How to allow anydesk through usg40 firewall
I suppose the log is: "abnormal TCP flag attack detected, Drop"
This issue occurs when the device receives packets with:
(1) ALL TCP flags bit are set at same time.
(2) SYN, FIN bits are set at same time.
(3) SYN, RST bits are set at same time.
(4) FIN, RST bits are set at same time.
(5) Only FIN bit is set.
(6) Only PSH bit is set.
(7) Only URG bit is set.
Therefore, the device detects and regards these packets as attacks.
If you are sure these packets are safe, you can log into the device and enter the following CLI commands to disable this detection:
Router(config)# secure-policy abnormal_tcp_flag_detect deactivateRegards0
Zyxel_Emily Posts: 1,064
With default configuration, Anydesk is not blocked by USG.
PC2 can access PC1 by Anydesk successfully without extra firewall or NAT settings.
If there are lots of "abnormal TCP flag attack detected, DROP" logs, you can follow the instruction from Alfonso to enter the CLI command to disable/enable abnormal tcp flags detect.
Disable detect: secure-policy abnormal_tcp_flag_detect deactivate
Enable detect: secure-policy abnormal_tcp_flag_detect activate
Router(config)# secure-policy abnormal_tcp_flag_detect deactivate
Router(config)# show secure-policy status
secure-policy status: yes
secure-policy asymmetrical route status: no
secure-policy default rule: deny, logsecure-policy tcp flag detect: no
- 8.5K All Categories
- 1.6K Nebula
- 72 Nebula Ideas
- 57 Nebula Status and Incidents
- 4.5K Security
- 227 Security Ideas
- 985 Switch
- 46 Switch Ideas
- 882 WirelessLAN
- 24 WLAN Ideas
- 5.2K Consumer Product
- 158 Service & License
- 280 News and Release
- 99 Success Stories
- 61 Security Advisories
- 13 Education Center
- 581 FAQ
- 263 Nebula FAQ
- 160 Security FAQ
- 76 Switch FAQ
- 75 WirelessLAN FAQ
- 7 Consumer Product FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 62 About Community
- 46 Security Highlight