Chapter 5 Advanced Configuration / Network Management
63
create a firewall policy to protect your network against the
following attack types and port scans:
Attacks
Port Scans
Ping of Death Attack
Tear Drop Attack
IP Spoofing Attack
Smurf Attack
Land Attack
Fragmentation Scan
UDP Scan
ICMP Scan
TCP Session Scan
Xmas Scan
Null Scan
RST Scan
SYNACK Scan
FIN Scan
ACK Scan
You can also choose to
Enable
or
Disable
protection against
various denial-of-service type attacks with the
DOS Protection
option.
A "denial-of-service" attack is characterized by an explicit
attempt by attackers to prevent legitimate users of a service
from using that service. Examples include: attempts to "flood" a
network, thereby preventing legitimate network traffic, attempts
to disrupt connections between two machines, thereby
preventing access to a service, attempts to prevent a particular
individual from accessing a service, or, attempts to disrupt
service to a specific system or person.
The Service Filtering options allow you to block FTP, Telnet or
response to Pings from the external network. Check the
category you want to block to enable filtering of that type of
packet.
When you have selected the desired Firewall policies, click the
Apply
button to enforce the policies. Remember to save any
configuration changes.
Содержание UT-300R2
Страница 1: ...UT 300R2 ADSL2 2 Modem USER GUIDE UTStarcom Inc...
Страница 5: ...iii Traffic Statistics 76 Diagnostics 77 8 Attachments 79 Technical Specifications 79 Glossary 82...
Страница 83: ...Chapter 8 Attachments 83 WAN Wide Area Network WEP Wired Equivalent Privacy WLAN Wireless Local Area Network...
Страница 84: ......