Chapter 14 Firewall
VMG1312-B10C User’s Guide
184
14.1.2 What You Need to Know
SYN Attack
A SYN attack floods a targeted system with a series of SYN packets. Each packet causes the
targeted system to issue a SYN-ACK response. While the targeted system waits for the ACK that
follows the SYN-ACK, it queues up all outstanding SYN-ACK responses on a backlog queue. SYN-
ACKs are moved off the queue only when an ACK comes back or when an internal timer terminates
the three-way handshake. Once the queue is full, the system will ignore all incoming SYN requests,
making the system unavailable for legitimate users.
DoS
Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the
Internet. Their goal is not to steal information, but to disable a device or network so users no longer
have access to network resources. The ZyXEL Device is pre-configured to automatically detect and
thwart all known DoS attacks.
DDoS
A DDoS attack is one in which multiple compromised systems attack a single target, thereby
causing denial of service for users of the targeted system.
LAND Attack
In a LAND attack, hackers flood SYN packets into the network with a spoofed source IP address of
the target system. This makes it appear as if the host computer sent the packets to itself, making
the system unavailable while the target system tries to respond to itself.
Ping of Death
Ping of Death uses a "ping" utility to create and send an IP packet that exceeds the maximum
65,536 bytes of data allowed by the IP specification. This may cause systems to crash, hang or
reboot.
SPI
Stateful Packet Inspection (SPI) tracks each connection crossing the firewall and makes sure it is
valid. Filtering decisions are based not only on rules but also context. For example, traffic from the
WAN may only be allowed to cross the firewall in response to a request from the LAN.
Содержание VMG1312-B10C
Страница 4: ...Contents Overview VMG1312 B10C User s Guide 4 Diagnostic 265 Troubleshooting 271 ...
Страница 14: ...Table of Contents VMG1312 B10C User s Guide 14 ...
Страница 15: ...15 PART I User s Guide ...
Страница 16: ...16 ...
Страница 22: ...Chapter 1 Introducing the Device VMG1312 B10C User s Guide 22 ...
Страница 33: ...33 PART II Technical Reference ...
Страница 34: ...34 ...
Страница 64: ...Chapter 5 Broadband VMG1312 B10C User s Guide 64 ...
Страница 100: ...Chapter 6 Wireless VMG1312 B10C User s Guide 100 ...
Страница 124: ...Chapter 7 Home Networking VMG1312 B10C User s Guide 124 ...
Страница 166: ...Chapter 10 Network Address Translation NAT VMG1312 B10C User s Guide 166 ...
Страница 176: ...Chapter 12 Interface Group VMG1312 B10C User s Guide 176 ...
Страница 192: ...Chapter 14 Firewall VMG1312 B10C User s Guide 192 ...
Страница 198: ...Chapter 16 Parental Control VMG1312 B10C User s Guide 198 ...
Страница 208: ...Chapter 18 Certificates VMG1312 B10C User s Guide 208 ...
Страница 211: ...Chapter 19 VPN VMG1312 B10C User s Guide 211 Figure 121 IPSec VPN Add ...
Страница 224: ...Chapter 20 Log VMG1312 B10C User s Guide 224 ...
Страница 234: ...Chapter 24 IGMP Status VMG1312 B10C User s Guide 234 ...
Страница 238: ...Chapter 25 xDSL Statistics VMG1312 B10C User s Guide 238 ...
Страница 242: ...Chapter 27 User Account VMG1312 B10C User s Guide 242 ...
Страница 248: ...Chapter 30 TR 064 VMG1312 B10C User s Guide 248 ...
Страница 252: ...Chapter 31 Time Settings VMG1312 B10C User s Guide 252 ...
Страница 264: ...Chapter 35 Configuration VMG1312 B10C User s Guide 264 ...
Страница 270: ...Chapter 36 Diagnostic VMG1312 B10C User s Guide 270 ...
Страница 288: ...Appendix B Legal Information VMG1312 B10C User s Guide 288 ...