Chapter 35 ADP
ZyWALL USG 300 User’s Guide
645
UDP Flood Attack
UDP is a connection-less protocol and it does not require any connection setup
procedure to transfer data. A UDP flood attack is possible when an attacker sends
a UDP packet to a random port on the victim system. When the victim system
receives a UDP packet, it will determine what application is waiting on the
destination port. When it realizes that there is no application that is waiting on the
port, it will generate an ICMP packet of destination unreachable to the forged
source address. If enough UDP packets are delivered to ports on victim, the
system will go down.
Protocol Anomaly Background Information
The following sections may help you configure the protocol anomaly profile screen
(see
)
HTTP Inspection and TCP/UDP/ICMP Decoders
The following table gives some information on the HTTP inspection, TCP decoder,
UDP decoder and ICMP decoder ZyWALL protocol anomaly rules.
Table 176
HTTP Inspection and TCP/UDP/ICMP Decoders
LABEL
DESCRIPTION
HTTP Inspection
APACHE-WHITESPACE
ATTACK
This rule deals with non-RFC standard of tab for a space
delimiter. Apache uses this, so if you have an Apache
server, you need to enable this option.
ASCII-ENCODING
ATTACK
This rule can detect attacks where malicious attackers use
ASCII-encoding to encode attack strings. Attackers may
use this method to bypass system parameter checks in
order to get information or privileges from a web server.
BARE-BYTE-
UNICODING-ENCODING
ATTACK
Bare byte encoding uses non-ASCII characters as valid
values in decoding UTF-8 values. This is NOT in the HTTP
standard, as all non-ASCII values have to be encoded with
a %. Bare byte encoding allows the user to emulate an IIS
server and interpret non-standard encodings correctly.
BASE36-ENCODING
ATTACK
This is a rule to decode base36-encoded characters. This
rule can detect attacks where malicious attackers use
base36-encoding to encode attack strings. Attackers may
use this method to bypass system parameter checks in
order to get information or privileges from a web server.
DIRECTORY-TRAVERSAL
ATTACK
This rule normalizes directory traversals and self-referential
directories. So, “/abc/this_is_not_a_real_dir/../xyz” get
normalized to “/abc/xyz”. Also, “/abc/./xyz” gets
normalized to “/abc/xyz”. If a user wants to configure an
alert, then specify “yes”, otherwise “no”. This alert may give
false positives since some web sites refer to files using
directory traversals.
Содержание Unified Security Gateway ZyWALL 300
Страница 2: ......
Страница 30: ...Table of Contents ZyWALL USG 300 User s Guide 30 ...
Страница 31: ...31 PART I User s Guide ...
Страница 32: ...32 ...
Страница 38: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 300 User s Guide 38 ...
Страница 46: ...Chapter 2 Features and Applications ZyWALL USG 300 User s Guide 46 ...
Страница 64: ...Chapter 3 Web Configurator ZyWALL USG 300 User s Guide 64 ...
Страница 74: ...Chapter 4 Installation Setup Wizard ZyWALL USG 300 User s Guide 74 ...
Страница 116: ...Chapter 6 Configuration Basics ZyWALL USG 300 User s Guide 116 ...
Страница 128: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 128 Figure 73 Configuration Network Interface WLAN Add ...
Страница 184: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 184 ...
Страница 221: ...221 PART II Technical Reference ...
Страница 222: ...222 ...
Страница 288: ...Chapter 11 Registration ZyWALL USG 300 User s Guide 288 ...
Страница 303: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 303 Figure 269 Configuration Network Interface Ethernet Edit ...
Страница 320: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 320 Figure 275 Configuration Network Interface Cellular Add ...
Страница 330: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 330 Figure 278 Configuration Network Interface WLAN Add No Security ...
Страница 345: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 345 Figure 286 Configuration Network Interface VLAN Edit ...
Страница 355: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 355 Figure 288 Configuration Network Interface Bridge Add ...
Страница 378: ...Chapter 14 Trunks ZyWALL USG 300 User s Guide 378 ...
Страница 394: ...Chapter 15 Policy and Static Routes ZyWALL USG 300 User s Guide 394 ...
Страница 408: ...Chapter 16 Routing Protocols ZyWALL USG 300 User s Guide 408 ...
Страница 428: ...Chapter 19 NAT ZyWALL USG 300 User s Guide 428 ...
Страница 454: ...Chapter 23 Authentication Policy ZyWALL USG 300 User s Guide 454 ...
Страница 472: ...Chapter 24 Firewall ZyWALL USG 300 User s Guide 472 ...
Страница 479: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 479 Figure 355 Configuration VPN IPSec VPN VPN Connection Edit IKE ...
Страница 490: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 490 Figure 358 Configuration VPN IPSec VPN VPN Gateway Edit ...
Страница 534: ...Chapter 27 SSL User Screens ZyWALL USG 300 User s Guide 534 ...
Страница 536: ...Chapter 28 SSL User Application Screens ZyWALL USG 300 User s Guide 536 ...
Страница 544: ...Chapter 29 SSL User File Sharing ZyWALL USG 300 User s Guide 544 ...
Страница 638: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 638 Figure 448 Profiles Protocol Anomaly ...
Страница 682: ...Chapter 37 Content Filter Reports ZyWALL USG 300 User s Guide 682 ...
Страница 700: ...Chapter 38 Anti Spam ZyWALL USG 300 User s Guide 700 ...
Страница 722: ...Chapter 39 Device HA ZyWALL USG 300 User s Guide 722 ...
Страница 738: ...Chapter 40 User Group ZyWALL USG 300 User s Guide 738 ...
Страница 744: ...Chapter 41 Addresses ZyWALL USG 300 User s Guide 744 ...
Страница 756: ...Chapter 43 Schedules ZyWALL USG 300 User s Guide 756 ...
Страница 772: ...Chapter 45 Authentication Method ZyWALL USG 300 User s Guide 772 ...
Страница 794: ...Chapter 46 Certificates ZyWALL USG 300 User s Guide 794 ...
Страница 806: ...Chapter 48 SSL Application ZyWALL USG 300 User s Guide 806 ...
Страница 811: ...Chapter 49 Endpoint Security ZyWALL USG 300 User s Guide 811 ...
Страница 866: ...Chapter 50 System ZyWALL USG 300 User s Guide 866 ...
Страница 873: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 873 ...
Страница 886: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 886 ...
Страница 916: ...Chapter 54 Packet Flow Explore ZyWALL USG 300 User s Guide 916 ...
Страница 918: ...Chapter 55 Reboot ZyWALL USG 300 User s Guide 918 ...
Страница 920: ...Chapter 56 Shutdown ZyWALL USG 300 User s Guide 920 ...
Страница 948: ...Chapter 58 Product Specifications ZyWALL USG 300 User s Guide 948 ...
Страница 1014: ...Appendix A Log Descriptions ZyWALL USG 300 User s Guide 1014 ...
Страница 1124: ...Appendix F Open Software Announcements ZyWALL USG 300 User s Guide 1124 ...
Страница 1156: ...Index ZyWALL USG 300 User s Guide 1156 ...