X4000
User’s Guide
359
Special Features
10
fragmented packets. The packet fragments are assembled again on passing
through NAT, before the packet can pass the router.
You can prevent some DoS attacks that operate with fake source IP addresses
by using the Back Route Verification function (see
chapter 10.2.10, page 352
).
You can counter DoS attacks that speculate on destroying the system by
causing the log files to overflow (syslog messages) by suitably positioning and
limiting the size of these files.
Summary of Contents for X4000
Page 4: ...4 X4000 User s Guide...
Page 6: ...6 X4000 User s Guide Table of Contents...
Page 14: ...14 X4000 User s Guide Table of Contents...
Page 30: ...30 X4000 User s Guide Welcome 1...
Page 34: ...34 X4000 User s Guide General Safety Precautions 2...
Page 68: ...68 X4000 User s Guide Hardware Description and Installation 3...
Page 92: ...92 X4000 User s Guide Configuration Requirements 4...
Page 118: ...118 X4000 User s Guide Fast Configuration with the Configuration Wizard Basic Unit 6...
Page 362: ...362 X4000 User s Guide Configuration of Security Functions and Firewall 10...
Page 374: ...374 X4000 User s Guide Configuration Management 11...
Page 386: ...386 X4000 User s Guide Troubleshooting 12...
Page 433: ...X4000 User s Guide 433 15...
Page 449: ...X4000 User s Guide 449 15...
Page 468: ...468 X4000 User s Guide General Safety Precautions in 15 Different Languages 15...
Page 496: ...496 X4000 User s Guide Index...
Page 498: ...498 X4000 User s Guide Document 71000L Version1 3...