13 - 116 WiNG 5.5 Access Point System Reference Guide
13.3.23.2 Denial of Service
Firewall
A
denial-of-service attack
(DoS attack) or distributed denial-of-service attack is an attempt to make a computer resource
unavailable to its intended users. Although the means to carry out a DoS attack may vary, it generally consists of concerted
efforts to prevent an Internet site or service from functioning efficiently.
One common method involves saturating the target’s machine with external communications requests, so it cannot respond to
legitimate traffic or responds so slowly as to be rendered effectively unavailable. DoS attacks are implemented by either
forcing the targeted computer(s) to reset, or consume its resources so it can’t provide its intended service.
The DoS screen displays the types of attack, number of times it occurred and the time of last occurrence.
To view access point DoS attack information:
1. Select the
Statistics
menu from the Web UI.
2. Select
System
from the navigation pane (on the left-hand side of the screen). Expand a RF Domain and select one of its
connected access points.
3. Select
F
irewall
and expand the menu to reveal its sub menu items
.
4. Select
Denial of Service
.
Figure 13-75
Access Point - Firewall Denial of Service screen
The
Denial of Service
screen displays the following:
Attack Type
Displays the
Denial of Service
(DoS) attack type.
Count
Displays the number of times the access point’s firewall has detected each listed DoS attack.
Last Occurrence
Displays the when the attack event was last detected by the access point firewall.
Clear All
Select the
Clear All
button to clear the screen of its current status and begin a new data
collection.
Refresh
Select the
Refresh
button to update the screen’s statistics counters to their latest values.
Summary of Contents for AP-7131 Series
Page 1: ...Motorola Solutions WiNG 5 5 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 14: ...x WiNG 5 5 Access Point System Reference Guide ...
Page 22: ...8 WiNG 5 5 Access Point System Reference Guide ...
Page 26: ...1 4 WiNG 5 5 Access Point System Reference Guide ...
Page 74: ...3 36 WiNG 5 5 Access Point System Reference Guide ...
Page 428: ...6 2 WiNG 5 5 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 528: ...6 102 WiNG 5 5 Access Point System Reference Guide ...
Page 610: ...8 40 WiNG 5 5 Access Point System Reference Guide ...
Page 615: ...Services Configuration 9 5 Figure 9 2 Captive Portal Policy screen Basic Configuration tab ...
Page 656: ...9 46 WiNG 5 5 Access Point System Reference Guide ...
Page 670: ...10 14 WiNG 5 5 Access Point System Reference Guide ...
Page 682: ...11 12 WiNG 5 5 Access Point System Reference Guide ...
Page 721: ...Operations 12 39 Figure 12 40 Certificate Management Import New Trustpoint screen ...
Page 738: ...12 56 WiNG 5 5 Access Point System Reference Guide ...
Page 890: ...A 2 WiNG 5 5 Access Point System Reference Guide ...
Page 952: ...B 62 WiNG 5 5 Access Point System Reference Guide ...
Page 953: ......