TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 9
l2tp - The Layer 2 Tunneling Protocol (L2TP) ALG
msn - The MSN ALG supports the following functionalities of
Microsoft Instant Messenger 7.0:
netbios - Windows Network Basic Input/Output System
(NetBIOS) ALG
nntp - The NNTP ALG interprets the GROUP command of the
NNTP packets
pptp - PPTP uses TCP 1723 for its control connection and Generic
Routing Encapsulation (GRE) for its data connection
rpc - The Remote Procedure Call ALG
rtspv4 - RTSP controls a stream that might be sent over a separate
protocol
smtp - The Simple Mail Transport Protocol ALG
sql - The SQL ALG interprets and translates the redirect messages
coming from the network listener.
tftp - The TFTP ALG creates a dynamic association to allow the
data transfer from server to client when it sees a write/read request
from the client on the control connection.
Port triggers make use of ALGs to support applications that negotiate
connections on ports other than their well-known ones. For example, the
Remote Procedure Call (RPC) in both Windows and UNIX systems have well-
known port numbers for their portmapper services, which, in turn, dynamically
allocate port numbers for distributed processes to use for their communication.
Port triggers, through ALGs, add the necessary intelligence for the firewall to
intelligently permit these conversations by dynamically opening ports in a
specified range.
Port triggers are statically configured as compared to ALGs that are dynamic
in nature and are based on deeper inspection of the network traffic. Keep in
mind, however, that you should not use a port trigger if NAT is applied to the
traffic. Port triggers do not provide the same functionality that ALGs offer. For
example, if an upper-layer protocol carries IP addresses within its data
segment, an ALG knows where the IP address is held and can handle the traffic
appropriately even when NAT is applied. Port triggers, on the other hand,
check only the IP header.
For deeper information on ALGs and port triggers, see the “Firwall” section of
the HP ProCurve Threat Management Services zl Module Management and
Configuration Guide.
6.1.5 Denial of Service (DoS) Attack Prevention
The TMS zl Module provides for Denial of Service (DoS) and other attack
checking. IP Spoofing, Ping of Death, LAND, and IP Reassembly attacks are