EasyManua.ls Logo

Radware DefensePro 6.02 - User Manual

Radware DefensePro 6.02
339 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
DefensePro User Guide
Software Version 6.02
Document ID: RDWR-DP-V0602_UG1201
January, 2012

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Radware DefensePro 6.02 and is the answer not in the manual?

Summary

Important Notices

Important Notices

Presents the guide's terms and restrictions, including copyright and proprietary information clauses.

Copyright Notices

Copyright Notices

Lists copyright notices for software components developed by third-party projects like OpenSSL and OpenBSD.

Safety Instructions

Safety Instructions

Provides essential safety precautions and warnings for operating and maintaining the device.

Electrical Shock Hazard Label

Illustrates the label warning about electrical shock hazards associated with dual power supply systems.

HIGH VOLTAGE

Warns about high voltage hazards and the need for qualified personnel for adjustments or repairs.

GROUNDING

Instructs to connect the device's protective earth terminal screws to the building's protective earth.

Chapter 1 - Introduction

Introducing DefensePro

Introduces Radware’s DefensePro, an IPS and DoS protection device for business continuity against network threats.

DefensePro System Components

Describes the DefensePro system components, including the device, management interface, and update service.

Radware Security Update Service on the Web

Details the Radware Security Update Service for delivering signature updates against network and application security threats.

Typical Deployment

Illustrates the in-line installation of DefensePro IPS in an enterprise network at the gateway for perimeter protection.

Network Connectivity

Shows the typical network topology of DefensePro, illustrating its connection within an enterprise network.

Management Interfaces-APSolute Vision and Others

Describes the primary management interface, APSolute Vision, and additional interfaces like WBM and CLI for DefensePro.

DefensePro Features

Provides a brief description of the main DefensePro features, including security protections and bandwidth management.

Related Documentation

Lists related documents for further information on DefensePro, such as release notes and installation guides.

Chapter 2 - Getting Started

DefensePro Physical Ports

Describes the physical ports on DefensePro platforms, including RJ-45 and fiber-optic ports for traffic inspection.

DefensePro Platforms and Models

Details the various DefensePro platforms and models, including their port configurations and hardware specifications.

APSolute Vision User Interface Overview

Provides an overview of the APSolute Vision interface structure, organized functionally for easy access to options.

Configuration Perspective

Explains how to use the Configuration perspective to configure Radware devices, including device selection and settings.

Monitoring Perspective

Describes the Monitoring perspective for viewing physical devices, interfaces, and logical objects, with system and properties panes.

Security Monitoring Perspective

Details how to access real-time security monitoring tools to analyze current attacks and threat levels.

Asset Management Perspective

Explains the Asset Management perspective, available to Administrator roles for managing assets and user configurations.

Configuring Inspection Ports

Describes how to configure inspection ports on a DefensePro device to receive, inspect, and transmit traffic.

Chapter 3 - Basic Device Configuration

Locking and Unlocking a Device

Explains the process of locking and unlocking a device to prevent simultaneous configuration changes by multiple users.

DefensePro Device Setup

Covers essential setup parameters for a selected DefensePro device, including global parameters and time settings.

Configuring DefensePro Global Parameters

Details how to view and configure basic device parameters like location, contact information, and system up time.

Configuring Date and Time Synchronization

Describes how to configure NTP for synchronizing the device's time and date for accurate timestamps.

Configuring Access Protocols

Details how to configure access protocols like WBM, CLI, Telnet, and SSH for managing DefensePro devices.

Configuring SNMP Supported Versions

Describes how to configure supported SNMP versions for connecting APSolute Vision to DefensePro devices.

Upgrading a License for a DefensePro Device

Explains the procedure for upgrading DefensePro device capabilities using a new license key.

Configuring E-mail Settings

Covers configuring the device to send information messages and trap notifications via e-mail to users.

Configuring RADIUS Authentication for Device Management

Details how to enhance security by authenticating users for device management using RADIUS servers.

Configuring Syslog Settings

Explains how to configure event traps to be mirrored to syslog servers for centralized logging.

Managing Certificates

Describes how to manage digital certificates and keys for secure access to Web Based Management (WBM).

Configuring High Availability

Covers configuring two compatible DefensePro devices to operate in a two-node cluster for high availability.

