Configuring DoS blocking





LANconfig: Firewall/QoS > DoS

Command line: Setup > IP-Router > Firewall

Important: In order to drastically reduce the vulnerability of the network to DoS attacks, packets from remote networks should only be accepted if either a connection from the internal network was initiated or if the incoming packets are allowed through by an explicit filter entry (source: remote network, destination: local network). This measure already blocks a large number of attacks.

For all permitted accesses, the device explicitly checks the connection state, the source addresses, and the correctness of the fragments. This is performed both for incoming and outgoing packets, since an attack can also be launched from within the local network.

In order to avoid opening a path for DoS attacks due to the incorrect configuration of the firewall, this aspect is configured centrally. Along with the maximum number of half-open connections, the packet action and the available reporting mechanisms, there are further reaction options:

The following protection mechanisms are always active:

www.lancom-systems.com

LANCOM Systems GmbH | A Rohde & Schwarz Company | Adenauerstr. 20/B2 | 52146 Wuerselen | Germany | E‑Mail info@lancom.de

LANCOM Logo