Home > Motorola > Wireless > Motorola Wing 5 Manual

Motorola Wing 5 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Motorola Wing 5 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 249 Motorola manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 1128
    							FIREWALL-POLICY 14 - 9
    14.1.6 flow
    firewall-policy
    Defines the session flow timeout for different packet types
    Supported in the following platforms:
     AP300
     AP621
     AP650
     AP6511
     AP6521
     AP6532
     AP71XX
     RFS4000
     RFS6000
     RFS7000
     NX9000
     NX9500
    Syntax
    flow [dhcp|timeout]
    flow dhcp stateful
    flow timeout [icmp|other|tcp|udp]
    flow timeout [icmp|other] 
    flow timeout udp 
    flow timeout tcp [close-wait|reset|setup|stateless-fin-or-reset|
    stateless-general] 
    flow timeout tcp established 
    Parameters
    • flow dhcp stateful
    • flow timeout [icmp|other] 
    dhcp Configures DHCP packet flow
    stateful Performs a stateful check on DHCP packets
    timeout Configures a packet timeout
    icmp Configures the timeout for ICMP packets
    other Configures the timeout for packets that are not ICPM, TCP, or UDP
     Configures the timeout from 1 - 32400 seconds 
    						
    							14 - 10 WiNG CLI Reference Guide
    • flow timeout udp 
    • flow timeout tcp [close-wait|reset|setup|stateless-fin-or-reset|
    stateless-general] 
    • flow timeout tcp established 
    Examples
    rfs7000-37FABE(config-rw-policy-test)#flow timeout udp 10000
    rfs7000-37FABE(config-rw-policy-test)#flow timeout icmp 16000
    rfs7000-37FABE(config-rw-policy-test)#flow timeout other 16000
    rfs7000-37FABE(config-rw-policy-test)#flow timeout tcp established 1500
    rfs7000-37FABE(config-rw-policy-test)#show context
    firewall-policy test
     no ip dos tcp-sequence-past-window
     flow timeout icmp 16000
     flow timeout udp 10000
     flow timeout tcp established 1500
     flow timeout other 16000
     dhcp-offer-convert
     dns-snoop entry-timeout 35
    Related Commands
    timeout Configures a packet timeout
    udp Configures the timeout for UDP packets
     Configures the timeout from 15 - 32400 seconds
    timeout Configures a packet timeout
    tcp Configures the timeout for TCP packets
    close-wait Configures the closed TCP flow timeout
    reset Configures the reset TCP flow timeout
    setup Configures the opening TCP flow timeout
    stateless-fin-or-reset Configures the stateless TCP flow timeout created with the FIN or RESET packets
    stateless-general Configures the stateless TCP flow timeout
     Configures the timeout from 1 - 32400 seconds
    timeout Configures packet timeout
    tcp Configures the timeout for TCP packets
    established Configures the established TCP flow timeout
     Configures the timeout from 15 - 32400 seconds
    noResets values or disables firewall policy flow commands 
    						
