Chapter 8 Security
BM2022 Users Guide
124
Click
Security > Firewall > DDOS
to open this screen as shown next.
Figure 60
DDOS Screen
This screen contains the following fields:
Table 48
DDOS
LABEL
DESCRIPTION
Prevent from TCP
SYN Flood
Select this to monitor for and block TCP SYN flood attacks.
A SYN flood is one type of denial of service attack where an overwhelming
number of SYN requests assault a client device.
Prevent from UDP
Flood
Select this to monitor for and block UDP flood attacks.
An UDP flood is a type of denial of service attack where an overwhelming
number of UDP packets assault random ports on a client device. Because the
device is forced to analyze and respond to each packet, it quickly becomes
unreachable to other devices.
Prevent from
ICMP Flood
Select this to monitor for and block ICMP flood attacks.
An ICMP flood is a type of denial of service attack where an overwhelming
number of ICMP ping assault a client device, locking it down and preventing it
from responding to requests from other servers.
Prevent from Port
Scan
Select this to monitor for and block port scan attacks.
A port scan attack is typically the precursor to a full-blown denial of service
attack wherein each port on a device is probed for security holes that can be
exploited. Once a security flaw is discovered, an attacker can initiate the
appropriate denial of service attack or intrusion attack against the client device.
Prevent from
LAND Attack
Select this to monitor for and block LAND attacks.
A Local Area Network Denial (LAND) attack is a type of denial of service attack
where a spoofed TCP SYN packet targets a client devices IP address and forces it
into an infinite recursive loop of querying itself and then replying, effectively
locking it down.
Prevent from IP
Spoof
Select this to monitor for and block IP address spoof attacks.
An IP address spoof is an attack whereby the source IP address in the incoming
IP packets allows a malicious party to masquerade as a legitimate user and gain
access to the client device.
Prevent from
ICMP redirect
Select this to monitor for and block ICMP redirect attacks.
An ICMP redirect attack is one where forged ICMP redirect messages can force
the client device to route packets for certain connections through an attackers
host.
Summary of Contents for BM2022
Page 12: ...15 PART I User s Guide ...
Page 22: ...Chapter 2 Introducing the Web Configurator BM2022 User s Guide 26 ...
Page 55: ...59 PART II Technical Reference ...
Page 56: ...60 ...
Page 60: ...Chapter 5 System Status BM2022 User s Guide 64 ...
Page 86: ...Chapter 6 WiMAX BM2022 User s Guide 90 ...
Page 187: ...Chapter 12 Maintenance BM2022 User s Guide 192 ...
Page 193: ...Chapter 13 Troubleshooting BM2022 User s Guide 198 ...
Page 203: ...Appendix A WiMAX Security BM2022 User s Guide 208 ...
Page 237: ...Appendix C Pop up Windows JavaScript and Java Permissions BM2022 User s Guide 242 ...
Page 273: ...Appendix E Importing Certificates BM2022 User s Guide 278 ...