P-660H-Tx v2 Support Notes
11 What is Brute-force attack?
A Brute-force attack, such as 'Smurf' attack, targets a feature in the IP
specification known as directed or subnet broadcasting, to quickly flood the
target network with useless data. A Smurf hacker flood a destination IP
address of each packet as the broadcast address of the network, the router will
broadcast the ICMP echo request packet to all hosts on the network. If there
are numerous hosts, this will create a large amount of ICMP echo request
packet, the resulting ICMP traffic will not only clog up the 'intermediary'
network, but will also congest the network of the spoofed source IP address,
known as the 'victim' network. This flood of broadcast traffic consumes all
available bandwidth, making communications impossible.
12. What is IP Spoofing attack?
Many DoS attacks also use IP Spoofing as part of their attack. IP Spoofing
may be used to break into systems, to hide the hacker's identity, or to magnify
the effect of the DoS attack. IP Spoofing is a technique used to gain
unauthorized access to computers by tricking a router or firewall into thinking
that the communications are coming from within the trusted network. To
engage in IP Spoofing, a hacker must modify the packet headers so that it
appears that the packets originate from a trusted host and should be allowed
through the router or firewall.
13. What are the default ACL firewall rules in P-660H-Tx v2?
There are two default ACLs pre-configured in the P-660H-Tx v2, one allows all
connections from LAN to WAN and the other blocks all connections from WAN
to LAN except of the DHCP packets.
Configuration
1. How do I configure the firewall?
You can use the Web Configurator to configure the firewall for P-660H-Tx v2.
By factory default, if you connect your PC to the LAN Interface of P-660H-Tx
v2, you can access Web Configurator via ‘http://192.168.1.1’.
Note: Don’t forget to type in the Administrator Password.
2. How do I prevent others from configuring my firewall?
There are several ways to protect others from touching the settings of your
firewall.
22
All contents copyright © 2006 ZyXEL Communications Corporation.