
Chapter 10 Firewalls
161
Nortel Business Secure Router 222 Configuration — Basics
Figure 48
SYN flood
In a LAND Attack, hackers flood SYN packets into the network with a spoofed
source IP address of the targeted system. This makes it appear as if the host
computer sent the packets to itself, making the system unavailable while the target
system tries to respond to itself.
3
A brute force attack, such as a Smurf attack, targets a feature in the IP
specification known as directed or subnet broadcasting, to quickly flood the
target network with useless data. A Smurf hacker floods a router with Internet
Control Message Protocol (ICMP) echo request packets (pings). Since the
destination IP address of each packet is the broadcast address of the network,
the router broadcasts the ICMP echo request packet to all hosts on the
network. If there are numerous hosts, this creates a large amount of ICMP
echo request and response traffic. If a hacker chooses to spoof the source IP
address of the ICMP echo request packet, the resulting ICMP traffic not only
clogs up the intermediary network, but also congests the network of the
spoofed source IP address, known as the victim network. This flood of
broadcast traffic consumes all available bandwidth, making communications
impossible.
Summary of Contents for BSR222
Page 28: ...28 Tables NN47922 500 ...
Page 50: ...50 Chapter 2 Introducing the WebGUI NN47922 500 ...
Page 66: ...66 Chapter 3 Wizard setup NN47922 500 ...
Page 92: ...92 Chapter 5 System screens NN47922 500 ...
Page 104: ...104 Chapter 6 LAN screens NN47922 500 ...
Page 154: ...154 Chapter 9 Static Route screens NN47922 500 ...
Page 196: ...196 Chapter 11 Firewall screens NN47922 500 ...
Page 212: ...212 Chapter 13 VPN NN47922 500 Figure 68 Summary IP Policies ...
Page 256: ...256 Chapter 13 VPN NN47922 500 Figure 82 VPN Client Termination advanced ...
Page 260: ...260 Chapter 13 VPN NN47922 500 ...
Page 264: ...264 Chapter 14 Certificates NN47922 500 Figure 84 My Certificates ...
Page 290: ...290 Chapter 14 Certificates NN47922 500 Figure 95 Trusted remote host details ...
Page 314: ...314 Chapter 16 IEEE 802 1x NN47922 500 ...
Page 318: ...318 Chapter 17 Authentication server NN47922 500 Figure 107 Local User database edit ...
Page 326: ...326 Chapter 17 Authentication server NN47922 500 ...
Page 374: ...374 Chapter 20 Logs Screens NN47922 500 Figure 151 Log settings ...
Page 384: ...384 Chapter 20 Logs Screens NN47922 500 ...
Page 402: ...402 Chapter 22 Maintenance NN47922 500 Figure 170 Restart screen ...