Chapter 4 - Device Network Configuration

Configuring Device IP Interfaces

Describes how DefensePro performs routing between IP interfaces, including Layer 2, Layer 4, and Layer 7 routing.

Managing IP Routing

Explains how DefensePro devices forward IP packets using an IP routing table, including static and dynamic configuration.

Configuring Ports

Details how to change physical attributes of ports, such as speed and duplex mode, and configure port trunking.

Configuring the Basic Network Parameters-IP Version Mode and IP Fragmentation

Covers specifying IP version mode (IPv4/IPv6), jumbo frame handling, and IP fragmentation parameters.

Configuring Port Pairs

Explains how to configure ports on a DefensePro device to receive, inspect, and transmit traffic in paired operations.

Chapter 5 - Security Configuration

Security Protections

Describes DefensePro’s multi-layer security approach, covering network-wide, server, and access-control protections.

Selecting a Device for Security Configuration

Explains how to select the specific DefensePro device for configuring security policies within the APSolute Vision.

Configuring Global Security Settings

Details how to enable and configure global parameters for various protection features before setting up policies.

Managing the Network Protection Policy

Describes how to create and manage network-protection policies, defining rules and applying protection profiles.

Managing the Server Protection Policy

Explains how to configure server protection policies to defend specific servers against targeted network and application attacks.

Configuring White Lists

Details how to configure white lists to exempt specific traffic from security inspection.

Configuring Black Lists

Explains how to configure black lists to block traffic without inspection, used as policy exceptions.

Managing the ACL Policy

Describes the Access Control List (ACL) module for configuring a flexible and focused stateful access-control policy.

Chapter 6 - Bandwidth Management

Bandwidth Management Overview

Provides an overview of the Bandwidth Management module, enabling control over available bandwidth and application prioritization.

Managing Bandwidth Management Global Settings

Details the general bandwidth management parameters, including classification modes and application classification types.

Bandwidth Management Policies

Describes how to define and manage bandwidth management policies, including policy mechanism, classification criteria, and rules.

Port Bandwidth

Explains how to configure the maximum available bandwidth for ports to optimize the queuing algorithm.

Chapter 7 - Managing Classes

Configuring Network Classes

Describes how to define network classes by network address, mask, or IP range for traffic classification.

Configuring Application Classes

Explains how to configure application classes based on Layer-4 ports for UDP and TCP traffic.

Configuring Physical Port Classes

Details how to define network segments using physical port definitions for traffic classification.

Configuring VLAN Tag Classes

Describes how to define network segments using VLAN tags for traffic classification.

Configuring MAC Address Classes

Explains how to configure MAC address classes to identify traffic based on source or destination MAC addresses.

Viewing Active Class Configurations

Describes how to view the active class configurations that are currently set on the device.

Chapter 8 - Managing Services for Traffic Filtering

Basic Filters

Describes how to configure basic filters with protocol, port, and content type parameters for traffic filtering.

AND Group Filters

Explains how to create AND Group filters by combining basic filters with a logical AND operator.

OR Group Filters

Describes how to create OR Group filters by combining basic or AND filters with a logical OR operator.

Viewing Active Services

Explains how to view active services, including basic filters and AND/OR groups, through Web Based Management.

Chapter 9 - Managing Device Operations and Maintenance

Rebooting a DefensePro Device

Covers how to activate a device reboot from APSolute Vision for configuration changes to take effect.

Shutting Down a DefensePro Device

Explains how to activate a device shutdown from APSolute Vision, applicable to OnDemand Switch platforms.

Enabling and Disabling APSolute Vision Monitoring

Details how to enable or disable APSolute Vision monitoring for a DefensePro device, affecting status polling and alerts.

Upgrading Device Software

Explains the process of upgrading DefensePro software versions using APSolute Vision for new features and functions.

Downloading a Device’s Log File to the APSolute Vision Client

Covers downloading a DefensePro device’s log file to the APSolute Vision client system for debugging purposes.

Updating a Radware Signature File or RSA Signature File

Details how to upload updated Radware or RSA signature files to a DefensePro device from Radware.com or client system.

Downloading a Technical Support File to the APSolute Vision Client

Explains how to generate and download a technical support file containing CLI output for Radware Technical Support.

