background image

 

 

21

Ally IP1000 Factory Default Configuration 

Configuration 

Parameter 

Possible 

Settings 

Default Intrusion 

Implication Mgmt. 

Console 

Page 

AllyRTCfg 

Option 

Idle Connection 

Timeout   

!

 

0 = Never 

Timeout 

!

 

Any other 

unsigned 
32-bit 

integer 

600 

seconds 

 (10 min) 

An "idle" connection is an 

established TCP connection over 
which no traffic has been 

transmitted for some period of 
time. The "Idle Connection 

Timeout" value determines the 
amount of time a connection may 
be idle before the Ally resets that 

connection. 
 

Specify “0” to indicate that idle 
connections are to remain open 

indefinitely. 

TCP 

Policy 

-it 

Inside Adapter 
Port Scan 

Prevention 

!

 

Enabled 

!

 

Disabled 

Disabled TCP 

Policy 

-si 

Blacklist Due to 
Port Scanning 

on the Inside 
Adapter after 

Scans/Seconds 

Any unsigned 

32-bit 

integers 

25/5 TCP 

Policy 

-ssi 
-sti 

Outside Adapter 
Port Scan 

Prevention 

!

 

Enabled 

!

 

Disabled 

Enabled TCP 

Policy 

-so 

Blacklist Due to 
Port Scanning 

on the Outside 
Adapter after 
Scans/Seconds 

Any unsigned 

32-bit 

integers 

25/5 

Port Scan Prevention is one of the 
Ally IP1000 features designed to 

provide anti-reconnaissance 
protection. This feature limits the 

number of TCP connection 
requests from a specific source IP 
address that will be allowed to 

pass through the Ally over a 
specified time period. Systems 

that exceed the port scan 
threshold are added to the 

dynamic blacklist associated with 
the adapter on which the port 

scans were received. No further 
traffic from a dynamically 
blacklisted system is passed 

through the Ally until the "Blacklist 
Timeout" occurs. 

The Port Scan Prevention threshold 

is configured independently for the 
Inside and Outside Adapters. This 

threshold consists of a maximum 
number of connection requests 

received in a specified number of 
seconds. 

TCP 
Policy 

-sso 
-sto 

 

Port Scan 

Method 

!

 

SYN 

!

 

ACK 

ACK 

This option determines whether 

the Ally IP1000 will detect port 
scans by counting the number of 

initial TCP connection request 
packets (SYN) received from a 
system or the number of three-

way handshake completion 
packets (ACK) received from that 

system. By default, the Ally uses 
the ACK packet for port scan 

detection. 

TCP 

Policy 

-psb 

Summary of Contents for ALLY IP1000

Page 1: ...User Guide...

Page 2: ...ceo logo are trademarks or registered trademarks of Arxceo Corporation Microsoft and Windows Embedded XP are registered trademarks of Microsoft Corporation Other brands trademarks or trade names may b...

Page 3: ...000 Back Panel 6 Management 7 Command Line Management 8 Confirmation 8 Intrusion Protection Information 10 Reviewing Intrusion Messages in the Event Log 12 Appendix A 13 Appendix B 18 Appendix C 25 Cu...

Page 4: ...from infected internal systems can be provided by deploying Ally products at common gateways or network traffic intersections In the Perimeter Protection position there are only a few steps to perfor...

Page 5: ...s case you will need to change the software Network Adapter Configuration to match this physical setup by using either the Ally Management Console or the command line interface To make certain this fe...

Page 6: ...0 introduces a potential point of attack The Ally IP1000 Inside and Outside Adapters do not use an IP or MAC address This unique approach helps protect the Ally IP1000 and your network from attacks Ho...

Page 7: ...ator Password arxceo 4 The first time the Ally Management Console is accessed you will be required to accept the End User License Agreement EULA If you do not accept the terms of the EULA the product...

Page 8: ...al console unattended logout of the system by entering the logout command in the command window This will password protect the console Confirmation The next step to Plug and Protect is to ensure no kn...

Page 9: ...te blacklists and whitelists for both the Outside and Inside adapters Arxceo recommends performing the following three steps as a component of your scheduled systems security maintenance 1 Review Blac...

Page 10: ...ine that you are blacklisting on SYN requests rather than ACK responses IP Fragments Due to physical differences between various networking hardware IP packets may be broken into various fragments whe...

Page 11: ...tion oriented sessions such as HTTP and TCP IP the Ally appliance prevents any connection into the network unless the original source IP address remains unchanged throughout the session For example on...