    							FIREWALL-POLICY 14 - 11
    14.1.7 ip
    firewall-policy
    Configures Internet Protocol (IP) components
    Supported in the following platforms:
     AP300
     AP621
     AP650
     AP6511
     AP6521
     AP6532
     AP71XX
     RFS4000
     RFS6000
     RFS7000
     NX9000
     NX9500
    Syntax
    ip [dos|tcp]
    ip dos {[ascend|broadcast-multicast-icmp|chargen|fraggle|ftp-bounce|
    invalid-protocol|ip-ttl-zero|ipspoof|land|option-route|router-advt|
    router-solicit|smurf|snork|tcp-bad-sequence|tcp-fin-scan|tcp-intercept|
    tcp-max-incomplete|tcp-null-scan|tcp-post-syn|tcp-sequence-past-window|
    tcp-xmas-scan|tcphdrfrag|twinge|udp-short-hdr|winnuke]}
    ip tcp [adjust-mss|recreate-flow-on-out-of-state-syn|validate-icmp-unreachable|
    validate-rst-ack-number|validate-rst-seq-number|optimize-unnecessary-resends]
    ip dos {[ascend|broadcast-multicast-icmp|chargen|fraggle|ftp-bounce|invalid-
    protocol|ip-ttl-zero|ipsproof|land|option-route|router-advt|router-
    solicit|smurf|snork|tcp-bad-sequence|tcp-fin-scan|tcp-intercept|tcp-null-scan|tcp-
    post-scan|tcp-sequence-past-window|tcp-xmas-scan|tcphdrfrag|twinge|udp-short-
    hdr|winnuke]} {[log-and-drop|log-only]} {log-level} {[|alerts|critical|debug|emergencies|errors|informational|notifications|warnigns]}
    ip dos {[ascend|broadcast-multicast-icmp|chargen|fraggle|ftp-bounce|invalid-
    protocol|ip-ttl-zero|ipsproof|land|option-route|router-advt|router-
    solicit|smurf|snork|tcp-bad-sequence|tcp-fin-scan|tcp-intercept|tcp-null-scan|tcp-
    post-scan|tcp-sequence-past-window|tcp-xmas-scan|tcphdrfrag|twinge|udp-short-
    hdr|winnuke]} {drop-only}
    ip dos tcp-max-incomplete [high|low] 
     
    ip tcp adjust-mss 
    ip tcp [optimize-unnecessary-resends| 
    recreate-flow-on-out-of-state-syn|validate-icmp-unreachable|
    validate-rst-ack-number|validate-rst-seq-number] 
    						
    							14 - 12 WiNG CLI Reference Guide
    Parameters
    • ip dos {[ascend|broadcast-multicast-icmp|chargen|fraggle|ftp-bounce|
    invalid-protocol|ip-ttl-zero|ipsproof|land|option-route|router-advt|
    router-solicit|smurf|snork|tcp-bad-sequence|tcp-fin-scan|tcp-intercept|
    tcp-null-scan|tcp-post-scan|tcp-sequence-past-window|tcp-xmas-scan|tcphdrfrag|
    twinge|udp-short-hdr|winnuke]} {[log-and-drop|log-only]} {log-level} 
    {[|alerts|critical|debug|emergencies|errors|informational|notifications|
    warnigns]}
    dos Identifies IP events as DoS events
    ascend Enables an ASCEND DoS check. Ascend routers listen on UDP port 9 for packets from 
    Ascends Java Configurator. Sending a formatted packet to this port can cause an 
    Ascend router to crash.
    broadcast-multicast-icmp Detects broadcast or multicast ICMP packets as an attack
    chargen The Character Generation Protocol (chargen) is an IP suite service primarily used for 
    testing and debugging networks. It is also used as a source of generic payload for 
    bandwidth and QoS measurements.
    fraggle A Fraggle DoS attack checks for UDP packets to or from port 7 or 19
    ftp-bounce A FTP bounce attack is a MIM attack that enables an attacker to open a port on a 
    different machine using FTP. FTP requires that when a connection is requested by a 
    client on the FTP port (21), another connection must open between the server and 
    the client. To confirm, the PORT command has the client specify an arbitrary 
    destination machine and port for the data connection. This is exploited by the 
    attacker to gain access to a device that may not be the originating client.
    invalid-protocol Enables a check for an invalid protocol number
    ip-ttl-zero Enables a check for the TCP/IP TTL field having a value of zero (0)
    ipsproof Enables a check for the IP spoofing DoS attack
    land A Local Area Network Denial (LAND) is a DoS attack where IP packets are spoofed 
    and sent to a device where the source IP and destination IP of the packet are the 
    target device’s IP, and similarly, the source port and destination port are open ports 
    on the same device. This causes the attacked device to reply to itself continuously.
    option-route Enables an IP Option Record Route DoS check
    router-advt This is an attack where a default route entry is added remotely to a device. This route 
    entry is given preference, and thereby exposes an attack vector.
    router-solicit Router solicitation messages are sent to locate routers as a form of network 
    scanning. This information can then be used to attack a device.
    smurf In this attack, a large number of ICMP echo packets are sent with a spoofed source 
    address. This causes the device with the spoofed source address to be flooded with 
    a large number of replies.
    snork This attack causes a remote Windows™ NT to consume 100% of the CPU’s 
    resources. This attack uses a UDP packtet with a destination port of 135 and a 
    source port of 7, 9, or 135. This attack can also be exploited as a bandwidth 
    consuming attack. 
    						
