金盾抗DDOS防火墙用户手册
金盾抗DDOS防火墙
用 户 操 作 手 册
选 择 金 盾 ,铸 就 成 功
―――――――――――――――――――――――――――――
AnHui ZXSoft Co. Ltd.?版权所有 2002-2008
金盾全国技术支持热线:800-868-7722
金盾抗DDOS防火墙用户手册
目 录
物品清单 一、
1. 2. 3. 二、
1. 2.
用户手册简介 ............................................................................................................... 2 用途 .................................................................................................................................... 2 约定 .................................................................................................................................... 2 概述 .................................................................................................................................... 2
产品概述 ...................................................................................................................... 3 DOS/DDOS简介 ................................................................................................................. 3 金盾抗DDOS防火墙........................................................................................................... 3 1)技术优势 .......................................................................................................................... 3
a) DOS/DDOS攻击检测及防护 ...................................................................................... 3
b) 通用方便的报文规则过滤 ....................................................................................... 4 c) 专业的连接跟踪机制 .............................................................................................. 4 d) 简洁丰富的管理 ..................................................................................................... 4 e) 广泛的部署能力 ..................................................................................................... 4 f) 优质的售后服务 ..................................................................................................... 4 2)防护原理 .......................................................................................................................... 4
a) 攻击检测 ................................................................................................................ 4 b) 协议分析 ................................................................................................................ 5
c) 主机识别 ................................................................................................................ 5 d) 连接跟踪 ................................................................................................................ 5 e) 端口防护 ................................................................................................................ 5 3)产品系列 .......................................................................................................................... 5
a) 软件产品.................................................................................................................. 5 b) 硬件产品 ................................................................................................................ 5
三、 安装指南 ...................................................................................................................... 6
1.设备类型及构成......................................................................................................................... 6
1)JDFW-100+....................................................................................................................... 6 2)JDFW-1000+ ..................................................................................................................... 6 3)JDFW-8000+ ..................................................................................................................... 7 4)JDFW-2000+ ..................................................................................................................... 7 5)集群型号 .......................................................................................................................... 8 2.硬件设备安装 ............................................................................................................................ 8
1)单路型防火墙 ................................................................................................................... 8
2)双路型防火墙 ................................................................................................................... 8 3)集群型防火墙 ................................................................................................................... 8
3.注意事项 ................................................................................................................................... 9 四、 防火墙功能描述 ..........................................................................................................10
1.用户登录 ..................................................................................................................................10
2.系统信息 ..................................................................................................................................10
1)内核版本号及构建日期 ....................................................................................................10
2)序列号码 .........................................................................................................................10
AnHui ZXSoft Co. Ltd.?版权所有 2002-2008
金盾全国技术支持热线:800-868-7722
金盾抗DDOS防火墙用户手册
3)设备连接状态及地址 .......................................................................................................10 3.规则设置 ..................................................................................................................................10
1)地址 ................................................................................................................................10 2)端口 .............................................................................................................................. 11 3)标志位 ............................................................................................................................. 11 4)模式匹配 .......................................................................................................................... 11 5)方向选择 .......................................................................................................................... 11 6)规则行为 .......................................................................................................................... 11 4.防护状态 .................................................................................................................................. 11
1) SYN保护模式................................................................................................................. 11 2) SYN危急保护模式..........................................................................................................12 3) ACK&RST保护模式 .......................................................................................................12 4) UDP保护模式.................................................................................................................12 5) ICMP保护模式 ...............................................................................................................12 6)碎片保护模式 ..................................................................................................................12 7) NonIP保护模式...............................................................................................................13 8) 忽略模式........................................................................................................................13 9) 禁止模式........................................................................................................................13 10) WebCC保护模式 ...........................................................................................................13 11) GameCC保护模式 .........................................................................................................13 12) 高级UDP保护模式 ......................................................................................................13 5.参数设置 ..................................................................................................................................13
1) 系统控制........................................................................................................................14 a)系统时间 ..................................................................................................................14 b) 流量控制 .................................................................................................................14 c)策略选项 .................................................................................................................14 2)攻击检测 .........................................................................................................................14
a) SYN Flood保护 .....................................................................................................14 b)SYN Flood高压保护................................................................................................14 c)SYN Flood单机保护 ................................................................................................14 d)ACK&RST Flood保护 .............................................................................................14 e)TCP端口自动关闭触发............................................................................................15 f)UDP保护触发 .........................................................................................................15 g ) ICMP保护触发 ........................................................................................................15 h) 碎片保护触发 ..........................................................................................................15 i) NonIP保护触发 .........................................................................................................15 3) 流量限制 .......................................................................................................................15
a)紧急触发状态 ..........................................................................................................15
b)简单过滤流量限制...................................................................................................15 c)忽略主机流量限制 ...................................................................................................15 d)伪造源流量限制 ......................................................................................................15 4) TCP防护 .......................................................................................................................15
a) 屏蔽持续时间: .......................................................................................................16
b) 连接数量保护 ..........................................................................................................16
AnHui ZXSoft Co. Ltd.?版权所有 2002-2008
金盾全国技术支持热线:800-868-7722
金盾抗DDOS防火墙用户手册
