Dos Defend Configuration; Using The Gui - TP-Link Jetstream T1500G-8T User Manual

Hide thumbs Also See for Jetstream T1500G-8T:
Table of Contents

Advertisement

Configuring DoS Defend
2

DoS Defend Configuration

2.1

Using the GUI

Choose the menu SECURITY > DoS Defend to load the following page.
Figure 2-1 DoS Defend
Follow these steps to configure DoS Defend:
1) In the DoS Defend section, enable DoS Protection and click Apply.
2) In the DoS Defend Config section, select one or more defend types according to your
needs and click Apply. The following table introduces each type of DoS attack.
Downloaded from
ManualsNet.com
Land Attack
The attacker sends a specific fake SYN (synchronous) packet to the destination
host. Because both of the source IP address and the destination IP address of
the SYN packet are set to be the IP address of the host, the host will be trapped
in an endless circle of building the initial connection.
Scan SYNFIN
The attacker sends the packet with its SYN field and the FIN field set to 1. The
SYN field is used to request initial connection whereas the FIN field is used to
request disconnection. Therefore, the packet of this type is illegal.
Xmascan
The attacker sends the illegal packet with its TCP index, FIN, URG and PSH field
set to 1.
search engine
DoS Defend Configuration
User Guide
719

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents