- 论坛徽章:
- 0
|
* Intrusion Detection Feature
SPI and Anti-DoS firewall protection yes/no
RIP defect yes/no
* Stateful Packet Inspection
Packet Fragmentation
TCP Connection yes/no
UDP Session yes/no
FTP Service yes/no
H.323 Service yes/no
TFTP Service yes/no
* Connection Policy
Fragmentation half-open wait: secs
TCP SYN wait: sec.
TCP FIN wait: sec.
TCP connection idle timeout: sec.
UDP session idle timeout: sec.
H.323 data channel idle timeout: sec.
* DoS Detect Criteria:
Total incomplete TCP/UDP sessions HIGH: session
Total incomplete TCP/UDP sessions LOW: session
Incomplete TCP/UDP sessions (per min) HIGH: session
Incomplete TCP/UDP sessions (per min) LOW: session
Maximum incomplete TCP/UDP sessions number from same host:
Incomplete TCP/UDP sessions detect sensitive time period: msec.
Maximum half-open fragmentation packet number from same host:
Half-open fragmentation detect sensitive time period: msec.
Flooding cracker block time: sec.
这里有几个地方搞不明白的.
1. SPI and Anti-DoS firewall protection yes/no这个选项与下面的Stateful Packet Inspection有没有关系啊.网上有说SPI就是 -m state --state ESTABLISHED,RELATED -j ACCEPT,那么后面的那些Stateful Packet Inspection中的参数是什么作用啊,是不是可以理解为:state ESTABLISHED,RELATED -j ACCEPT,然后选中的服务比如说tcp,udp在不满足前满这个状态的情况下可以accept,但是其他的任何服务,到最后全部DROP呢?如果 SPI and Anti-DoS firewall protection yes/no这个选项不选,那么Stateful Packet Inspection中的参数又是什么作用呢?
2.RIP defect.这个是说不响应RIP请求数据包,那么它将保留在输入队列中不能被发送.iptables中有这种匹配可以清除队列中的包的命令么?
3.Connection Policy这个连接policy有时间控制,有什么参数可以匹配空闲时间呢
4.DoS Detect Criteria 这个里面是用session来控制的,也就是说需要用到connlimit.现在有没有可以连udp一起匹配的模块呢...
谢谢 |
|