    							FIREWALL-POLICY 14 - 13
    tcp-bad-sequence A DoS attack that uses a specially crafted TCP packet to cause the targeted device 
    to drop all subsequent network traffic for a specific TPC connection
    tcp-fin-scan A FIN scan finds services on ports. A closed port returns a RST. This allows the 
    attacker to identify open ports
    tcp-intercept Prevents TCP intercept attacks by using TCP SYN cookies
    tcp-null-scan A TCP null scan finds services on ports. A closed port returns a RST. This allows the 
    attacker to identify open ports.
    tcp-post-syn Enables TCP post SYN DoS attacks
    tcp-sequence-past-window Enables a TCP SEQUENCE PAST WINDOW DoS attack check. Disable this check to 
    work around a bug in Windows XPs TCP stack which sends data past the window 
    when conducting a selective ACK.
    tcp-xmas-scan A TCP XMAS scan finds services on ports. A closed port returns a RST. This allows 
    the attacker to identify open ports
    tcphdrfrag A DoS attack where the TCP header spans IP fragments
    twinge A twinge attack is a flood of false ICMP packets to try and slow down a system
    udp-short-hdr Enables the identification of truncated UDP headers and UDP header length fields
    winnuke This DoS attack is specific to Windows™ 95 and Windows™ NT, causing devices to 
    crash with a blue screen
    log-and-drop Logs the event and drops the packet
    log-only Logs the event only, the packet is not dropped
    log-level  Configures the log level
     Sets the numeric logging level
    alerts Numerical severity 1. Indicates a condition where immediate action is required
    critical Numerical severity 2. Indicates a critical condition
    debugging Numerical severity 7. Debugging messages
    emergencies Numerical severity 0. System is unusable
    errors Numerical severity 3. Indicates an error condition
    informational Numerical severity 6. Indicates a informational condition
    notification Numerical severity 5. Indicates a normal but significant condition
    warnings Numerical severity 4. Indicates a warning condition 
    						
