7 - 4
WiNG 5.2.6 Access Point System Reference Guide
4. The following
Events
can be filtered on behalf of the Firewall:
Action
If a DoS filter is enabled, chose an action from the drop-down menu to
determine how the Firewall treats the associated DoS attack. Options
include:
Log and Drop
- An entry for the associated DoS attack is added to the log
and then the packets are dropped.
Log Only
- An entry for the associated DoS attack is added to the log. No
further action is taken.
Drop Only
- The DoS packets is dropped. No further action is taken.
Log Level
Select this option to enable logging to the system log. Then select a
standard Syslog level from the
Log Level
drop-down menu.
Ascend
Ascend DoS attacks are a series of attacks that target known
vulnerabilities in various versions of Ascend routers.
Broadcast/
Multicast ICMP
Broadcast or Multicast ICMP DoS attacks are a series of attacks that take
advantage of ICMP behavior in response to echo requests. These usually
involve spoofing the source address of the target and sending ICMP
broadcast or multicast echo requests to the rest of the network and in the
process flooding the target machine with replies.
Chargen
The Chargen attack establishes a Telnet connection to port 19 and
attempts to use the character generator service to create a string of
characters which is then directed to the DNS service on port 53 to disrupt
DNS services.
Fraggle
The Fraggle DoS attack uses a list of broadcast addresses to send spoofed
UDP packets to each broadcast address’ echo port (port 7). Each of those
addresses that have port 7 open will respond to the request generating a
lot of traffic on the network. For those that do not have port 7 open they
will send an unreachable message back to the originator, further clogging
the network with more traffic.
FTP Bounce
The FTP Bounce DoS attack uses a vulnerability in the FTP “PORT”
command as a way to scan ports on a target machine by using another
machine in the middle.
Invalid Protocol
Attackers may use vulnerability in the endpoint implementation by sending
invalid protocol fields, or may misuse the misinterpretation of endpoint
software. This can lead to inadvertent leakage of sensitive network
topology information, call hijacking, or a DoS attack.
TCP IP TTL Zero
The TCP IP TTL Zero DoS attack sends spoofed multicast packets onto the
network which have a
Time To Live
(TTL) of 0. This causes packets to loop
back to the spoofed originating machine, and can cause the network to
overload.
IP Spoof
IP Spoof is a category of Denial of Service attack that sends IP packets with
forged source addresses. This can hide the identity of the attacker.
Summary of Contents for Solutions WiNG 5.2.6
Page 1: ...Motorola Solutions WiNG 5 2 6 Access Point System Reference Guide ...
Page 2: ......
Page 14: ...1 4 WiNG 5 2 6 Access Point System Reference Guide ...
Page 26: ...2 12 WiNG 5 2 6 Access Point System Reference Guide ...
Page 46: ...3 20 WiNG 5 2 6 Access Point System Reference Guide ...
Page 247: ...Device Configuration 5 189 Figure 5 102 Profile Overrides Management Settings screen ...
Page 264: ...6 2 WiNG 5 2 6 Access Point System Reference Guide Figure 6 1 Configuration Wireless ...
Page 392: ...7 32 WiNG 5 2 6 Access Point System Reference Guide ...
Page 438: ...8 46 WiNG 5 6 2 Access Point System Reference Guide ...
Page 514: ...12 12 WiNG 5 2 6 Access Point System Reference Guide Figure 12 6 RF Domain Health screen ...
Page 533: ...Statistics 12 31 Figure 12 18 RF Domain Smart RF Energy Graph ...
Page 597: ...Statistics 12 95 Figure 12 54 Access Point Certificate Trustpoint screen ...
Page 626: ...12 124 WiNG 5 2 6 Access Point System Reference Guide ...
Page 628: ...A 2 WiNG 5 2 6 Access Point System Reference Guide ...
Page 669: ......