1
|
ADP anomaly detection is in general effective against abnormal behavior while IDP packet inspection signatures are in general effective for known attacks (see IDP for information on packet inspection).
|
2
|
ADP traffic and anomaly rules are updated when you upload new firmware. This is different from the IDP packet inspection signatures and the system protect signatures you download from myZyXEL.com.
|
•
|
See What You Need To Know for IDP-related term definitions.
|
•
|
See ADP Technical Reference for background information on these screens.
|
Enable Anomaly Detection
|
|||
Use this list to specify which anomaly profile the ZyWALL uses for traffic flowing in a specific direction. Edit the policies directly in the table.
|
|||
Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry.
|
|||
To turn on an entry, select it and click Activate.
|
|||
To turn off an entry, select it and click Inactivate.
|
|||
To change an entry’s position in the numbered list, select it and click Move to display a field to type a number for where you want to put that entry and press [ENTER] to move the entry to the number that you typed.
|
|||
This is the direction of travel of packets to which an anomaly profile is bound. Traffic direction is defined by the zone the traffic is coming from and the zone the traffic is going to.
Use the From field to specify the zone from which the traffic is coming. Select ZyWALL to specify traffic coming from the ZyWALL itself.
Use the To field to specify the zone to which the traffic is going. Select ZyWALL to specify traffic destined for the ZyWALL itself.
From LAN1 To LAN1 means packets traveling from a computer on one LAN1 subnet to a computer on another LAN1 subnet via the ZyWALL’s LAN1 zone interfaces. The ZyWALL does not check packets traveling from a LAN1 computer to another LAN1 computer on the same subnet.
From WAN To WAN means packets that come in from the WAN zone and the ZyWALL routes back out through the WAN zone.
|
|||
An anomaly profile is a set of anomaly rules with configured activation, log and action settings. This field shows which anomaly profile is bound to which traffic direction. Select an ADP profile to apply to the entry’s traffic direction. Configure the ADP profiles in the ADP profile screens.
|
|||
Click Apply to save your changes.
|
|||
Click Reset to return the screen to its last-saved settings.
|
All traffic anomaly and protocol anomaly rules are enabled. Rules with a high or severe severity level (greater than three) generate log alerts and cause packets that trigger them to be dropped. Rules with a very low, low or medium severity level (less than or equal to three) generate logs (not log alerts) and no action is taken on packets that trigger them.
|
|
Click OK to save your changes.
|
|
Click Cancel to exit this screen without saving your changes.
|
This is the name of the ADP profile. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. These are valid, unique profile names:
|
|
Scan/Flood Detection
|
|
(Scan detection only.) Select a sensitivity level so as to reduce false positives in your network. If you choose low sensitivity, then scan thresholds and sample times are set low, so you will have fewer logs and false positives; however some traffic anomaly attacks may not be detected.
If you choose high sensitivity, then scan thresholds and sample times are set high, so most traffic anomaly attacks will be detected; however you will have more logs and false positives.
|
|
To turn on an entry, select it and click Activate.
|
|
To turn off an entry, select it and click Inactivate.
|
|
To edit an item’s log option, select it and use the Log icon. Select whether to have the ZyWALL generate a log (log), log and alert (log alert) or neither (no) when traffic matches this anomaly rule.
|
|
To edit what action the ZyWALL takes when a packet matches a rule, select the signature and use the Action icon.
none: The ZyWALL takes no action when a packet matches the signature(s).
block: The ZyWALL silently drops packets that matches the rule. Neither sender nor receiver are notified.
|
|
This is the name of the traffic anomaly rule. Click the Name column heading to sort in ascending or descending order according to the rule name.
|
|
This is the action the ZyWALL should take when a packet matches a rule. To edit this, select an item and use the Action icon.
|
|
For flood detection you can set the number of detected flood packets per second that causes the ZyWALL to take the configured action.
|
|
Click OK to save your settings to the ZyWALL, complete the profile and return to the profile summary page.
|
|
Click Cancel to return to the profile summary page without saving any changes.
|
|
Click Save to save the configuration to the ZyWALL but remain in the same page. You may then go to the another profile screen (tab) in order to complete the profile. Click OK in the final profile screen to complete the profile.
|
This is the name of the profile. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. These are valid, unique profile names:
|
|
To turn on an entry, select it and click Activate.
|
|
To turn off an entry, select it and click Inactivate.
|
|
To edit an item’s log option, select it and use the Log icon. Select whether to have the ZyWALL generate a log (log), log and alert (log alert) or neither (no) when traffic matches this anomaly rule.
|
|
To edit what action the ZyWALL takes when a packet matches a signature, select the signature and use the Action icon.
original setting: Select this action to return each signature in a service group to its previously saved configuration.
none: Select this action on an individual signature or a complete service group to have the ZyWALL take no action when a packet matches a rule.
drop: Select this action on an individual signature or a complete service group to have the ZyWALL silently drop a packet that matches a rule. Neither sender nor receiver are notified.
reject-sender: Select this action on an individual signature or a complete service group to have the ZyWALL send a reset to the sender when a packet matches the signature. If it is a TCP attack packet, the ZyWALL will send a packet with a ‘RST’ flag. If it is an ICMP or UDP attack packet, the ZyWALL will send an ICMP unreachable packet.
reject-receiver: Select this action on an individual signature or a complete service group to have the ZyWALL send a reset to the receiver when a packet matches the rule. If it is a TCP attack packet, the ZyWALL will send a packet with an a ‘RST’ flag. If it is an ICMP or UDP attack packet, the ZyWALL will do nothing.
reject-both: Select this action on an individual signature or a complete service group to have the ZyWALL send a reset to both the sender and receiver when a packet matches the rule. If it is a TCP attack packet, the ZyWALL will send a packet with a ‘RST’ flag to the receiver and sender. If it is an ICMP or UDP attack packet, the ZyWALL will send an ICMP unreachable packet.
|
|
This is the name of the protocol anomaly rule. Click the Name column heading to sort in ascending or descending order according to the protocol anomaly rule name.
|
|
This is the action the ZyWALL should take when a packet matches a rule. To edit this, select an item and use the Action icon.
|
|
Select whether to have the ZyWALL generate a log (log), log and alert (log alert) or neither (no) when traffic matches this anomaly rule.
|
|
none: The ZyWALL takes no action when a packet matches the signature(s).
block: The ZyWALL silently drops packets that matches the rule. Neither sender nor receiver are notified.
|
|
Click OK to save your settings to the ZyWALL, complete the profile and return to the profile summary page.
|
|
Click Cancel to return to the profile summary page without saving any changes.
|
|
Click Save to save the configuration to the ZyWALL but remain in the same page. You may then go to the another profile screen (tab) in order to complete the profile. Click OK in the final profile screen to complete the profile.
|
|
||||
|
This rule deals with non-RFC standard of tab for a space delimiter. Apache uses this, so if you have an Apache server, you need to enable this option.
|
|
This rule can detect attacks where malicious attackers use ASCII-encoding to encode attack strings. Attackers may use this method to bypass system parameter checks in order to get information or privileges from a web server.
|
|
BARE-BYTE-UNICODING-ENCODING ATTACK
|
Bare byte encoding uses non-ASCII characters as valid values in decoding UTF-8 values. This is NOT in the HTTP standard, as all non-ASCII values have to be encoded with a %. Bare byte encoding allows the user to emulate an IIS server and interpret non-standard encodings correctly.
|
This is a rule to decode base36-encoded characters. This rule can detect attacks where malicious attackers use base36-encoding to encode attack strings. Attackers may use this method to bypass system parameter checks in order to get information or privileges from a web server.
|
|
DIRECTORY-TRAVERSAL ATTACK
|
This rule normalizes directory traversals and self-referential directories. So, “/abc/this_is_not_a_real_dir/../xyz” get normalized to “/abc/xyz”. Also, “/abc/./xyz” gets normalized to “/abc/xyz”. If a user wants to configure an alert, then specify “yes”, otherwise “no”. This alert may give false positives since some web sites refer to files using directory traversals.
|
This rule is IIS specific. IIS does two passes through the request URI, doing decodes in each one. In the first pass, IIS encoding (UTF-8 unicode, ASCII, bare byte, and %u) is done. In the second pass ASCII, bare byte, and %u encodings are done.
|
|
IIS-BACKSLASH-EVASION ATTACK
|
This is an IIS emulation rule that normalizes backslashes to slashes. Therefore, a request-URI of “/abc\xyz” gets normalized to “/abc/xyz”.
