. . . . .
FSL100 User Guide v
Using Traceroute ...................................................................................................... 2-17
Ch. 3: Managing Traffic Flow .......................................................................................... 3-1
Shaping Traffic Flow................................................................................................... 3-1
Overview...............................................................................................................3-1
Network Layout..................................................................................................... 3-2
Scenario Description............................................................................................. 3-2
Analyzing and Shaping Traffic .............................................................................. 3-6
Ch. 4: Configuring Attack Prevention ............................................................................ 4-1
What is Freedom9 Network AntiDoS? ...................................................................... 4-1
Flooding Attacks.................................................................................................... 4-1
Port Attacks........................................................................................................... 4-1
Attacks Through Malformed Packets.................................................................... 4-1
Valid But Potentially Dangerous Packets.............................................................. 4-2
Enabling DDoS Prevention ........................................................................................ 4-2
Flooding Attacks.................................................................................................... 4-2
Port Attacks........................................................................................................... 4-2
Attacks Through Malformed Packets.................................................................... 4-2
Attacks Through Valid But Potentially Dangerous Packets................................... 4-2
Enabling DDoS Logging........................................................................................ 4-3
Attack Overview Table................................................................................................ 4-3
Logging Command Index...................................................................................... 4-6
Ch. 5: Traffic Flow Reporting.......................................................................................... 5-1
Top-Talkers.................................................................................................................. 5-1
Logging Overview....................................................................................................... 5-1
Logging........................................................................................................................5-1
Logging Levels...................................................................................................... 5-1
Log Modules..........................................................................................................5-2
Traffic and Event Log Management......................................................................5-3
Log Module Settings................................................................................................... 5-3
Setting Log Modules ............................................................................................. 5-3
Disabling Log Module Settings.............................................................................. 5-3
Viewing the Log Module Settings.......................................................................... 5-3
Viewing the Traffic and Event Log ........................................................................5-4
Admin Mail Server....................................................................................................... 5-5
Configuring Freedom9 Network Appliances to Send E-mail Notifications ............ 5-5
Deleting the Admin Mail Server............................................................................. 5-5
Removing E-mail Addresses from the Admin Mail Server.................................... 5-6
Syslog Management ................................................................................................... 5-6
Deleting the Syslog Host IP Address.................................................................... 5-7
Disabling the Syslog Host Log Options................................................................. 5-7
Syslog Message Format ....................................................................................... 5-7
Reviewing Message Logs .......................................................................................... 5-8
Conventions.......................................................................................................... 5-8
Acronyms.............................................................................................................. 5-9
Anatomy of a message ....................................................................................... 5-11
Traffic Logging .................................................................................................... 5-12
Traffic Logging Messages................................................................................... 5-13