User manual

Table Of Contents
Reference: Configuration options
95
With a mouse click on the link you have the choice to reject or not to reject fragmented
ICMP packets.
TCP port scan
With this rule you can define when a TCP port scan is assumed by the Firewall and what
should be done in this case. This rule serves for preventing so-called TCP port scan
attack, which results in a detection of open TCP ports on your computer. This kind of
attack is used to search a computer for weak spots and is often followed by more
dangerous attack types.
Predefined rules for the TCP port scan
Setting: Low Setting: Medium Setting: High
Assume a TCP port scan if
50 or more ports were
scanned in 5,000
milliseconds.
When detected, log
attacker's IP and don't
add rule to block the
attack.
Assume a TCP port scan if
50 or more ports were
scanned in 5,000
milliseconds.
When detected, log
attacker's IP and add rule
to block the attack.
Same rule as for medium
level.
Ports
With a mouse click on the link a dialog box appears in which you can enter the number of
ports that must have been scanned so that a TCP port scan is assumed.
Port scan time window
With a mouse click on this link a dialog box appears in which you can enter the time span
for a certain number of port scans, so that a TCP port scan is assumed.
Report file
With a mouse click on the link you have the choice to log or don't log the attacker's IP
address.
Rule
With a mouse click on the link you have the choice to add or not to add the rule to block
the TCP port scan attack.
UDP port scan
With this rule you can define when a UDP port scan is assumed by the Firewall and what
should be done in this case. This rule prevents so-called UDP port scan attacks, which
result in a detection of open UDP ports on your computer. This kind of attack is used to
search a computer for weak spots and is often followed by more dangerous attack types.
Predefined rules for the UDP port scan
Setting: Low Setting: Medium Setting: High
Assume a UDP port scan
if 50 or more ports were
scanned in 5,000
Assume a UDP port scan
if 50 or more ports were
scanned in 5,000
Same rule as for medium
level.