Network Attack Prevention Configuration
Except on the first page, right running head:  
Heading1 or Heading1NewPage text (automatic)
769
Alcatel-Lucent
Beta Beta
OmniAccess 5740 Unified Services Gateway CLI Configuration Guide
SAMPLE FIREWALL POLICY CONFIGURATIONS ON OMNIACCESS 5740 USG
EXAMPLE 1
As the default setting, detection of all stateless attacks with logging is applied at 
the ingress path of all interfaces. To be exact, the following is the default setting 
for a brand new box out of factory:
match-list everything
ip any any
firewall
   attack a1
      default stateless
policy p1
   match everything attack a1 reset
interface GigabitEthernet3/0
   firewall policy in p1
E
XAMPLE 2
This example checks traffic from outside-zone to inside-zone for attacks defined in 
“d1”. If found, TCP RST will be sent to both source and destination for TCP traffic. 
Packets will be dropped for non-TCP traffic.
list outside-zone interface GigabitEthernet3/0
list inside-zone interface GigabitEthernet3/1
match-list m1 
   tcp list outside-zone list inside-zone type ftp
firewall 
   attack d1
      default
   policy p1
      match m1 attack d1 drop
interface GigabitEthernet3/0
   firewall policy in p1