background image

 

 

22 

Ally IP1000 Factory Default Configuration 

Configuration 

Parameter 

Possible 

Settings 

Default Intrusion 

Implication Mgmt. 

Console 

Page 

AllyRTCfg 

Option 

Maximum 

Segment Size 
Range 

Any unsigned 

32-bit 

integers 

450 - 1460  During the establishment of a TCP 

connection the two communicating 
systems negotiate a Maximum 

Segment Size (MSS). This value 
determines the maximum packet 

size that will be transmitted during 
the conversation (MSS + 40 = 
maximum packet size). 

The Ally IP1000 limits the MSS 
values to a specified range. This 
feature helps prevent an attacker 

from consuming excessive network 
resources by establishing 

connections that generate many 
very small packets. 

 -minmss 

-maxmss 

UDP Policy 

!

 

Discard All 

!

 

Analyze 

!

 

Allow All 

Analyze 

Selecting “Analyze” activates the 

UDP policy parameters, i.e. the 
next 4 entries in this table. 

General 

Filtering 
Options 

-av 

DNS Policy 

!

 

Discard All 

!

 

Analyze 

Analyze 

Domain Name Service (DNS) is a 

UDP based protocol. This is the 
protocol that converts domain 

names to IP addresses. Typically, 
DNS traffic should be allowed to 

pass through the Ally IP1000. 
 
Selecting “Analyze” activates the 

DNS sub-policy parameters, i.e. 
the next 3 entries in this table.  

UDP 

Policy 

-ad 

DNS Cache 

Poisoning 
Detection 

!

 

Enabled 

!

 

Disabled 

Enabled 

Some systems accept DNS 

information that was not 
specifically requested. This allows 

an attacker to replace a legitimate 
name resolution with another 

address. This is referred to as DNS 
Cache Poisoning. It causes an 

unsuspecting system to connect to 
an imposter system instead of the 
intended destination. 

UDP 

Policy 

-dv 

Summary of Contents for ALLY IP1000

Page 1: ...User Guide...

Page 2: ...ceo logo are trademarks or registered trademarks of Arxceo Corporation Microsoft and Windows Embedded XP are registered trademarks of Microsoft Corporation Other brands trademarks or trade names may b...

Page 3: ...000 Back Panel 6 Management 7 Command Line Management 8 Confirmation 8 Intrusion Protection Information 10 Reviewing Intrusion Messages in the Event Log 12 Appendix A 13 Appendix B 18 Appendix C 25 Cu...

Page 4: ...from infected internal systems can be provided by deploying Ally products at common gateways or network traffic intersections In the Perimeter Protection position there are only a few steps to perfor...

Page 5: ...s case you will need to change the software Network Adapter Configuration to match this physical setup by using either the Ally Management Console or the command line interface To make certain this fe...

Page 6: ...0 introduces a potential point of attack The Ally IP1000 Inside and Outside Adapters do not use an IP or MAC address This unique approach helps protect the Ally IP1000 and your network from attacks Ho...

Page 7: ...ator Password arxceo 4 The first time the Ally Management Console is accessed you will be required to accept the End User License Agreement EULA If you do not accept the terms of the EULA the product...

Page 8: ...al console unattended logout of the system by entering the logout command in the command window This will password protect the console Confirmation The next step to Plug and Protect is to ensure no kn...

Page 9: ...te blacklists and whitelists for both the Outside and Inside adapters Arxceo recommends performing the following three steps as a component of your scheduled systems security maintenance 1 Review Blac...

Page 10: ...ine that you are blacklisting on SYN requests rather than ACK responses IP Fragments Due to physical differences between various networking hardware IP packets may be broken into various fragments whe...

Page 11: ...tion oriented sessions such as HTTP and TCP IP the Ally appliance prevents any connection into the network unless the original source IP address remains unchanged throughout the session For example on...

Page 12: ...e most recent 100 event log messages Additionally the Ally IP1000 event log messages can be viewed on the local console using the Windows Event Viewer To access the Windows Event Viewer 1 At the Ally...

