30.01.2015 Views

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8.3 Special Security Settings<br />

Anti-Spoofing<br />

Anti-Spoofing checks whether only packets with allowed source IP addresses are received at<br />

individual interfaces of the <strong>Kerio</strong> Control host. This function protects <strong>Kerio</strong> Control host from<br />

attacks from the internal network that use false IP addresses (so called spoofing).<br />

For each interface, any source IP address belonging to any network connected to the interface<br />

is correct (either directly or using other routers). For any interface connected to the Internet<br />

(so called external interface), any IP address which is not allowed at any other interface is<br />

correct.<br />

Detailed information on networks connected to individual interfaces is acquired in the routing<br />

table.<br />

The Anti-Spoofing function can be configured in the<br />

Anti-Spoofing folder in Configuration → Advanced Options.<br />

Enable Anti-Spoofing<br />

This option activates Anti-Spoofing.<br />

Log<br />

If this option is on, all packets that have not passed the anti-spoofing rules will be logged<br />

in the Security log (for details see chapter 22.11).<br />

Connections Count Limit<br />

This security function defines a limit for the maximum number of network connections which<br />

can be established from one local host (workstation) to the Internet or from the Internet to the<br />

local server via a mapped port.<br />

Incoming and outgoing connections are monitored separately. If number of all connections<br />

established from/to a single local host in any direction reaches the specified value, <strong>Kerio</strong><br />

Control block any further connections in the particular direction.<br />

These restrictions protects firewall (<strong>Kerio</strong> Control host) from overload and may also help<br />

protect it from attacks to the target server, reduce activity and impact of a worm or Trojan<br />

horse.<br />

Count limit for outgoing connections is useful for example when a local client host is attacked<br />

by a worm or Trojan horse which attempts to establish connections to larger number of<br />

various servers. Limiting of number of incoming connections can for example prevent the<br />

target from so called SYN flood attacks (flooding the server by opening too many concurrent<br />

connections without any data transferred).<br />

119

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!