WatchGuard Firebox System 7.0 User Guide

WatchGuard Firebox System 7.0 User Guide WatchGuard Firebox System 7.0 User Guide

watchguard.com
from watchguard.com More from this publisher
11.07.2015 Views

Chapter 11: Intrusion Detection and Preventionprotection feature will self-activate. Once active, furtherconnection attempts from the external side of the Fireboxmust be verified before being allowed to reach your servers.Connections that cannot be verified are not allowedthrough, thus protecting your server from having a fullbacklog.The SYN Flood protection feature will self-deactivate whenit senses the attack is over.From Policy Manager:1 On the toolbar, click the Default Packet Handling icon.You can also, from Policy Manager, select Setup => IntrusionPrevention => Default Packet Handling.The Default Packet Handling dialog box appears.2 Select the checkbox marked Block SYN Flood Attacks.Changing SYN flood settingsActive SYN flood defenses can occasionally prevent legitimateconnection attempts from being completed. If youfind that too many legitimate connection attempts failwhen your SYN flood defense is active, you can changeSYN flood settings to minimize this problem.You can set the maximum number of incomplete TCP connectionsthe Firebox allows before the SYN flood defense isactivated. The default setting of 60 means that when thenumber of TCP connections waiting to be validated climbsto 61 or above, SYN flood defense is activated. Conversely,when the number of connections waiting for validationdrops to 59 or less, SYN flood defense is deactivated. Youmight need to adjust this setting to custom-fit the SYN Floodprotection feature for your network. Every time the featureself-activates, a log message will be recorded statingSYN Validation: activated. When the feature selfdeactivates,the log message SYN Validation: deactivatedwill be recorded. If these messages occur frequentlywhen your server is not under attack, the MaximumIncomplete Connections setting may be too low. If the SYNFlood protection feature is not preventing attacks from182 WatchGuard Firebox System

Detecting Man-in-the-Middle Attacksaffecting your server, the setting may be too high. Consultyour server’s documentation for help choosing a newvalue, or experiment by adjusting the setting until theproblems disappear.The validation timeout controls how long the Firebox“remembers” clients that pass the validation test. Thedefault setting of 120 seconds means that a client thatdrops a legitimate connection has a two-minute window toreconnect without being challenged. Setting the validationtimeout to zero seconds means that legitimate connectionsare “forgotten” when dropped, so every connectionattempt is challenged.From Policy Manager:1 On the toolbar, click the Default Packet Handling icon.You can also, from Policy Manager, select Setup => IntrusionPrevention => Default Packet Handling.The Default Packet Handling dialog box appears.2 Use the SYN Validation Timeout box to set how longthe Firebox “remembers” a validated connection afterthat connection is dropped.3 Use the Maximum Incomplete Connections box to setthe number of connections awaiting validation that areallowed to queue before the Firebox automaticallyactivates SYN flood defense.Detecting Man-in-the-Middle AttacksMan-in-the-middle attacks deceive two parties into thinkingthey are communicating with each other while they areactually both communicating with a third party. Theattacker can then intercept data passing through the connection.User Guide 183

Chapter 11: Intrusion Detection and Preventionprotection feature will self-activate. Once active, furtherconnection attempts from the external side of the <strong>Firebox</strong>must be verified before being allowed to reach your servers.Connections that cannot be verified are not allowedthrough, thus protecting your server from having a fullbacklog.The SYN Flood protection feature will self-deactivate whenit senses the attack is over.From Policy Manager:1 On the toolbar, click the Default Packet Handling icon.You can also, from Policy Manager, select Setup => IntrusionPrevention => Default Packet Handling.The Default Packet Handling dialog box appears.2 Select the checkbox marked Block SYN Flood Attacks.Changing SYN flood settingsActive SYN flood defenses can occasionally prevent legitimateconnection attempts from being completed. If youfind that too many legitimate connection attempts failwhen your SYN flood defense is active, you can changeSYN flood settings to minimize this problem.You can set the maximum number of incomplete TCP connectionsthe <strong>Firebox</strong> allows before the SYN flood defense isactivated. The default setting of 60 means that when thenumber of TCP connections waiting to be validated climbsto 61 or above, SYN flood defense is activated. Conversely,when the number of connections waiting for validationdrops to 59 or less, SYN flood defense is deactivated. Youmight need to adjust this setting to custom-fit the SYN Floodprotection feature for your network. Every time the featureself-activates, a log message will be recorded statingSYN Validation: activated. When the feature selfdeactivates,the log message SYN Validation: deactivatedwill be recorded. If these messages occur frequentlywhen your server is not under attack, the MaximumIncomplete Connections setting may be too low. If the SYNFlood protection feature is not preventing attacks from182 <strong>WatchGuard</strong> <strong>Firebox</strong> <strong>System</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!