TMS zl Management and Configuration Guide ST.1.1.100226
4-102
Firewall
Attack Checking
10. Click OK and Close.
11. Click Save.
12. Configure a firewall access policy with the following parameters:
• Action—Permit Traffic
• From—INTERNAL
• To—EXTERNAL
• Service—TCP 1584–1585
• Source—Any Address
• Destination—172.19.55.0/24 and 172.23.11.0/24 (create a multiple-
entry network address object as shown in “Named Objects and Their
Uses” on page 4-10).
13. Configure another access policy to permit the reverse traffic. See “Fire-
wall Access Policies” on page 4-22 for instructions.
Attack Checking
The TMS zl Module automatically detects and blocks specific known
attacks. It monitors TCP handshakes and drops packets with flags that signal
known attacks.
The TMS zl Module firewall checks for these attacks by default:
■ IP spoofing
■ Ping of death
■ Land attacks
■ IP reassembly attacks
Note You cannot prevent the firewall from dropping packets that display the signs
of these attacks.
Additionally, you can enable and disable certain optional checks, including
those for the following attacks:
■ ICMP replay
■ ICMP error messages
■ SYN flooding
■ Source routing