Home > Asus > Router > Asus Router RX3042H User Manual

Asus Router RX3042H User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Asus Router RX3042H User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 379 Asus manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							
    59
    RX3042H User's Manual Configuring DDNS
    8  Configuring DDNS
    Dynamic DNS (DDNS) is a service that allows computers to use the 
    same  domain  name,  even  when  the  IP  address  changes  from  time 
    to  time  (during  reboot  or  when  the  ISPʼs  DHCP  server  resets  IP 
    leases).  RX3042H  connects  to  a  DDNS  service  provider  whenever 
    the  WAN  IP  address  changes.  It  supports  setting  up  the  web 
    services  such  as  Web  server,  FTP  server  using  a  domain  name 
    instead  of  the  IP  address.  DDNS  supports  the  DDNS  clients  with 
    the following features:
    •    Update  DNS  records  (addition)  when  an  external  interface 
    comes up
    •   Force DNS update
    HTTP DDNS Client
    HTTP  DDNS  client  uses  the  mechanism  provided  by  the  popular 
    DDNS service providers for updating the DNS records dynamically. 
    In this case, the service provider updates DNS records in the DNS. 
    RX3042H  uses  HTTP  to  trigger  this  update.  RX3042H  supports 
    HTTP DDNS update with the following service provider: •    www.dyndns.org
    Figure 8.1. Network Diagram for HTTP DDNS
    Whenever  IP  address  of  the  configured  DDNS  interface  changes, 
    DDNS  update  is  sent  to  the  specified  DDNS  service  provider. 
    RX3042H  should  be  configured  with  the  DDNS  username  and 
    password that are obtained from your DDNS service provider. 
    						
    							
    60
    Configuring DDNS RX3042H User's Manual
    
    8.1  DDNS Configuration Parameters
    Table  8.1  describes  the  configuration  parameters  available  for 
    DDNS service.
    Table 8.1. DDNS Configuration Parameters
    FieldDescription
    InterfaceSelect the interface that the DDNS service is to be used.
    StatusShows the state of DDNS.
    Enable 
    DDNS
    Check  this  box  to  enable  DDNS  service;  otherwise,  keep  the 
    box unchecked.
    Domain 
    Name
    Enter the registered domain name into this field. For example, 
    If the host name of your RX3042H is “host1” and the domain 
    name  is  “yourdomain.com”,  The  fully  qualify  domain  name 
    (FQDN) is “host1.yourdomain.com”.
    UsernameEnter the username provided by your DDNS service provider 
    in this field.
    PasswordEnter  the  password  provided  by  your  DDNS  service  provider 
    in this field.
    8.2  Configuring HTTP DDNS Client
    Figure 8.2. HTTP DDNS Configuration Page 
    						
    							
    61
    RX3042H User's Manual Configuring DDNS
    
    Follow these instructions to configure the HTTP DDNS:
    1. First, you should have already registered a domain name to the  DDNS service provider, dyndns. If you have not done so, please 
    visit www.dyndns.org for more details.
    2.  Open  the  DDNS  configuration  page  by  clicking  Advanced  -> 
    DDNS Service menu.
    3. Select the interface that the DDNS service is to be used.
    4. Check Enable DDNS checkbox to enable the DDNS service.
    5. Enter the registered domain name in the Domain Name field.
    6.  Enter  the  username  and  password  provided  by  your  DDNS  service provider.
    7.  Click  on  Apply  button  to  send  a  DNS  update  request  to  your 
    DDNS  service  provider.  Note  that  DNS  update  request  will  also 
    be  sent  to  your  DDNS  service  provider  automatically  whenever 
    the WAN port status is changed. 
    						
    							
    RX3042H User's Manual Configuring Firewall
    63
    9  Configuring Firewall and NAT
    The  RX3042H  provides  built-in  firewall/NAT  functions,  enabling 
    you  to  protect  the  system  against  denial  of  service  (DoS)  attacks 
    and  other  types  of  malicious  accesses  to  your  LAN  while  providing 
    Internet access sharing at the same time. You can also specify how 
    to  monitor  attempted  attacks,  and  who  should  be  automatically 
    notified.
    This  chapter  describes  how  to  create/modify/delete ACL  (Access 
    Control List) rules to control the data passing through your network. 
    You will use firewall configuration pages to:
    • Configure firewall global and DoS settings
    • Create, modify, delete and view ACL rules.
    Note:  When  you  define  an ACL  rule,  you  instruct  the  RX3042H  to 
    examine each data packet it receives to determine whether it meets 
    criteria  set  forth  in  the  rule.  The  criteria  can  include  the  network  or 
    internet protocol it is carrying, the direction in which it is traveling (for 
    example, from the LAN to the Internet or vice versa), the IP address 
    of  the  sending  computer,  the  destination  IP  address,  and  other 
    characteristics of the packet data.
    If  the  packet  matches  the  criteria  established  in  a  rule,  the  packet 
    can  either  be  accepted  (forwarded  towards  its  destination),  or 
    denied (discarded), depending on the action specified in the rule.
    9.1  Firewall Overview
    9.1.1  Stateful Packet Inspection
    The  stateful  packet  inspection  engine  in  the  RX3042H  maintains  a 
    state  table  that  is  used  to  keep  track  of  connection  states  of  all  the 
    packets  passing  through  the  firewall. The  firewall  will  open  a  “hole” 
    to  allow  the  packet  to  pass  through  if  the  state  of  the  packet  that 
    belongs  to  an  already  established  connection  matches  the  state 
    maintained  by  the  stateful  packet  inspection  engine.  Otherwise, 
    the  packet  will  be  dropped.  This  “hole”  will  be  closed  when  the 
    connection  session  terminates.  No  configuration  is  required  for 
    stateful packet inspection; it is enabled by default when the firewall 
    is  enabled.  Please  refer  to  section  9.3.1  “Firewall  ”  to  enable  or 
    disable firewall service on the RX3042H. 
    						
    							
    Configuring Firewall RX3042H User's Manual
    64
    
    9.1.2  DoS (Denial of Service) Protection
    Both DoS protection and stateful packet inspection provide first line 
    of  defense  for  your  network.  No  configuration  is  required  for  both 
    protections  on  your  network  as  long  as  firewall  is  enabled  for  the 
    RX3042H.  By  default,  the  firewall  is  enabled  at  the  factory.  Please 
    refer to section 9.3.1 “Firewall ” to enable or disable firewall service 
    on the RX3042H.
    9.1.3  Firewall and Access Control List (ACL)
    9.1.3.1  Priority Order of ACL Rule
    All ACL rules have a rule ID assigned – the smaller the rule ID, the 
    higher the priority. Firewall monitors the traffic by extracting header 
    information  from  the  packet  and  then  either  drops  or  forwards  the 
    packet  by  looking  for  a  match  in  the ACL  rule  table  based  on  the 
    header information. Note that the ACL rule checking starts from the 
    rule  with  the  smallest  rule  ID  until  a  match  is  found  or  all  the ACL 
    rules  are  examined.  If  no  match  is  found,  the  packet  is  dropped; 
    otherwise,  the  packet  is  either  dropped  or  forwarded  based  on  the 
    action defined in the matched ACL rule.
    9.1.3.2  Tracking Connection State
    The  stateful  packet  inspection  engine  in  the  firewall  keeps  track 
    of  the  state,  or  progress,  of  a  network  connection.  By  storing 
    information  about  each  connection  in  a  state  table,  RX3042H  is 
    able  to  quickly  determine  if  a  packet  passing  through  the  firewall 
    belongs to an already established connection. If it does, it is passed 
    through the firewall without going through ACL rule evaluation.
    For  example,  an  ACL  rule  allows  outbound  ICMP  packet  from 
    192.168.1.1 to 192.168.2.1. When 192.168.1.1 send an ICMP echo 
    request (i.e. a ping packet) to 192.168.2.1, 192.168.2.1 will send an 
    ICMP echo reply to 192.168.1.1. In the RX3042H, you donʼt need to 
    create another inbound ACL rule because stateful packet inspection 
    engine  will  remember  the  connection  state  and  allows  the  ICMP 
    echo reply to pass through the firewall
    9.1.4  Default ACL Rules
    The RX3042H supports two types of access rules: 
    						
    							
    RX3042H User's Manual Configuring Firewall
    65
    
    •    ACL  Rules:  for  controlling  all  access  to  the  computers  on  the 
    LAN  and  DMZ  and  for  controlling  access  to  external  networks 
    for hosts on the LAN and DMZ.
    •  Self-Access Rules: for controlling access to the RX3042H itself.
    Default Access Rules
    •  All traffic from external hosts to the hosts on the LAN and DMZ is 
    denied.
    •   All  traffic  originated  from  the  LAN  is  forwarded  to  the  external  network using NAT.
    WARNING:  It  is  not  necessary  to  remove  the  default ACL rule from the ACL rule table! It is better to create  higher priority ACL rules to override the default rule.
    9.2  NAT Overview
    Network Address  Translation  allows  use  of  a  single  device,  such 
    as  the  RX3042H,  to  act  as  an  agent  between  the  Internet  (public 
    network)  and  a  local  (private)  network.  This  means  that  a  NAT 
    IP  address  can  represent  an  entire  group  of  computers  to  any 
    entity  outside  a  network.  Network  Address  Translation  (NAT)  is 
    a  mechanism  for  conserving  registered  IP  addresses  in  large 
    n e t w o r k s   a n d   s i m p l i f y i n g   I P  a d d r e s s i n g   m a n a g e m e n t   t a s k s . 
    Because  of  the  translation  of  IP  addresses,  NAT  also  conceals 
    true  network  address  from  privy  eyes  and  provide  a  certain  degree 
    security to the local network.
    The  NAT  modes  supported  are  static  NAT,  dynamic  NAT,  NAPT, 
    reverse static NAT and reverse NAPT.
    9.2.1  NAPT (Network Address and Port Translation)  
      or PAT (Port Address Translation)
     
    Also called IP Masquerading, this feature maps many internal hosts 
    to  one  globally  valid  Internet  address. The  mapping  contains  a  pool 
    of network ports to be used for translation. Every packet is translated 
    with  the  globally  valid  Internet  address  and  the  port  number  is 
    translated  with  an  un-used  port  from  the  pool  of  network  ports. 
    Figure 9.1 shows that all the hosts on the local network gain access 
    to the Internet by mapping to only one globally valid IP address and 
    different port numbers from a free pool of network ports.  
    						
