Parameter
Select or enter . . .
Whole System
This type of attack sends large numbers of
Flood: SYN
SYN (Synchronization or Start Connection)
packets, which create "half-open" connections
to the Internet and prevent the AP+4 from
accepting any new requests to connect.
Select the check box and enter the number of
SYN Packets/Second that will be accepted.
Whole System
This DoS attack involves large numbers of FIN
Flood: FIN
(Finish) packets, which terminate the
connection between the sender and recipient.
Select the check box and enter the number of
FIN Packets/Second that will be accepted.
Whole System
This type of attack sends a large amount of
Flood: UDP
traffic to ports 7 and 19 on LAN clients.
Select the check box and enter the number of
UDP Packets/Second that will be accepted.
Whole System
This type of attack involves large numbers of
Flood: ICMP
ICMP (Internet Control Message Protocol)
requests, such as ping or netmask, etc.
Select the check box and enter the number of
ICMP Packets/Second that will be accepted.
Per Source IP
This type of attack involves large numbers of
Flood: SYN
SYN packets with the source address spoofed
(faked) to appear to be the address of a LAN
client.
Select the check box and enter the number of
SYN Packets/Second that will be accepted.
Per Source IP
This type of attack involves large numbers of
Flood: FIN
FIN (Finish) packets, with the source address
spoofed to appear to be the address of a LAN
client.
Select the check box and enter the number of
FIN Packets/Second that will be accepted.
Per Source IP
This type of attack involves a large amount of
Flood: UDP
traffic directed to ports 7 and 19 on LAN
clients. In these messages the source address
is spoofed to appear to be the address of a
LAN client.
Select the check box and enter the number of
UDP Packets/Second that will be accepted.
58
Zoom AP+4 User Guide