Home > Asus > Router > Asus Router RX3042H User Manual

Asus Router RX3042H User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Asus Router RX3042H User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 379 Asus manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							
    RX3042H User's Manual Configuring Firewall
    69
    
    FieldDescription
    SYN/ ICMP/ UDP 
    Flooding
    Check or un-check this option to enable or disable the 
    logging  for  SYN/ICMP/UDP  flooding  attacks.  These 
    attacks  involve  sending  lots  of  TCP  SYN/ICMP/UDP 
    to a host in a very short period. RX3042H will not drop 
    the  flooding  packets  to  avoid  affecting  the  normal 
    traffic.
    TCP XMAS/ 
    NULL/ FIN Scan
    A  hacker  may  be  scanning  your  system  by  sending 
    these specially formatted packets to see what services 
    are available. Sometimes this is done in preparation for 
    a  future  attack,  or  sometimes  it  is  done  to  see  if  your 
    system  might  have  a  service,  which  is  susceptible  to 
    attack.
    XMAS  scan:  A  TCP  packet  has  been  seen  with  a 
    sequence  number  of  zero  and  the  FIN,  URG,  and 
    PUSH bits are all set.
    NULL  scan:  A  TCP  packet  has  been  seen  with  a 
    sequence number of zero and all control bits are set to 
    zero.
    FIN  scan:  A  hacker  is  scanning  the  target  system 
    using  a  “stealth”  method. The  goal  of  the  hacker  is  to 
    find out if they can connect to the system without really 
    connecting  using  the  “FIN”  scanning.  It  attempts  to 
    close  a  non-existent  connection  on  the  server.  Either 
    way,  it  is  an  error,  but  systems  sometimes  respond 
    with different error results depending upon whether the 
    desired service is available or not.
    Re-assemblyIn  the  teardrop  attack,  the  attacker ʼs  IP  puts  a 
    confusing offset value in the second or later fragment. 
    If the receiving operating system does not have a plan 
    for this situation, it can cause the system to crash. 
    WinNUKECheck  or  un-check  this  option  to  enable  or  disable 
    protection  against  Winnuke  attacks.  Some  older 
    versions  of  the  Microsoft  Windows  OS  are  vulnerable 
    to  this  attack.  If  the  computers  in  the  LAN  are  not 
    updated with recent versions/patches, you are advised 
    to enable this protection by checking this check box. 
    						
    							
    Configuring Firewall RX3042H User's Manual
    70
    
    9.3.2.2  Configuring DoS Settings
    To configure DoS settings, follow the instructions below:1.  Open  the  Firewall  General  configuration  page  as  shown  in 
    Figure 9.3 by clicking on Firewall ->Security menu.
    2.  Check  or  uncheck  individual  check  box  for  each  type  DoS 
    protection.
    3. Click Apply to save the settings.
    Figure 9.3. Firewall General Configuration Page
    9.4  ACL Rule Configuration Parameters
    9.4.1  ACL Rule Configuration Parameters
    Table  9.3  describes  the  configuration  parameters  firewall  inbound, 
    outbound and self-access ACL rules. 
    						
    							
    RX3042H User's Manual Configuring Firewall
    71
    
    Table 9.3. ACL Rule Configuration Parameters
    FieldDescription
    Filter Direction  – choose the available option from the drop-down 
    list to configure the ACL.
    For dual-WAN configuration, two options are available –  LAN ->WAN  and 
    WAN ->LAN.
    For  WAN  +  DMZ  configuration,  six  options  are  available  –  LAN  ->WAN, 
    WAN ->LAN, LAN ->DMZ, DMZ->LAN, WAN ->DMZ and DMZ ->WAN.
    ID
    Add New  
    Click on this option to add a new ACL rule.
    Rule Number Select  a  rule  from  the  drop-down  list,  to  modify  its 
    settings.
    Move to
    This  option  allows  you  to  set  a  priority  for  this  rule.  The  RX3042H  Firewall 
    acts on packets based on the priority of the rules. Set a priority by specifying 
    a number for its position in the list of rules:
    1 (First)This number marks the highest priority.
    Other 
    numbers
    Select  other  numbers  to  indicate  the  priority  you  wish  to 
    assign to the rule.
    Log
    Click on the  “Enable” or “Disable” radio button to enable or disable logging for 
    this ACL rule.
    Action
    AllowSelect this button to configure the rule as an allow rule.
    This  rule  when  bound  to  the  Firewall  will  allow  matching 
    packets to pass through.
    DenySelect this button to configure the rule as a deny rule.
    This  rule  when  bound  to  the  Firewall  will  not  allow 
    matching packets to pass through.
    Route to 
    – keep the setting to “AUTO” unless packets are routed to specific interface. Available options include AUTO, eth1 (WAN1), eth2 (WAN2), PPP1 (WAN1-
    unnumbered), PPP1 (WAN2-unnumbered), PPP3 (WAN1-PPPoE1), PPP4 
    (WAN1-PPPoE2), PPP5 (WAN2-PPPoE1), PPP6 (WAN2-PPPoE2). If WAN 
    interface  is  set  to  DMZ  mode,  only AUTO,  eth1,  PPP1/3/4  are  available.
    These  options  are  selectable  from  the  drop-down  list.  If AUTO  is  selected, 
    the  router  will  route  the  packets  based  on  the  information  in  the  routing 
    table. 
    						
