Chapter 17 Firewall
Nebula Mobile Router User’s Guide
227
DoS
Denial-of-Service (DoS) attacks are aimed at devices and networks with a connection to the Internet.
Their goal is not to steal information, but to disable a device or network so users no longer have access
to network resources. The Zyxel Device is pre-configured to automatically detect and thwart all known
DoS attacks.
DoS Thresholds
For DoS attacks, the Zyxel Device uses thresholds to determine when to drop sessions that do not
become fully established. These thresholds apply globally to all sessions. You can use the default
threshold values, or you can change them to values more suitable to your security requirements.
DDoS
A Distributed Denial-of-Service (DDoS) attack is one in which multiple compromised systems attack a
single target, thereby causing denial of service for users of the targeted system.
ICMP
Internet Control Message Protocol (ICMP) is a message control and error-reporting protocol between a
host server and a gateway to the Internet. ICMP uses Internet Protocol (IP) datagrams, but the messages
are processed by the TCP/IP software and directly apparent to the application user.
LAND Attack
In a LAND attack, hackers flood SYN packets into the network with a spoofed source IP address of the
target system. This makes it appear as if the host computer sent the packets to itself, making the system
unavailable while the target system tries to respond to itself.
Ping of Death
Ping of Death uses a ‘ping’ utility to create and send an IP packet that exceeds the maximum 65,536
bytes of data allowed by the IP specification. This may cause systems to crash, hang or reboot.
SPI
Stateful Packet Inspection (SPI) tracks each connection crossing the firewall and makes sure it is valid.
Filtering decisions are based not only on rules but also context. For example, traffic from the WAN may
only be allowed to cross the firewall in response to a request from the LAN.
17.2 Firewall
Use the firewall to protect your Zyxel Device and network from attacks by hackers on the Internet and
control access to it.
Содержание LTE3301-PLUS
Страница 16: ...16 PART I User s Guide...
Страница 43: ...Chapter 3 Web Configurator Nebula Mobile Router User s Guide 43 Figure 31 Connection Status...
Страница 50: ...Chapter 3 Web Configurator Nebula Mobile Router User s Guide 50 Figure 36 Check Icons...
Страница 89: ...Nebula Mobile Router User s Guide 89 PART II Technical Reference...
Страница 165: ...Chapter 9 Home Networking Nebula Mobile Router User s Guide 165 Figure 99 Network Setting Home Networking LAN Setup...
Страница 267: ...Chapter 26 Cellular WAN Status Nebula Mobile Router User s Guide 267 Figure 176 System Monitor Cellular WAN Status...
Страница 284: ...Chapter 30 TR 069 Client Nebula Mobile Router User s Guide 284 Figure 187 Maintenance TR 069 Client...
Страница 293: ...Chapter 33 Log Setting Nebula Mobile Router User s Guide 293 Figure 190 Maintenance Log Setting...
Страница 361: ...Index Nebula Mobile Router User s Guide 361 Zyxel Nebula Control Center 18...