Motorola WS2000 - Wireless Switch - Network Management Device System Reference Manual page 61

Wireless switch
Hide thumbs Also See for WS2000 - Wireless Switch - Network Management Device:
Table of Contents

Advertisement

FTP Bounce Attack Check
IP Unaligned Timestamp
Check
Sequence Number Prediction
Check
IP Spoof Attack Check
Reset Attack Check
Sequence Number Out of
Range Check
Mime Flood Attack Check
TCP FIN timeout
Click the
Apply
button to save changes made on this screen.
An FTP bounce attack uses the PORT command in FTP mode to gain
access to arbitrary ports on machines other than the originating client.
An IP unaligned timestamp attack uses a frame with the IP timestamp
option, where the timestamp is not aligned on a 32-bit boundary.
A sequence number prediction attack establishes a three-way TCP
connection with a forged source address, and the attacker guesses the
sequence number of the destination host's response.
An IP Spoof Attack floods a destination host using an IP address that
is not reachable on that interface.
An attack where the TCP session is ended prematurely by an attacking
host.
An attack which uses packet numbers which are out of the valid
sequence range.
A MIME flood attack uses an improperly formatted MIME header in
"sendmail" to cause a buffer overflow on the destination host.
• Use the Max Header Length field to set the maximum allowable header
length. Set this value to be at least 256 bytes.
• Use the Max Headers field to set the maximum number of headers allowed.
Set this value to be at least 12.
Enter a TCP FIN timeout value (in seconds) to determine how long the
WS2K has to wait to receive a FIN before it closes the TCP connection.
4-7
WAN Configuration

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents