![ZyXEL Communications P-660H-T1 v3s User Manual Download Page 122](http://html1.mh-extra.com/html/zyxel-communications/p-660h-t1-v3s/p-660h-t1-v3s_user-manual_944049122.webp)
Chapter 9 Firewalls
P-660H-T1v3s User’s Guide
122
DoS
Denials of Service (DoS) attacks are aimed at devices and networks with a
connection to the Internet. Their goal is not to steal information, but to disable a
device or network so users no longer have access to network resources. The
ZyXEL Device is pre-configured to automatically detect and thwart all known DoS
attacks.
DDoS
A DDoS attack is one in which multiple compromised systems attack a single
target, thereby causing denial of service for users of the targeted system.
LAND Attack
In a LAND attack, hackers flood SYN packets into the network with a spoofed
source IP address of the target system. This makes it appear as if the host
computer sent the packets to itself, making the system unavailable while the
target system tries to respond to itself.
Ping of Death
Ping of Death uses a "ping" utility to create and send an IP packet that exceeds
the maximum 65,536 bytes of data allowed by the IP specification. This may
cause systems to crash, hang or reboot.
SPI
Stateful Packet Inspection (SPI) tracks each connection crossing the firewall and
makes sure it is valid. Filtering decisions are based not only on rules but also
context. For example, traffic from the WAN may only be allowed to cross the
firewall in response to a request from the LAN.
Summary of Contents for P-660H-T1 v3s
Page 2: ......
Page 8: ...Safety Warnings P 660H T1v3s User s Guide 8...
Page 10: ...Contents Overview P 660H T1v3s User s Guide 10...
Page 18: ...Table of Contents P 660H T1v3s User s Guide 18...
Page 19: ...19 PART I User s Guide...
Page 20: ...20...
Page 26: ...Chapter 1 Introduction P 660H T1v3s User s Guide 26...
Page 36: ...Chapter 3 Status Screens P 660H T1v3s User s Guide 36...
Page 66: ...Chapter 5 Setup Wizard P 660H T1v3s User s Guide 66...
Page 67: ...67 PART II Technical Reference...
Page 68: ...68...
Page 88: ...Chapter 6 WAN Setup P 660H T1v3s User s Guide 88...
Page 104: ...Chapter 7 LAN Setup P 660H T1v3s User s Guide 104...
Page 124: ...Chapter 9 Firewalls P 660H T1v3s User s Guide 124...
Page 134: ...Chapter 11 Static Route P 660H T1v3s User s Guide 134...
Page 160: ...Chapter 15 Remote Management P 660H T1v3s User s Guide 160...
Page 176: ...Chapter 17 System Settings P 660H T1v3s User s Guide 176...
Page 202: ...Chapter 21 Troubleshooting P 660H T1v3s User s Guide 202...
Page 210: ...210...
Page 234: ...Appendix A Setting up Your Computer s IP Address P 660H T1v3s User s Guide 234...
Page 244: ...Appendix B Pop up Windows JavaScripts and Java Permissions P 660H T1v3s User s Guide 244...
Page 254: ...Appendix C IP Addresses and Subnetting P 660H T1v3s User s Guide 254...
Page 262: ...Appendix E Legal Information P 660H T1v3s User s Guide 262...
Page 268: ...Index P 660H T1v3s User s Guide 268...
Page 269: ...Index P 660H T1v3s User s Guide 269...
Page 270: ...Index P 660H T1v3s User s Guide 270...