Dos Configuration; Dos Protection Configuration Parameters; Table 9.2 Dos Attack Definition - Asus iPBX30 User Manual

Table of Contents

Advertisement

iPBX30 User Manual
9.3.2 DoS Configuration
The iPBX30 has an Attack Defense Engine that protects internal
networks from Denial of Service (DoS) attacks such as SYN
flooding, IP smurfing, LAND, Ping of Death and all re-assembly
attacks. It can drop ICMP redirects and IP loose/strict source routing
packets. For example, a security device with the iPBX30 Firewall
provides protection from "WinNuke", a widely used program to
remotely crash unprotected Windows systems in the Internet. The
iPBX30 Firewall also provides protection from a variety of common
Internet attacks such as IP Spoofing, Ping of Death, Land Attack,
and Reassembly attacks.
9.3.2.1 DoS Protection Configuration Parameters
The table below provides explanation for each type of DoS attacks.
You may check or uncheck the check box to enable or disable the
protection for each type DoS attacks.
Field
Description
I P S o u r c e
Intruder uses "source routing" in order to break into the
Route
target system.
IP Spoofing
Spoofing is the creation of TCP/IP packets using somebody
else's IP address. IP spoofing is an integral part of many
network attacks that do not need to see responses.
Land
Attacker sends out packets to the system with the same
source and destination IP address being that of the target
system and causes the target system trying to resolve an
infinite series of connections to itself. This can cause the
target system to slow down drastically.
Ping of Death
An attacker sends out larger than 64KB packets to cause
certain operating system to crash.
Smurf
An attacker issues ICMP echo requests to some broadcast
addresses. Each datagram has a spoofed IP source address
to be that of a real target-host. Most of the addressed hosts
will respond with an ICMP echo reply, but not to the real
initiating host, instead all replies carry the IP address of the
previously spoofed host as their current destination and
cause the victim host or network to slow down drastically.
Table 9.2. DoS Attack Definition
Chapter 9
67

Advertisement

Table of Contents
loading

Table of Contents