What Is Land Attack; What Is Brute-Force Attack; What Is Ip Spoofing Attack; What Are The Default Acl Firewall Rules In Amg1302-T10B /Amg1202-T10B - ZyXEL Communications AMG1202-T10B Support Notes

Wireless n-lite adsl2+ 4-port gateway
Hide thumbs Also See for AMG1202-T10B:
Table of Contents

Advertisement

AMG1202-T10B/AMG1302-T10B
Support Notes
three-way handshake. Once the queue is full, the system will ignore all
incoming SYN requests, making the system unavailable for legitimate users.

10. What is LAND attack?

In a LAN attack, hackers flood SYN packets to the network with a spoofed
source IP address of the targeted system. This makes it appear as if the host
computer sent the packets to itself, making the system unavailable while the
target system tries to respond to itself.

11 What is Brute-force attack?

A Brute-force attack, such as 'Smurf' attack, targets a feature in the IP
specification known as directed or subnet broadcasting, to quickly flood the
target network with useless data. A Smurf hacker flood a destination IP
address of each packet is the broadcast address of the network; the router will
broadcast the ICMP echo request packet to all hosts on the network. If there
are numerous hosts, this will create a large amount of ICMP echo request
packet, the resulting ICMP traffic will not only clog up the 'intermediary'
network, but will also congest the network of the spoofed source IP address,
known as the 'victim' network. This flood of broadcast traffic consumes all
available bandwidth, making communications impossible.

12. What is IP Spoofing attack?

Many DoS attacks also use IP Spoofing as part of their attack. IP Spoofing
may be used to break into systems, to hide the hacker's identity, or to magnify
the effect of the DoS attack. IP Spoofing is a technique used to gain
unauthorized access to computers by tricking a router or firewall into thinking
that the communications are coming from within the trusted network. To
engage in IP Spoofing, a hacker must modify the packet headers so that it
appears that the packets originate from a trusted host and should be allowed
through the router or firewall.
13. What are the default ACL firewall rules in AMG1302-T10B
/AMG1202-T10B?
There are two default ACLs pre-configured in the AMG1302-T10B
/AMG1202-T10B, one allows all connections from LAN to WAN and the other
blocks all connections from WAN to LAN except of the DHCP packets.
21
All contents copyright © 2013 ZyXEL Communications Corporation.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the AMG1202-T10B and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Amg1302-t10b

Table of Contents