30.01.2015 Views

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

8.3 Special Security Settings<br />

Anti-Spoofing<br />

Anti-Spoofing checks whether only packets with allowed source IP addresses are received at<br />

individual interfaces of the <strong>Kerio</strong> Control host. This function protects <strong>Kerio</strong> Control host from<br />

attacks from the internal network that use false IP addresses (so called spoofing).<br />

For each interface, any source IP address belonging to any network connected to the interface<br />

is correct (either directly or using other routers). For any interface connected to the Internet<br />

(so called external interface), any IP address which is not allowed at any other interface is<br />

correct.<br />

Detailed information on networks connected to individual interfaces is acquired in the routing<br />

table.<br />

The Anti-Spoofing function can be configured in the<br />

Anti-Spoofing folder in Configuration → Advanced Options.<br />

Enable Anti-Spoofing<br />

This option activates Anti-Spoofing.<br />

Log<br />

If this option is on, all packets that have not passed the anti-spoofing rules will be logged<br />

in the Security log (for details see chapter 22.11).<br />

Connections Count Limit<br />

This security function defines a limit for the maximum number of network connections which<br />

can be established from one local host (workstation) to the Internet or from the Internet to the<br />

local server via a mapped port.<br />

Incoming and outgoing connections are monitored separately. If number of all connections<br />

established from/to a single local host in any direction reaches the specified value, <strong>Kerio</strong><br />

Control block any further connections in the particular direction.<br />

These restrictions protects firewall (<strong>Kerio</strong> Control host) from overload and may also help<br />

protect it from attacks to the target server, reduce activity and impact of a worm or Trojan<br />

horse.<br />

Count limit for outgoing connections is useful for example when a local client host is attacked<br />

by a worm or Trojan horse which attempts to establish connections to larger number of<br />

various servers. Limiting of number of incoming connections can for example prevent the<br />

target from so called SYN flood attacks (flooding the server by opening too many concurrent<br />

connections without any data transferred).<br />

119

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!