Netgear FVS336G-300NAS Specifications Page 270

  • Download
  • Add to my manuals
  • Print
  • Page
    / 693
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 269
Customize Firewall Protection
270
ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv3
8. Click the Apply button.
Your settings are saved.
Manage the Ping Settings for the IPv6 WAN Ports
The following procedure describes how to manage a WAN security check for IPv6 traffic by
specifying the ping settings for the WAN ports. By default, the VPN firewall does not allow
pings on the IPv6 WAN ports. Keep this setting unless you have a specific reason to enable the
VPN firewall to respond to a ping from the Internet.
To allow pings on the IPv6 WAN ports and specify the ping settings:
1. On your computer, launch an Internet browser.
2. In the address field of your browser, enter the IP address that was assigned to the VPN
firewall during the installation process.
The VPN firewall factory default IP address is 192.168.1.1.
The NETGEAR Configuration Manager Login screen displays.
3. In the Username field, type your user name and in the Password / Passcode field, type
your password.
LAN Security Checks
Block UDP flood Select the Block UDP flood check box to prevent the VPN firewall from accepting
more than a specified number of simultaneous, active User Datagram Protocol
(UDP) connections from a single device on the LAN. By default, the Block UDP
flood check box is selected.
In the UDP Flood Limit field, enter the number of connections per second that
defines a UDP flood. You can enter a number from 1 to 40. The default value is 40.
The VPN firewall drops UDP packets that exceed the specified number of
connections per second.
A UDP flood is a form of denial of service attack that can be initiated when one
device sends many UDP packets to random ports on a remote host. As a result, the
distant host does the following:
1. Checks for the application listening at that port.
2. Sees that no application is listening at that port.
3. Replies with an ICMP Destination Unreachable packet.
When the victimized system is flooded, it is forced to send many ICMP packets,
eventually making it unreachable by other clients. The attacker might also spoof the
IP address of the UDP packets, ensuring that the excessive ICMP return packets do
not reach the attacker, thus making the attacker’s network location anonymous.
Disable Ping Reply
on LAN Ports
Select the Disable Ping Reply on LAN Ports check box to prevent the VPN firewall
from responding to a ping on a LAN port. A ping can be used as a diagnostic tool.
Keep this check box cleared unless you have a specific reason to prevent the VPN
firewall from responding to a ping on a LAN port.
Setting Description
Page view 269
1 2 ... 265 266 267 268 269 270 271 272 273 274 275 ... 692 693

Comments to this Manuals

No comments