ZyWALL Series Internet Security Gateway
11-4
Firewalls
Table 11-1 Common IP Ports
21 FTP
53 DNS
23 Telnet
80 HTTP
25 SMTP
110
POP3
11.4.2 Types of DoS Attacks
There are four types of DoS attacks:
1. Those that exploit bugs in a TCP/IP implementation.
2. Those that exploit weaknesses in the TCP/IP specification.
3. Brute-force attacks that flood a network with useless data.
4. IP
Spoofing.
1. "
Ping of Death
" and "
Teardrop
" attacks exploit bugs in the TCP/IP implementations of various
computer and host systems.
1-a Ping of Death uses a "ping" utility to create an IP packet that exceeds the maximum 65,536
bytes of data allowed by the IP specification. The oversize packet is then sent to an unsuspecting
system. Systems may crash, hang or reboot.
1-b Teardrop attack exploits weaknesses in the reassembly of IP packet fragments. As data is
transmitted through a network, IP packets are often broken up into smaller chunks. Each fragment
looks like the original IP packet except that it contains an offset field that says, for instance, "This
fragment is carrying bytes 200 through 400 of the original (non fragmented) IP packet." The
Teardrop program creates a series of IP fragments with overlapping offset fields. When these
fragments are reassembled at the destination, some systems will crash, hang, or reboot.
2. Weaknesses in the TCP/IP specification leave it open to "
SYN Flood
" and "
LAND
" attacks. These
attacks are executed during the handshake that initiates a communication session between two
applications.
Summary of Contents for Internet Security Gateway ZyWALL 100
Page 1: ...ZyWALL 10W 30W 50 100 Internet Security Gateway User s Guide Version 3 62 February 2004 ...
Page 8: ......
Page 32: ......
Page 42: ......
Page 60: ......
Page 74: ......
Page 92: ......
Page 102: ......
Page 104: ......
Page 108: ......
Page 124: ...ZyWALL Series Internet Security Gateway 8 16 WAN Screens Figure 8 10 Dial Backup Setup ...
Page 132: ......
Page 134: ......
Page 156: ......
Page 170: ......
Page 218: ......
Page 224: ......
Page 235: ...ZyWALL Series Internet Security Gateway VPN Screens 15 11 Figure 15 5 VPN IKE ...
Page 260: ......
Page 262: ......
Page 282: ...ZyWALL Series Internet Security Gateway 16 20 Certificates Figure 16 9 Trusted CA Details ...
Page 298: ......
Page 300: ......
Page 308: ......
Page 350: ......
Page 351: ...Logs IX Part IX Logs This part provides information and instructions for the logs and reports ...
Page 352: ......
Page 356: ...ZyWALL Series Internet Security Gateway 20 4 Log Screens Figure 20 2 Log Settings ...
Page 364: ......
Page 365: ...Maintenance X Part X Maintenance This part covers the maintenance screens ...
Page 366: ......
Page 378: ......
Page 380: ......
Page 406: ......
Page 420: ......
Page 428: ......
Page 446: ......
Page 466: ......
Page 490: ......
Page 504: ......
Page 524: ......
Page 536: ......
Page 538: ......
Page 554: ......
Page 574: ......
Page 580: ......
Page 586: ......
Page 588: ......
Page 590: ......
Page 592: ......
Page 604: ......
Page 608: ......
Page 610: ......
Page 614: ......
Page 624: ......
Page 634: ......
Page 636: ......
Page 648: ......
Page 654: ......
Page 680: ......
Page 682: ......