Managing DefensePro Device Configurations

Describes how to manage configurations of DefensePro devices within the APSolute Vision server, including commands requiring or not requiring reboot.

Updating Policy Configurations on a DefensePro Device

Explains how to apply configuration changes, such as network security policy or ACL policy, to a managed device in a single operation.

Checking Device Memory Availability

Describes how to check if a DefensePro device has sufficient memory before changing tuning parameters.

Resetting the Baseline for DefensePro

Covers resetting baseline-learned statistics for BDoS or DNS profiles to accommodate network changes.

Enabling and Disabling Interfaces

Details how to enable and disable interfaces, device ports, and trunks from the Monitoring perspective.

Scheduling APSolute Vision and Device Tasks

Describes how to schedule operations for the APSolute Vision server and managed devices, referred to as tasks.

Chapter 10 - Monitoring DefensePro Devices and Interfaces

Monitoring DefensePro Devices

Covers monitoring various statistics and information for managed DefensePro devices, including general info and high availability.

Monitoring DefensePro High Availability

Describes how to view status parameters related to the high availability of a selected DefensePro device in a cluster.

Monitoring the DefensePro Suspend Table

Explains how to view the Suspend table, which lists attackers whose traffic is suspended by protections like anti-scan.

Monitoring DefensePro CPU Utilization

Details how to view statistics for the device’s average resource utilization and the utilization for each accelerator.

Monitoring and Clearing DefensePro Authentication Tables

Covers viewing statistics for Authentication Tables and clearing their contents.

Monitoring DefensePro SNMP Statistics

Describes how to view statistics for the SNMP layer of the device, including received and sent messages.

Monitoring DME Utilization According to Configured Policies

Details viewing statistics related to user-defined policies and the utilization of the DoS Mitigation Engine (DME).

Monitoring DefensePro Syslog Information

Explains how to view information relating to the syslog mechanism for centralized logging.

Monitoring Session Table Information

Describes how to view the Session table, which tracks sessions bridged and forwarded by the device.

Monitoring DefensePro IP Statistics

Covers monitoring statistics for the IP layer of the device, including packet discards and errors.

Monitoring DefensePro Bandwidth Management Statistics

Details monitoring Bandwidth Management (BWM) statistics for a DefensePro device, including last-second and last-period data.

Monitoring Routing Table Information

Explains how to view the Routing table, which stores information about destinations and how they can be reached.

Monitoring DefensePro ARP Table Information

Describes how to view the device’s ARP table, which contains static and dynamic entries.

Monitoring MPLS RD Information

Details how to monitor MPLS RD information and configure MPLS RD for VPNs.

Monitoring Device Interfaces

Explains how to view status and interface statistics for ports and trunks on DefensePro devices.

Chapter 11 - Real-Time Security Reporting

Viewing the Security Dashboard

Provides a graphical representation of current and recent attacks, offering an overview of threats and their risk levels.

Viewing Current Attack Information

Details how to view summary and detailed information for current and recent attacks detected by the DefensePro device.

Viewing Real-Time Traffic Statistics

Describes how to view real-time traffic statistics over time for IP traffic, including overall traffic, protocol mix, and packet discards.

Monitoring Attack Sources-Geographical Map

Explains how to view attack sources geographically, displaying originating countries based on source IP addresses.

Protection Monitoring

Provides real-time traffic monitoring per network rule policy, helping to understand protection effectiveness and anomaly detection.

HTTP Reports

Details how to monitor rate-based and rate-invariant HTTP traffic parameters, learn baselines, and analyze anomalies.

Chapter 12 - Administering DefensePro

Command Line Interface

Describes access to the Command Line Interface (CLI) via serial cable or terminal emulation for device management.

CLI Session Time-Out

Explains how to define the period for maintaining CLI session inactivity before automatic termination.

CLI Capabilities

Lists the capabilities of the DefensePro CLI, including command syntax, help, editing, and history features.

Web Based Management

Describes managing DefensePro devices using a Web-based interface, including SSL confinement and help access.

Web Based Management Capabilities

Details the capabilities of secure Web Based Management (HTTPS), including self-signed Radware SSL certificates.

