Specifications

WAN Configuration 4-7
Click the Apply button to save changes made on this screen.
4.2.4 Enabling NetBIOS ALG
Use the NetBIOS ALG feature to allow hosts on WAN side of WS2000 to access Windows™ share folders
with HOSTNAME instead of the IP address of the LAN PC. When this feature is enabled, the Host need not
know the IP address of the LAN PC to access it. The LAN PC can be access by it’s name\share combination
through Windows Explorer. For example, \\UserHome\JohnDoe.
Configuring NetBIOS ALG access requires two steps. Most of the configuration for using NetBIOS must be
performed on the client device on the WAN side. On the devices on the WAN side of WS2000, the following
configuration must be performed.
Configuring WAN Hosts
The WAN hosts should map the HOSTNAME of the LAN side PC against the WAN IP address of the
WS2000 in their
c:\windows\system32\drivers\etc\lmhosts file.
WAN hosts should have their NetBIOS over TCP/IP enabled.
To enable NetBIOS over TCP/IP on the WAN Hosts, do the following
1. Open the Local Area Connection Properties dialog for the WAN Host.
2. Click Internet Protocol (TCP/IP) to select it.
FTP Bounce Attack Check An FTP bounce attack uses the PORT command in FTP mode to gain
access to arbitrary ports on machines other than the originating client.
IP Unaligned Timestamp
Check
An IP unaligned timestamp attack uses a frame with the IP timestamp
option, where the timestamp is not aligned on a 32-bit boundary.
Sequence Number Prediction
Check
A sequence number prediction attack establishes a three-way TCP
connection with a forged source address, and the attacker guesses the
sequence number of the destination host’s response.
IP Spoof Attack Check An IP Spoof Attack floods a destination host using an IP address that
is not reachable on that interface.
Reset Attack Check An attack where the TCP session is ended prematurely by an attacking
host.
Sequence Number Out of
Range Check
An attack which uses packet numbers which are out of the valid
sequence range.
Mime Flood Attack Check A MIME flood attack uses an improperly formatted MIME header in
“sendmail” to cause a buffer overflow on the destination host.
Use the Max Header Length field to set the maximum allowable header
length. Set this value to be at least 256 bytes.
Use the Max Headers field to set the maximum number of headers allowed.
Set this value to be at least 12.
TCP FIN timeout Enter a TCP FIN timeout value (in seconds) to determine how long the
WS2K has to wait to receive a FIN before it closes the TCP connection.
NOTE These instructions are only valid for the Windows ™ operating system.