protocol anomaly detection: Specifies a check level for the protocol validity check of the signature set.


FTP

Action for brute-force: If the login attempts per minute fail for the times specified by the threshold, StoneOS will identify the attempts as an intrusion and take an action according to the configuration.

Protocol anomaly detection: Specifies a check level for the protocol validity check of the signature set.

Banner protection: Select the Enable check box to enable protection against FTP server banners.

Max command line length: Specifies a max length (including carriage return) for the FTP command line. The value range is 5 to 1024 bytes.

Max response line length: Specifies a max length for the FTP response line. The value range is 5 to 1024 bytes.


HTTP

Basic

Protocol anomaly detection: Specifies a check level for the protocol validity check of the signature set.

Banner protection: Select the Enable check box to enable protection against HTTP server banners.

Max URI length: Specifies a max URI length for the HTTP protocol. The value range is 64 to 4096 bytes.

Web Server Protection

New: Click the New button and configure Web servers the Web Server Configuration dialog. The system has a default Web server named "default" which is enabled by default, and cannot be disabled or deleted. At most 32 Web servers can be configured (not include the default Web server).

Enable: Select the Web server from the Web server table and click this button to enable it.

Disable: Select the Web server from the Web server table and click this button to disable it.

Edit: Select the Web server from the Web server table and click this button to edit it.

Delete: Select the Web server from the Web server table and click this button to delete it.

Options on the Web Server Configuration dialog are:

Web server name: Specifies the name of the Web server.

Configure Domain: Specifies domains for the Web server. Click this link, the Configure Domain dialog appears. At most 5 domains can be configured for one Web server. The domain name of the Web server follows the longest match rule from the back to the front. The traffic that does not match any rules will match the default Web server. For example, you have configured two Web servers: web_server1 and web_server2. web_server1 contains the domain name abc.com and web_server2 contains the domain name email.abc.com. After configuring the settings, the traffic that visits news.abc.com will match the web_server1, the traffic that visits www.email.abc.com will math web_server2, and the traffic that visits www.abc.com.cn will match the default Web server.

SQL injection protection: Select the Enable check box to enable SQL injection check for the HTTP protocol.

XSS injection protection: Select the Enable check box to enable XSS injection check for the HTTP protocol.

External link check: Select the Enable check box to enable external link check for the Web server. This function controls the access to the external resource.

ACL: Select the Enable check box to enable access control for the Web server. The access control function checks the the upload paths of the websites to prevent the malicious code uploading from attackers.

HTTP request flood protection: Select the Enable check box to enable the HTTP request flood protection.

 

 

Allowed methods: Specifies allowed HTTP method(s).

XSS check: Select the Enable check box to enable XSS check for the HTTP protocol.

SQL check:

Command injection check: Select the Enable check box to enable command injection check for the HTTP protocol.


POP3

Action for brute-force: If the login attempts per minute fail for the times specified by the threshold, StoneOS will identify the attempts as an intrusion and take an action according to the configuration.

Protocol anomaly detection: Specifies a check level for the protocol validity check of the signature set.

Banner protection: Select the Enable check box to enable protection against POP3 server banners.

Max command line length: Specifies a max length (including carriage return) for the POP3 command line. The value range is 5 to 1024 bytes.

Max parameter length: Specifies a max length for the POP3 client command parameter. The value range is 8 to 256 bytes.

Max failure time: Specifies a max failure time (within one single POP3 session) for the POP3 server. The value range is 0 to 512 times.


SMTP

Action for brute-force: If the login attempts per minute fail for the times specified by the threshold, StoneOS will identify the attempts as an intrusion and take an action according to the configuration.

Protocol anomaly detection: Specifies a check level for the protocol validity check of the signature set.

Banner protection: Select the Enable check box to enable protection against SMTP server banners.

Max command line length: Specifies a max length (including carriage return) for the SMTP command line. The value range is 5 to 1024 bytes.

Max path length: Specifies a max length for the reverse-path and forward-path field in the SMTP client command. The value range is 16 to 512 bytes (including punctuation marks).

Max reply line length: Specifies a max reply line length for the SMTP server. The value range is 64 to 1024 bytes (including carriage return).

Max text line length: Specifies a max length for the E-mail text of the SMTP client. The value range is 64 to 2048 bytes (including carriage return).

Max content type length: Specifies a max length for the Content-Type field. The value range is 64 to 1024 bytes

Max content filename length: Specifies a max length for the filename of E-mail attachment. The value range is 64 to 1024 bytes

Max failure time: Specifies a max failure time (within one single SMTP session) for the SMTP server. The value range is 0 to 512 times.


Telnet

Action for brute-force: If the login attempts per minute fail for the times specified by the threshold, StoneOS will identify the attempts as an intrusion and take an action according to the configuration.

Protocol anomaly detection: Specifies a check level for the protocol validity check of the signature set.

Username/Password max length: Specifies a max length for the username and password used in Telnet. The value range is 64 to 1024 bytes


Other-TCP/Other-UDP/IMAP/Finger/NNTP/TFTP/SNMP/MySQL/MSSQL/ORACLE/NetBIOS/DHCP/LDAP/VoIP

Max scan length: Specifies a max scan length. The value range is 0 to 65535 bytes.


SUNRPC

Protocol anomaly detection: Specifies a check level for the protocol validity check of the signature set.


MSRPC

Action for brute-force: If the login attempts per minute fail for the times specified by the threshold, StoneOS will identify the attempts as an intrusion and take an action according to the configuration.

Protocol anomaly detection: Specifies a check level for the protocol validity check of the signature set.

Max bind length: Specifies a max length for MSRPC's binding packets. The value range is 16 to 65535 bytes.

Max request length: Specifies a max length for MSRPC's request packets. The value range is 16 to 65535 bytes.