金盾防火墙使用说明书

2019-05-24 21:29

金盾抗DDOS防火墙用户手册

金盾抗DDOS防火墙

用 户 操 作 手 册

选 择 金 盾 ,铸 就 成 功

―――――――――――――――――――――――――――――

AnHui ZXSoft Co. Ltd.?版权所有 2002-2008

金盾全国技术支持热线:800-868-7722

金盾抗DDOS防火墙用户手册

目 录

物品清单 一、

1. 2. 3. 二、

1. 2.

用户手册简介 ............................................................................................................... 2 用途 .................................................................................................................................... 2 约定 .................................................................................................................................... 2 概述 .................................................................................................................................... 2

产品概述 ...................................................................................................................... 3 DOS/DDOS简介 ................................................................................................................. 3 金盾抗DDOS防火墙........................................................................................................... 3 1)技术优势 .......................................................................................................................... 3

a) DOS/DDOS攻击检测及防护 ...................................................................................... 3

b) 通用方便的报文规则过滤 ....................................................................................... 4 c) 专业的连接跟踪机制 .............................................................................................. 4 d) 简洁丰富的管理 ..................................................................................................... 4 e) 广泛的部署能力 ..................................................................................................... 4 f) 优质的售后服务 ..................................................................................................... 4 2)防护原理 .......................................................................................................................... 4

a) 攻击检测 ................................................................................................................ 4 b) 协议分析 ................................................................................................................ 5

c) 主机识别 ................................................................................................................ 5 d) 连接跟踪 ................................................................................................................ 5 e) 端口防护 ................................................................................................................ 5 3)产品系列 .......................................................................................................................... 5

a) 软件产品.................................................................................................................. 5 b) 硬件产品 ................................................................................................................ 5

三、 安装指南 ...................................................................................................................... 6

1.设备类型及构成......................................................................................................................... 6

1)JDFW-100+....................................................................................................................... 6 2)JDFW-1000+ ..................................................................................................................... 6 3)JDFW-8000+ ..................................................................................................................... 7 4)JDFW-2000+ ..................................................................................................................... 7 5)集群型号 .......................................................................................................................... 8 2.硬件设备安装 ............................................................................................................................ 8

1)单路型防火墙 ................................................................................................................... 8

2)双路型防火墙 ................................................................................................................... 8 3)集群型防火墙 ................................................................................................................... 8

3.注意事项 ................................................................................................................................... 9 四、 防火墙功能描述 ..........................................................................................................10

1.用户登录 ..................................................................................................................................10

2.系统信息 ..................................................................................................................................10

1)内核版本号及构建日期 ....................................................................................................10

2)序列号码 .........................................................................................................................10

AnHui ZXSoft Co. Ltd.?版权所有 2002-2008

金盾全国技术支持热线:800-868-7722

金盾抗DDOS防火墙用户手册

3)设备连接状态及地址 .......................................................................................................10 3.规则设置 ..................................................................................................................................10

1)地址 ................................................................................................................................10 2)端口 .............................................................................................................................. 11 3)标志位 ............................................................................................................................. 11 4)模式匹配 .......................................................................................................................... 11 5)方向选择 .......................................................................................................................... 11 6)规则行为 .......................................................................................................................... 11 4.防护状态 .................................................................................................................................. 11

1) SYN保护模式................................................................................................................. 11 2) SYN危急保护模式..........................................................................................................12 3) ACK&RST保护模式 .......................................................................................................12 4) UDP保护模式.................................................................................................................12 5) ICMP保护模式 ...............................................................................................................12 6)碎片保护模式 ..................................................................................................................12 7) NonIP保护模式...............................................................................................................13 8) 忽略模式........................................................................................................................13 9) 禁止模式........................................................................................................................13 10) WebCC保护模式 ...........................................................................................................13 11) GameCC保护模式 .........................................................................................................13 12) 高级UDP保护模式 ......................................................................................................13 5.参数设置 ..................................................................................................................................13

1) 系统控制........................................................................................................................14 a)系统时间 ..................................................................................................................14 b) 流量控制 .................................................................................................................14 c)策略选项 .................................................................................................................14 2)攻击检测 .........................................................................................................................14

a) SYN Flood保护 .....................................................................................................14 b)SYN Flood高压保护................................................................................................14 c)SYN Flood单机保护 ................................................................................................14 d)ACK&RST Flood保护 .............................................................................................14 e)TCP端口自动关闭触发............................................................................................15 f)UDP保护触发 .........................................................................................................15 g ) ICMP保护触发 ........................................................................................................15 h) 碎片保护触发 ..........................................................................................................15 i) NonIP保护触发 .........................................................................................................15 3) 流量限制 .......................................................................................................................15

a)紧急触发状态 ..........................................................................................................15

b)简单过滤流量限制...................................................................................................15 c)忽略主机流量限制 ...................................................................................................15 d)伪造源流量限制 ......................................................................................................15 4) TCP防护 .......................................................................................................................15

a) 屏蔽持续时间: .......................................................................................................16

b) 连接数量保护 ..........................................................................................................16

AnHui ZXSoft Co. Ltd.?版权所有 2002-2008

金盾全国技术支持热线:800-868-7722

金盾抗DDOS防火墙用户手册

c) 连接空闲超时 ............................................................................................................16 d) 默认黑名单策略 ........................................................................................................16 5) UDP防护设置 ................................................................................................................16 a) 请求连接超时 ............................................................................................................16 b) 建立连接超时............................................................................................................16 6) 变量设置.......................................................................................................................16 6.端口策略 ..................................................................................................................................16

1)防护类型 .........................................................................................................................16

a) 标准防护(default) ...............................................................................................16

b) 动态验证(WEB Service Protection) ............................................................................17 c) 频率保护(Game Service Protection) ............................................................................17 2) 连接攻击检测 ................................................................................................................17 3) 连接数量限制 ................................................................................................................17 4) 端口探测限制 ................................................................................................................17 5) 防护标志........................................................................................................................17

a) 超时连接.................................................................................................................17

b) 超出屏蔽.................................................................................................................17 c) 延时提交.................................................................................................................17 d) 接受协议.................................................................................................................18 6)模块参数 .........................................................................................................................18

管理及配置 .................................................................................................................18 1)语言 ................................................................................................................................18 2)用户/密码 ........................................................................................................................18 2.状态监控页面.............................................................................................................................19

1)全局统计 .........................................................................................................................18 2) 系统负载 .......................................................................................................................19

3) 主机状态 .......................................................................................................................20

a) 主机 ........................................................................................................................20

b) 带宽 ........................................................................................................................21 c) 频率 ........................................................................................................................21 d) 连接 ........................................................................................................................21 e) 防护模式 .................................................................................................................21 4) 单一主机状态 ................................................................................................................21

a)主机地址 ...................................................................................................................22 b)网关IP地址 ..............................................................................................................22 c)网关MAC地址 .........................................................................................................22 d)流量策略 ...................................................................................................................22 e) 连接策略 .................................................................................................................22 f) 黑名单策略 ..............................................................................................................22 g) 保护设置集序号.......................................................................................................23 h) 分时流量 .................................................................................................................23 i)防护插件....................................................................................................................23 5)连接监控 .........................................................................................................................23

AnHui ZXSoft Co. Ltd.?版权所有 2002-2008

金盾全国技术支持热线:800-868-7722

五、

1.登录页面 ..................................................................................................................................18

金盾抗DDOS防火墙用户手册

a) 控制 ........................................................................................................................23 b) 本地地址 .................................................................................................................23 c)远端地址 ...................................................................................................................23 d)当前状态 ...................................................................................................................23 e)选择连接 ...................................................................................................................24 6)屏蔽列表 .........................................................................................................................24

a) 控制 ........................................................................................................................24

b) 本地地址 .................................................................................................................24 c)远端地址 ...................................................................................................................24 d)当前状态 ...................................................................................................................24 7) 黑名单管理....................................................................................................................24 3.攻击防御页面 ...........................................................................................................................25

1) 全局参数 .......................................................................................................................25

2) 规则设置 .......................................................................................................................25

a)规则设置集................................................................................................................26 b)控制 ..........................................................................................................................26 c)协议 ..........................................................................................................................26 d)地址 ..........................................................................................................................26 e)细节 ..........................................................................................................................26 f)匹配...........................................................................................................................26 3)规则编辑页面 ..................................................................................................................26

a) 规则序号 .................................................................................................................27 b) 规则描述 .................................................................................................................27 c) 报文长度 .................................................................................................................27 d) 本地地址 .................................................................................................................27 e) 远程地址 .................................................................................................................27 f)协议类型....................................................................................................................27 g)本地端口/远程端口 ....................................................................................................27 h)TCP标志位 ...............................................................................................................27 i)ICMP类型/ICMP代码 ................................................................................................28 j)模式匹配....................................................................................................................28 k)方向选择 ...................................................................................................................28

l)规则行为....................................................................................................................28

4.日志记录页面..........................................................................................................................29 5.系统配置页面..........................................................................................................................30

1)保存配置.......................................................................................................................30

2)系统设备.......................................................................................................................31 3)集群参数 .........................................................................................................................31 4)用户管理 .........................................................................................................................32 5) SNMP系统配置..............................................................................................................33 6) SNMP用户......................................................................................................................33 7)SNMP视图列表 ................................................................................................................34 6.服务支持.................................................................................................................................35

1) 关于我们 .......................................................................................................................35

AnHui ZXSoft Co. Ltd.?版权所有 2002-2008

金盾全国技术支持热线:800-868-7722


金盾防火墙使用说明书.doc 将本文的Word文档下载到电脑 下载失败或者文档不完整,请联系客服人员解决!

下一篇:超星2017第三学期西南大学葡萄酒与西方文化作业答案

相关阅读
本类排行
× 注册会员免费下载(下载后可以自由复制和排版)

马上注册会员

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: