Site Tools


advanced-firewall

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
advanced-firewall [2023/05/28 04:35] – [Firewall] -formatting hogwildadvanced-firewall [2023/05/28 04:44] – [Multicast] -clarity-IGMP snooping hogwild
Line 12: Line 12:
 **Limit communication to:  **This specifies the maximum number of requests per second to which the Firewall will reply. Setting a limit number is recommended to prevent DDoS attacks.\\   \\   \\ {{:pasted:20220118-183317.png}}\\ **Limit communication to:  **This specifies the maximum number of requests per second to which the Firewall will reply. Setting a limit number is recommended to prevent DDoS attacks.\\   \\   \\ {{:pasted:20220118-183317.png}}\\
  
-**Enable TCP SYN cookies:  **Enabling this protects the router from SYN Flood attacks via the "SYN cookies" technique. This function encodes information from the SYN packet into the (SYN/ACK) response. This is a standard method for preventing SYN floods. However, it has certain limitations which may cause issues with some old TCP/IP stacks.+ \\ 
 + 
 +**Enable TCP SYN cookies:  **Enabling this uses the "SYN cookies" technique to protect the router from SYN Flood attacks. This function encodes information from the SYN packet into the (SYN/ACK) response. This is a standard method for preventing SYN floods. However, it has certain limitations which may cause issues with some old TCP/IP stacks.
  
 **Enable DCSP Fix:  **Checking this enables a workaround for packet marking, a well-known issue related to DSCP when connected to Comcast. **Enable DCSP Fix:  **Checking this enables a workaround for packet marking, a well-known issue related to DSCP when connected to Comcast.
Line 71: Line 73:
 **Udpxy port**- This specifies the port on which you can recive Udpxy information from your router.\\  \\   \\  {{:pasted:20220118-190844.png}}\\  \\ **Udpxy port**- This specifies the port on which you can recive Udpxy information from your router.\\  \\   \\  {{:pasted:20220118-190844.png}}\\  \\
  
-**Efficient Multicast Forwarding (IGMP Snooping) -** IGMP snooping allows the router's switch to facilitate discovery of IGMP clients. The goal is to send multicat multicast traffic only towards Ethernet ports with at least one multicast member(subscriber)Use caution, as often, UPnP is often the only significant multicast application in use in digital home networks;+**Efficient Multicast Forwarding (IGMP Snooping) -** IGMP snooping allows the router's switch to facilitate discovery of Multicast IGMP clients. The goal is to send multicast traffic only towards ports with at least one multicast subscriber? 
 + 
 +Caution is advised, as often, UPnP is the only significant multicast application in use on a home network. Thus, multicast configuration issues or other deficiencies can appear as UPnP issues, when they're actually underlying network issues.
  
-therefore, multicast network misconfiguration or other deficiencies can appear as UPnP issues rather than underlying network issues. If IGMP snooping is enabled on a switch, or more commonly a wireless router/switch, it will interfere with UPnP/DLNA device discovery (SSDP) if incorrectly or incompletely configured (e.g. without an active querier or IGMP proxy), making UPnP appear unreliable. Typical scenarios observed include a server or client (e.g. smart TV) appearing after power on, and then disappearing after a few minutes (often 30 by default configuration) due to IGMP group membership expiring. On this very topic please beware of the wireless multicast forwarding under [[advanced-wireless|Advanced Wireless]]+If IGMP snooping is enabled on a (wireless router)/switch, it will interfere with UPnP/DLNA device discovery (SSDP) if incorrectly or incompletely configured (e.g. without an active querier or IGMP proxy), making UPnP appear unreliable. Typical scenarios observed include a server or client (e.g. smart TV) appearing after power on, and then disappearing after a few minutes (often 30 by default configuration) due to IGMP group membership expiring. On this very topic please beware of the wireless multicast forwarding under [[advanced-wireless|Advanced Wireless]]
  
 **Force IGMPv2** - IGMPv2 enhances the IGMP communication supporting additional messages/behavior to optimise the end-to-end communication between client and server. Possibly the most important being the "Group Leave" message which is lacking instead in IGMP v1.\\   \\ **Force IGMPv2** - IGMPv2 enhances the IGMP communication supporting additional messages/behavior to optimise the end-to-end communication between client and server. Possibly the most important being the "Group Leave" message which is lacking instead in IGMP v1.\\   \\
  
  
advanced-firewall.txt · Last modified: 2023/05/28 05:39 by hogwild