As a complement to threshold rules, it is also possible to manually define hosts and networks that
are to be statically blocked or excluded. Manually blocked hosts and networks can be blocked by
default or based on a schedule. It is also possible to specify which protocols and protocol port
numbers are to be blocked.
Exclude Lists can be created and used to exclude hosts from being blocked when a threshold rule
limit is reached. Good practice includes adding to the list the firewall's interface IP or MAC address
connecting towards the ZoneDefense switch. This prevents the firewall from being accidentally
blocked out.
Example 12.1. A simple ZoneDefense scenario
The following simple example illustrates the steps needed to set up ZoneDefense. It is assumed that all interfaces
on the firewall have already been configured.
An HTTP threshold of 10 connections/second is applied. If the connection rate exceeds this limitation, the firewall
will block the specific host (in network range 192.168.2.0/24 for example) from accessing the switch completely.
A D-Link switch model DES-3226S is used in this case, with a management interface address 192.168.1.250
connecting to the firewall's interface address 192.168.1.1. This firewall interface is added into the exclude list to
prevent the firewall from being accidentally locked out from accessing the switch.
Web Interface
Add a new switch into ZoneDefense section:
1.
Go to ZoneDefense > Switches > Add > ZoneDefense switch
2.
Now enter:
•
Name: switch1
•
Switch model: DES-3226S
•
IP Address: 192.168.1.250
3.
For SNMP Community enter the Write Community String configured for the switch
4.
Press Check Switch to verify the firewall can communicate with the switch and the community string is
correct.
5.
Click OK
Add the firewall's management interface into the exclude list:
1.
Go to ZoneDefense > Exclude list
12.3.3. Manual Blocking and Exclude
Lists
Chapter 12. ZoneDefense
507
Summary of Contents for DFL-1600 - Security Appliance
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27 ...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79 ...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146 ...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227 ...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241 ...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339 ...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360 ...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382 ...
Page 386: ... The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386 ...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439 ...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450 ...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488 ...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503 ...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510 ...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533 ...