Block Hacker Attack - Billion BIPAC 6500W User Manual

Wireless broadband vpn firewall router with 4-port 10/100m switch
Table of Contents

Advertisement

already set from the address list, select the MAC address in the list table and click the "Delete"
button. The MAC address will no longer exist.
MAC Address List
Blocked: Select this radio button if you want the MAC addresses in the list to be blocked
from accessing the Internet.
Allowed: Select this radio button if you want to block all the PCs in the LAN from Internet
access except for those with MAC address listed in the list.

3.4.3.5.3 Block Hacker Attack

BIPAC 6500W can automatically detect and block the DoS (Denial of Service) attack if user
enables this function.
This kind of attack is not to achieve the confidential data of this network; instead, it aims to
crush specific equipment or the entire network. If this happens, the users will not be able to
access the network resources. The following hacker patterns are implemented.
Ping of Death (Length > 65535)
-
Land Attack (Same source / destination IP address)
-
IP with zero length
-
Sync flooding
-
Smurf Attack (ICMP Echo with x.x.x.0 or x.x.x.255)
-
-
Snork Attack
-
UDP port loop-back
-
TCP NULL scan
Chapter 3 Configuration
31

Advertisement

Table of Contents
loading

Table of Contents