    							14 - 14 WiNG CLI Reference Guide
    • ip dos {[ascend|broadcast-multicast-icmp|chargen|fraggle|ftp-bounce|
    invalid-protocol|ip-ttl-zero|ipsproof|land|option-route|router-advt|
    router-solicit|smurf|snork|tcp-bad-sequence|tcp-fin-scan|tcp-intercept|
    tcp-null-scan|tcp-post-scan|tcp-sequence-past-window|tcp-xmas-scan|tcphdrfrag|
    twinge|udp-short-hdr|winnuke]} {drop-only}
    dos Identifies IP events as DoS events
    ascend Enables an ASCEND DoS check. Ascend routers listen on UDP port 9 for packets from 
    Ascends Java Configurator. Sending a formatted packet to this port can cause an 
    Ascend router to crash.
    broacast-multicast-icmp Detects broadcast or multicast ICMP packets as an attack
    chargen The Character Generation Protocol (chargen) is an IP suite service primarily used for 
    testing and debugging networks. It is also used as a source of generic payload for 
    bandwidth and QoS measurements.
    fraggle A Fraggle DoS attack checks for UDP packets to or from port 7 or 19
    ftp-bounce A FTP bounce attack is a MIM attack that enables an attacker to open a port on a 
    different machine using FTP. FTP requires that when a connection is requested by a 
    client on the FTP port (21), another connection must open between the server and 
    the client. To confirm, the PORT command has the client specify an arbitrary 
    destination machine and port for the data connection. This is exploited by the 
    attacker to gain access to a device that may not be the originating client.
    invalid-protocol Enables a check for invalid protocol number
    ip-ttl-zero Enables a check for the TCP/IP TTL field having a value of zero (0)
    ipsproof Enables a check for IP spoofing DoS attack
    land A Local Area Network Denial (LAND) is a DoS attack where IP packets are spoofed 
    and sent to a device where the source IP and destination IP of the packet are the 
    target device’s IP, and similarly, the source port and destination port are open ports 
    on the same device. This causes the attacked device to reply to itself continuously.
    option-route Enables an IP Option Record Route DoS check
    router-advt This is an attack where a default route entry is added remotely to a device. This route 
    entry is given preference, and thereby exposes an attack vector.
    router-solicit Router solicitation messages are sent to locate routers as a form of network 
    scanning. This information can then be used to attack a device.
    smurf In this attack a large number of ICMP echo packets are sent with a spoofed source 
    address. This causes the device with the spoofed source address to be flooded with 
    a large number of replies.
    snork This attack causes a remote Windows™ NT to consume 100% of the CPU’s 
    resources. This attack uses a UDP packtet with a destination port of 135 and a 
    source port of 7, 9, or 135. This attack can also be exploited as a bandwidth 
    consuming attack.
    tcp-bad-sequence A DoS attack that uses a specially crafted TCP packet to cause the targeted device 
    to drop all subsequent network traffic for a specific TPC connection 
    						
    							FIREWALL-POLICY 14 - 15
    • ip dos tcp-max-incomplete [high|low] 
    • ip tcp adjust-mss 
    • ip tcp [optimize-unnecessary-resends|recreate-flow-on-out-of-state-syn|validate-
    icmp-unreachable|validate-rst-ack-number|validate-rst-seq-number]
    tcp-fin-scan A FIN scan finds services on ports. A closed port returns a RST. This allows the 
    attacker to identify open ports
    tcp-intercept Prevents TCP intercept attacks by using TCP SYN cookies
    tcp-null-scan A TCP null scan finds services on ports. A closed port returns a RST. This allows the 
    attacker to identify open ports
    tcp-post-syn Enables a TCP post SYN DoS attack
    tcp-sequence-past-window Enables a TCP SEQUENCE PAST WINDOW DoS attack check. Disable this check to 
    work around a bug in Windows XPs TCP stack which sends data past the window 
    when conducting a selective ACK.
    tcp-xmas-scan A TCP XMAS scan finds services on ports. A closed port returns a RST. This allows 
    the attacker to identify open ports
    tcphdrfrag A DoS attack where the TCP header spans IP fragments
    twinge A twinge attack is a flood of false ICMP packets to try and slow down a system
    udp-short-hdr Enables the identification of truncated UDP headers and UDP header length fields
    winnuke This DoS attack is specific to Windows™ 95 and Windows™ NT, causing devices to 
    crash with a blue screen
    drop-only Drops a packet without logging
    dos Identifies IP events as DoS events
    tcp-max-incomplete Sets the limits for the maximum number of incomplete TCP connections
    high Sets the upper limit for the maximum number of incomplete TCP connections
    low Sets the lower limit for the maximum number of incomplete TCP connections
     Sets the limit in the range of 1 - 1000 connections
    tcp Identifies and configures TCP events and configuration items
    adjust-mss Adjusts the TCP Maximum Segment Size (MSS)
     Sets the TCP MSS value from 472 - 1460
    tcp Identifies and configures TCP events and configuration items
    optimize-unnecessary-resends Enables the validation of unnecessary of TCP packets
    recreate-flow-on-out-of-state-
    syncAllows a TCP SYN packet to delete an old flow in TCP_FIN_FIN_STATE, and 
    TCP_CLOSED_STATE states and create a new flow 
    						
