74
For SYN Flood, ICMP Echo Storm and ICMP flood, IDS will just warn the user in the Event
Log but it will not be able to protect against such attacks.
Hacker attack types recognized by the IDS
Intrusion Name
Detect Parameter Blacklist Type of Block
Duration
Drop Packet Show Log
Ascend Kill
Ascend Kill data
Src IP
DoS
Yes
Yes
WinNuke
TCP
Port 135, 137~139,
Flag: URG
Src IP
DoS
Yes
Yes
Smurf
ICMP type 8
Des IP is broadcast
Dst IP
Victim
Protection
Yes
Yes
Land attack
SrcIP = DstIP
Yes
Yes
Echo/CharGen Scan
UDP Echo Port and
CharGen Port
Yes
Yes
Echo Scan
UDP Dst Port =
Echo(7)
Src IP
Scan
Yes
Yes
CharGen Scan
UDP Dst Port =
CharGen(19)
Src IP
Scan
Yes
Yes
X’mas Tree Scan
TCP Flag: X’mas
Src IP
Scan
Yes
Yes
IMAP
SYN/FIN Scan
TCP Flag: SYN/FIN
DstPort: IMAP(143)
SrcPort: 0 or 65535
Src IP
Scan
Yes
Yes
SYN/FIN/RST/ACK
Scan
TCP,
No Existing session
And Scan Hosts
more than five.
Src IP
Scan
Yes
Yes
Net Bus Scan
TCP
No Existing session
DstPort = Net Bus
12345,12346, 3456
SrcIP
Scan
Yes
Yes
Back Orifice Scan
UDP,
DstPort
=
Orifice Port (31337)
SrcIP
Scan
Yes
Yes
SYN Flood
Max
TCP
Open
Handshaking Count
(Default 100 c/sec)
Yes
ICMP Flood
Max ICMP Count
(Default 100 c/sec)
Yes
ICMP Echo
Max PING Count
(Default 15 c/sec)
Yes
Summary of Contents for TW-EA514
Page 65: ...64 Hyv ksynn t...
Page 66: ...65...
Page 67: ...1 TW EA514 ADSL2 Wireless Router User s Manual...
Page 74: ...8 1 3 Applications of the TW EA514...
Page 92: ...26 4 3 WAN...
Page 115: ...49 Step 7 WPS set up complete And you have set up security enabled Wi Fi networks...
Page 117: ...51 Step 4 Enter the AP SSID and apply Next button...