    							
    Configuring Firewall RX3042H User's Manual
    72
    
    FieldDescription
    NAT
    NoneSelect  this  option  if  you  donʼt  intend  to  use  NAT  in  this 
    ACL rule.
    IP AddressSelect  this  option  to  specify  the  IP  address  of  the  you 
    want the outgoing traffic to use as the source IP address. 
    Note this option is called.
    AutoRX3042H  automatically  uses  the  IP  address  of  the 
    interface that the traffic is to be forwarded as the source 
    IP address. It is  recommended that you select this option 
    if NAT is to be used for out going traffic 
    Source
    This  option  allows  you  to  set  the  source  network  to  which  this  rule 
    should  apply.  Use  the  drop-down  list  to  select  one  of  the  following 
    options:
    AnyThis  option  allows  you  to  apply  this  rule  to  all  the 
    computers  in  the  source  network,  such  as  those  on  the 
    Internet for the inbound traffic or all the computers in the 
    local network for outbound traffic.
    IP AddressThis option allows you to specify an IP address on which 
    this rule will be applied.
    IP AddressSpecify the appropriate network address
    SubnetThis  option  allows  you  to  include  all  the  computers  that 
    are  connected  in  an  IP  subnet.  When  this  option  is 
    selected, the following fields become available:
    FieldDescription
    AddressEnter the appropriate IP address.
    MaskEnter the corresponding subnet mask.
    MAC AddressThis  option  allows  you  to  specify  a  MAC  address  on 
    which this rule will be applied.
    MACEnter the desired MAC address.
    Destination
    This  option  allows  you  to  set  the  destination  network  to  which 
    this rule should apply. Use the drop-down list to select one of the 
    following options:
    AnyThis  option  allows  you  to  apply  this  rule  to  all  the 
    computers  in  the  local  network  for  inbound  traffic  or  any 
    computer in the Internet for outbound traffic. 
    						
    							
    RX3042H User's Manual Configuring Firewall
    73
    
    IP Address, 
    Subnet
    Select  any  of  these  options  and  enter  details  as 
    described in the Source IP section above.
    Service
    Select  a  service,  from  the  drop-down  list,  to  which  this  rule 
    should  apply.  If  the  desired  service  is  not  listed,  click  on  the 
    Edit button to create a new service.
    Time Select a time slot during which this rule should apply. 
    EnableCheck this box if you want to activate the ACL rule at the 
    time specified.
    Date and TimeChck the desired dates and time for this ACL rule.
    Table 9.4. Service Configuration Parameters
    FieldDescription
    Service Name
    Enter a distinctive name identifying the new service.
    Protocol
    Select  a  protocol  type  from  the  drop-down  list. Available  options  are All, 
    TCP, UDP, ICMP, IGMP, AH ESP and TCP/UDP.
    Port Range
    This  option  allows  you  to  set  the  destination  port  to  which  this  rule  should 
    apply. Use the drop-down list to select one of the following options:
    AnySelect  this  option  if  you  want  this  rule  to  apply  to  all 
    applications with an arbitrary source port number.
    SingleThis option allows you to apply this rule to an application 
    with a specific source port number.
    Port NumberEnter the source port number
    RangeSelect  this  option  if  you  want  this  rule  to  apply  to 
    applications  with  this  port  range.  The  following  fields 
    become available for entry when this option is selected.
    Start PortEnter the starting port number of the range
    End PortEnter the ending port number of the range 
    						
    							
    Configuring Firewall RX3042H User's Manual
    74
    
    FieldDescription
    This option allows you to select the ICMP message type for the service. The 
    supported ICMP message types are: 
    •  Any (default)
    •  0: Echo reply
    •  1: Type 1
    •  2: Type 2
    •  3: Dst unreach: destination unreachable
    •  4: Src quench: source quench
    •  5: Redirect
    •  6: Type 6
    •  7: Type 7
    •  8: Echo req: 
    •  9: Router advertisement
    •  10: Router solicitation
    •  11: Time exceed: time exceeded
    •  12: Parameter problem
    •  13: Timestamp request
    •  14: Timestamp reply
    •  15: Info request: information request
    •  16: Info reply: information reply
    •  17: Addr mask req: address mask request
    •  18: Addr mask reply: address mask reply
    9.5  Configuring ACL Rules – (Firewall ->ACL)
    By  creating ACL  rules  in  the ACL  configuration  page  as  shown  in 
    Figure  9.4,  you  can  perform  access  control  (allow  or  deny)  to  both 
    the trusted and un-trusted networks.
    Options in this configuration page allow you to:•  Add a rule, and set parameters for it
    •  Modify an existing rule
    •  Delete an existing rule
    •  View configured ACL rules 
    						
