The setting method of ADSL Modem Firewall--Networking tutorial
Source: Internet
Author: User
Many ADSL modems are integrated with firewall capabilities to protect user systems from denial of service (DoS) attacks and malicious attacks from local area networks. And can be set to monitor the attack, once the problem can be found in the form of e-mail notification users. If your local area network is through the ADSL Modem sharing the Internet, the firewall that opens it is a good choice, although its function does not have the specialized firewall to be strong, but this is a meal "the free lunch" after all.
Below with a Globespan chip of ADSL modem for example, to detail how to configure and manage ADSL modem built-in firewall.
First, the firewall settings
Into the ADSL Modem Management page, click on the "service →firewall", we can in the page on the firewall to do detailed settings. as follows:
Blacklist Status: Blacklist state. If you want to let ADSL modem always use the blacklist state to work, you can choose Enable, or choose Disable.
Blacklist Period (min): The IP address of the specified computer is in the blacklist state in the prescribed time (in minutes).
Attack Protection: Check "Enable" can enable the ADSL modem built firewall protection function.
DOS Protection: Click the Enable option to get SYN DOS, ICMP dos, and Per-host dos service protection.
Max Half Open TCP Conn: The percentage of the current IP connection is open when the incomplete open state is set. TCP connections may run out of available IP connections in an incomplete open state, and if the percentage exceeds the limit, this incomplete open connection will be closed and a new connection will replace it.
Max ICMP Conn: Sets the percentage of the current number of connections used to manage ICMP, and if the percentage is exceeded, the new connection will begin to transfer data instead of the old connection.
Max single Host Conn: Sets the percentage of the current IP connection for a separate computer, taking into account the number of computers in the local area network.
Log destination: Used to list events that attack firewalls on records that can be sent to the system or to a designated administrator.
e-mail ID of Admin 1/2/3: Specify an administrator's e-mail address. Used to receive reports that the firewall was attacked. The e-mail report information sent includes the time of attack, the source IP address of the computer on which the attack was made, the destination IP address, the protocol used, and so on.
Second, the Management blacklist list
If you confirm that a packet has attacked the firewall settings or some IP filtering rules, the firewall will block the source IP address of the packet for a specified period of time, but the user must enable the Blacklist list setting.
To view the list of current blacklist computers, click Blacklist at the bottom of the firewall Settings page and include the following information in the table that appears:
Host IP Address: Logs the IP address of the computer that emitted the attack packet.
Reason: A short description of the type of attack.
IPF rule ID: If the packet violates the IP filtering rule, then the ID number of the rule is displayed in this box.
Action: If the user wants the entries on the blacklist to be unblocked before it is automatically unblocked, the entries in the list can be deleted.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.