Chapter 15 Firewall
VMG1312-B10A User’s Guide
220
15.1.2 What You Need to Know
SYN Attack
A SYN attack floods a targeted system with a series of SYN packets. Each packet causes the
targeted system to issue a SYN-ACK response. While the targeted system waits for the ACK that
follows the SYN-ACK, it queues up all outstanding SYN-ACK responses on a backlog queue. SYN-
ACKs are moved off the queue only when an ACK comes back or when an internal timer terminates
the three-way handshake. Once the queue is full, the system will ignore all incoming SYN requests,
making the system unavailable for legitimate users.
DoS
Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the
Internet. Their goal is not to steal information, but to disable a device or network so users no longer
have access to network resources. The ZyXEL Device is pre-configured to automatically detect and
thwart all known DoS attacks.
DDoS
A DDoS attack is one in which multiple compromised systems attack a single target, thereby
causing denial of service for users of the targeted system.
LAND Attack
In a LAND attack, hackers flood SYN packets into the network with a spoofed source IP address of
the target system. This makes it appear as if the host computer sent the packets to itself, making
the system unavailable while the target system tries to respond to itself.
Ping of Death
Ping of Death uses a "ping" utility to create and send an IP packet that exceeds the maximum
65,536 bytes of data allowed by the IP specification. This may cause systems to crash, hang or
reboot.
SPI
Stateful Packet Inspection (SPI) tracks each connection crossing the firewall and makes sure it is
valid. Filtering decisions are based not only on rules but also context. For example, traffic from the
WAN may only be allowed to cross the firewall in response to a request from the LAN.
Summary of Contents for VWG1312-B10A
Page 2: ......
Page 8: ...Contents Overview VMG1312 B10A User s Guide 8 Troubleshooting 291 ...
Page 18: ...Table of Contents VMG1312 B10A User s Guide 18 ...
Page 19: ...19 PART I User s Guide ...
Page 20: ...20 ...
Page 34: ...Chapter 2 The Web Configurator VMG1312 B10A User s Guide 34 ...
Page 39: ...Chapter 4 Tutorials VMG1312 B10A User s Guide 39 7 Click Apply to save your settings ...
Page 79: ...79 PART II Technical Reference ...
Page 80: ...80 ...
Page 168: ...Chapter 9 Routing VMG1312 B10A User s Guide 168 ...
Page 186: ...Chapter 10 Quality of Service QoS VMG1312 B10A User s Guide 186 ...
Page 212: ...Chapter 13 Interface Group VMG1312 B10A User s Guide 212 ...
Page 228: ...Chapter 15 Firewall VMG1312 B10A User s Guide 228 ...
Page 234: ...Chapter 17 Parental Control VMG1312 B10A User s Guide 234 ...
Page 244: ...Chapter 19 Certificates VMG1312 B10A User s Guide 244 ...
Page 248: ...Chapter 20 Log VMG1312 B10A User s Guide 248 ...
Page 252: ...Chapter 21 Traffic Status VMG1312 B10A User s Guide 252 ...
Page 258: ...Chapter 24 IGMP Status VMG1312 B10A User s Guide 258 ...
Page 262: ...Chapter 25 xDSL Statistics VMG1312 B10A User s Guide 262 ...
Page 264: ...Chapter 26 User Account VMG1312 B10A User s Guide 264 ...
Page 270: ...Chapter 29 TR 064 VMG1312 B10A User s Guide 270 ...
Page 274: ...Chapter 30 Time Settings VMG1312 B10A User s Guide 274 ...
Page 280: ...Chapter 32 Logs Setting VMG1312 B10A User s Guide 280 ...
Page 298: ...Chapter 36 Troubleshooting VMG1312 B10A User s Guide 298 ...
Page 338: ...Appendix C Pop up Windows JavaScripts and Java Permissions VMG1312 B10A User s Guide 338 ...
Page 352: ...Appendix D Wireless LANs VMG1312 B10A User s Guide 352 ...
Page 368: ...Appendix G Legal Information VMG1312 B10A User s Guide 368 ...
Page 376: ...VMG1312 B10A User s Guide 376 Index ...