c) 连接空闲超时 ............................................................................................................16 d) 默认黑名单策略 ........................................................................................................16 5) UDP防护设置 ................................................................................................................16 a) 请求连接超时 ............................................................................................................16 b) 建立连接超时............................................................................................................16 6) 变量设置.......................................................................................................................16 6.端口策略 ..................................................................................................................................16
1)防护类型 .........................................................................................................................16
a) 标准防护(default) ...............................................................................................16
b) 动态验证(WEB Service Protection) ............................................................................17 c) 频率保护(Game Service Protection) ............................................................................17 2) 连接攻击检测 ................................................................................................................17 3) 连接数量限制 ................................................................................................................17 4) 端口探测限制 ................................................................................................................17 5) 防护标志........................................................................................................................17
a) 超时连接.................................................................................................................17
b) 超出屏蔽.................................................................................................................17 c) 延时提交.................................................................................................................17 d) 接受协议.................................................................................................................18 6)模块参数 .........................................................................................................................18
管理及配置 .................................................................................................................18 1)语言 ................................................................................................................................18 2)用户/密码 ........................................................................................................................18 2.状态监控页面.............................................................................................................................19
1)全局统计 .........................................................................................................................18 2) 系统负载 .......................................................................................................................19
3) 主机状态 .......................................................................................................................20
a) 主机 ........................................................................................................................20
b) 带宽 ........................................................................................................................21 c) 频率 ........................................................................................................................21 d) 连接 ........................................................................................................................21 e) 防护模式 .................................................................................................................21 4) 单一主机状态 ................................................................................................................21
a)主机地址 ...................................................................................................................22 b)网关IP地址 ..............................................................................................................22 c)网关MAC地址 .........................................................................................................22 d)流量策略 ...................................................................................................................22 e) 连接策略 .................................................................................................................22 f) 黑名单策略 ..............................................................................................................22 g) 保护设置集序号.......................................................................................................23 h) 分时流量 .................................................................................................................23 i)防护插件....................................................................................................................23 5)连接监控 .........................................................................................................................23
AnHui ZXSoft Co. Ltd.?版权所有 2002-2008
金盾全国技术支持热线:800-868-7722
五、
1.登录页面 ..................................................................................................................................18
金盾抗DDOS防火墙用户手册
a) 控制 ........................................................................................................................23 b) 本地地址 .................................................................................................................23 c)远端地址 ...................................................................................................................23 d)当前状态 ...................................................................................................................23 e)选择连接 ...................................................................................................................24 6)屏蔽列表 .........................................................................................................................24
a) 控制 ........................................................................................................................24
b) 本地地址 .................................................................................................................24 c)远端地址 ...................................................................................................................24 d)当前状态 ...................................................................................................................24 7) 黑名单管理....................................................................................................................24 3.攻击防御页面 ...........................................................................................................................25
1) 全局参数 .......................................................................................................................25
2) 规则设置 .......................................................................................................................25
a)规则设置集................................................................................................................26 b)控制 ..........................................................................................................................26 c)协议 ..........................................................................................................................26 d)地址 ..........................................................................................................................26 e)细节 ..........................................................................................................................26 f)匹配...........................................................................................................................26 3)规则编辑页面 ..................................................................................................................26
a) 规则序号 .................................................................................................................27 b) 规则描述 .................................................................................................................27 c) 报文长度 .................................................................................................................27 d) 本地地址 .................................................................................................................27 e) 远程地址 .................................................................................................................27 f)协议类型....................................................................................................................27 g)本地端口/远程端口 ....................................................................................................27 h)TCP标志位 ...............................................................................................................27 i)ICMP类型/ICMP代码 ................................................................................................28 j)模式匹配....................................................................................................................28 k)方向选择 ...................................................................................................................28
l)规则行为....................................................................................................................28
4.日志记录页面..........................................................................................................................29 5.系统配置页面..........................................................................................................................30
1)保存配置.......................................................................................................................30
2)系统设备.......................................................................................................................31 3)集群参数 .........................................................................................................................31 4)用户管理 .........................................................................................................................32 5) SNMP系统配置..............................................................................................................33 6) SNMP用户......................................................................................................................33 7)SNMP视图列表 ................................................................................................................34 6.服务支持.................................................................................................................................35
1) 关于我们 .......................................................................................................................35
AnHui ZXSoft Co. Ltd.?版权所有 2002-2008
金盾全国技术支持热线:800-868-7722