RCA DCW615 Manual page 58

Hide thumbs Also See for DCW615:
Table of Contents

Advertisement

Chapter 4: Additional Information
Service attacks, including:
• Reassembly attacks
• SYN Attack (SYN Flood)
• ICMP Flood
• Ping of Death Attack
• Tear Drop Attack
• IP Spoofing Attack
• LAND Attack
• Jolt
• Winnuke Attack (Netbios out-of-bound)
• OverDrop
• BONK, BOINK
• Blind Spoofing
• Echo/Chargen
• Storm
• Smurf Attack
• Mime Flood
De-Militarized Zone (DMZ) support, allowing a LAN side computer to expose all non-filtered
ports to the WAN
URL keyword blocking for web access control
NAT
With popular ALG support
With port triggers
With port forwarding, including support for:
56
Chapter 4

Advertisement

Table of Contents
loading

Table of Contents