ZyAIR B-5000 User’s Guide
Firewall
28-5
Figure 28-3 SYN Flood
2-b In a
LAND Attack
, hackers flood SYN packets into the network with a spoofed source IP
address of the targeted system. This makes it appear as if the host computer sent the packets to
itself, making the system unavailable while the target system tries to respond to itself.
3. A
brute-force
attack, such as a "Smurf" attack, targets a feature in the IP specification known as
directed or subnet broadcasting, to quickly flood the target network with useless data. A Smurf hacker
floods a router with Internet Control Message Protocol (ICMP) echo request packets (pings). Since the
destination IP address of each packet is the broadcast address of the network, the router will broadcast
the ICMP echo request packet to all hosts on the network. If there are numerous hosts, this will create a
large amount of ICMP echo request and response traffic. If a hacker chooses to spoof the source IP
address of the ICMP echo request packet, the resulting ICMP traffic will not only clog up the
"intermediary" network, but will also congest the network of the spoofed source IP address, known as
the "victim" network. This flood of broadcast traffic consumes all available bandwidth, making
communications impossible.
Содержание ZyAIR B-5000
Страница 1: ...ZyAIR B 5000 Outdoor Access Point Bridge User s Guide Version 1 5 8 200 February 2004 ...
Страница 6: ...ZyAIR B 5000 User s Guide vi ...
Страница 12: ...ZyAIR B 5000 User s Guide xii Table of Contents ...
Страница 20: ...ZyAIR B 5000 User s Guide xx Preface ...
Страница 22: ......
Страница 26: ......
Страница 32: ......
Страница 36: ......
Страница 52: ...ZyAIR B 5000 User s Guide 4 16 Access Point Quick Setup Figure 4 8 Quick Setup Wireless ...
Страница 55: ...ZyAIR B 5000 User s Guide Access Point Quick Setup 4 19 Figure 4 9 Quick Setup Configuration Review ...
Страница 75: ...ZyAIR B 5000 User s Guide Bridge Quick Setup 5 19 Figure 5 11 Quick Setup Configuration Review ...
Страница 78: ......
Страница 80: ...ZyAIR B 5000 User s Guide 6 2 System Setup Figure 6 1 Basic Configuration Tutorial ...
Страница 92: ......
Страница 96: ......
Страница 102: ......
Страница 114: ......
Страница 124: ......
Страница 128: ......
Страница 130: ......
Страница 132: ...ZyAIR B 5000 User s Guide 16 2 Advanced Configuration Figure 16 1 Advanced Configuration Tutorial ...
Страница 148: ...ZyAIR B 5000 User s Guide 20 2 Configuration Save Restart Figure 20 1 Advanced Configuration Overview ...
Страница 152: ......
Страница 172: ......
Страница 174: ......
Страница 182: ......
Страница 184: ......
Страница 214: ......
Страница 226: ......
Страница 227: ...FIREWALL VII Part VII FIREWALL This part introduces firewalls in general and the ZyAIR firewall ...
Страница 228: ......
Страница 242: ......
Страница 252: ......
Страница 272: ......
Страница 282: ......
Страница 284: ......