Configuring Attack Defense

To configure Attack Defense, take the following steps:

  1. On the Navigation pane, click Configure > Security > Attack Defense to visit the Attack Defense page.
  2. Select a security zone for Attack Defense from the Zone drop-down list.
  3. To enable all the Attack Defense functions for the security zone, select the Enable all check box, and also select an action from the Action drop-down list. To enable an individual defense function, select its corresponding check box.
  4. Configure parameters for the selected functions.
  5. Click OK to save the changes.

Options for Attack Defense are described in detail as follows:


Select a zone

Zone: Select a security zone for Attack Defense from the Zone list.


Select all

Enable all: Select this check box to enable all the Attack Defense functions for the security zone.

Action: Specifies an action for all the Attack Defense functions, i.e., the defense measure the system will take if any attack has been detected.


Flood defense

ICMP flood: Select this check box to enable ICMP flood defense for the security zone.

UDP flood: Select this check box to enable UDP flood defense for the security zone.

ARP spoofing: Select this check box to enable ARP spoofing defense for the security zone.

SYN flood: Select this check box to enable SYN flood defense for the security zone.


MS-Windows defense

WinNuke attack: Select this check box to enable WinNuke attack defense for the security zone. If any WinNuke attack has been detected, system will drop the packets and give an alarm.


Scan/spoof defense

IP address spoof: Select this check box to enable IP address spoof defense for the security zone. If any IP address spoof attack has been detected, system will drop the packets and give an alarm.

IP address sweep: Select this check box to enable IP address sweep defense for the security zone.

Port scan: Select this check box to enable port scan defense for the security zone.


Denial of service defense

Ping of Death attack: Select this check box to enable Ping of Death attack defense for the security zone. If any Ping of Death attack has been attacked, system will drop the attacking packets, and also give an alarm.

Teardrop attack: Select this check box to enable Teardrop attack defense for the security zone. If any Teardrop attack has been attacked, system will drop the attacking packets, and also give an alarm.

IP fragment: Select this check box to enable IP fragment defense for the security zone.

IP option: Select this check box to enable IP option attack defense for the security zone. system will defend against the following types of IP options: Security, Loose Source Route, Record Route, Stream ID, Strict Source Route and Timestamp.

Smurf or fraggle attack: Select this check box to enable Smurf or fraggle attack defense for the security zone.

Land attack: Select this check box to enable Land attack defense for the security zone.

Large ICMP packet: Select this check box to enable large ICMP packet defense for the security zone.


Proxy

SYN proxy: Select this check box to enable SYN proxy for the security zone. SYN proxy is designed to defend against SYN flood attacks in combination with SYN flood defense. When both SYN flood defense and SYN proxy are enabled, SYN proxy will act on the packets that have already passed detections for SYN flood attacks.


Protocol anomaly report

TCP option anomaly: Select this check box to enable TCP option anomaly defense for the security zone.


DNS query flood

DNS query flood: Select this check box to enable DNS query flood defense for the security zone.

Recursive DNS query flood: Select this check box to enable recursive DNS query flood defense for the security zone.