Dos Defend Configuration - TP-Link T1600G-18TS Configuration Manual

T1600g series
Hide thumbs Also See for T1600G-18TS:
Table of Contents

Advertisement

Configuring Network Security
5

DoS Defend Configuration

5.1
Using the GUI
Choose the menu Network Security > DoS Defend > DoS Defend to load the following page.
Figure 5-1 Dos Defend
Follow these steps to configure DoS Defend:
1) In the Configure section, enable DoS Protection.
2) In the Defend Table section, select one or more defend types according to your needs.
The following table introduces each type of DoS attack.
Land Attack
Scan SYNFIN
Xmascan
NULL Scan
The attacker sends a specific fake SYN (synchronous) packet to the destination
host. Because both of the source IP address and the destination IP address of
the SYN packet are set to be the IP address of the host, the host will be trapped
in an endless circle of building the initial connection.
The attacker sends the packet with its SYN field and the FIN field set to 1. The
SYN field is used to request initial connection whereas the FIN field is used to
request disconnection. Therefore, the packet of this type is illegal.
The attacker sends the illegal packet with its TCP index, FIN, URG and PSH field
set to 1.
The attacker sends the illegal packet with its TCP index and all the control fields
set to 0. During the TCP connection and data transmission, the packets with all
control fields set to 0 are considered illegal.
DoS Defend Configuration
Configuration Guide
567

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents