Wireless ADSL Modem User’s Manual
78
•
Land Attack checking:
Land attack is a type of DoS attack that works by
sending a spoofed packet containing the same source and destination IP address
and port (the victim’s IP address). This packet contains a connection request,
resulting in a handshake process. At the end of the handshake, the victim sends
out an ACK (ACKnowledge)
request. Since the source and the destination are the
same, the victim receives the ACK request it just sent out. The received data
does not match what the victim is expecting, so it retransmits the ACK request.
This process repeats until the network crashes. Enabling this will allow the
firewall to filter out possible Land Attack packets.
•
Reassembly Attack checking:
Reassembly Attack is a type of DoS attack
that exploits the weakness of the IP protocol reassembly process. As discussed
earlier in this user guide, packets undergo fragmentation when they exceed a
certain maximum size. Certain criteria define the packet fragmentation process
so that packets can be reassembled properly. In Reassembly Attack, the
subpackets have malformed criteria (fragment offset), which can easily cause a
system to crash, freeze, or reboot. Enable this option to check for and filter out
Reassembly Attack packets.
Advanced Protection:
•
SYN Flooding checking:
SYN Flooding is a type of DoS attack that is
accomplished by not sending the final acknowledgement to the receiving
server’s SYN-ACK (SYNchronize-ACKnowledge) in the final part of the
handshake process. This causes the serve to keep signaling until it is timed out.
When a flood (many) of these attacks are sent simultaneously, the server will
probably overload and crash. Enable SYN Flooding checking to filter out
possible SYN flood packets.
•
ICMP Redirection checking:
Also known as an ICMP storm attack or smurf
attack, ICMP Redirection is another form of DoS. This attack is performed by
sending ICMP echo requests to a broadcast network node. The return IP
address is spoofed and replaced by the victim’s own address, causing it to send
the request back to itself. This causes the broadcast address to send it out to all
the network nodes in the broadcast area (usually the entire LAN). In turn, all
those recipients resend it back to the broadcast. The process repeats itself,
gaining more amplitude through each iteration and eventually causing a traffic
overload and crashing the network. Enable ICMP Redirection checking to filter
out packets containing the threat.
•
Source Routing checking:
Source routing gives the sender of a packet the
ability to determine the exact route that an IP packet takes to get to the
destination. However, source routing can be used for malicious reasons. Using
a source routed packet, the sender could find out important information about