46516
41
Zoom out
Zoom in
Previous page
1/100
Next page
Plug-Ins
41
Play sound alarm
when attack is detected—if selected, Outpost Firewall will
play the specified audio file every time an attack is detected.
Block intruder IP forif selected, blocks all network exchanges from the
computer attacking yours for the number of minutes you set (60 minutes by default).
o
Also block intruder subnet—if selected, blocks all network exchanges
from the entire subnet to which the intruder belongs.
Ethernet Attacks
When data is sent from one computer to another over a local network, the sending machine
broadcasts an ARP (IP-to-Ethernet address lookup) request to determine the MAC address
based on the IP address of the target machine and waits for it to send back its MAC
address. During the time between the packet broadcast and the MAC address response, data
is vulnerable to tampering, hijacking, and/or redirection to an unauthorized third party.
Attack Detection plug-in also detects and averts particular Ethernet attacks such as IP
spoofing, ARP scanning, ARP flood and others by inspecting Ethernet and Wi-Fi
connections thus protecting your system from invasions on a local network. To specify the
Ethernet attacks prevention settings, select the Ethernet tab in the plug-in properties
window. The following options are available:
Enable smart ARP filtering. Prevents ARP spoofing - where a node starts sending
a huge number of ARP replies with varying MAC addresses in a short time span,
trying to overload the network equipment as it tries to determine which MAC
address actually belongs to the node. If enabled, Outpost Firewall Pro only permits
incoming replies from other hosts for which there was a previous outgoing request.
Only the first ARP reply is accepted for each request. Smart ARP filtering also
protects from ARP cache poisoning, which occurs when someone succeeds in
intercepting Ethernet traffic using fake ARP replies in an effort to change the
address of a network card to one that an attacker can monitor. Additionally, it
prevents ARP floods - where a huge number of bogus ARP replies are sent to the
target machine freezing a system.
Detect IP address spoofing and block IP flood. Detects when an attacker falsifies
or forges his IP address and blocks abnormal volumes of traffic which may
otherwise overload a computer. This option cannot stop the network from being
flooded but can protect the PC from overload.
Prevent gateway network adapter MAC spoofing. Detects any attempt by an
attacker to associate a gateway network adapter IP address with their own MAC
address to allow them to intercept packets. Hackers can substitute legitimate MAC
addresses with ones of their own and reroute legitimate traffic to a hacker-controlled
machine, by sending out forged ARP responses which Outpost Firewall Pro will
41


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for Outpost Firewall Versie 4.0 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of Outpost Firewall Versie 4.0 in the language / languages: English as an attachment in your email.

The manual is 2,59 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info