SIEMENS SE565 Residential Gateway
User’s Guide
Chapter 5 Configuring Security Features
Firewall Settings
SIEMENS
44
•
TCP NULL
An outside device can send an IP packet with the protocol field set to TCP but with an all null TCP header
and data section. If your gateway responds to this attack, it will bring down your system.
•
TCP FIN
An outside device can send an attack using TCP FIN. This attack never allows a data packet to finish
transmitting and brings down your system.
•
TCP XMAS
An outside device can send an attack using TCP packets with all the flags set. This causes your system to
slow to a halt.
•
Fragmented TCP Packet
An outside device can send an attack using fragmented packets to allow an outside user Telnet access to a
device on your network.
•
Fragmented TCP Header
An outside device can send an attack using TCP packets with only a header and no payload. When
numerous packets are sent through the gateway in this manner, your system slows and halts.
•
Fragmented UDP Header
An outside device can send an attack using fragmented UDP headers to bring down a device on your
network.
•
Fragmented ICMP Header
An outside device can send an attack using fragmented ICMP headers to bring down a device on your
network.
•
Inconsistent UDP/IP header lengths
An outside device can send an attack using inconsistent UDP/IP headers to bring down a device on your
network.
•
Inconsistent IP header lengths
An outside device can send an attack using changes in the IP header to zero the fragment offset field. This
will be treated as a complete packet when received and cause your system to halt.