![TP-Link T2500G-10MPS User Manual Download Page 616](http://html1.mh-extra.com/html/tp-link/t2500g-10mps/t2500g-10mps_user-manual_1145700616.webp)
Configuration Guide 592
Configuring Network Security
DoS Defend Configuration
5
DoS Defend Configuration
5.1 Using the GUI
Choose the menu
Network Security > DoS Defend > DoS Defend
to load the following page.
Figure 5-1
Dos Defend
Follow these steps to configure DoS Defend:
1) In the
Configure
section, enable DoS Protection.
2) In the
Defend Table
section, select one or more defend types according to your needs.
The following table introduces each type of DoS attack.
Land Attack
The attacker sends a specific fake SYN (synchronous) packet to the destination
host. Because both of the source IP address and the destination IP address of
the SYN packet are set to be the IP address of the host, the host will be trapped
in an endless circle of building the initial connection.
Scan SYNFIN
The attacker sends the packet with its SYN field and the FIN field set to 1. The
SYN field is used to request initial connection whereas the FIN field is used to
request disconnection. Therefore, the packet of this type is illegal.
Xmascan
The attacker sends the illegal packet with its TCP index, FIN, URG and PSH field
set to 1.
Summary of Contents for T2500G-10MPS
Page 1: ...User Guide T2500G 10MPS 1910012405 REV1 0 1 April 2018...
Page 24: ...Using the CLI 767 Appendix Default Parameters 773...
Page 145: ...Part 5 Monitoring Traffic CHAPTERS 1 Traffic Monitor 2 Appendix Default Parameters...
Page 172: ...Part 7 Configuring DDM CHAPTERS 1 Overview 2 DDM Configuration 3 Appendix Default Parameters...