API Structure

Explains the APSolute API as a SOAP/XML interface for third-party applications to access DefensePro devices.

APSolute API Software Development Kit (SDK)

Provides information on the APSolute API SDK, including components, documentation, and sample code for custom applications.

Appendix A - Behavioral DoS Advanced Settings

TCP Protocols

Describes Footprint Bypass types for TCP protocols, detailing parameters for attack characteristics.

ICMP

Details Footprint Bypass types for ICMP protocol, listing parameters for packet header analysis.

IGMP

Describes Footprint Bypass types for IGMP protocol, listing parameters for packet header analysis.

SYN

Details Footprint Bypass types for SYN protocol, listing parameters for packet header analysis and fragmentation.

TCP Fragmentation

Describes Footprint Bypass types for TCP Fragmentation, listing parameters for packet header analysis.

UDP

Details Footprint Bypass types for UDP protocol, listing parameters for packet header analysis and DNS query details.

Appendix B - Configuring SSL-Based Protection with AppXcel

Configuring SSL Inspection

Explains how to configure SSL inspection by setting up physical ports for traffic scanning and SSL acceleration.

Configuring SSL Inspection Layer 4 Ports for DefensePro

Details how to configure SSL inspection Layer 4 ports, mapping original traffic ports to AppXcel's decrypted session ports.

Appendix C - Troubleshooting

Diagnostic Tools

Introduces DefensePro's diagnostic tools, including Traffic Capture and Trace-Log, for system diagnosis.

Traffic Capture Tool

Describes the Traffic Capture tool for capturing packets for analysis using TCPDUMP format.

Trace-Log Tool Configuration

Explains how to configure the Trace-Log tool for debugging traffic flow within the device.

Diagnostics Policies

Explains how to configure diagnostic policies to classify and store only required traffic information for analysis.

Technical Support File

Details how to generate and download a technical-support file containing CLI output for Radware Technical Support.

Appendix D - Predefined Basic Filters

Predefined Basic Filters

Lists predefined basic filters supported by DefensePro, including name, protocol, OMPC offset, and mask.

Appendix E - Glossary

Glossary Terms

Provides a list of specialized terms and their definitions used in the Radware technical environment.

Summary

Important Notices

Important Notices

Presents the guide's terms and restrictions, including copyright and proprietary information clauses.

Copyright Notices

Copyright Notices

Lists copyright notices for software components developed by third-party projects like OpenSSL and OpenBSD.

Safety Instructions

Safety Instructions

Provides essential safety precautions and warnings for operating and maintaining the device.

Electrical Shock Hazard Label

Illustrates the label warning about electrical shock hazards associated with dual power supply systems.

HIGH VOLTAGE

Warns about high voltage hazards and the need for qualified personnel for adjustments or repairs.

GROUNDING

Instructs to connect the device's protective earth terminal screws to the building's protective earth.

Chapter 1 - Introduction

Introducing DefensePro

Introduces Radware’s DefensePro, an IPS and DoS protection device for business continuity against network threats.

DefensePro System Components

Describes the DefensePro system components, including the device, management interface, and update service.

Radware Security Update Service on the Web

Details the Radware Security Update Service for delivering signature updates against network and application security threats.

Typical Deployment

Illustrates the in-line installation of DefensePro IPS in an enterprise network at the gateway for perimeter protection.

Network Connectivity

Shows the typical network topology of DefensePro, illustrating its connection within an enterprise network.

Management Interfaces-APSolute Vision and Others

Describes the primary management interface, APSolute Vision, and additional interfaces like WBM and CLI for DefensePro.

DefensePro Features

Provides a brief description of the main DefensePro features, including security protections and bandwidth management.

Related Documentation

Lists related documents for further information on DefensePro, such as release notes and installation guides.

Chapter 2 - Getting Started

DefensePro Physical Ports

Describes the physical ports on DefensePro platforms, including RJ-45 and fiber-optic ports for traffic inspection.

DefensePro Platforms and Models

Details the various DefensePro platforms and models, including their port configurations and hardware specifications.

APSolute Vision User Interface Overview

Provides an overview of the APSolute Vision interface structure, organized functionally for easy access to options.

Configuration Perspective

Explains how to use the Configuration perspective to configure Radware devices, including device selection and settings.

