Help - Security | Help Index | Glossary |
Firewall | |
Enable | If enabled, DoS (Denial of Service) attacks will be detected and blocked. The default is enabled. It is strongly recommended that this setting be left enabled.
Note:
|
Threshold | This setting affects the number of "half-open" connections allowed.
|
Options | |
Respond to ICMP | The ICMP protocol is used by the "ping" and "traceroute" programs, and by network monitoring and diagnostic programs.
|
Allow VPN Passthrough |
The IPSec, PPTP, and L2TP protocols are used to establish a secure connection, and are widely used by VPN (Virtual Private Networking)programs.
Note: IPSec sessions must NOT use AH (Authentication Header). Packets using AH cannot be routed correctly. |
Drop Fragmented IP Packets |
If enabled, fragmented IP packets are discarded, forcing re-transmission of these packets. In some situations, this could prevent successful commnunication. |
Block TCP Flood | A TCP flood is excessively large number of TCP connection requests. This is usually a DoS (Denial of Service) attack. This setting should be normally be enabled. |
Block UDP Flood | A UDP flood is excessively large number of UDP packets. This is usually a DoS (Denial of Service) attack. This setting should be normally be enabled. |
Block non-standard packets |
Abnormal packets are often used by hackers and in DoS attacks, but may also be generated by mis-configured network devices. (PCs will normally not generate non-standard packets.) This setting should normally be enabled. |