    							
    Configuring Firewall RX3042H User's Manual
    66
    
    Figure 9.1 NAPT – Map Any Internal PCs to a Single Global IP Address
    Figure  9.2  Reverse  NAPT  –  Relayed  Incoming  Packets  to  the Internal Host Base on the Protocol, Port Number or IP Address 
    						
    							
    RX3042H User's Manual Configuring Firewall
    67
    
    9.2.2  Reverse NAPT / Virtual Server
    Reverse  NAPT  is  also  called  inbound  mapping,  port  mapping,  or 
    virtual  server. Any  packet  coming  to  the  RX3042H  can  be  relayed 
    to  the  internal  host  based  on  the  protocol,  port  number  and/or  IP 
    address  specified  in  the  ACL  rule.  This  is  useful  when  multiple 
    services are hosted on different internal hosts. Figure 9.2shows that 
    web  server  (TCP/80)  is  hosted  on  PC A,  telnet  server  (TCP/23)  on 
    PC B, DNS server (UDP/53) on PC C and FTP server (TCP/21) on 
    PC D. This means that the inbound traffic of these four services will 
    be directed to respective host hosting these services.
    9.3  Firewall Settings – (Firewall/NAT ->Settings)
    9.3.1  Firewall Options
    Table 9.1 lists the firewall options parameters.
    Table 9.1. Firewall Options Parameters
    FieldDescription
    DoS CheckCheck  or  uncheck  this  box  to  enable  or  disable  DoS 
    check.  When  DoS  check  is  disabled,  the  following 
    functionalities are disabled:
    •  Stateful packet inspection
    •  Skip all DoS attack check
    Default NAT
    Log Port Probing
    Connection  attempt  to  closed  ports  will  be  logged  if 
    this option is enabled.
    Stealth ModeIf enabled, RX3042H will not respond to remote peerʼs 
    attempt to connect to the closed TCP/UDP ports.
    To configure firewall settings, follow the instructions below:
    1.  Open  the  Firewall  Settings   configuration  page  as  shown  in 
    Figure 9.3 by clicking on 
    Firewall/NAT ->Settings menu.
    2. Check or uncheck individual check box for each firewall option.
    3. Click Apply to save the settings.
    9.3.2  DoS Configuration 
    						
    							
    Configuring Firewall RX3042H User's Manual
    68
    
    The  RX3042H  has  an Attack  Defense  Engine  that  protects  internal 
    networks  from  Denial  of  Service  (DoS)  attacks  such  as  SYN 
    flooding,  IP  smurfing,  LAND,  Ping  of  Death  and  all  re-assembly 
    attacks.  It  can  drop  ICMP  redirects  and  IP  loose/strict  source 
    routing  packets.  For  example,  a  security  device  with  the  RX3042H 
    Firewall provides protection from “WinNuke”, a widely used program 
    to  remotely  crash  unprotected  Windows  systems  in  the  Internet. 
    The  RX3042H  Firewall  also  provides  protection  from  a  variety 
    of  common  Internet  attacks  such  as  IP  Spoofing,  Ping  of  Death, 
    Land Attack,  and  Reassembly  attacks.  For  a  complete  list  of  DoS 
    protection provided by the RX3042H, please see Table 2.1.
    9.3.2.1  DoS Protection Configuration Parameters
    Table  9.2  provides  explanation  for  each  type  of  DoS  attacks.  You 
    may  check  or  uncheck  the  check  box  to  enable  or  disable  the 
    protection for each type DoS attacks.
    Table 9.2. DoS Attack Definition
    FieldDescription
    IP Source Route
    Intruder uses “source routing” in order to break into the 
    target system.
    IP SpoofingSpoofing  is  the  creation  of  TCP/IP  packets  using 
    somebody elseʼs IP address. IP spoofing is an integral 
    part  of  many  network  attacks  that  do  not  need  to  see 
    responses.
    LandAttacker  sends  out  packets  to  the  system  with  the 
    same  source  and  destination  IP  address  being  that  of 
    the target system and causes the target system trying 
    to resolve an infinite series of connections to itself. This 
    can cause the target system to slow down drastically.
    Ping of DeathAn  attacker  sends  out  larger  than  64KB  packets  to 
    cause certain operating system to crash.
    SmurfAn  attacker  issues  ICMP  echo  requests  to  some 
    broadcast  addresses.  Each  datagram  has  a  spoofed 
    IP source address to be that of a real target-host. Most 
    of  the  addressed  hosts  will  respond  with  an  ICMP 
    echo reply, but not to the real initiating host, instead all 
    replies  carry  the  IP  address  of  the  previously  spoofed 
    host  as  their  current  destination  and  cause  the  victim 
    host or network to slow down drastically. 
    						
    All Asus manuals Comments (0)

    Related Manuals for Asus Router RX3042H User Manual