Motorola Solutions WiNG 5.2.6 Reference Manual page 367

Access point
Table of Contents

Advertisement

TCP Packet
Sequence
TCP XMAS Scan
TCP Header
Fragment
Twinge
UDP Short Header
WINNUKE
5. Select
OK
to update the Denial of Service settings. Select
policy can be invoked at any point in the configuration process by selecting
left-hand side, of the access point user interface.
6. Select the
Storm Control
7. Select the
Activate Firewall Policy
parameters for configuration. Ensure this option stays selected to apply the configuration to the access point profile.
This is an attempt to predict the sequence number used to identify the
packets in a TCP connection, which can be used to counterfeit packets. The
attacker hopes to correctly guess the sequence number to be used by the
sending host. If they can do this, they will be able to send counterfeit
packets to the receiving host which will seem to originate from the sending
host, even though the counterfeit packets may originate from some third
host controlled by the attacker.
The TCP XMAS Scan floods the target system with TCP packets including
the FIN, URG, and PUSH flags. This is used to determine details about the
target system and can crash a system.
Enables the TCP Header Fragment denial of service check in the firewall.
The Twinge DoS attack sends ICMP packets and cycles through using all
ICMP types and codes. This can crash some Windows systems.
Enables the UDP Short Header denial of service check in the firewall.
The WINNUKE DoS attack sends a large amount of data to UDP port 137
to crash the NETBIOS service on windows and can also result on high CPU
utilization on the target machine.
tab.
option on the upper left-hand side of the screen to enable the screen's
Security Configuration
Reset
to revert to the last saved configuration. The Firewall
Activate Firewall Policy
7 - 7
from the upper,

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents