UTStarcom UT-300R2 User Manual page 65

Adsl2/2+modem
Table of Contents

Advertisement

Chapter 5 Advanced Configuration / Network Management
create a firewall policy to protect your network against the
following attack types and port scans:
Attacks
Ping of Death Attack
Tear Drop Attack
IP Spoofing Attack
Smurf Attack
Land Attack
You can also choose to Enable or Disable protection against
various denial-of-service type attacks with the DOS Protection
option.
A "denial-of-service" attack is characterized by an explicit
attempt by attackers to prevent legitimate users of a service
from using that service. Examples include: attempts to "flood" a
network, thereby preventing legitimate network traffic, attempts
to disrupt connections between two machines, thereby
preventing access to a service, attempts to prevent a particular
individual from accessing a service, or, attempts to disrupt
service to a specific system or person.
The Service Filtering options allow you to block FTP, Telnet or
response to Pings from the external network. Check the
category you want to block to enable filtering of that type of
packet.
When you have selected the desired Firewall policies, click the
Apply button to enforce the policies. Remember to save any
configuration changes.
Port Scans
Fragmentation Scan
UDP Scan
ICMP Scan
TCP Session Scan
Xmas Scan
63
Null Scan
RST Scan
SYNACK Scan
FIN Scan
ACK Scan

Advertisement

Table of Contents
loading

Table of Contents