|
IIS-UNICODE-CODEPOINT-ENCODING ATTACK
|
This rule can detect attacks which send attack strings containing non-ASCII characters encoded by IIS Unicode. IIS Unicode encoding references the unicode.map file. Attackers may use this method to bypass system parameter checks in order to get information or privileges from a web server.
|
MULTI-SLASH-ENCODING ATTACK
|
This rule normalizes multiple slashes in a row, so something like: “abc/////////xyz” get normalized to “abc/xyz”.
|
NON-RFC-DEFINED-CHAR ATTACK
|
This rule lets you receive a log or alert if certain non-RFC characters are used in a request URI. For instance, you may want to know if there are NULL bytes in the request-URI.
|
NON-RFC-HTTP-DELIMITER ATTACK
|
This is when a newline “\n” character is detected as a delimiter. This is non-standard but is accepted by both Apache and IIS web servers.
|
OVERSIZE-CHUNK-ENCODING ATTACK
|
This rule is an anomaly detector for abnormally large chunk sizes. This picks up the apache chunk encoding exploits and may also be triggered on HTTP tunneling that uses chunk encoding.
|
OVERSIZE-REQUEST-URI-DIRECTORY ATTACK
|
This rule takes a non-zero positive integer as an argument. The argument specifies the max character directory length for URL directory. If a URL directory is larger than this argument size, an alert is generated. A good argument value is 300 characters. This should limit the alerts to IDS evasion type attacks, like whisker.
|
SELF-DIRECTORY-TRAVERSAL ATTACK
|
This rule normalizes self-referential directories. So, “/abc/./xyz” gets normalized to “/abc/xyz”.
|
This rule emulates the IIS %u encoding scheme. The %u encoding scheme starts with a %u followed by 4 characters, like %uXXXX. The XXXX is a hex encoded value that correlates to an IIS unicode codepoint. This is an ASCII value. An ASCII character is encoded like, %u002f = /, %u002e = ., etc.
|
|
The UTF-8 decode rule decodes standard UTF-8 unicode sequences that are in the URI. This abides by the unicode standard and only uses % encoding. Apache uses this standard, so for any Apache servers, make sure you have this option turned on. When this rule is enabled, ASCII decoding is also enabled to enforce correct functioning.
|
|
WEBROOT-DIRECTORY-TRAVERSAL ATTACK
|
This is when a directory traversal traverses past the web server root directory. This generates much fewer false positives than the directory option, because it doesn’t alert on directory traversals that stay within the web server directory structure. It only alerts when the directory traversals go past the web server root directory, which is associated with certain web attacks.
|
BAD-LENGTH-OPTIONS ATTACK
|
This is when a TCP packet is sent where the TCP option length field is not the same as what it actually is or is 0. This may cause some applications to crash.
|
EXPERIMENTAL-OPTIONS ATTACK
|
This is when a TCP packet is sent which contains non-RFC-complaint options. This may cause some applications to crash.
|
This is when a TCP packet is sent which doesn’t have enough data to read. This could mean the packet was truncated.
|
|
T/TCP provides a way of bypassing the standard three-way handshake found in TCP, thus speeding up transactions. However, this could lead to unauthorized access to the system by spoofing connections.
|
|
This is when a TCP packet is sent which has a TCP datagram length of less than 20 bytes. This may cause some applications to crash.
|
|
This is when a TCP packet is sent which has a TCP header length of less than 20 bytes.This may cause some applications to crash.
|
|
This is when a UDP packet is sent which has a UDP length field of greater than the actual packet length. This may cause some applications to crash.
|
|
This is when a UDP packet is sent which has a UDP datagram length of less the UDP header length. This may cause some applications to crash.
|
|
This is when a UDP packet is sent which has a UDP length field of less than 8 bytes. This may cause some applications to crash.
|
|
TRUNCATED-ADDRESS-HEADER ATTACK
|
This is when an ICMP packet is sent which has an ICMP datagram length of less than the ICMP address header length. This may cause some applications to crash.
|
This is when an ICMP packet is sent which has an ICMP datagram length of less than the ICMP header length. This may cause some applications to crash.
|
|
TRUNCATED-TIMESTAMP-HEADER ATTACK
|
This is when an ICMP packet is sent which has an ICMP datagram length of less than the ICMP Time Stamp header length. This may cause some applications to crash.
|