background image

 

 

11

Intrusions Prevented Automatically by Default 

Area 

Description and Protection 

Information Leakage 

Previously transmitted data is often used by network cards 
to fill in non-required fields or to increase packet sizes to 

meet the required minimum frame size of various protocols. 
For instance, Ethernet packets must be at least 64 bytes in 

length.  Packets that are shorter than this required 
minimum are padded with a previous transmission’s data to 

create a 64 byte packet length. Therefore, confidential 
information on the inside of your LAN that has been 
accessed correctly, and without encryption, can be sent out 

to the Internet on the next DNS resolution request, as one 
example. ALLY IP1000 changes the content of all bytes 

beyond the exact size required, or within non-required 
fields, in order to prevent data leakage. 

Network 

Reconnaissance: 

IP Address Discovery; 

TCP Port Discovery;  

UDP Port Discovery;  

OS Fingerprinting 

A critical part of an attacker’s network reconnaissance is to 

determine what addresses, ports, operating systems and 
firewall devices are used in your network. The Ally IP1000 

prevents address discovery, port discovery, bounce-
scanning and other types of network recons by default. 

IP Spoofing 

Attackers frequently change their packets to show a 
different IP address than the one they are actually using. 

For connection-oriented sessions, such as HTTP and TCP/IP, 
the Ally appliance prevents any connection into the network 
unless the original source IP address remains unchanged 

throughout the session. For example, only ACK responses 
that match the originator’s IP address from the initial SYN 

request are allowed into the network.  

Resource Flooding & 
Denial of Service (DoS) 

The Ally IP1000 protects against DoS and its variants along 
with illegitimate large amounts of traffic intended to 

overload a system to an extent it is unable to respond to 
legitimate traffic. Examples of DoS and other resource 

floods that are thwarted by the Ally IP1000 are: SYN; 
SYN/ACK; ACK; RESET; 3-way connection ‘hogs’ 

(handshake takes place, but no data sent); Invalid TCP 
packets; and Open Idle Connections. 

Session Hijacking: 

Initial Sequence Number 

(ISN) Guessing; 

IPID Guessing 

Session hijacking involves brute force methods to attempt 

to match an existing ISN, IPID, and other fields within the 
IP and TCP header. By default, the Ally IP1000 hardens, 
encrypts and randomizes many of the IP and TCP fields to 

prevent session hijacking. Windows XP nodes sitting behind 
a typical firewall have a 12% likelihood of being hijacked. 

With an Ally IP1000 in place, this likelihood drops to a 
0.00001% chance of success.  

Worm Mitigation 

Worms typically propagate by scanning for the next target 

victim. The Ally IP1000 detects these scans and blacklists 
the offending node and drops any further traffic from that 

node. Therefore, worm propagation is stopped from coming 
into your network by default. 

 
 

 
 

 
 

Summary of Contents for ALLY IP1000

Page 1: ...User Guide...

Page 2: ...ceo logo are trademarks or registered trademarks of Arxceo Corporation Microsoft and Windows Embedded XP are registered trademarks of Microsoft Corporation Other brands trademarks or trade names may b...

Page 3: ...000 Back Panel 6 Management 7 Command Line Management 8 Confirmation 8 Intrusion Protection Information 10 Reviewing Intrusion Messages in the Event Log 12 Appendix A 13 Appendix B 18 Appendix C 25 Cu...

Page 4: ...from infected internal systems can be provided by deploying Ally products at common gateways or network traffic intersections In the Perimeter Protection position there are only a few steps to perfor...

Page 5: ...s case you will need to change the software Network Adapter Configuration to match this physical setup by using either the Ally Management Console or the command line interface To make certain this fe...

Page 6: ...0 introduces a potential point of attack The Ally IP1000 Inside and Outside Adapters do not use an IP or MAC address This unique approach helps protect the Ally IP1000 and your network from attacks Ho...

Page 7: ...ator Password arxceo 4 The first time the Ally Management Console is accessed you will be required to accept the End User License Agreement EULA If you do not accept the terms of the EULA the product...

Page 8: ...al console unattended logout of the system by entering the logout command in the command window This will password protect the console Confirmation The next step to Plug and Protect is to ensure no kn...

Page 9: ...te blacklists and whitelists for both the Outside and Inside adapters Arxceo recommends performing the following three steps as a component of your scheduled systems security maintenance 1 Review Blac...

Page 10: ...ine that you are blacklisting on SYN requests rather than ACK responses IP Fragments Due to physical differences between various networking hardware IP packets may be broken into various fragments whe...

