Security Configuration
7 - 5
LAND
The LAND DoS attack sends spoofed packets containing the SYN flag to
the target destination using the target port and IP address as both the
source and destination. This will either crash the target system or result in
high resource utilization slowing down all other processes.
Option Route
Enables the IP Option Route denial of service check in the firewall.
Router
Advertisement
In this attack, the attacker uses ICMP to redirect the network router
function to some other host. If that host can not provide router services, a
DoS of network communications occurs as routing stops. This can also be
modified to single out a specific system, so that only that system is subject
to attack (because only that system sees the 'false' router). By providing
router services from a compromised host, the attacker can also place
themselves in a
man-in-the-middle
situation and take control of any open
channel at will (as mentioned earlier, this is often used with TCP packet
forgery and spoofing to intercept and change open TELNET sessions).
Router Solicit
The ICMP Router Solicitation scan is used to actively find routers on a
network. Of course, a hacker could set up a protocol analyzer to detect
routers as they broadcast routing information on the network. In some
instances, however, routers may not send updates. For example, if the local
network does not have other routers, the router may be configured to not
send routing information packets onto the local network.
ICMP offers a method for router discovery. Clients send ICMP router
solicitation multicasts onto the network, and routers must respond (as
defined in RFC 1122).
By sending ICMP Router Solicitation packets (ICMP type 9) on the network
and listening for ICMP Router Discovery replies (ICMP type 10), hackers
can build a list of all of the routers that exist on a network segment.
Hackers often use this scan to locate routers that do not reply to ICMP echo
requests
Smurf
The Smurf DoS Attack sends ICMP echo requests to a list of broadcast
addresses in a row, and then repeats the requests, thus flooding the
network.
Snork
The Snork DoS attack uses UDP packet broadcasts to consume network
and system resources.
TCP Bad Sequence
Enables a TCP Bad Sequence denial of service check in the firewall.
TCP FIN Scan
Hackers use the TCP FIN scan to identify listening TCP port numbers based
on how the target device reacts to a transaction close request for a TCP
port (even though no connection may exist before these close requests are
made). This type of scan can get through basic firewalls and boundary
routers that filter on incoming TCP packets with the Finish (FIN) and ACK
flag combination. The TCP packets used in this scan include only the TCP
FIN flag setting.
If the target device's TCP port is closed, the target device sends a TCP RST
packet in reply. If the target device's TCP port is open, the target device
discards the FIN and sends no reply.
Summary of Contents for Solutions WiNG 5.2.6
Page 1: ...Motorola Solutions WiNG 5 2 6 Access Point System Reference Guide ...
Page 2: ......
Page 14: ...1 4 WiNG 5 2 6 Access Point System Reference Guide ...
Page 26: ...2 12 WiNG 5 2 6 Access Point System Reference Guide ...
Page 46: ...3 20 WiNG 5 2 6 Access Point System Reference Guide ...
Page 247: ...Device Configuration 5 189 Figure 5 102 Profile Overrides Management Settings screen ...
Page 264: ...6 2 WiNG 5 2 6 Access Point System Reference Guide Figure 6 1 Configuration Wireless ...
Page 392: ...7 32 WiNG 5 2 6 Access Point System Reference Guide ...
Page 438: ...8 46 WiNG 5 6 2 Access Point System Reference Guide ...
Page 514: ...12 12 WiNG 5 2 6 Access Point System Reference Guide Figure 12 6 RF Domain Health screen ...
Page 533: ...Statistics 12 31 Figure 12 18 RF Domain Smart RF Energy Graph ...
Page 597: ...Statistics 12 95 Figure 12 54 Access Point Certificate Trustpoint screen ...
Page 626: ...12 124 WiNG 5 2 6 Access Point System Reference Guide ...
Page 628: ...A 2 WiNG 5 2 6 Access Point System Reference Guide ...
Page 669: ......