    							14 - 16 WiNG CLI Reference Guide
    Examples
    rfs7000-37FABE(config-rw-policy-test)#ip dhcp fraggle drop-only
    rfs7000-37FABE(config-rw-policy-test)#ip dhcp tcp-max-incomplete high 600
    rfs7000-37FABE(config-rw-policy-test)#ip dhcp tcp-max-incomplete low 60
    rfs7000-37FABE(config-rw-policy-test)#show context
    firewall-policy test
     ip dos fraggle drop-only
     no ip dos tcp-sequence-past-window
     ip dos tcp-max-incomplete high 600
     ip dos tcp-max-incomplete low 60
     flow timeout icmp 16000
     flow timeout udp 10000
     flow timeout tcp established 1500
     flow timeout other 16000
     dhcp-offer-convert
     dns-snoop entry-timeout 35
    Related Commands
    validate-icpm-unreachable Enables the validation of the sequence number in ICMP unreachable error packets 
    which abort an established TCP flow
    validate-rst-ack-number Enables the validation of acknowledgement number in RST packets which abort a 
    TCP flow
    validate-rst-seq-number Enables the validation of the sequence number in RST packets which abort an 
    established TCP flow
    noResets values or disables firewall policy IP commands 
    						
    							FIREWALL-POLICY 14 - 17
    14.1.8 ip-mac
    firewall-policy
    Defines an action based on the device IP MAC table, and also detects conflicts between IP addresses and MAC addresses
    Supported in the following platforms:
     AP300
     AP621
     AP650
     AP6511
     AP6521
     AP6532
     AP71XX
     RFS4000
     RFS6000
     RFS7000
     NX9000
     NX9500
    Syntax
    ip-mac [conflict|routing]
    ip-mac conflict drop-only
    ip-mac conflict [log-and-drop|log-only] log-level [|alerts|critical|debug|
    emergencies|errors|informational|notifications|warnings]
    ip-mac routing conflict drop-only
    ip-mac routing [log-and-drop|log-only] log-level [|alerts|critical|debug|
    emergencies|errors|informational|notifications|warnings]
    Parameters
    • ip-mac conflict drop-only
    conflict Action performed when a conflict exists between the IP address and MAC address
    drop-only Drops a packet without logging 
    						
    							14 - 18 WiNG CLI Reference Guide
    • ip-mac conflict [log-and-drop|log-only] log-level [|alerts|critical|debug|
    emergencies|errors|informational|notifications|warnings]
    • ip-mac routing conflict drop-only
    • ip-mac routing [log-and-drop|log-only] log-level [|alerts|critical|debug|
    emergencies|errors|informational|notifications|warnings]
    conflict Action performed when a conflict exists between the IP address and MAC address
    log-and-drop Logs the event and drops the packet
    log-only Logs the event only, the packet is not dropped
    log-level  Configures the log level
     Sets the numeric logging level
    alerts Numerical severity 1. Indicates a condition where immediate action is required
    critical Numerical severity 2. Indicates a critical condition
    debugging Numerical severity 7. Debugging messages
    emergencies Numerical severity 0. System is unusable
    errors Numerical severity 3. Indicates an error condition
    informational Numerical severity 6. Indicates a informational condition
    notification Numerical severity 5. Indicates a normal but significant condition
    warnings Numerical severity 4. Indicates a warning condition
    routing Defines a routing table based action
    conflict Action performed when a conflict exists in the routing table
    drop-only Drops a packet without logging
    routing Defines a routing table based action
    conflict Action performed when a conflict exists in the routing table
    log-and-drop Logs the event and drops the packet
    log-only Logs the event only, the packet is not dropped
    log-level  Configures the log level to log this event under
     Sets the numeric logging level
    alerts Numerical severity 1. Indicates a condition where immediate action is required
    critical Numerical severity 2. Indicates a critical condition
    debugging Numerical severity 7. Debugging messages
    emergencies Numerical severity 0. System is unusable
    errors Numerical severity 3. Indicates an error condition 
    						
    All Motorola manuals Comments (0)