    							
    RX3042H User's Manual Configuring Firewall
    75
    
    Figure 9.4. ACL Configuration Page
    9.5.1  Add an ACL Rule
    To add an ACL rule, follow the instructions below:
    1. Open the ACL Rule configuration page, as shown in Figure 9.4, 
    by clicking Firewall ->ACL menu.
    2.  Select  an  option  from  the  “Filter  Direction”  drop-down  list.  For  example, if you want to create an ACL to filter traffic originated from 
    LAN and destined to WAN, then choose  LAN ->WAN option.
    3. Select Add New from the “ID” drop-down list.
    4. Set desired action (Allow or Deny) from the  Action drop-down list.
    5.  Select  from  the  Route  To  drop-down  list  if  you  intend  to  direct 
    the  traffic  to  a  specific  interface.  Choose AUTO  if  you  want  to 
    have RX3042H route the traffic automatically.
    6.  Choose  NAT  type  and  enter  the  required  information  for  the  selected NAT type.
    7.  Make  changes  to  any  or  all  of  the  following  fields:  source/ destination  IP,  service,  time  and  log.  Please  see  Table  9.3  for  
    						
    							
    Configuring Firewall RX3042H User's Manual
    76
    
    Figure 9.5. ACL Configuration Example
    explanation of these fields.
    8.  Assign  a  priority  for  this  rule  by  selecting  a  number  from  the  Move  to   drop-down  list.  Note  that  the  number  indicates  the 
    priority  of  the  rule  with  1  being  the  highest.  Higher  priority  rules 
    will be examined prior to the lower priority rules by the firewall.
    9.  Click  on  the  Add  button  to  create  the  new ACL  rule.  The  new 
    ACL rule will then be displayed in the inbound access control list 
    table at the bottom half of the Inbound ACL Configuration page.
    Figure  9.5  illustrates  how  to  create  a  rule  to  deny  outbound  HTTP 
    traffic originated from the host w/ IP address 192.168.1.129.
    Figure 9.6. Sample ACL List Table 
    						
    							
    RX3042H User's Manual Confi guring Firewall
    77
    
    9.5.2  Modify an ACL Rule
    To modify an inbound ACL rule, follow the instructions below:
    1.  Open  the  Outbound ACL  Rule  Configuration  Page  by  clicking  Firewall/NAT ->ACL
     menu.
    2.  Click  on  the 
        icon  of  the  rule  to  be  modifi ed  in  the  inbound 
    ACL table or select the rule number from the 
    ID drop-down list.
    3. Make desired changes to any or all of the following fi elds: action,  source/destination IP, service, time and log. Please see Table 9.3 
    for explanation of these fi elds.
    4.  Click  on  the  Modify  button  to  modify  this  ACL  rule.  The  new 
    settings  for  this ACL  rule  will  then  be  displayed  in  the  inbound 
    access  control  list  table  at  the  bottom  half  of  the  Inbound ACL 
    Confi guration page.
    9.5.3  Delete an ACL Rule
    To delete an inbound ACL rule, click on the  in front of the rule to be deleted.
    9.5.4  Display ACL Rules
    To  see  existing ACL  rules,  just  open  the ACL  Rule  Configuration 
    page by clicking  Firewall/NAT ->ACL  menu and then select a traffi c 
    direction from the T raffi c Direction
     drop-down list.
    9.6  Confi guring Self-Access ACL Rules     
     –(Firewall/NAT ->Self-Access ACL)
    Self-Access  rules  control  access  to/from  the  RX3042H  itself.  You 
    may  use  Self-Access  Rule  Configuration  page,  as  illustrated  in 
    Figure 9.7, to:
    •  Add a Self-Access rule
    •  Modify an existing Self-Access rule
    •  Delete an existing Self-Access rule
    •  View existing Self-Access rules 
    						
    							
    Configuring Firewall RX3042H User's Manual
    78
    
    9.6.1  Add a Self-Access Rule
    To add a Self-Access rule, follow the instructions below:1.  Open  the  Self-Access  Rule  Configuration  page  by  clicking  Firewall/NAT ->Self-Access ACL
     menu.
    2. Select “Add New” from the “ID” drop-down list.
    3. Set desired action (Allow or Deny) from the “ Action” drop-down list.
    4.  Assign  a  priority  for  this  rule  by  selecting  a  number  from  the 
    “ Move  to ”  drop-down  list.  Note  that  the  number  indicates  the 
    priority  of  the  rule  with  1  being  the  highest.  Higher  priority  rules 
    will be examined prior to the lower priority rules by the firewall.
    5.  Make  desired  changes  to  any  or  all  of  the  following  fields:  source/destination IP, service, time and log. Please see Table 9.3 
    for explanation of these fields.
    6.  Click  on  the  " Add"  button  to  create  the  new  Self-Access 
    rule.  The  new  rule  will  then  be  displayed  in  the  Existing  Self-
    Access ACL  list  table  at  the  bottom  half  of  the  Self-Access ACL 
    configuration page.
    Figure 9.7. Self-Access ACL Configuration Page 
    						
    All Asus manuals Comments (0)

    Related Manuals for Asus Router RX3042H User Manual