Page 13: ...dapters Device ALLY has been started Network adapter Network Adapter Number is assigned to handle inside network traffic Network adapter Network Adapter Number is assigned to handle outside network tr...

Page 14: ...from the same IP address in Outside Scan Timeout Number seconds will cause that IP address to be placed on the outside adapter s blacklist 16 Configuration Blacklist Time Period An IP address will rem...

Page 15: ...formation Reply packets are passed through without analysis or discarded 35 Configuration ICMP Address Mask Policy ICMP Address Mask Request packets are passed through without analysis or discarded 36...

Page 16: ...card Fragmented Packet A fragmented packet from IP address Source IP Address to Destination IP Address with IP id IP ID was discarded 54 Detection Discard Outbound Management An outbound connection re...

Page 17: ...ole User or User Name set the ALLY SNMP Syslog agent s configuration variable Variable Name to New Variable Value 64 Configuration Event SNMP Syslog Agent Reload The ALLY SNMP Syslog agent was directe...

Page 18: ...passed through without inspection or intervention When Pass Through Mode is enabled the other Ally IP1000 configuration parameters are ignored and NO PROTECTION is provided General Filtering Options...

Page 19: ...tering Options at Inside to Outside Address Authentication Disabled First Connection per Session All Connections First Connect per Session TCP Policy id Maximum Number of Inside to Outside Concurrent...

Page 20: ...established This setting is especially useful when the applications communicating through the Ally create multiple connections from a specific source IP address to a single destination IP address and...

Page 21: ...ed 32 bit integers 25 5 Port Scan Prevention is one of the Ally IP1000 features designed to provide anti reconnaissance protection This feature limits the number of TCP connection requests from a spec...

Page 22: ...UDP Policy Discard All Analyze Allow All Analyze Selecting Analyze activates the UDP policy parameters i e the next 4 entries in this table General Filtering Options av DNS Policy Discard All Analyze...

Page 23: ...rd All Analyze Allow All Analyze Selecting Analyze activates the ICMP policy parameters i e the next 12 entries in this table General Filtering Options ai ICMP Echo Request Policy Discard All Allow Al...

Page 24: ...card All Allow All Allow All Address Resolution Protocol ARP is the protocol that converts IP addresses to MAC addresses Typically ARP traffic should be allowed to pass through the Ally IP1000 Non IP...

Page 25: ...ration Event Detection and Information Configuration and Configuration Event messages are always written to the event log while Detection and Information messages can be optionally disabled Use the Al...

Page 26: ...on Maximum Concurrent Connections N A mmun mmuy 9 Configuration IP Fragment Policy N A mfrn mfry 10 Configuration Log Invalid TCP Flags N A mlfn mlfy 11 Configuration Log Invalid TCP Option N A mlon m...

Page 27: ...eply Policy N A 33 Configuration ICMP Information Request Policy N A 34 Configuration ICMP Information Reply Policy N A 35 Configuration ICMP Address Mask Policy N A 36 Configuration ICMP Address Mask...

Page 28: ...sy 55 Detection Discard ARP Packet la mdan mday 56 Detection Discard ICMP Packet ldi mdin mdiy 57 Detection Discard UDP Packet ldu mdun mduy 58 Detection Discard DNS Packet ldns mddn mddy 59 Configura...

Page 29: ...zed Arxceo Reseller for hardware and software support for your Ally IP1000 Additional information is available on our website at www arxceo com Further support or additional questions may be directed...

Page 30: ...f Button System Reset Button LEDs Power Hard drive activity 2 network activity System overheat Power Supply 200 Watt AC Power Supply Thermal Control with PFC Cooling 1 x 100mm blower fan in chassis Op...

Page 31: ...violation of this provision is void You may not lease rent merge time share or use the Software in the operation of any service bureau You agree not to reverse engineer decompile or disassemble the S...

Page 32: ...e no obligation to provide the support services after the expiration of the then current Support Term At any time regardless of whether a Support Term is then in effect in the event that any part or a...

Page 33: ...icts of laws The parties hereby consent to the exclusive jurisdiction of the courts residing in the State of Alabama The headings in this Agreement are inserted for convenience only and shall not be u...

Page 34: ......

Reviews: