Chapter 4: Additional Information
Chapter 4
47
Service attacks, including:
•
Reassembly attacks
•
SYN Attack (SYN Flood)
•
ICMP Flood
•
Ping of Death Attack
•
Tear Drop Attack
•
IP Spoofing Attack
•
LAND Attack
•
Jolt
•
Winnuke Attack (Netbios out-of-bound)
•
OverDrop
•
BONK, BOINK
•
Blind Spoofing
•
Echo/Chargen
•
Storm
•
Smurf Attack
•
Mime Flood
•
De-Militarized Zone (DMZ) support, allowing a LAN side computer to expose all non-filtered
ports to the WAN
•
URL keyword blocking for web access control
NAT
•
With popular ALG support
•
With port triggers
•
With port forwarding, including support for:
16096620 DCW615/25. 04 Addit
6/26/03, 10:45 AM
47