![CTS VRG5-31412 Series User Manual Download Page 134](http://html1.mh-extra.com/html/cts/vrg5-31412-series/vrg5-31412-series_user-manual_2694013134.webp)
134
Or untick the checkbox to disable this feature. But note that when the feature is disabled,
the Residential Gateway will be vulnerable to DDoS attacks.
Whole System Flood: SYN
—
Tick the checkbox to prevent a SYN attack. A SYN attack
will interrupt the process of the three way handshake of TCP and redirect the
acknowledge response to a malicious IP address. Or it will cause the targeted system to
be flooded with false SYN requests.
Whole System Flood: FIN
—
Tick the checkbox to prevent a FIN flood. This attack will
flood the network with connection resets from an invalid IP address.
Whole System Flood: UDP
—
Tick the checkbox to prevent a flood of large numbers of
raw UDP packets targeted at the Residential Gateway.
Whole System Flood: ICMP
—
Tick the checkbox to prevents a flood of ICMP
messages from an invalid IP address. This attack can cause all TCP requests to be
halted.
Per Source IP Flood: SYN
—
Tick the checkbox to prevent a SYN attack on a specified
IP address.
Per Source IP Flood: FIN
—
Tick the checkbox to prevent a FIN attack on the LAN port
IP address.
Per Source IP Flood: UDP
—
Tick the checkbox to prevent a UDP attack on the LAN
port IP address.
Per Source IP Flood: ICMP
—
Tick the checkbox to prevent an ICMP attack on the LAN
port IP address.
TCP/UDP Port Scan
—
Tick the checkbox to prevent a series of systematic queries to
the Residential Gateway for open ports through which to route traffic.
ICMP Smurf
—
Tick the checkbox to prevent the hacker to forge the IP address of the