EasyManua.ls Logo

Alcatel-Lucent OmniAccess 5740 - Sample Firewall Policy Configurations on Omniaccess 5740 USG

Alcatel-Lucent OmniAccess 5740
1225 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Network Attack Prevention Configuration
Except on the first page, right running head:
Heading1 or Heading1NewPage text (automatic)
769
Alcatel-Lucent
Beta Beta
OmniAccess 5740 Unified Services Gateway CLI Configuration Guide
SAMPLE FIREWALL POLICY CONFIGURATIONS ON OMNIACCESS 5740 USG
EXAMPLE 1
As the default setting, detection of all stateless attacks with logging is applied at
the ingress path of all interfaces. To be exact, the following is the default setting
for a brand new box out of factory:
match-list everything
ip any any
firewall
attack a1
default stateless
policy p1
match everything attack a1 reset
interface GigabitEthernet3/0
firewall policy in p1
E
XAMPLE 2
This example checks traffic from outside-zone to inside-zone for attacks defined in
“d1”. If found, TCP RST will be sent to both source and destination for TCP traffic.
Packets will be dropped for non-TCP traffic.
list outside-zone interface GigabitEthernet3/0
list inside-zone interface GigabitEthernet3/1
match-list m1
tcp list outside-zone list inside-zone type ftp
firewall
attack d1
default
policy p1
match m1 attack d1 drop
interface GigabitEthernet3/0
firewall policy in p1

Table of Contents

Other manuals for Alcatel-Lucent OmniAccess 5740

Related product manuals