Page 11: ...tion oriented sessions such as HTTP and TCP IP the Ally appliance prevents any connection into the network unless the original source IP address remains unchanged throughout the session For example on...

Page 12: ...e most recent 100 event log messages Additionally the Ally IP1000 event log messages can be viewed on the local console using the Windows Event Viewer To access the Windows Event Viewer 1 At the Ally...

Page 13: ...dapters Device ALLY has been started Network adapter Network Adapter Number is assigned to handle inside network traffic Network adapter Network Adapter Number is assigned to handle outside network tr...

Page 14: ...from the same IP address in Outside Scan Timeout Number seconds will cause that IP address to be placed on the outside adapter s blacklist 16 Configuration Blacklist Time Period An IP address will rem...

Page 15: ...formation Reply packets are passed through without analysis or discarded 35 Configuration ICMP Address Mask Policy ICMP Address Mask Request packets are passed through without analysis or discarded 36...

Page 16: ...card Fragmented Packet A fragmented packet from IP address Source IP Address to Destination IP Address with IP id IP ID was discarded 54 Detection Discard Outbound Management An outbound connection re...

Page 17: ...ole User or User Name set the ALLY SNMP Syslog agent s configuration variable Variable Name to New Variable Value 64 Configuration Event SNMP Syslog Agent Reload The ALLY SNMP Syslog agent was directe...

Page 18: ...passed through without inspection or intervention When Pass Through Mode is enabled the other Ally IP1000 configuration parameters are ignored and NO PROTECTION is provided General Filtering Options...

Page 19: ...tering Options at Inside to Outside Address Authentication Disabled First Connection per Session All Connections First Connect per Session TCP Policy id Maximum Number of Inside to Outside Concurrent...

Page 20: ...established This setting is especially useful when the applications communicating through the Ally create multiple connections from a specific source IP address to a single destination IP address and...

Page 21: ...ed 32 bit integers 25 5 Port Scan Prevention is one of the Ally IP1000 features designed to provide anti reconnaissance protection This feature limits the number of TCP connection requests from a spec...

Page 22: ...UDP Policy Discard All Analyze Allow All Analyze Selecting Analyze activates the UDP policy parameters i e the next 4 entries in this table General Filtering Options av DNS Policy Discard All Analyze...

Page 23: ...rd All Analyze Allow All Analyze Selecting Analyze activates the ICMP policy parameters i e the next 12 entries in this table General Filtering Options ai ICMP Echo Request Policy Discard All Allow Al...

Page 24: ...card All Allow All Allow All Address Resolution Protocol ARP is the protocol that converts IP addresses to MAC addresses Typically ARP traffic should be allowed to pass through the Ally IP1000 Non IP...

Page 25: ...ration Event Detection and Information Configuration and Configuration Event messages are always written to the event log while Detection and Information messages can be optionally disabled Use the Al...

Page 26: ...on Maximum Concurrent Connections N A mmun mmuy 9 Configuration IP Fragment Policy N A mfrn mfry 10 Configuration Log Invalid TCP Flags N A mlfn mlfy 11 Configuration Log Invalid TCP Option N A mlon m...

Page 27: ...eply Policy N A 33 Configuration ICMP Information Request Policy N A 34 Configuration ICMP Information Reply Policy N A 35 Configuration ICMP Address Mask Policy N A 36 Configuration ICMP Address Mask...

Page 28: ...sy 55 Detection Discard ARP Packet la mdan mday 56 Detection Discard ICMP Packet ldi mdin mdiy 57 Detection Discard UDP Packet ldu mdun mduy 58 Detection Discard DNS Packet ldns mddn mddy 59 Configura...

Page 29: ...zed Arxceo Reseller for hardware and software support for your Ally IP1000 Additional information is available on our website at www arxceo com Further support or additional questions may be directed...

Page 30: ...f Button System Reset Button LEDs Power Hard drive activity 2 network activity System overheat Power Supply 200 Watt AC Power Supply Thermal Control with PFC Cooling 1 x 100mm blower fan in chassis Op...

Page 31: ...violation of this provision is void You may not lease rent merge time share or use the Software in the operation of any service bureau You agree not to reverse engineer decompile or disassemble the S...

Page 32: ...e no obligation to provide the support services after the expiration of the then current Support Term At any time regardless of whether a Support Term is then in effect in the event that any part or a...

Page 33: ...icts of laws The parties hereby consent to the exclusive jurisdiction of the courts residing in the State of Alabama The headings in this Agreement are inserted for convenience only and shall not be u...

Page 34: ......

Reviews: