Configuration of port scan attack defense for the USG2000&5000 series on the web UI

2

You can configure port scan attack defense for the USG2000&5000 series on the web UI.
1. Choose Firewall > Security Protection > Attack Defense.
2. In the attack defense configuration list, choose Attack Defense Type > Scan.
3. On the Configure Scan Attack Defense page, select Enable corresponding to Port Scan.
4. Set parameters for port scan attack defense.
5. Click Apply.

Other related questions:
Configuration of port scan attack defense for the USG6000 series on the web UI
You can configure port scan attack defense for the USG6000 series on the web UI. 1. Choose Policy > Security Protection > Attack Defense. 2. Click the Single-Packet Attack tab. 3. Select the Port Scan check box to enable the attack defense function. 4. Set the maximum scanning rate and blacklist aging time. If you enable port scan attack defense, enable the blacklist function as well to ensure that the device discards blacklisted packets.

Configuring port scan attack defense using the CLI for the USG2000&5000 series
The USG2000&5000 series supports configuring port scan attack defense using the CLI. 1. Run the firewall defend port-scan enable command to enable the port scan attack defense function. Port scan attack defense is disabled by default. 2. Run the firewall defend port-scan max-rate max-rate-number command to set the maximum connection rate. The default maximum connection rate is 4000 pps. 3. Run the firewall defend port-scan blacklist-timeout interval command to set the blacklist aging time. The default blacklist aging time is 20 minutes. 4. Run the firewall blacklist enable command to enable the blacklist function. After port scan attack defense is enabled, the USG detects received TCP and UDP packets. If the number of packets with different destination ports from a specific source IP address per second exceeds the threshold, the USG determines that the host at this IP address launches port scan attacks, blacklists this IP address, and processes the packets as follows: If the blacklist function is enabled, the USG discards the packets from this IP address. If the blacklist function is disabled, the USG generates an alarm but does not discard the packets.

Configuration of IP sweep attack defense for the USG2000&5000 series on the web UI
You can configure IP sweep attack defense for the USG2000&5000 series on the web UI. 1. Choose Firewall > Security Protection > Attack Defense. 2. In the attack defense configuration list, choose Attack Defense Type > Scan. 3. On the Configure Scan Attack Defense page, select Enable corresponding to IP Sweep. 4. Set parameters for IP sweep attack defense. 5. Click Apply.

Configuration of SIP flood attack defense for the USG2000&5000 series on the web UI
You can configure SIP flood attack defense for the USG2000&5000 series on the web UI. Configure SIP flood attack defense based on IP addresses. 1. Choose Firewall > Security Protection > Attack Defense. 2. In the attack defense configuration list, choose Attack Defense Type > Application Layer > SIP Flood. 3. On the Configure SIP Flood Attack Defense page, select Enable corresponding to Defense. 4. Set a port range. 5. Click Add. Enter an IP address in the IP Address text box. 6. Click Apply. Configure SIP flood attack defense based on security zones. 1. Choose Firewall > Security Protection > Attack Defense. 2. In the attack defense configuration list, choose Attack Defense Type > Application Layer > SIP Flood. 3. On the Configure SIP Flood Attack Defense page, select Enable corresponding to Defense. 4. Set a port range. 5. Click the (Optional) Based on Security Zones tab. 6. Click Add. Select a security zone from the Security Zone drop-down list. 7. Click Apply.

Configuration of port scan attack defense for the USG6000 series on the CLI
You can configure port scan attack defense for the USG6000 series on the CLI. 1. Run the firewall defend port-scan enable command to enable port scan attack defense. By default, port scan attack defense is disabled. 2. Run the firewall defend port-scan max-rate max-rate-number command to set the port scan maximum connection rate. By default, the maximum connection rate is 4000 pps. 3. Run the firewall defend port-scan blacklist-timeout interval command to set the blacklist aging time. By default, the blacklist aging time is 20 minutes. 4. Run the firewall blacklist enable command to enable the blacklist function. After port scan attack defense is enabled, the device checks received TCP and UDP packets. If the number of packets that a source address sends per second to different destination ports exceeds the specified threshold, the USG6000 considers that the source address is initiating a port scan attack. It blacklists the IP address and: Discards the packets from the source address if the blacklist function is enabled. Forwards the packets from the source address and generates an alarm if the blacklist function is disabled.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top