Monitoring Perspective

Describes the Monitoring perspective for viewing physical devices, interfaces, and logical objects, with system and properties panes.

Security Monitoring Perspective

Details how to access real-time security monitoring tools to analyze current attacks and threat levels.

Asset Management Perspective

Explains the Asset Management perspective, available to Administrator roles for managing assets and user configurations.

Configuring Inspection Ports

Describes how to configure inspection ports on a DefensePro device to receive, inspect, and transmit traffic.

Chapter 3 - Basic Device Configuration

Locking and Unlocking a Device

Explains the process of locking and unlocking a device to prevent simultaneous configuration changes by multiple users.

DefensePro Device Setup

Covers essential setup parameters for a selected DefensePro device, including global parameters and time settings.

Configuring DefensePro Global Parameters

Details how to view and configure basic device parameters like location, contact information, and system up time.

Configuring Date and Time Synchronization

Describes how to configure NTP for synchronizing the device's time and date for accurate timestamps.

Configuring Access Protocols

Details how to configure access protocols like WBM, CLI, Telnet, and SSH for managing DefensePro devices.

Configuring SNMP Supported Versions

Describes how to configure supported SNMP versions for connecting APSolute Vision to DefensePro devices.

Upgrading a License for a DefensePro Device

Explains the procedure for upgrading DefensePro device capabilities using a new license key.

Configuring E-mail Settings

Covers configuring the device to send information messages and trap notifications via e-mail to users.

Configuring RADIUS Authentication for Device Management

Details how to enhance security by authenticating users for device management using RADIUS servers.

Configuring Syslog Settings

Explains how to configure event traps to be mirrored to syslog servers for centralized logging.

Managing Certificates

Describes how to manage digital certificates and keys for secure access to Web Based Management (WBM).

Configuring High Availability

Covers configuring two compatible DefensePro devices to operate in a two-node cluster for high availability.

Chapter 4 - Device Network Configuration

Configuring Device IP Interfaces

Describes how DefensePro performs routing between IP interfaces, including Layer 2, Layer 4, and Layer 7 routing.

Managing IP Routing

Explains how DefensePro devices forward IP packets using an IP routing table, including static and dynamic configuration.

Configuring Ports

Details how to change physical attributes of ports, such as speed and duplex mode, and configure port trunking.

Configuring the Basic Network Parameters-IP Version Mode and IP Fragmentation

Covers specifying IP version mode (IPv4/IPv6), jumbo frame handling, and IP fragmentation parameters.

Configuring Port Pairs

Explains how to configure ports on a DefensePro device to receive, inspect, and transmit traffic in paired operations.

Chapter 5 - Security Configuration

Security Protections

Describes DefensePro’s multi-layer security approach, covering network-wide, server, and access-control protections.

Selecting a Device for Security Configuration

Explains how to select the specific DefensePro device for configuring security policies within the APSolute Vision.

Configuring Global Security Settings

Details how to enable and configure global parameters for various protection features before setting up policies.

Managing the Network Protection Policy

Describes how to create and manage network-protection policies, defining rules and applying protection profiles.

Managing the Server Protection Policy

Explains how to configure server protection policies to defend specific servers against targeted network and application attacks.

Configuring White Lists

Details how to configure white lists to exempt specific traffic from security inspection.

Configuring Black Lists

Explains how to configure black lists to block traffic without inspection, used as policy exceptions.

Managing the ACL Policy

Describes the Access Control List (ACL) module for configuring a flexible and focused stateful access-control policy.

Chapter 6 - Bandwidth Management

Bandwidth Management Overview

Provides an overview of the Bandwidth Management module, enabling control over available bandwidth and application prioritization.

Managing Bandwidth Management Global Settings

Details the general bandwidth management parameters, including classification modes and application classification types.

Bandwidth Management Policies

Describes how to define and manage bandwidth management policies, including policy mechanism, classification criteria, and rules.

Port Bandwidth

Explains how to configure the maximum available bandwidth for ports to optimize the queuing algorithm.

Chapter 7 - Managing Classes

Configuring Network Classes

Describes how to define network classes by network address, mask, or IP range for traffic classification.

