ZyAIR B-5000 User’s Guide
28-6
Firewall
Figure 28-4 Smurf Attack
4. Often, many DoS attacks also employ a technique known as "
IP Spoofing
" as part of their attack. IP
Spoofing may be used to break into systems, to hide the hacker's identity, or to magnify the effect of the
DoS attack. IP Spoofing is a technique used to gain unauthorized access to computers by tricking a
router or firewall into thinking that the communications are coming from within the trusted network. To
engage in IP spoofing, a hacker must modify the packet headers so that it appears that the packets
originate from a trusted host and should be allowed through the router or firewall. The ZyAIR blocks all
IP Spoofing attempts.
5. An
IP Zero Length Attack
is the use of data sizes zero times a normal packet to flood the
communications that are coming from within a trusted network. These data packets are checked and the
victim network wastes time in attempting to do so.
28.5 Enabling the Firewall
The default rules allow LAN-to-WAN traffic and return traffic from the WAN when the connection initiated
from the LAN. You may allow traffic initiated from the WAN by configuring port-forwarding rules
discussed in
section 28.6.
Click
FIREWALL
and
GENERAL
to open the
General Parameters
screen.
Содержание ZyAIR B-5000
Страница 1: ...ZyAIR B 5000 Outdoor Access Point Bridge User s Guide Version 1 5 8 200 February 2004 ...
Страница 6: ...ZyAIR B 5000 User s Guide vi ...
Страница 12: ...ZyAIR B 5000 User s Guide xii Table of Contents ...
Страница 20: ...ZyAIR B 5000 User s Guide xx Preface ...
Страница 22: ......
Страница 26: ......
Страница 32: ......
Страница 36: ......
Страница 52: ...ZyAIR B 5000 User s Guide 4 16 Access Point Quick Setup Figure 4 8 Quick Setup Wireless ...
Страница 55: ...ZyAIR B 5000 User s Guide Access Point Quick Setup 4 19 Figure 4 9 Quick Setup Configuration Review ...
Страница 75: ...ZyAIR B 5000 User s Guide Bridge Quick Setup 5 19 Figure 5 11 Quick Setup Configuration Review ...
Страница 78: ......
Страница 80: ...ZyAIR B 5000 User s Guide 6 2 System Setup Figure 6 1 Basic Configuration Tutorial ...
Страница 92: ......
Страница 96: ......
Страница 102: ......
Страница 114: ......
Страница 124: ......
Страница 128: ......
Страница 130: ......
Страница 132: ...ZyAIR B 5000 User s Guide 16 2 Advanced Configuration Figure 16 1 Advanced Configuration Tutorial ...
Страница 148: ...ZyAIR B 5000 User s Guide 20 2 Configuration Save Restart Figure 20 1 Advanced Configuration Overview ...
Страница 152: ......
Страница 172: ......
Страница 174: ......
Страница 182: ......
Страница 184: ......
Страница 214: ......
Страница 226: ......
Страница 227: ...FIREWALL VII Part VII FIREWALL This part introduces firewalls in general and the ZyAIR firewall ...
Страница 228: ......
Страница 242: ......
Страница 252: ......
Страница 272: ......
Страница 282: ......
Страница 284: ......