Инструкция по эксплуатации Planet Technology VIP280

Страница 32

Advertising
background image

Приобрести оборудование PLANET для SIPNET с доставкой до Вашего дома или офиса вы можете на

www.pchome.ru

или по телефону +7 (495) 786-23-09.

The Inspection Module has access to the "raw message," and can examine data from all packet layers. In addition, the

firewall router analyzes state information from previous communications and other applications. The Inspection Module
examines IP addresses, port numbers, and any other information required in order to determine whether packets comply
with the enterprise security policy. The Inspection Module stores and updates state and context information in dynamic
connections tables. These tables are continually updated, providing cumulative data against which the router checks
subsequent communications. The router follows the security principle of "All communications are denied unless expressly
permitted." By default, the router drops traffic that is not explicitly allowed by the security policy and generates real-time
security alerts, providing the system manager with complete network status.

Securing "Stateless" Protocols

The firewall router¡¦s Inspection Module understands the internal structures of the IP protocol family and applications

built on top of them. For stateless protocols such as UDP, the Inspection Module extracts data from a packet's application
content and stores it in the state connections tables, providing context in cases where the application does not provide it. In
addition, the Inspection Module can dynamically allow or disallow connections as necessary. These capabilities provide the
highest level of security for complex protocols.

Why is this router secure ?

This router is pre-configured to automatically detect and thwart Denial of Service (DoS) attacks such as Ping of

Death/Teardrop, SYN Flood/LAND Attack, Smurf Attack, IP Spoofing, Port Scan, etc. It also uses stateful packet
inspection to determine if an inbound connection is allowed through the firewall to the private LAN. The router supports
Network Address Translation (NAT), which translates the private local addresses to one or multiple public addresses. This
adds another extra level of security since the clients on the private LAN are invisible to the Internet.

What kind of firewall is the router ?

• The router's built-in firewall module inspects packets contents and IP headers. It is applicable to all protocols and

understands data in the packet is intended for other layers, from network layer up to the application layer.

• The router's firewall performs stateful inspection. It takes into account the state of connections it handles so that,

for example, a legitimate incoming packet can be matched with the outbound request for that packet and allowed
in. Conversely, an incoming packet masquerading as a response to a nonexistent outbound request can be blocked.

• The router's firewall uses session filtering, i.e., smart rules, that enhance the filtering process and control the

network session rather than control individual packets in a session.

• The router's firewall is fast. It uses a hashing function to search the matched session cache instead of going

through every individual rule for a packet.

• The router's firewall provides email service to notify you when attacks occur.

Why do you need this router when your router has only packet filtering or/and NAT built-in?

With the spectacular growth of the Internet and online access, companies that do business on the Internet face greater
security threats. Although packet filter and NAT restrict access to particular computers and networks, however, for the
other companies this security may be insufficient, because packets filters typically cannot maintain session state. Thus, for
greater security, a firewall router is considered.

Атаки Denial of Service (DoS):

Что такое атаки Denials of Service (DoS)?

Denial of Service (DoS) attacks are aimed at devices and networks with a connection to the Internet. Their

goal is not to steal information, but to disable a device or network so users no longer have access to network
resources.

Основные типы DoS атак:

Those that exploits bugs in a TCP/IP implementation such as Ping of Death and Teardrop.

Those that exploits weaknesses in the TCP/IP specification such as SYN Flood and LAND Attacks.

Brute-force attacks that flood a network with useless data such as Smurf attack.

IP Spoofing

Что такое атака Ping of Death?

Advertising