The following is an example of an ADSL modem using a Globespan chip to specify how to configure and manage
ADSL modem Built-in firewall.
First, the firewall settings
Into the ADSL Modem Management page, click on "Service →firewall", we can in the page on the firewall to do detailed settings.
Blacklist Status: Blacklist state. If you want Adslmodem to use the blacklist status to work, you can choose Enable, otherwise you will choose Disable.
Blacklist Period (min): The IP address of the specified computer is in the blacklist state in the prescribed time (in minutes).
Attack Protection: Tick "Enable" can be enabled
DOS Protection: Click the Enable option to get SYN DOS, ICMP dos, and Per-host dos service protection.
Max Half Open TCP Conn: The percentage of the current IP connection is open when the incomplete open state is set. TCP connections may run out of available IP connections in an incomplete open state, and if the percentage exceeds the limit, this incomplete open connection will be closed and a new connection will replace it.
Max ICMP Conn: Sets the percentage of the current number of connections used to manage ICMP, and if the percentage is exceeded, the new connection will begin to transfer data instead of the old connection.
Max single Host Conn: Sets the percentage of the current IP connection for a separate computer, taking into account the number of computers in the local area network.
Log destination: Used to list events that attack firewalls on records that can be sent to the system or to a designated administrator.
e-mail ID of Admin 1/2/3: Specify an administrator's e-mail address. Used to receive reports that the firewall was attacked. The e-mail report information sent includes the time of attack, the source IP address of the computer on which the attack was made, the destination IP address, the protocol used, and so on.
Second, the Management blacklist list
If you confirm that a packet has attacked the firewall settings or some IP filtering rules, the firewall will block the source IP address of the packet for a specified period of time, but the user must enable the Blacklist list setting.
To view the list of current blacklist computers, click Blacklist at the bottom of the firewall Settings page and include the following information in the table that appears:
Host IP address: Record hair
The IP address of the computer that attacked the packet.
Reason: A short description of the type of attack.
IPF rule ID: If the packet violates the IP filtering rule, then the ID number of the rule is displayed in this box.
Action: If the user wants the entries on the blacklist to be unblocked before it is automatically unblocked, the entries in the list can be deleted.