Dos Defend - TP-Link TL-SL5428E User Manual

24-port 10/100mbps + 4-port gigabit l2 managed switch
Hide thumbs Also See for TL-SL5428E:
Table of Contents

Advertisement

distinguish the malicious DoS attack packets. Upon detecting the packets, the switch will discard
the illegal packets directly and limit the transmission rate of the legal packets if the over legal
packets may incur a breakdown of the network. The switch can defend a few types of DoS attack
listed in the following table.
DoS Attack Type
Land Attack
Scan SYNFIN
Xmascan
NULL Scan Attack
SYN packet with its source port
less than 1024
Smurf Attack
Blat Attack
Ping Flooding
SYN/SYN-ACK Flooding
winNuke Attack

13.4.1 DoS Defend

On this page, you can enable the DoS Defend type appropriate to your need.
The attacker sends a specific fake SYN packet to the destination Host.
Since both the source IP address and the destination IP address of the SYN
packet are set to be the IP address of the Host, the Host will be trapped in
an endless circle for building the initial connection. The performance of the
network will be reduced extremely.
The attacker sends the packet with its SYN field and the FIN field set to 1.
The SYN field is used to request initial connection whereas the FIN field is
used to request disconnection. Therefore, the packet of this type is illegal.
The switch can defend this type of illegal packet.
The attacker sends the illegal packet with its TCP index, FIN, URG and
PSH field set to 1.
The attacker sends the illegal packet with its TCP index and all the control
fields set to 0. During the TCP connection and data transmission, the
packets with all the control fields set to 0 are considered as the illegal
packets.
The attacker sends the illegal packet with its TCP SYN field set to 1 and
source port less than 1024.
By pretending to be a Host, the attacker broadcasts request packets for
ICMP response in the LAN. When receiving the request packet, all the
Hosts in the LAN will respond and send the reply packets to the actual Host,
which will causes this Host to be attacked.
The attacker sends the illegal packet with its source port and destination
port on Layer 4 the same and its URG field set to 1. Similar to the Land
Attack, the system performance of the attacked Host is reduced since the
Host circularly attempts to build a connection with the attacker.
The attacker floods the destination system with Ping broadcast storm
packets to forbid the system to respond to the legal communication.
The attacker uses a fake IP address to send TCP request packets to the
Server. Upon receiving the request packets, the Server responds with
SYN-ACK packets. Since the IP address is fake, no response will be
returned. The Server will keep on sending SYN-ACK packets. If the attacker
sends overflowing fake request packets, the network resource will be
occupied maliciously and the requests of the legal clients will be denied.
Since the Operation System with bugs can not correctly process the URG
(Urgent Pointer) of TCP packets, the attacker sends this type of packets to
the TCP port139 (NetBIOS) of the Host with the Operation System bugs,
which will cause the Host with a blue screen.
Table 13-1 Defendable DoS Attack Types
165
Description

Advertisement

Table of Contents
loading

Table of Contents