Configuring Application Classes

Explains how to configure application classes based on Layer-4 ports for UDP and TCP traffic.

Configuring Physical Port Classes

Details how to define network segments using physical port definitions for traffic classification.

Configuring VLAN Tag Classes

Describes how to define network segments using VLAN tags for traffic classification.

Configuring MAC Address Classes

Explains how to configure MAC address classes to identify traffic based on source or destination MAC addresses.

Viewing Active Class Configurations

Describes how to view the active class configurations that are currently set on the device.

Chapter 8 - Managing Services for Traffic Filtering

Basic Filters

Describes how to configure basic filters with protocol, port, and content type parameters for traffic filtering.

AND Group Filters

Explains how to create AND Group filters by combining basic filters with a logical AND operator.

OR Group Filters

Describes how to create OR Group filters by combining basic or AND filters with a logical OR operator.

Viewing Active Services

Explains how to view active services, including basic filters and AND/OR groups, through Web Based Management.

Chapter 9 - Managing Device Operations and Maintenance

Rebooting a DefensePro Device

Covers how to activate a device reboot from APSolute Vision for configuration changes to take effect.

Shutting Down a DefensePro Device

Explains how to activate a device shutdown from APSolute Vision, applicable to OnDemand Switch platforms.

Enabling and Disabling APSolute Vision Monitoring

Details how to enable or disable APSolute Vision monitoring for a DefensePro device, affecting status polling and alerts.

Upgrading Device Software

Explains the process of upgrading DefensePro software versions using APSolute Vision for new features and functions.

Downloading a Device’s Log File to the APSolute Vision Client

Covers downloading a DefensePro device’s log file to the APSolute Vision client system for debugging purposes.

Updating a Radware Signature File or RSA Signature File

Details how to upload updated Radware or RSA signature files to a DefensePro device from Radware.com or client system.

Downloading a Technical Support File to the APSolute Vision Client

Explains how to generate and download a technical support file containing CLI output for Radware Technical Support.

Managing DefensePro Device Configurations

Describes how to manage configurations of DefensePro devices within the APSolute Vision server, including commands requiring or not requiring reboot.

Updating Policy Configurations on a DefensePro Device

Explains how to apply configuration changes, such as network security policy or ACL policy, to a managed device in a single operation.

Checking Device Memory Availability

Describes how to check if a DefensePro device has sufficient memory before changing tuning parameters.

Resetting the Baseline for DefensePro

Covers resetting baseline-learned statistics for BDoS or DNS profiles to accommodate network changes.

Enabling and Disabling Interfaces

Details how to enable and disable interfaces, device ports, and trunks from the Monitoring perspective.

Scheduling APSolute Vision and Device Tasks

Describes how to schedule operations for the APSolute Vision server and managed devices, referred to as tasks.

Chapter 10 - Monitoring DefensePro Devices and Interfaces

Monitoring DefensePro Devices

Covers monitoring various statistics and information for managed DefensePro devices, including general info and high availability.

Monitoring DefensePro High Availability

Describes how to view status parameters related to the high availability of a selected DefensePro device in a cluster.

Monitoring the DefensePro Suspend Table

Explains how to view the Suspend table, which lists attackers whose traffic is suspended by protections like anti-scan.

Monitoring DefensePro CPU Utilization

Details how to view statistics for the device’s average resource utilization and the utilization for each accelerator.

Monitoring and Clearing DefensePro Authentication Tables

Covers viewing statistics for Authentication Tables and clearing their contents.

Monitoring DefensePro SNMP Statistics

Describes how to view statistics for the SNMP layer of the device, including received and sent messages.

Monitoring DME Utilization According to Configured Policies

Details viewing statistics related to user-defined policies and the utilization of the DoS Mitigation Engine (DME).

Monitoring DefensePro Syslog Information

Explains how to view information relating to the syslog mechanism for centralized logging.

Monitoring Session Table Information

Describes how to view the Session table, which tracks sessions bridged and forwarded by the device.

Monitoring DefensePro IP Statistics

Covers monitoring statistics for the IP layer of the device, including packet discards and errors.

Monitoring DefensePro Bandwidth Management Statistics

Details monitoring Bandwidth Management (BWM) statistics for a DefensePro device, including last-second and last-period data.

