![D-Link DRO-250i User Manual Download Page 120](http://html.mh-extra.com/html/d-link/dro-250i/dro-250i_user-manual_76969120.webp)
Introduction to DRO-250i
DRO-250i User Manual
119
attacks: SYN Flooding, TCP Hijacking, LAND Attack, Win Nuke/
OOBNuke, Christmas Tree SYN / FIN (Jackal), SYN / FIN (zero-sized
DNS zone payload), BackOffice, NetBus, Smurf, Tear Drop, ICMP
Flooding.
Source port:
- Displays the source IP address and the TCP/UDP port that
the intrusion was attempted from.
Destination port:
- Displays the source IP address and the TCP/UDP port
that the intrusion was attempted.
For ICMP flood, Sync flood, and ECHO storm attacks destination IP,
destination port, source IP and source Port are logged as zero in the table shown in
the web-page. These fields are not considered for intrusion detection as the criteria
for the blocking is number of packets (packet count).