7 - 6
WiNG 5.2.6 Access Point System Reference Guide
TCP Intercept
A SYN-flooding attack occurs when a hacker floods a server with a barrage
of requests for connection.
Because these messages have unreachable return addresses, the
connections cannot be established. The resulting volume of unresolved
open connections eventually overwhelms the server and can cause it to
deny service to valid requests, thereby preventing legitimate users from
connecting to a Web site, accessing e-mail, using FTP service, and so on.
The TCP intercept feature helps prevent SYN-flooding attacks by
intercepting and validating TCP connection requests. In intercept mode,
the TCP intercept software intercepts TCP synchronization (SYN) packets
from clients to servers that match an extended access list. The software
establishes a connection with the client on behalf of the destination server,
and if successful, establishes the connection with the server on behalf of
the client and knits the two half-connections together transparently. Thus,
connection attempts from unreachable hosts will never reach the server.
The software continues to intercept and forward packets throughout the
duration of the connection. The number of SYNs per second and the
number of concurrent connections proxied depends on the platform,
memory, processor, and other factors. In the case of illegitimate requests,
the software’s aggressive timeouts on half-open connections and its
thresholds on TCP connection requests protect destination servers while
still allowing valid requests.
When establishing a security policy using TCP intercept, you can choose to
intercept all requests or only those coming from specific networks or
destined for specific servers. You can also configure the connection rate
and threshold of outstanding connections. Optionally operate TCP
intercept in watch mode, as opposed to intercept mode. In watch mode,
the software passively watches the connection requests flowing through
the router. If a connection fails to get established in a configurable interval,
the software intervenes and terminates the connection attempt.
TCP Null Scan
Hackers use the TCP NULL scan to identify listening TCP ports. This scan
also uses a series of strangely configured TCP packets, which contain a
sequence number of 0 and no flags. Again, this type of scan can get
through some firewalls and boundary routers that filter incoming TCP
packets with standard flag settings.
If the target device's TCP port is closed, the target device sends a TCP RST
packet in reply. If the target device's TCP port is open, the target discards
the TCP NULL scan, sending no reply.
TCP Post SYN
A remote attacker may be attempting to avoid detection by sending a SYN
frame with a different sequence number than the original SYN. This can
cause an
Intrusion Detection Syste
m (IDS) to become unsynchronized with
the data in a connection. Subsequent frames sent during the connection
are ignored by the IDS.
Summary of Contents for Solutions WiNG 5.2.6
Page 1: ...Motorola Solutions WiNG 5 2 6 Access Point System Reference Guide ...
Page 2: ......
Page 14: ...1 4 WiNG 5 2 6 Access Point System Reference Guide ...
Page 26: ...2 12 WiNG 5 2 6 Access Point System Reference Guide ...
Page 46: ...3 20 WiNG 5 2 6 Access Point System Reference Guide ...
Page 247: ...Device Configuration 5 189 Figure 5 102 Profile Overrides Management Settings screen ...
Page 264: ...6 2 WiNG 5 2 6 Access Point System Reference Guide Figure 6 1 Configuration Wireless ...
Page 392: ...7 32 WiNG 5 2 6 Access Point System Reference Guide ...
Page 438: ...8 46 WiNG 5 6 2 Access Point System Reference Guide ...
Page 514: ...12 12 WiNG 5 2 6 Access Point System Reference Guide Figure 12 6 RF Domain Health screen ...
Page 533: ...Statistics 12 31 Figure 12 18 RF Domain Smart RF Energy Graph ...
Page 597: ...Statistics 12 95 Figure 12 54 Access Point Certificate Trustpoint screen ...
Page 626: ...12 124 WiNG 5 2 6 Access Point System Reference Guide ...
Page 628: ...A 2 WiNG 5 2 6 Access Point System Reference Guide ...
Page 669: ......