Digi ConnectPort X4 User's Guide Page 97

  • Download
  • Add to my manuals
  • Print
  • Page
    / 271
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 96
Configuration through the web interface
97
Network Port Scan Cloaking
The Network Port Scan Cloaking feature allows you to configure this Digi device to ignore
(discard) received packets for services that are hidden or not enabled and network ports that are not
open.
Malicious software on the Internet may scan IP addresses, protocols and ports to try to gain access
to hosts. The Network Port Scan Cloaking feature can be used to prevent responses from being sent
to the originator for ping and for TCP and UDP ports that do not have an associated service. The
default operation is that, when a TCP connection request is received for a port that is not open/
bound, the Digi device will send a TCP reset reply to inform the originator that the service is not
available. Similarly, the default operation when a UDP datagram is received for a port that is not
open/bound, the Digi device will send an ICMP port unreachable packet to inform the originator
that the service is not available. For the DNS Proxy feature, specific network interfaces can be
configured to ignore (discard) requests that are received from that interface, without otherwise
acting on them.
These actions, which are common behaviors in accordance with established protocol standards,
effectively inform the originator that it has found a valid IP destination. The originator may
continue to probe other ports to gain access to the Digi device. In addition, such reply packets may
have a monetary cost for mobile network services (cellular, WiMAX, etc.). Enabling the cloaking
feature can help manage both the port scanning threat and reduce overall data costs.
Your Digi device can be configured to activate cloaking on a global basis, as well as for individual
network interfaces that are available on your device. By enabling the cloak for individual protocols
and interfaces, you prevent reply packets from being sent to the originator under the conditions
described above.
Note
If you enable cloaking on a global basis for a particular protocol, that selection
overrides the selections for the interface-specific settings. For example, enabling
cloaking for ping in the global group, overrides a disabled selection for the eth0
(Ethernet) interface.
Enable Network Port Scan Cloaking: Enables the Network Port Scan Cloaking
feature on this Digi device.
Scan Cloaking: Ping: Enables/disables cloaking for ping requests. Replies will not be
sent for received ping requests.
Scan Cloaking: TCP: Enables/disables cloaking for TCP connection requests for
which no service is available.
Scan Cloaking: UDP: Enables/disables cloaking for UDP packets for which no service
is available.
Scan Cloaking: DNS Proxy: Enable/disable cloaking for DNS Proxy requests for a
specific network interface. Note: there is no global cloaking selection for DNS Proxy.
To cloak the DNS Proxy feature altogether, simply disable it.
Page view 96
1 2 ... 92 93 94 95 96 97 98 99 100 101 102 ... 270 271

Comments to this Manuals

No comments