D-Link DFL-1500 [103/271] Setup anti dos

D-Link DFL-1500 [103/271] Setup anti dos
DFL-900/1500 User Manual Chapter 10
Firewall
95
Log Message Description
6 2004-11-30 10:50:18
192.168.17.173,4161
140.112.1.1,1863 TCP LAN2 WAN1
BLOCK Block-MSN
The firewall log is number 6. At the specified time (
2004-11-30 10:50:18),
the firewall
blocked the packet which came from source IP address/port
(
192.168.17.173:4161) to the destination IP address/port
(
140.112.1.1:1863) using TCP protocol. The direction of packet flow is
from LAN2 to WAN1 in this log. The packet matched the firewall rule
(Block-MSN) and then blocked it out according to the rule’s configuration.
7 2004-11-30 10:50:59
192.168.17.173:4199
140.116.5.8:80 TCP/(HTTP) LAN2
WAN1 Forward AllowHTTP
The firewall log is number 7. At the specified time (
2004-11-30 10:50:59),
the firewall
forwarded the packet which came from source IP address/port
(
192.168.17.173:4199) to the destination IP address/port
(
140.116.5.8:80) using TCP(HTTP) protocol. The direction of packet flow
is from LAN2 to WAN1 in this log. The packet matched the firewall rule
(AllowHTTP) and then forwarded it out according to the rule’s
configuration.
Table 10-5 Firewall Log examples
10.4.2 Setup Anti-DoS
Step 1. Setup Anti-DoS
With the Anti-DoS attacks protection
enabled, the DFL-1500 will be equipped with the
built-in Anti-DoS engine. Normal DoS attacks will
show up in the log when detecting and blocking
such traffic. However, Flooding attacks require
extra parameters to recognize. Check the
Enable DoS attacks protection checkbox.
And change the value of flooding thresholds as
your preference.
ADVANCED SETTINGS > Firewall > Anti-DoS
FIELD DESCRIPTION EXAMPLE
Enable DoS attacks protection
Enable the Denial of Service (DoS) attack protection. You
should enable this to activate any further settings.
Notice, the Anti-DoS feature can detect the TCP/UDP/ICMP
flooding on each interface of the firewall device.
Enabled

Содержание

Скачать