Monitoring Routing Table Information

Explains how to view the Routing table, which stores information about destinations and how they can be reached.

Monitoring DefensePro ARP Table Information

Describes how to view the device’s ARP table, which contains static and dynamic entries.

Monitoring MPLS RD Information

Details how to monitor MPLS RD information and configure MPLS RD for VPNs.

Monitoring Device Interfaces

Explains how to view status and interface statistics for ports and trunks on DefensePro devices.

Chapter 11 - Real-Time Security Reporting

Viewing the Security Dashboard

Provides a graphical representation of current and recent attacks, offering an overview of threats and their risk levels.

Viewing Current Attack Information

Details how to view summary and detailed information for current and recent attacks detected by the DefensePro device.

Viewing Real-Time Traffic Statistics

Describes how to view real-time traffic statistics over time for IP traffic, including overall traffic, protocol mix, and packet discards.

Monitoring Attack Sources-Geographical Map

Explains how to view attack sources geographically, displaying originating countries based on source IP addresses.

Protection Monitoring

Provides real-time traffic monitoring per network rule policy, helping to understand protection effectiveness and anomaly detection.

HTTP Reports

Details how to monitor rate-based and rate-invariant HTTP traffic parameters, learn baselines, and analyze anomalies.

Chapter 12 - Administering DefensePro

Command Line Interface

Describes access to the Command Line Interface (CLI) via serial cable or terminal emulation for device management.

CLI Session Time-Out

Explains how to define the period for maintaining CLI session inactivity before automatic termination.

CLI Capabilities

Lists the capabilities of the DefensePro CLI, including command syntax, help, editing, and history features.

Web Based Management

Describes managing DefensePro devices using a Web-based interface, including SSL confinement and help access.

Web Based Management Capabilities

Details the capabilities of secure Web Based Management (HTTPS), including self-signed Radware SSL certificates.

API Structure

Explains the APSolute API as a SOAP/XML interface for third-party applications to access DefensePro devices.

APSolute API Software Development Kit (SDK)

Provides information on the APSolute API SDK, including components, documentation, and sample code for custom applications.

Appendix A - Behavioral DoS Advanced Settings

TCP Protocols

Describes Footprint Bypass types for TCP protocols, detailing parameters for attack characteristics.

ICMP

Details Footprint Bypass types for ICMP protocol, listing parameters for packet header analysis.

IGMP

Describes Footprint Bypass types for IGMP protocol, listing parameters for packet header analysis.

SYN

Details Footprint Bypass types for SYN protocol, listing parameters for packet header analysis and fragmentation.

TCP Fragmentation

Describes Footprint Bypass types for TCP Fragmentation, listing parameters for packet header analysis.

UDP

Details Footprint Bypass types for UDP protocol, listing parameters for packet header analysis and DNS query details.

Appendix B - Configuring SSL-Based Protection with AppXcel

Configuring SSL Inspection

Explains how to configure SSL inspection by setting up physical ports for traffic scanning and SSL acceleration.

Configuring SSL Inspection Layer 4 Ports for DefensePro

Details how to configure SSL inspection Layer 4 ports, mapping original traffic ports to AppXcel's decrypted session ports.

Appendix C - Troubleshooting

Diagnostic Tools

Introduces DefensePro's diagnostic tools, including Traffic Capture and Trace-Log, for system diagnosis.

Traffic Capture Tool

Describes the Traffic Capture tool for capturing packets for analysis using TCPDUMP format.

Trace-Log Tool Configuration

Explains how to configure the Trace-Log tool for debugging traffic flow within the device.

Diagnostics Policies

Explains how to configure diagnostic policies to classify and store only required traffic information for analysis.

Technical Support File

Details how to generate and download a technical-support file containing CLI output for Radware Technical Support.

Appendix D - Predefined Basic Filters

Predefined Basic Filters

Lists predefined basic filters supported by DefensePro, including name, protocol, OMPC offset, and mask.

Appendix E - Glossary

Glossary Terms

Provides a list of specialized terms and their definitions used in the Radware technical environment.

Radware DefensePro 6.02 Specifications

General IconGeneral
BrandRadware
ModelDefensePro 6.02
CategoryFirewall
LanguageEnglish