Page 12: ...e most recent 100 event log messages Additionally the Ally IP1000 event log messages can be viewed on the local console using the Windows Event Viewer To access the Windows Event Viewer 1 At the Ally...

Page 13: ...dapters Device ALLY has been started Network adapter Network Adapter Number is assigned to handle inside network traffic Network adapter Network Adapter Number is assigned to handle outside network tr...

Page 14: ...from the same IP address in Outside Scan Timeout Number seconds will cause that IP address to be placed on the outside adapter s blacklist 16 Configuration Blacklist Time Period An IP address will rem...

Page 15: ...formation Reply packets are passed through without analysis or discarded 35 Configuration ICMP Address Mask Policy ICMP Address Mask Request packets are passed through without analysis or discarded 36...

Page 16: ...card Fragmented Packet A fragmented packet from IP address Source IP Address to Destination IP Address with IP id IP ID was discarded 54 Detection Discard Outbound Management An outbound connection re...

Page 17: ...ole User or User Name set the ALLY SNMP Syslog agent s configuration variable Variable Name to New Variable Value 64 Configuration Event SNMP Syslog Agent Reload The ALLY SNMP Syslog agent was directe...

Page 18: ...passed through without inspection or intervention When Pass Through Mode is enabled the other Ally IP1000 configuration parameters are ignored and NO PROTECTION is provided General Filtering Options...

Page 19: ...tering Options at Inside to Outside Address Authentication Disabled First Connection per Session All Connections First Connect per Session TCP Policy id Maximum Number of Inside to Outside Concurrent...

Page 20: ...established This setting is especially useful when the applications communicating through the Ally create multiple connections from a specific source IP address to a single destination IP address and...

Page 21: ...ed 32 bit integers 25 5 Port Scan Prevention is one of the Ally IP1000 features designed to provide anti reconnaissance protection This feature limits the number of TCP connection requests from a spec...

Page 22: ...UDP Policy Discard All Analyze Allow All Analyze Selecting Analyze activates the UDP policy parameters i e the next 4 entries in this table General Filtering Options av DNS Policy Discard All Analyze...

Page 23: ...rd All Analyze Allow All Analyze Selecting Analyze activates the ICMP policy parameters i e the next 12 entries in this table General Filtering Options ai ICMP Echo Request Policy Discard All Allow Al...

Page 24: ...card All Allow All Allow All Address Resolution Protocol ARP is the protocol that converts IP addresses to MAC addresses Typically ARP traffic should be allowed to pass through the Ally IP1000 Non IP...

Page 25: ...ration Event Detection and Information Configuration and Configuration Event messages are always written to the event log while Detection and Information messages can be optionally disabled Use the Al...

Page 26: ...on Maximum Concurrent Connections N A mmun mmuy 9 Configuration IP Fragment Policy N A mfrn mfry 10 Configuration Log Invalid TCP Flags N A mlfn mlfy 11 Configuration Log Invalid TCP Option N A mlon m...

Page 27: ...eply Policy N A 33 Configuration ICMP Information Request Policy N A 34 Configuration ICMP Information Reply Policy N A 35 Configuration ICMP Address Mask Policy N A 36 Configuration ICMP Address Mask...

Page 28: ...sy 55 Detection Discard ARP Packet la mdan mday 56 Detection Discard ICMP Packet ldi mdin mdiy 57 Detection Discard UDP Packet ldu mdun mduy 58 Detection Discard DNS Packet ldns mddn mddy 59 Configura...

Page 29: ...zed Arxceo Reseller for hardware and software support for your Ally IP1000 Additional information is available on our website at www arxceo com Further support or additional questions may be directed...

Page 30: ...f Button System Reset Button LEDs Power Hard drive activity 2 network activity System overheat Power Supply 200 Watt AC Power Supply Thermal Control with PFC Cooling 1 x 100mm blower fan in chassis Op...

Page 31: ...violation of this provision is void You may not lease rent merge time share or use the Software in the operation of any service bureau You agree not to reverse engineer decompile or disassemble the S...

Page 32: ...e no obligation to provide the support services after the expiration of the then current Support Term At any time regardless of whether a Support Term is then in effect in the event that any part or a...

Page 33: ...icts of laws The parties hereby consent to the exclusive jurisdiction of the courts residing in the State of Alabama The headings in this Agreement are inserted for convenience only and shall not be u...

Page 34: ......

Reviews: