Chapter 17 Firewall
EMG6726/8726-B10A User’s Guide
186
17.1.2 What You Need to Know
SYN Attack
A SYN attack floods a targeted system with a series of SYN packets. Each packet causes the targeted
system to issue a SYN-ACK response. While the targeted system waits for the ACK that follows the SYN-
ACK, it queues up all outstanding SYN-ACK responses on a backlog queue. SYN-ACKs are moved off the
queue only when an ACK comes back or when an internal timer terminates the three-way handshake.
Once the queue is full, the system will ignore all incoming SYN requests, making the system unavailable
for legitimate users.
DoS
Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the Internet.
Their goal is not to steal information, but to disable a device or network so users no longer have access
to network resources. The EMG is pre-configured to automatically detect and thwart all known DoS
attacks.
DDoS
A DDoS attack is one in which multiple compromised systems attack a single target, thereby causing
denial of service for users of the targeted system.
LAND Attack
In a LAND attack, hackers flood SYN packets into the network with a spoofed source IP address of the
target system. This makes it appear as if the host computer sent the packets to itself, making the system
unavailable while the target system tries to respond to itself.
Ping of Death
Ping of Death uses a "ping" utility to create and send an IP packet that exceeds the maximum 65,536
bytes of data allowed by the IP specification. This may cause systems to crash, hang or reboot.
SPI
Stateful Packet Inspection (SPI) tracks each connection crossing the firewall and makes sure it is valid.
Filtering decisions are based not only on rules but also context. For example, traffic from the WAN may
only be allowed to cross the firewall in response to a request from the LAN.
17.2 The Firewall Screen
Use this screen to set the security level of the firewall on the EMG. Firewall rules are grouped based on
the direction of travel of packets to which they apply.
Click
Security > Firewall
to display the
General
screen.
Содержание EMG6726-B10A
Страница 16: ...16 PART I User s Guide...
Страница 26: ...Chapter 1 Introducing the EMG EMG6726 8726 B10A User s Guide 26 Figure 10 Wall Mounting Example...
Страница 36: ...Chapter 3 Quick Start EMG6726 8726 B10A User s Guide 36 Figure 18 Quick Start Result Summary...
Страница 59: ...59 PART II Technical Reference...
Страница 83: ...Chapter 7 Wireless EMG6726 8726 B10A User s Guide 83 Figure 35 Network Setting Wireless Advanced...
Страница 86: ...Chapter 7 Wireless EMG6726 8726 B10A User s Guide 86 Figure 36 Network Setting Wireless Channel Status...
Страница 141: ...Chapter 10 Quality of Service QoS EMG6726 8726 B10A User s Guide 141 Figure 85 Classification Setup Add Edit...
Страница 211: ...Chapter 22 Voice EMG6726 8726 B10A User s Guide 211 Figure 141 VoIP SIP SIP Account Add new account Edit...
Страница 216: ...Chapter 22 Voice EMG6726 8726 B10A User s Guide 216 Figure 143 VoIP SIP SIP Service Provider Add New Provider Edit...
Страница 279: ...279 PART III Appendices Appendices contain general information Some information may not apply to your device...