![TP-Link T2500G-10MPS Скачать руководство пользователя страница 617](http://html1.mh-extra.com/html/tp-link/t2500g-10mps/t2500g-10mps_user-manual_1145700617.webp)
Configuration Guide 593
Configuring Network Security
DoS Defend Configuration
NULL Scan
The attacker sends the illegal packet with its TCP index and all the control fields
set to 0. During the TCP connection and data transmission, the packets with all
control fields set to 0 are considered illegal.
SYN sPort less
1024
The attacker sends the illegal packet with its TCP SYN field set to 1 and source
port smaller than 1024.
Blat Attack
The attacker sends the illegal packet with the same source port and destination
port on Layer 4 and with its URG field set to 1. Similar to the Land Attack, the
system performance of the attacked host is reduced because the Host circularly
attempts to build a connection with the attacker.
Ping Flooding
The attacker floods the destination system with Ping packets, creating a
broadcast storm that makes it impossible for the system to respond to legal
communication.
SYN/SYN-ACK
Flooding
The attacker uses a fake IP address to send TCP request packets to the server.
Upon receiving the request packets, the server responds with SYN-ACK packets.
Since the IP address is fake, no response will be returned. The server will keep
on sending SYN-ACK packets. If the attacker sends overflowing fake request
packets, the network resource will be occupied maliciously and the requests of
the legal clients will be denied.
WinNuke Attack
Because the Operation System with bugs cannot correctly process the URG
(Urgent Pointer) of TCP packets, the attacker sends this type of packets to the
TCP port139 (NetBIOS) of the host with the Operation System bugs, which will
cause the host with a blue screen.
Smurf Attack
The attacker broadcasts large numbers of Internet Control Message Protocol
(ICMP) packets with the intended victim’s spoofed source IP to a computer
network using an IP broadcast address. Most devices on a network will respond
to this by sending a reply to the source IP address. If the number of devices on
the network that receive and respond to these packets is very large, the victim’s
host will be flooded with traffic, which can slow down the victim’s host and cause
the host impossible to work on.
Ping Of Death
The attacker sends an improperly large Internet Control Message Protocol (ICMP)
echo request packet, or a ping packet, with the purpose of overflowing the input
buffers of the destination host and causing the host to crash.
3) Click
Apply
.
5.2 Using the CLI
Follow these steps to configure DoS Defend:
Step 1
configure
Enter global configuration mode.
Step 2
ip dos-prevent
Globally enable the DoS defend feature.
Содержание T2500G-10MPS
Страница 1: ...User Guide T2500G 10MPS 1910012405 REV1 0 1 April 2018...
Страница 24: ...Using the CLI 767 Appendix Default Parameters 773...
Страница 27: ...Part 1 Accessing the Switch CHAPTERS 1 Overview 2 Web Interface Access 3 Command Line Interface Access...
Страница 129: ...Part 4 Configuring LAG CHAPTERS 1 LAG 2 LAG Configuration 3 Configuration Example 4 Appendix Default Parameters...
Страница 145: ...Part 5 Monitoring Traffic CHAPTERS 1 Traffic Monitor 2 Appendix Default Parameters...
Страница 172: ...Part 7 Configuring DDM CHAPTERS 1 Overview 2 DDM Configuration 3 Appendix Default Parameters...
Страница 190: ...Part 8 Configuring L2PT CHAPTERS 1 Overview 2 L2PT Configuration 3 Configuration Example 4 Appendix Default Parameters...
Страница 274: ...Part 13 Configuring GVRP CHAPTERS 1 Overview 2 GVRP Configuration 3 Configuration Example 4 Appendix Default Parameters...
Страница 800: ...Configuration Guide 776 Configuring SNMP RMON Appendix Default Parameters Parameter Default Setting Status Disable...
Страница 803: ...BSMI Notice Pb Cd Hg CrVI PBB PBDE PCB 1 2...