Figure 14-4 View Firewall Log; Syn Flood - ZyXEL Communications ZyXEL ZYWALL10 User Manual

Internet security gateway
Hide thumbs Also See for ZyXEL ZYWALL10:
Table of Contents

Advertisement

ZyWALL 10 Internet Security Gateway
Traceroute
Traceroute is a utility used to determine the path a packet takes between two endpoints. Sometimes when a
packet filter firewall is configured incorrectly an attacker can traceroute the firewall gaining knowledge of
the network topology inside the firewall.
Teardrop
Teardrop attacks exploit weaknesses in the reassembly of IP packet fragments. As data is transmitted through
a network, IP packets are often broken up into smaller chunks. Each fragment looks like the original IP
packet except that it contains an offset field that says, for instance, "This fragment is carrying bytes 200
through 400 of the original (non fragmented) IP packet." The Teardrop program creates a series of IP
fragments with overlapping offset fields. When these fragments are reassembled at the destination, some
systems will crash, hang, or reboot.

SYN Flood

SYN Attack floods a targeted system with a series of SYN packets. Each packet causes the targeted system to
issue a SYN-ACK response. While the targeted system waits for the ACK that follows the SYN-ACK, it
queues up all outstanding SYN-ACK responses on what is known as a backlog queue. SYN-ACKs are
moved off the queue only when an ACK comes back or when an internal timer (which is set at relatively long
intervals) terminates the three-way handshake. Once the queue is full, the system will ignore all incoming
SYN requests, making the system unavailable for legitimate users.
Attack types and some background are described in more detail in Chapter 13.
#
Time
124
Jan 1 00
00:01:30
125
Jan 1 00
22:10:10
126
Jan 1 00
23:10:30
127
Jan 1 00
23:20:30
Clear Firewall Log (y/n):
Each log consists of two lines, showing the information described in the following table.
14-4
Packet Information
From:192.168.1.2 To: 10.100.6.45
TCP src port:01060 dest port:00119
From:192.168.1.2 To: 10.100.6.66
UDP src port:01053 dest port:00053
From:192.168.1.2 To: 10.100.6.66
UDP src port:01054 dest port:00053
From:192.168.1.2 To: 10.100.6.45
ICMP type:00008 code:00000

Figure 14-4 View Firewall Log

Reason
Action
not match
none
<2,01>protocol
match
block
<1,02>
not match
none
<1,02>dest port
attack
block
land
Introducing the ZyWALL Firewall

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 10

Table of Contents